java.security 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673
  1. # ===========================================================================
  2. # Licensed Materials - Property of IBM
  3. # "Restricted Materials of IBM"
  4. #
  5. # IBM SDK, Java(tm) Technology Edition, v7
  6. # (C) Copyright IBM Corp. 2010, 2014. All Rights Reserved
  7. #
  8. # US Government Users Restricted Rights - Use, duplication or disclosure
  9. # restricted by GSA ADP Schedule Contract with IBM Corp.
  10. # ===========================================================================
  11. #
  12. # This is the "master security properties file".
  13. #
  14. # In this file, various security properties are set for use by
  15. # java.security classes. This is where users can statically register
  16. # Cryptography Package Providers ("providers" for short). The term
  17. # "provider" refers to a package or set of packages that supply a
  18. # concrete implementation of a subset of the cryptography aspects of
  19. # the Java Security API. A provider may, for example, implement one or
  20. # more digital signature algorithms or message digest algorithms.
  21. #
  22. # Each provider must implement a subclass of the Provider class.
  23. # To register a provider in this master security properties file,
  24. # specify the Provider subclass name and priority in the format
  25. #
  26. # security.provider.<n>=<className>
  27. #
  28. # This declares a provider, and specifies its preference
  29. # order n. The preference order is the order in which providers are
  30. # searched for requested algorithms (when no specific provider is
  31. # requested). The order is 1-based; 1 is the most preferred, followed
  32. # by 2, and so on.
  33. #
  34. # <className> must specify the subclass of the Provider class whose
  35. # constructor sets the values of various properties that are required
  36. # for the Java Security API to look up the algorithms or other
  37. # facilities implemented by the provider.
  38. #
  39. # There must be at least one provider specification in java.security.
  40. #
  41. # The number 1 is used for the default provider.
  42. #
  43. # Note: Providers can be dynamically registered instead by calls to
  44. # either the addProvider or insertProviderAt method in the Security
  45. # class.
  46. #
  47. # List of providers and their preference orders (see above):
  48. #
  49. security.provider.1=com.ibm.jsse2.IBMJSSEProvider2
  50. security.provider.2=com.ibm.crypto.provider.IBMJCE
  51. security.provider.3=com.ibm.security.jgss.IBMJGSSProvider
  52. security.provider.4=com.ibm.security.cert.IBMCertPath
  53. security.provider.5=com.ibm.security.sasl.IBMSASL
  54. security.provider.6=com.ibm.xml.crypto.IBMXMLCryptoProvider
  55. security.provider.7=com.ibm.xml.enc.IBMXMLEncProvider
  56. security.provider.8=com.ibm.security.jgss.mech.spnego.IBMSPNEGO
  57. security.provider.9=sun.security.provider.Sun
  58. #
  59. # Select the source of seed data for SecureRandom. By default an
  60. # attempt is made to use the entropy gathering device specified by
  61. # the securerandom.source property. If an exception occurs when
  62. # accessing the URL then the traditional system/thread activity
  63. # algorithm is used.
  64. #
  65. # On Solaris and Linux systems, if file:/dev/urandom is specified and it
  66. # exists, a special SecureRandom implementation is activated by default.
  67. # This "NativePRNG" reads random bytes directly from /dev/urandom.
  68. #
  69. # On Windows systems, the URLs file:/dev/random and file:/dev/urandom
  70. # enables use of the Microsoft CryptoAPI seed functionality.
  71. #
  72. securerandom.source=file:/dev/urandom
  73. #
  74. # The entropy gathering device is described as a URL and can also
  75. # be specified with the system property "java.security.egd". For example,
  76. # -Djava.security.egd=file:/dev/urandom
  77. # Specifying this system property will override the securerandom.source
  78. # setting.
  79. #
  80. # Class to instantiate as the javax.security.auth.login.Configuration
  81. # provider.
  82. #
  83. login.configuration.provider=com.ibm.security.auth.login.ConfigFile
  84. #
  85. # Default login configuration file
  86. #
  87. #login.config.url.1=file:${user.home}/.java.login.config
  88. #
  89. # Class to instantiate as the system Policy. This is the name of the class
  90. # that will be used as the Policy object.
  91. #
  92. policy.provider=sun.security.provider.PolicyFile
  93. # The default is to have a single system-wide policy file,
  94. # and a policy file in the user's home directory.
  95. policy.url.1=file:${java.home}/lib/security/java.policy
  96. policy.url.2=file:${java.home}/lib/security/java.pol
  97. policy.url.3=file:///${user.home}/.java.policy
  98. # whether or not we expand properties in the policy file
  99. # if this is set to false, properties (${...}) will not be expanded in policy
  100. # files.
  101. policy.expandProperties=true
  102. # whether or not we allow an extra policy to be passed on the command line
  103. # with -Djava.security.policy=somefile. Comment out this line to disable
  104. # this feature.
  105. policy.allowSystemProperty=true
  106. # whether or not we look into the IdentityScope for trusted Identities
  107. # when encountering a 1.1 signed JAR file. If the identity is found
  108. # and is trusted, we grant it AllPermission.
  109. policy.ignoreIdentityScope=false
  110. #
  111. # Default keystore type.
  112. #
  113. keystore.type=jks
  114. #
  115. # List of comma-separated packages that start with or equal this string
  116. # will cause a security exception to be thrown when
  117. # passed to checkPackageAccess unless the
  118. # corresponding RuntimePermission ("accessClassInPackage."+package) has
  119. # been granted.
  120. package.access=sun.,\
  121. com.ibm.tenant.internal.,\
  122. com.ibm.oti.,\
  123. com.intel.fortress.,\
  124. com.sun.xml.internal.,\
  125. com.sun.imageio.,\
  126. com.sun.istack.internal.,\
  127. com.sun.jmx.,\
  128. com.sun.naming.internal.,\
  129. com.sun.proxy.,\
  130. com.sun.corba.se.,\
  131. com.sun.script.,\
  132. com.sun.org.apache.bcel.internal.,\
  133. com.sun.org.apache.regexp.internal.,\
  134. com.sun.org.apache.xerces.internal.,\
  135. com.sun.org.apache.xpath.internal.,\
  136. com.sun.org.apache.xalan.internal.extensions.,\
  137. com.sun.org.apache.xalan.internal.lib.,\
  138. com.sun.org.apache.xalan.internal.res.,\
  139. com.sun.org.apache.xalan.internal.templates.,\
  140. com.sun.org.apache.xalan.internal.utils.,\
  141. com.sun.org.apache.xalan.internal.xslt.,\
  142. com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
  143. com.sun.org.apache.xalan.internal.xsltc.compiler.,\
  144. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  145. com.sun.org.apache.xalan.internal.xsltc.util.,\
  146. com.sun.org.apache.xml.internal.res.,\
  147. com.sun.org.apache.xml.internal.serializer.utils.,\
  148. com.sun.org.apache.xml.internal.utils.,\
  149. com.sun.org.apache.xml.internal.security.,\
  150. com.sun.org.glassfish.,\
  151. org.jcp.xml.dsig.internal.,\
  152. com.sun.java.accessibility.,\
  153. com.ibm.rmi.channel.,\
  154. com.ibm.rmi.iiop.,\
  155. com.ibm.rmi.io.,\
  156. com.ibm.rmi.pi.,\
  157. com.ibm.rmi.poa.,\
  158. com.ibm.rmi.ras.,\
  159. com.ibm.rmi.transport.,\
  160. com.ibm.rmