java.security 44 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075
  1. # ===========================================================================
  2. # Licensed Materials - Property of IBM
  3. # "Restricted Materials of IBM"
  4. #
  5. # IBM SDK, Java(tm) Technology Edition, v8
  6. # (C) Copyright IBM Corp. 2010, 2017. All Rights Reserved
  7. #
  8. # US Government Users Restricted Rights - Use, duplication or disclosure
  9. # restricted by GSA ADP Schedule Contract with IBM Corp.
  10. # ===========================================================================
  11. #
  12. # This is the "master security properties file".
  13. #
  14. # An alternate java.security properties file may be specified
  15. # from the command line via the system property
  16. #
  17. # -Djava.security.properties=<URL>
  18. #
  19. # This properties file appends to the master security properties file.
  20. # If both properties files specify values for the same key, the value
  21. # from the command-line properties file is selected, as it is the last
  22. # one loaded.
  23. #
  24. # Also, if you specify
  25. #
  26. # -Djava.security.properties==<URL> (2 equals),
  27. #
  28. # then that properties file completely overrides the master security
  29. # properties file.
  30. #
  31. # To disable the ability to specify an additional properties file from
  32. # the command line, set the key security.overridePropertiesFile
  33. # to false in the master security properties file. It is set to true
  34. # by default.
  35. # In this file, various security properties are set for use by
  36. # java.security classes. This is where users can statically register
  37. # Cryptography Package Providers ("providers" for short). The term
  38. # "provider" refers to a package or set of packages that supply a
  39. # concrete implementation of a subset of the cryptography aspects of
  40. # the Java Security API. A provider may, for example, implement one or
  41. # more digital signature algorithms or message digest algorithms.
  42. #
  43. # Each provider must implement a subclass of the Provider class.
  44. # To register a provider in this master security properties file,
  45. # specify the Provider subclass name and priority in the format
  46. #
  47. # security.provider.<n>=<className>
  48. #
  49. # This declares a provider, and specifies its preference
  50. # order n. The preference order is the order in which providers are
  51. # searched for requested algorithms (when no specific provider is
  52. # requested). The order is 1-based; 1 is the most preferred, followed
  53. # by 2, and so on.
  54. #
  55. # <className> must specify the subclass of the Provider class whose
  56. # constructor sets the values of various properties that are required
  57. # for the Java Security API to look up the algorithms or other
  58. # facilities implemented by the provider.
  59. #
  60. # There must be at least one provider specification in java.security.
  61. # There is a default provider that comes standard with the JDK. It
  62. # is called the "SUN" provider, and its Provider subclass
  63. # named Sun appears in the sun.security.provider package. Thus, the
  64. # "SUN" provider is registered via the following:
  65. #
  66. # security.provider.1=sun.security.provider.Sun
  67. #
  68. # (The number 1 is used for the default provider.)
  69. #
  70. # Note: Providers can be dynamically registered instead by calls to
  71. # either the addProvider or insertProviderAt method in the Security
  72. # class.
  73. #
  74. # List of providers and their preference orders (see above):
  75. #
  76. security.provider.1=com.ibm.jsse2.IBMJSSEProvider2
  77. security.provider.2=com.ibm.crypto.provider.IBMJCE
  78. security.provider.3=com.ibm.security.jgss.IBMJGSSProvider
  79. security.provider.4=com.ibm.security.cert.IBMCertPath
  80. security.provider.5=com.ibm.security.sasl.IBMSASL
  81. security.provider.6=com.ibm.xml.crypto.IBMXMLCryptoProvider
  82. security.provider.7=com.ibm.xml.enc.IBMXMLEncProvider
  83. security.provider.8=com.ibm.security.jgss.mech.spnego.IBMSPNEGO
  84. security.provider.9=sun.security.provider.Sun
  85. #
  86. # IBMJCE and IBMSecureRandom SecureRandom seed source.
  87. #
  88. # Select the primary source of seed data for the "SHA1PRNG" and
  89. # "NativePRNG" SecureRandom implementations in the "IBMJCE"
  90. # provider and the "SHA1PRNG" SecureRandom implementation
  91. # in the "IBMSecureRandom" provider.
  92. # (Other SecureRandom implementations might also use this property.)
  93. #
  94. # On Unix-like systems (for example, Solaris/Linux/MacOS), the
  95. # "NativePRNG" and "SHA1PRNG" implementations obtains seed data from
  96. # special device files such as file:/dev/random.
  97. #
  98. # On Windows systems, specifying the URLs "file:/dev/random" or
  99. # "file:/dev/urandom" will enable the native Microsoft CryptoAPI seeding
  100. # mechanism for SHA1PRNG.
  101. #
  102. # By default, an attempt is made to use the entropy gathering device
  103. # specified by the "securerandom.source" Security property. If an
  104. # exception occurs while accessing the specified URL:
  105. #
  106. # SHA1PRNG:
  107. # the traditional system/thread activity algorithm will be used.
  108. #
  109. # NativePRNG:
  110. # a default value of /dev/random will be used. If neither
  111. # are available, the implementation will be disabled.
  112. # "file" is the only currently supported protocol type.
  113. #
  114. # The entropy gathering device can also be specified with the System
  115. # property "java.security.egd". For example:
  116. #
  117. # % java -Djava.security.egd=file:/dev/random MainClass
  118. #
  119. # Specifying this System property will override the
  120. # "securerandom.source" Security property.
  121. #
  122. # In addition, if "file:/dev/random" or "file:/dev/urandom" is
  123. # specified, the "NativePRNG" implementation will be more preferred than
  124. # SHA1PRNG in the IBMJCE provider.
  125. #
  126. securerandom.source=file:/dev/urandom
  127. #
  128. # A list of known strong SecureRandom implementations.
  129. #
  130. # To help guide applications in selecting a suitable strong
  131. # java.security.SecureRandom implementation, Java distributions should
  132. # indicate a list of known strong implementations using the property.
  133. #
  134. # This is a comma-separated list of algorithm and/or algorithm:provider
  135. # entries.
  136. #
  137. securerandom.strongAlgorithms=SHA2DRBG:IBMJCE
  138. #
  139. # Class to instantiate as the javax.security.auth.login.Configuration
  140. # provider.
  141. #
  142. login.configuration.provider=com.ibm.security.auth.login.ConfigFile
  143. #
  144. # Default login configuration file
  145. #
  146. #login.config.url.1=file:${user.home}/.java.login.config
  147. #
  148. # Class to instantiate as the system Policy. This is the name of the class
  149. # that will be used as the Policy object.
  150. #
  151. policy.provider=sun.security.provider.PolicyFile
  152. # The default is to have a single system-wide policy file,
  153. # and a policy file in the user's home directory.
  154. policy.url.1=file:${java.home}/lib/security/java.policy
  155. policy.url.2=file:${java.home}/lib/security/java.pol
  156. policy.url.3=file:///${user.home}/.java.policy
  157. # whether or not we expand properties in the policy file
  158. # if this is set to false, properties (${...}) will not be expanded in policy
  159. # files.
  160. policy.expandProperties=true
  161. # whether or not we allow an extra policy to be passed on the command line
  162. # with -Djava.security.policy=somefile. Comment out this line to disable
  163. # this feature.
  164. policy.allowSystemProperty=true
  165. # whether or not we look into the IdentityScope for trusted Identities
  166. # when encountering a 1.1 signed JAR file. If the identity is found
  167. # and is trusted, we grant it AllPermission.
  168. policy.ignoreIdentityScope=false
  169. #
  170. # Default keystore type.
  171. #
  172. keystore.type=jks
  173. #
  174. # Controls compatibility mode for the JKS keystore type.
  175. #
  176. # When set to 'true', the JKS keystore type supports loading
  177. # keystore files in either JKS or PKCS12 format. When set to 'false'
  178. # it supports loading only JKS keystore files.
  179. #
  180. keystore.type.compat=true
  181. #
  182. # List of comma-separated packages that start with or equal this string
  183. # will cause a security exception to be thrown when
  184. # passed to checkPackageAccess unless the
  185. # corresponding RuntimePermission ("accessClassInPackage."+package) has
  186. # been granted.
  187. package.access=sun.,\
  188. com.ibm.oti.,\
  189. com.intel.fortress.,\
  190. com.sun.xml.internal.,\
  191. com.sun.imageio.,\
  192. com.sun.istack.internal.,\
  193. com.sun.jmx.,\
  194. com.sun.media.sound.,\
  195. com.sun.naming.internal.,\
  196. com.sun.proxy.,\
  197. com.sun.corba.se.,\
  198. com.sun.org.apache.bcel.internal.,\
  199. com.sun.org.apache.regexp.internal.,\
  200. com.sun.org.apache.xerces.internal.,\
  201. com.sun.org.apache.xpath.internal.,\
  202. com.sun.org.apache.xalan.internal.extensions.,\
  203. com.sun.org.apache.xalan.internal.lib.,\
  204. com.sun.org.apache.xalan.internal.res.,\
  205. com.sun.org.apache.xalan.internal.templates.,\
  206. com.sun.org.apache.xalan.internal.utils.,\
  207. com.sun.org.apache.xalan.internal.xslt.,\
  208. com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
  209. com.sun.org.apache.xalan.internal.xsltc.compiler.,\
  210. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  211. com.sun.org.apache.xalan.internal.xsltc.util.,\
  212. com.sun.org.apache.xml.internal.res.,\
  213. com.sun.org.apache.xml.internal.security.,\
  214. com.sun.org.apache.xml.internal.serializer.utils.,\
  215. com.sun.org.apache.xml.internal.utils.,\
  216. com.sun.org.glassfish.,\
  217. com.oracle.xmlns.internal.,\
  218. com.oracle.webservices.internal.,\
  219. com.ibm.stax.,\
  220. com.ibm.xml.jaxp.datatype.,\
  221. com.ibm.xml.resolver.,\
  222. com.ibm.xml.xlxp.api.event.,\
  223. com.ibm.xml.xlxp.api.jaxp.impl.,\
  224. com.ibm.xml.xlxp.api.sax.impl.,\
  225. com.ibm.xml.xlxp.api.stax.events.,\
  226. com.ibm.xml.xlxp.api.stax.msg.,\
  227. com.ibm.xml.xlxp.api.stax.serializer.,\
  228. com.ibm.xml.xlxp.api.util.,\
  229. com.ibm.xml.xlxp.scan.msg.,\
  230. com.ibm.xml.xlxp.scan.util.,\
  231. com.ibm.xtq.ast.parsers.xpath.,\
  232. com.ibm.xtq.ast.parsers.xslt.,\
  233. com.ibm.xtq.ast.res.,\
  234. com.ibm.xtq.ast.visit.,\
  235. com.ibm.xtq.bcel.,\
  236. com.ibm.xtq.common.utils.,\
  237. com.ibm.xtq.utils.,\
  238. com.ibm.xtq.xml.datamodel.,\
  239. com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
  240. com.ibm.xtq.xml.dtm.utils.,\
  241. com.ibm.xtq.xml.experimental.,\
  242. com.ibm.xtq.xml.res.,\
  243. com.ibm.xtq.xml.types.,\
  244. com.ibm.xtq.xml.unicode.normalize.,\
  245. com.ibm.xtq.xml.utils.,\
  246. com.ibm.xtq.xml.xdm.dom.,\
  247. com.ibm.xtq.xml.xdm.ref.,\
  248. com.ibm.xtq.xml.xdm.res.,\
  249. com.ibm.xtq.xpath.jaxp.,\
  250. com.ibm.xtq.xslt.cmdline.,\
  251. com.ibm.xtq.xslt.jaxp.interpreter.,\
  252. com.ibm.xtq.xslt.res.,\
  253. com.ibm.xtq.xslt.runtime.debug.,\
  254. com.ibm.xtq.xslt.runtime.output.,\
  255. com.ibm.xtq.xslt.runtime.res.,\
  256. com.ibm.xtq.xslt.runtime.v2.,\
  257. com.ibm.xtq.xslt.translator.v1.,\
  258. com.ibm.xtq.xslt.translator.v2.,\
  259. com.ibm.xtq.xslt.typechecker.,\
  260. com.ibm.xtq.xslt.xylem.autof.,\
  261. com.ibm.xtq.xslt.xylem.codegen.,\
  262. com.ibm.xtq.xslt.xylem.interpreter.,\
  263. com.ibm.xtq.xslt.xylem.optimizers.,\
  264. com.ibm.xtq.xslt.xylem.parser.,\
  265. com.ibm.xtq.xslt.xylem.partialeval.,\
  266. com.ibm.xtq.xslt.xylem.types.,\
  267. com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
  268. com.ibm.xtq.xslt.xylem.xpath20.parser.,\
  269. com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
  270. com.ibm.xylem.annot.meta.,\
  271. com.ibm.xylem.builders.,\
  272. com.ibm.xylem.codegen.,\
  273. com.ibm.xylem.commandline.,\
  274. com.ibm.xylem.config.,\
  275. com.ibm.xylem.drivers.,\
  276. com.ibm.xylem.interpreter.,\
  277. com.ibm.xylem.parser.,\
  278. com.ibm.xylem.res.,\
  279. com.ibm.xylem.types.,\
  280. com.ibm.xylem.utils.,\
  281. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  282. com.sun.org.apache.xerces.internal.dom.,\
  283. com.sun.org.apache.xerces.internal.jaxp.,\
  284. com.sun.org.apache.xerces.internal.parsers.,\
  285. com.sun.org.apache.xpath.internal.jaxp.,\
  286. com.sun.xml.internal.stream.,\
  287. org.apache.html.dom.,\
  288. org.apache.wml.,\
  289. org.apache.xalan.client.,\
  290. org.apache.xalan.extensions.,\
  291. org.apache.xalan.lib.sql.,\
  292. org.apache.xalan.res.,\
  293. org.apache.xalan.serialize.,\
  294. org.apache.xalan.templates.,\
  295. org.apache.xalan.trace.,\
  296. org.apache.xalan.transformer.,\
  297. org.apache.xalan.xslt.,\
  298. org.apache.xalan.xsltc.cmdline.,\
  299. org.apache.xerces.dom.events.,\
  300. org.apache.xerces.dom3.as.,\
  301. org.apache.xerces.impl.dtd.,\
  302. org.apache.xerces.impl.dv.util.,\
  303. org.apache.xerces.impl.io.,\
  304. org.apache.xerces.impl.msg.,\
  305. org.apache.xerces.impl.validation.,\
  306. org.apache.xerces.impl.xpath.,\
  307. org.apache.xerces.impl.xs.,\
  308. org.apache.xerces.util.,\
  309. org.apache.xerces.xinclude.,\
  310. org.apache.xerces.xni.grammars.,\
  311. org.apache.xerces.xpointer.,\
  312. org.apache.xerces.xs.datatypes.,\
  313. org.apache.xml.dtm.ref.dom2dtm.,\
  314. org.apache.xml.dtm.ref.sax2dtm.,\
  315. org.apache.xml.res.,\
  316. org.apache.xml.serializer.charmap.,\
  317. org.apache.xml.serializer.dom3.,\
  318. org.apache.xml.serializer.unicode.,\
  319. org.apache.xml.serializer.utils.,\
  320. org.apache.xml.utils.,\
  321. org.apache.xmlcommons.,\
  322. org.apache.xpath.axes.,\
  323. org.apache.xpath.compiler.,\
  324. org.apache.xpath.functions.,\
  325. org.apache.xpath.objects.,\
  326. org.apache.xpath.operations.,\
  327. org.apache.xpath.patterns.,\
  328. org.apache.xpath.res.,\
  329. oracle.jrockit.jfr.,\
  330. org.jcp.xml.dsig.internal.,\
  331. com.ibm.rmi.channel.,\
  332. com.ibm.rmi.corba.,\
  333. com.ibm.rmi.iiop.,\
  334. com.ibm.rmi.io.,\
  335. com.ibm.rmi.pi.,\
  336. com.ibm.rmi.poa.,\
  337. com.ibm.rmi.ras.,\
  338. com.ibm.rmi.transport.,\
  339. com.ibm.rmi.util.,\
  340. com.ibm.CORBA.channel.orb.,\
  341. com.ibm.CORBA.iiop.,\
  342. com.ibm.CORBA.nio.,\
  343. com.ibm.CORBA.poa.,\
  344. com.ibm.CORBA.transport.,\
  345. jdk.internal.,\
  346. jdk.nashorn.internal.,\
  347. jdk.nashorn.tools.,\
  348. com.sun.activation.registries.,\
  349. com.sun.java.accessibility.,\
  350. com.sun.browser.,\
  351. com.sun.glass.,\
  352. com.sun.javafx.,\
  353. com.sun.media.,\
  354. com.sun.openpisces.,\
  355. com.sun.prism.,\
  356. com.sun.scenario.,\
  357. com.sun.t2k.,\
  358. com.sun.pisces.,\
  359. com.sun.webkit.,\
  360. jdk.management.resource.internal.
  361. #
  362. # List of comma-separated packages that start with or equal this string
  363. # will cause a security exception to be thrown when
  364. # passed to checkPackageDefinition unless the
  365. # corresponding RuntimePermission ("defineClassInPackage."+package) has
  366. # been granted.
  367. #
  368. # by default, none of the class loaders supplied with the JDK call
  369. # checkPackageDefinition.
  370. #
  371. package.definition=sun.,\
  372. com.sun.xml.internal.,\
  373. com.sun.imageio.,\
  374. com.sun.istack.internal.,\
  375. com.sun.jmx.,\
  376. com.sun.media.sound.,\
  377. com.sun.naming.internal.,\
  378. com.sun.proxy.,\
  379. com.sun.corba.se.,\
  380. com.sun.org.apache.bcel.internal.,\
  381. com.sun.org.apache.regexp.internal.,\
  382. com.sun.org.apache.xerces.internal.,\
  383. com.sun.org.apache.xpath.internal.,\
  384. com.sun.org.apache.xalan.internal.extensions.,\
  385. com.sun.org.apache.xalan.internal.lib.,\
  386. com.sun.org.apache.xalan.internal.res.,\
  387. com.sun.org.apache.xalan.internal.templates.,\
  388. com.sun.org.apache.xalan.internal.utils.,\
  389. com.sun.org.apache.xalan.internal.xslt.,\
  390. com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
  391. com.sun.org.apache.xalan.internal.xsltc.compiler.,\
  392. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  393. com.sun.org.apache.xalan.internal.xsltc.util.,\
  394. com.sun.org.apache.xml.internal.res.,\
  395. com.sun.org.apache.xml.internal.security.,\
  396. com.sun.org.apache.xml.internal.serializer.utils.,\
  397. com.sun.org.apache.xml.internal.utils.,\
  398. com.sun.org.glassfish.,\
  399. com.oracle.xmlns.internal.,\
  400. com.oracle.webservices.internal.,\
  401. com.ibm.stax.,\
  402. com.ibm.xml.jaxp.datatype.,\
  403. com.ibm.xml.resolver.,\
  404. com.ibm.xml.xlxp.api.event.,\
  405. com.ibm.xml.xlxp.api.jaxp.impl.,\
  406. com.ibm.xml.xlxp.api.sax.impl.,\
  407. com.ibm.xml.xlxp.api.stax.events.,\
  408. com.ibm.xml.xlxp.api.stax.msg.,\
  409. com.ibm.xml.xlxp.api.stax.serializer.,\
  410. com.ibm.xml.xlxp.api.util.,\
  411. com.ibm.xml.xlxp.scan.msg.,\
  412. com.ibm.xml.xlxp.scan.util.,\
  413. com.ibm.xtq.ast.parsers.xpath.,\
  414. com.ibm.xtq.ast.parsers.xslt.,\
  415. com.ibm.xtq.ast.res.,\
  416. com.ibm.xtq.ast.visit.,\
  417. com.ibm.xtq.bcel.,\
  418. com.ibm.xtq.common.utils.,\
  419. com.ibm.xtq.utils.,\
  420. com.ibm.xtq.xml.datamodel.,\
  421. com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
  422. com.ibm.xtq.xml.dtm.utils.,\
  423. com.ibm.xtq.xml.experimental.,\
  424. com.ibm.xtq.xml.res.,\
  425. com.ibm.xtq.xml.types.,\
  426. com.ibm.xtq.xml.unicode.normalize.,\
  427. com.ibm.xtq.xml.utils.,\
  428. com.ibm.xtq.xml.xdm.dom.,\
  429. com.ibm.xtq.xml.xdm.ref.,\
  430. com.ibm.xtq.xml.xdm.res.,\
  431. com.ibm.xtq.xpath.jaxp.,\
  432. com.ibm.xtq.xslt.cmdline.,\
  433. com.ibm.xtq.xslt.jaxp.interpreter.,\
  434. com.ibm.xtq.xslt.res.,\
  435. com.ibm.xtq.xslt.runtime.debug.,\
  436. com.ibm.xtq.xslt.runtime.output.,\
  437. com.ibm.xtq.xslt.runtime.res.,\
  438. com.ibm.xtq.xslt.runtime.v2.,\
  439. com.ibm.xtq.xslt.translator.v1.,\
  440. com.ibm.xtq.xslt.translator.v2.,\
  441. com.ibm.xtq.xslt.typechecker.,\
  442. com.ibm.xtq.xslt.xylem.autof.,\
  443. com.ibm.xtq.xslt.xylem.codegen.,\
  444. com.ibm.xtq.xslt.xylem.interpreter.,\
  445. com.ibm.xtq.xslt.xylem.optimizers.,\
  446. com.ibm.xtq.xslt.xylem.parser.,\
  447. com.ibm.xtq.xslt.xylem.partialeval.,\
  448. com.ibm.xtq.xslt.xylem.types.,\
  449. com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
  450. com.ibm.xtq.xslt.xylem.xpath20.parser.,\
  451. com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
  452. com.ibm.xylem.annot.meta.,\
  453. com.ibm.xylem.builders.,\
  454. com.ibm.xylem.codegen.,\
  455. com.ibm.xylem.commandline.,\
  456. com.ibm.xylem.config.,\
  457. com.ibm.xylem.drivers.,\
  458. com.ibm.xylem.interpreter.,\
  459. com.ibm.xylem.parser.,\
  460. com.ibm.xylem.res.,\
  461. com.ibm.xylem.types.,\
  462. com.ibm.xylem.utils.,\
  463. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  464. com.sun.org.apache.xerces.internal.dom.,\
  465. com.sun.org.apache.xerces.internal.jaxp.,\
  466. com.sun.org.apache.xerces.internal.parsers.,\
  467. com.sun.org.apache.xpath.internal.jaxp.,\
  468. com.sun.xml.internal.stream.,\
  469. org.apache.html.dom.,\
  470. org.apache.wml.,\
  471. org.apache.xalan.client.,\
  472. org.apache.xalan.extensions.,\
  473. org.apache.xalan.lib.sql.,\
  474. org.apache.xalan.res.,\
  475. org.apache.xalan.serialize.,\
  476. org.apache.xalan.templates.,\
  477. org.apache.xalan.trace.,\
  478. org.apache.xalan.transformer.,\
  479. org.apache.xalan.xslt.,\
  480. org.apache.xalan.xsltc.cmdline.,\
  481. org.apache.xerces.dom.events.,\
  482. org.apache.xerces.dom3.as.,\
  483. org.apache.xerces.impl.dtd.,\
  484. org.apache.xerces.impl.dv.util.,\
  485. org.apache.xerces.impl.io.,\
  486. org.apache.xerces.impl.msg.,\
  487. org.apache.xerces.impl.validation.,\
  488. org.apache.xerces.impl.xpath.,\
  489. org.apache.xerces.impl.xs.,\
  490. org.apache.xerces.util.,\
  491. org.apache.xerces.xinclude.,\
  492. org.apache.xerces.xni.grammars.,\
  493. org.apache.xerces.xpointer.,\
  494. org.apache.xerces.xs.datatypes.,\
  495. org.apache.xml.dtm.ref.dom2dtm.,\
  496. org.apache.xml.dtm.ref.sax2dtm.,\
  497. org.apache.xml.res.,\
  498. org.apache.xml.serializer.charmap.,\
  499. org.apache.xml.serializer.dom3.,\
  500. org.apache.xml.serializer.unicode.,\
  501. org.apache.xml.serializer.utils.,\
  502. org.apache.xml.utils.,\
  503. org.apache.xmlcommons.,\
  504. org.apache.xpath.axes.,\
  505. org.apache.xpath.compiler.,\
  506. org.apache.xpath.functions.,\
  507. org.apache.xpath.objects.,\
  508. org.apache.xpath.operations.,\
  509. org.apache.xpath.patterns.,\
  510. org.apache.xpath.res.,\
  511. oracle.jrockit.jfr.,\
  512. org.jcp.xml.dsig.internal.,\
  513. jdk.internal.,\
  514. jdk.nashorn.internal.,\
  515. jdk.nashorn.tools.,\
  516. com.sun.activation.registries.,\
  517. com.sun.java.accessibility.,\
  518. com.sun.browser.,\
  519. com.sun.glass.,\
  520. com.sun.javafx.,\
  521. com.sun.media.,\
  522. com.sun.openpisces.,\
  523. com.sun.prism.,\
  524. com.sun.scenario.,\
  525. com.sun.t2k.,\
  526. com.sun.pisces.,\
  527. com.sun.webkit.,\
  528. jdk.management.resource.internal.
  529. #
  530. # Determines whether this properties file can be appended to
  531. # or overridden on the command line via -Djava.security.properties
  532. #
  533. security.overridePropertiesFile=true
  534. #
  535. # Determines the default key and trust manager factory algorithms for
  536. # the javax.net.ssl package.
  537. #
  538. ssl.KeyManagerFactory.algorithm=IbmX509
  539. ssl.TrustManagerFactory.algorithm=PKIX
  540. #
  541. # The Java-level namelookup cache policy for successful lookups:
  542. #
  543. # any negative value: caching forever
  544. # any positive value: the number of seconds to cache an address for
  545. # zero: do not cache
  546. #
  547. # default value is forever (FOREVER). For security reasons, this
  548. # caching is made forever when a security manager is set. When a security
  549. # manager is not set, the default behavior in this implementation
  550. # is to cache for 30 seconds.
  551. #
  552. # NOTE: setting this to anything other than the default value can have
  553. # serious security implications. Do not set it unless
  554. # you are sure you are not exposed to DNS spoofing attack.
  555. #
  556. #networkaddress.cache.ttl=-1
  557. # The Java-level namelookup cache policy for failed lookups:
  558. #
  559. # any negative value: cache forever
  560. # any positive value: the number of seconds to cache negative lookup results
  561. # zero: do not cache
  562. #
  563. # In some Microsoft Windows networking environments that employ
  564. # the WINS name service in addition to DNS, name service lookups
  565. # that fail may take a noticeably long time to return (approx. 5 seconds).
  566. # For this reason the default caching policy is to maintain these
  567. # results for 10 seconds.
  568. #
  569. #
  570. networkaddress.cache.negative.ttl=10
  571. #
  572. # Properties to configure OCSP for certificate revocation checking
  573. #
  574. # Enable OCSP
  575. #
  576. # By default, OCSP is not used for certificate revocation checking.
  577. # This property enables the use of OCSP when set to the value "true".
  578. #
  579. # NOTE: SocketPermission is required to connect to an OCSP responder.
  580. #
  581. # Example,
  582. # ocsp.enable=true
  583. #
  584. # Location of the OCSP responder
  585. #
  586. # By default, the location of the OCSP responder is determined implicitly
  587. # from the certificate being validated. This property explicitly specifies
  588. # the location of the OCSP responder. The property is used when the
  589. # Authority Information Access extension (defined in RFC 3280) is absent
  590. # from the certificate or when it requires overriding.
  591. #
  592. # Example,
  593. # ocsp.responderURL=http://ocsp.example.net:80
  594. #
  595. # Subject name of the OCSP responder's certificate
  596. #
  597. # By default, the certificate of the OCSP responder is that of the issuer
  598. # of the certificate being validated. This property identifies the certificate
  599. # of the OCSP responder when the default does not apply. Its value is a string
  600. # distinguished name (defined in RFC 2253) which identifies a certificate in
  601. # the set of certificates supplied during cert path validation. In cases where
  602. # the subject name alone is not sufficient to uniquely identify the certificate
  603. # then both the "ocsp.responderCertIssuerName" and
  604. # "ocsp.responderCertSerialNumber" properties must be used instead. When this
  605. # property is set then those two properties are ignored.
  606. #
  607. # Example,
  608. # ocsp.responderCertSubjectName="CN=OCSP Responder, O=XYZ Corp"
  609. #
  610. # Issuer name of the OCSP responder's certificate
  611. #
  612. # By default, the certificate of the OCSP responder is that of the issuer
  613. # of the certificate being validated. This property identifies the certificate
  614. # of the OCSP responder when the default does not apply. Its value is a string
  615. # distinguished name (defined in RFC 2253) which identifies a certificate in
  616. # the set of certificates supplied during cert path validation. When this
  617. # property is set then the "ocsp.responderCertSerialNumber" property must also
  618. # be set. When the "ocsp.responderCertSubjectName" property is set then this
  619. # property is ignored.
  620. #
  621. # Example,
  622. # ocsp.responderCertIssuerName="CN=Enterprise CA, O=XYZ Corp"
  623. #
  624. # Serial number of the OCSP responder's certificate
  625. #
  626. # By default, the certificate of the OCSP responder is that of the issuer
  627. # of the certificate being validated. This property identifies the certificate
  628. # of the OCSP responder when the default does not apply. Its value is a string
  629. # of hexadecimal digits (colon or space separators may be present) which
  630. # identifies a certificate in the set of certificates supplied during cert path
  631. # validation. When this property is set then the "ocsp.responderCertIssuerName"
  632. # property must also be set. When the "ocsp.responderCertSubjectName" property
  633. # is set then this property is ignored.
  634. #
  635. # Example,
  636. # ocsp.responderCertSerialNumber=2A:FF:00
  637. #
  638. # Policy for failed Kerberos KDC lookups:
  639. #
  640. # When a KDC is unavailable (network error, service failure, etc), it is
  641. # put inside a blacklist and accessed less often for future requests. The
  642. # value (case-insensitive) for this policy can be:
  643. #
  644. # tryLast
  645. # KDCs in the blacklist are always tried after those not on the list.
  646. #
  647. # tryLess[:max_retries,timeout]
  648. # KDCs in the blacklist are still tried by their order in the configuration,
  649. # but with smaller max_retries and timeout values. max_retries and timeout
  650. # are optional numerical parameters (default 1 and 5000, which means once
  651. # and 5 seconds). Please notes that if any of the values defined here is
  652. # more than what is defined in krb5.conf, it will be ignored.
  653. #
  654. # Whenever a KDC is detected as available, it is removed from the blacklist.
  655. # The blacklist is reset when krb5.conf is reloaded. You can add
  656. # refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
  657. # reloaded whenever a JAAS authentication is attempted.
  658. #
  659. # Example,
  660. # krb5.kdc.bad.policy = tryLast
  661. # krb5.kdc.bad.policy = tryLess:2,2000
  662. krb5.kdc.bad.policy = tryLast
  663. # Algorithm restrictions for certification path (CertPath) processing
  664. #
  665. # In some environments, certain algorithms or key lengths may be undesirable
  666. # for certification path building and validation. For example, "MD2" is
  667. # generally no longer considered to be a secure hash algorithm. This section
  668. # describes the mechanism for disabling algorithms based on algorithm name
  669. # and/or key length. This includes algorithms used in certificates, as well
  670. # as revocation information such as CRLs and signed OCSP Responses.
  671. #
  672. # The syntax of the disabled algorithm string is described as this Java
  673. # BNF-style:
  674. # DisabledAlgorithms:
  675. # " DisabledAlgorithm { , DisabledAlgorithm } "
  676. #
  677. # DisabledAlgorithm:
  678. # AlgorithmName [Constraint] { '&' Constraint }
  679. #
  680. # AlgorithmName:
  681. # (see below)
  682. #
  683. # Constraint:
  684. # KeySizeConstraint, CertConstraint
  685. #
  686. # KeySizeConstraint:
  687. # keySize Operator DecimalInteger
  688. #
  689. # Operator:
  690. # <= | < | == | != | >= | >
  691. #
  692. # DecimalInteger:
  693. # DecimalDigits
  694. #
  695. # DecimalDigits:
  696. # DecimalDigit {DecimalDigit}
  697. #
  698. # DecimalDigit: one of
  699. # 1 2 3 4 5 6 7 8 9 0
  700. #
  701. # CertConstraint
  702. # jdkCA
  703. #
  704. # The "AlgorithmName" is the standard algorithm name of the disabled
  705. # algorithm. See "Java Cryptography Architecture Standard Algorithm Name
  706. # Documentation" for information about Standard Algorithm Names. Matching
  707. # is performed using a case-insensitive sub-element matching rule. (For
  708. # example, in "SHA1withECDSA" the sub-elements are "SHA1" for hashing and
  709. # "ECDSA" for signatures.) If the assertion "AlgorithmName" is a
  710. # sub-element of the certificate algorithm name, the algorithm will be
  711. # rejected during certification path building and validation. For example,
  712. # the assertion algorithm name "DSA" will disable all certificate algorithms
  713. # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
  714. # will not disable algorithms related to "ECDSA".
  715. #
  716. # A "Constraint" provides further guidance for the algorithm being specified.
  717. # The "KeySizeConstraint" requires a key of a valid size range if the
  718. # "AlgorithmName" is of a key algorithm. The "DecimalInteger" indicates the
  719. # key size specified in number of bits. For example, "RSA keySize <= 1024"
  720. # indicates that any RSA key with key size less than or equal to 1024 bits
  721. # should be disabled, and "RSA keySize < 1024, RSA keySize > 2048" indicates
  722. # that any RSA key with key size less than 1024 or greater than 2048 should
  723. # be disabled. Note that the "KeySizeConstraint" only makes sense to key
  724. # algorithms.
  725. #
  726. # "CertConstraint" specifies additional constraints for
  727. # certificates that contain algorithms that are restricted:
  728. #
  729. # "jdkCA" prohibits the specified algorithm only if the algorithm is used
  730. # in a certificate chain that terminates at a marked trust anchor in the
  731. # lib/security/cacerts keystore. All other chains are not affected.
  732. # If the jdkCA constraint is not set, then all chains using the
  733. # specified algorithm are restricted. jdkCA may only be used once in
  734. # a DisabledAlgorithm expression.
  735. # Example: To apply this constraint to SHA-1 certificates, include
  736. # the following: "SHA1 jdkCA"
  737. #
  738. # When an algorithm must satisfy more than one constraint, it must be
  739. # delimited by an ampersand '&'. For example, to restrict certificates in a
  740. # chain that terminate at a distribution provided trust anchor and contain
  741. # RSA keys that are less than or equal to 1024 bits, add the following
  742. # constraint: "RSA keySize <= 1024 & jdkCA".
  743. #
  744. # All DisabledAlgorithms expressions are processed in the order defined in the
  745. # property. This requires lower keysize constraints to be specified
  746. # before larger keysize constraints of the same algorithm. For example:
  747. # "RSA keySize < 1024 & jdkCA, RSA keySize < 2048".
  748. #
  749. # Note: This property is currently used by Oracle's PKIX implementation. It
  750. # is not guaranteed to be examined and used by other implementations.
  751. #
  752. # Example:
  753. # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
  754. #
  755. #
  756. jdk.certpath.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, \
  757. DSA keySize < 1024, EC keySize < 224
  758. # Algorithm restrictions for signed JAR files
  759. #
  760. # In some environments, certain algorithms or key lengths may be undesirable
  761. # for signed JAR validation. For example, "MD2" is generally no longer
  762. # considered to be a secure hash algorithm. This section describes the
  763. # mechanism for disabling algorithms based on algorithm name and/or key length.
  764. # JARs signed with any of the disabled algorithms or key sizes will be treated
  765. # as unsigned.
  766. #
  767. # The syntax of the disabled algorithm string is described as follows:
  768. # DisabledAlgorithms:
  769. # " DisabledAlgorithm { , DisabledAlgorithm } "
  770. #
  771. # DisabledAlgorithm:
  772. # AlgorithmName [Constraint]
  773. #
  774. # AlgorithmName:
  775. # (see below)
  776. #
  777. # Constraint:
  778. # KeySizeConstraint
  779. #
  780. # KeySizeConstraint:
  781. # keySize Operator KeyLength
  782. #
  783. # Operator:
  784. # <= | < | == | != | >= | >
  785. #
  786. # KeyLength:
  787. # Integer value of the algorithm's key length in bits
  788. #
  789. # Note: This property is currently used by the JDK Reference
  790. # implementation. It is not guaranteed to be examined and used by other
  791. # implementations.
  792. #
  793. jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024
  794. # Algorithm restrictions for Secure Socket Layer/Transport Layer Security
  795. # (SSL/TLS) processing
  796. #
  797. # In some environments, certain algorithms or key lengths may be undesirable
  798. # when using SSL/TLS. This section describes the mechanism for disabling
  799. # algorithms during SSL/TLS security parameters negotiation, including
  800. # protocol version negotiation, cipher suites selection, peer authentication
  801. # and key exchange mechanisms.
  802. #
  803. # Disabled algorithms will not be negotiated for SSL/TLS connections, even
  804. # if they are enabled explicitly in an application.
  805. #
  806. # For PKI-based peer authentication and key exchange mechanisms, this list
  807. # of disabled algorithms will also be checked during certification path
  808. # building and validation, including algorithms used in certificates, as
  809. # well as revocation information such as CRLs and signed OCSP Responses.
  810. # This is in addition to the jdk.certpath.disabledAlgorithms property above.
  811. #
  812. # See the specification of "jdk.certpath.disabledAlgorithms" for the
  813. # syntax of the disabled algorithm string.
  814. #
  815. # Note: This property is currently used by the JDK Reference implementation.
  816. # It is not guaranteed to be examined and used by other implementations.
  817. #
  818. # Example:
  819. # jdk.tls.disabledAlgorithms=MD5, SSLv3, DSA, RSA keySize < 2048
  820. jdk.tls.disabledAlgorithms=SSLv3, RC4, MD5withRSA, DH keySize < 768, 3DES_EDE_CBC, DESede, \
  821. EC keySize < 224
  822. # Legacy algorithms for Secure Socket Layer/Transport Layer Security (SSL/TLS)
  823. # processing in JSSE implementation.
  824. #
  825. # In some environments, a certain algorithm may be undesirable but it
  826. # cannot be disabled because of its use in legacy applications. Legacy
  827. # algorithms may still be supported, but applications should not use them
  828. # as the security strength of legacy algorithms are usually not strong enough
  829. # in practice.
  830. #
  831. # During SSL/TLS security parameters negotiation, legacy algorithms will
  832. # not be negotiated unless there are no other candidates.
  833. #
  834. # The syntax of the legacy algorithms string is described as this Java
  835. # BNF-style:
  836. # LegacyAlgorithms:
  837. # " LegacyAlgorithm { , LegacyAlgorithm } "
  838. #
  839. # LegacyAlgorithm:
  840. # AlgorithmName (standard JSSE algorithm name)
  841. #
  842. # See the specification of security property "jdk.certpath.disabledAlgorithms"
  843. # for the syntax and description of the "AlgorithmName" notation.
  844. #
  845. # Per SSL/TLS specifications, cipher suites have the form:
  846. # SSL_KeyExchangeAlg_WITH_CipherAlg_MacAlg
  847. # or
  848. # TLS_KeyExchangeAlg_WITH_CipherAlg_MacAlg
  849. #
  850. # For example, the cipher suite TLS_RSA_WITH_AES_128_CBC_SHA uses RSA as the
  851. # key exchange algorithm, AES_128_CBC (128 bits AES cipher algorithm in CBC
  852. # mode) as the cipher (encryption) algorithm, and SHA-1 as the message digest
  853. # algorithm for HMAC.
  854. #
  855. # The LegacyAlgorithm can be one of the following standard algorithm names:
  856. # 1. JSSE cipher suite name, e.g., TLS_RSA_WITH_AES_128_CBC_SHA
  857. # 2. JSSE key exchange algorithm name, e.g., RSA
  858. # 3. JSSE cipher (encryption) algorithm name, e.g., AES_128_CBC
  859. # 4. JSSE message digest algorithm name, e.g., SHA
  860. #
  861. # See SSL/TLS specifications and "Java Cryptography Architecture Standard
  862. # Algorithm Name Documentation" for information about the algorithm names.
  863. #
  864. # Note: This property is currently used by the JDK Reference implementation.
  865. # It is not guaranteed to be examined and used by other implementations.
  866. # There is no guarantee the property will continue to exist or be of the
  867. # same syntax in future releases.
  868. #
  869. # Example:
  870. # jdk.tls.legacyAlgorithms=DH_anon, DES_CBC, SSL_RSA_WITH_RC4_128_MD5
  871. #
  872. jdk.tls.legacyAlgorithms= \
  873. K_NULL, C_NULL, M_NULL, \
  874. DHE_DSS_EXPORT, DHE_RSA_EXPORT, DH_anon_EXPORT, DH_DSS_EXPORT, \
  875. DH_RSA_EXPORT, RSA_EXPORT, \
  876. DH_anon, ECDH_anon, \
  877. RC4_128, RC4_40, DES_CBC, DES40_CBC
  878. # The pre-defined default finite field Diffie-Hellman ephemeral (DHE)
  879. # parameters for Transport Layer Security (SSL/TLS/DTLS) processing.
  880. #
  881. # In traditional SSL/TLS/DTLS connections where finite field DHE parameters
  882. # negotiation mechanism is not used, the server offers the client group
  883. # parameters, base generator g and prime modulus p, for DHE key exchange.
  884. # It is recommended to use dynamic group parameters. This property defines
  885. # a mechanism that allows you to specify custom group parameters.
  886. #
  887. # The syntax of this property string is described as this Java BNF-style:
  888. # DefaultDHEParameters:
  889. # DefinedDHEParameters { , DefinedDHEParameters }
  890. #
  891. # DefinedDHEParameters:
  892. # "{" DHEPrimeModulus , DHEBaseGenerator "}"
  893. #
  894. # DHEPrimeModulus:
  895. # HexadecimalDigits
  896. #
  897. # DHEBaseGenerator:
  898. # HexadecimalDigits
  899. #
  900. # HexadecimalDigits:
  901. # HexadecimalDigit { HexadecimalDigit }
  902. #
  903. # HexadecimalDigit: one of
  904. # 0 1 2 3 4 5 6 7 8 9 A B C D E F a b c d e f
  905. #
  906. # Whitespace characters are ignored.
  907. #
  908. # The "DefinedDHEParameters" defines the custom group parameters, prime
  909. # modulus p and base generator g, for a particular size of prime modulus p.
  910. # The "DHEPrimeModulus" defines the hexadecimal prime modulus p, and the
  911. # "DHEBaseGenerator" defines the hexadecimal base generator g of a group
  912. # parameter. It is recommended to use safe primes for the custom group
  913. # parameters.
  914. #
  915. # If this property is not defined or the value is empty, the underlying JSSE
  916. # provider's default group parameter is used for each connection.
  917. #
  918. # If the property value does not follow the grammar, or a particular group
  919. # parameter is not valid, the connection will fall back and use the
  920. # underlying JSSE provider's default group parameter.
  921. #
  922. # Note: This property is currently used by OpenJDK's JSSE implementation. It
  923. # is not guaranteed to be examined and used by other implementations.
  924. #
  925. # Example:
  926. # jdk.tls.server.defaultDHEParameters=
  927. # { \
  928. # FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 \
  929. # 29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD \
  930. # EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245 \
  931. # E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED \
  932. # EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381 \
  933. # FFFFFFFF FFFFFFFF, 2}
  934. #
  935. # The policy for the XML Signature secure validation mode. The mode is
  936. # enabled by setting the property "org.jcp.xml.dsig.secureValidation" to
  937. # true with the javax.xml.crypto.XMLCryptoContext.setProperty() method,
  938. # or by running the code with a SecurityManager.
  939. #
  940. # Policy:
  941. # Constraint {"," Constraint }
  942. # Constraint:
  943. # AlgConstraint | MaxTransformsConstraint | MaxReferencesConstraint |
  944. # ReferenceUriSchemeConstraint | KeySizeConstraint | OtherConstraint
  945. # AlgConstraint
  946. # "disallowAlg" Uri
  947. # MaxTransformsConstraint:
  948. # "maxTransforms" Integer
  949. # MaxReferencesConstraint:
  950. # "maxReferences" Integer
  951. # ReferenceUriSchemeConstraint:
  952. # "disallowReferenceUriSchemes" String { String }
  953. # KeySizeConstraint:
  954. # "minKeySize" KeyAlg Integer
  955. # OtherConstraint:
  956. # "noDuplicateIds" | "noRetrievalMethodLoops"
  957. #
  958. # For AlgConstraint, Uri is the algorithm URI String that is not allowed.
  959. # See the XML Signature Recommendation for more information on algorithm
  960. # URI Identifiers. For KeySizeConstraint, KeyAlg is the standard algorithm
  961. # name of the key type (ex: "RSA"). If the MaxTransformsConstraint,
  962. # MaxReferencesConstraint or KeySizeConstraint (for the same key type) is
  963. # specified more than once, only the last entry is enforced.
  964. #
  965. # Note: This property is currently used by the JDK Reference implementation. It
  966. # is not guaranteed to be examined and used by other implementations.
  967. #
  968. jdk.xml.dsig.secureValidationPolicy=\
  969. disallowAlg http://www.w3.org/TR/1999/REC-xslt-19991116,\
  970. disallowAlg http://www.w3.org/2001/04/xmldsig-more#rsa-md5,\
  971. disallowAlg http://www.w3.org/2001/04/xmldsig-more#hmac-md5,\
  972. disallowAlg http://www.w3.org/2001/04/xmldsig-more#md5,\
  973. maxTransforms 5,\
  974. maxReferences 30,\
  975. disallowReferenceUriSchemes file http https,\
  976. minKeySize RSA 1024,\
  977. minKeySize DSA 1024,\
  978. noDuplicateIds,\
  979. noRetrievalMethodLoops
  980. #
  981. # Serialization process-wide filter
  982. #
  983. # A filter, if configured, is used by java.io.ObjectInputStream during
  984. # deserialization to check the contents of the stream.
  985. # A filter is configured as a sequence of patterns, each pattern is either
  986. # matched against the name of a class in the stream or defines a limit.
  987. # Patterns are separated by ";" (semicolon).
  988. # Whitespace is significant and is considered part of the pattern.
  989. #
  990. # If a pattern includes a "=", it sets a limit.
  991. # If a limit appears more than once the last value is used.
  992. # Limits are checked before classes regardless of the order in the sequence of patterns.
  993. # If any of the limits are exceeded, the filter status is REJECTED.
  994. #
  995. # maxdepth=value - the maximum depth of a graph
  996. # maxrefs=value - the maximum number of internal references
  997. # maxbytes=value - the maximum number of bytes in the input stream
  998. # maxarray=value - the maximum array length allowed
  999. #
  1000. # Other patterns, from left to right, match the class or package name as
  1001. # returned from Class.getName.
  1002. # If the class is an array type, the class or package to be matched is the element type.
  1003. # Arrays of any number of dimensions are treated the same as the element type.
  1004. # For example, a pattern of "!example.Foo", rejects creation of any instance or
  1005. # array of example.Foo.
  1006. #
  1007. # If the pattern starts with "!", the status is REJECTED if the remaining pattern
  1008. # is matched; otherwise the status is ALLOWED if the pattern matches.
  1009. # If the pattern ends with ".**" it matches any class in the package and all subpackages.
  1010. # If the pattern ends with ".*" it matches any class in the package.
  1011. # If the pattern ends with "*", it matches any class with the pattern as a prefix.
  1012. # If the pattern is equal to the class name, it matches.
  1013. # Otherwise, the status is UNDECIDED.
  1014. #
  1015. #jdk.serialFilter=pattern;pattern
  1016. #
  1017. # RMI Registry Serial Filter
  1018. #
  1019. # The filter pattern uses the same format as jdk.serialFilter.
  1020. # This filter can override the builtin filter if additional types need to be
  1021. # allowed or rejected from the RMI Registry.
  1022. #
  1023. #sun.rmi.registry.registryFilter=pattern;pattern
  1024. sun.rmi.registry.registryFilter=javax.rmi.CORBA.Stub
  1025. #
  1026. # RMI Distributed Garbage Collector (DGC) Serial Filter
  1027. #
  1028. # The filter pattern uses the same format as jdk.serialFilter.
  1029. # This filter can override the builtin filter if additional types need to be
  1030. # allowed or rejected from the RMI DGC.
  1031. #
  1032. # The builtin DGC filter can approximately be represented as the filter pattern:
  1033. #
  1034. #sun.rmi.transport.dgcFilter=\
  1035. # java.rmi.server.ObjID;\
  1036. # java.rmi.server.UID;\
  1037. # java.rmi.dgc.VMID;\
  1038. # java.rmi.dgc.Lease;\
  1039. # maxdepth=5;maxarray=10000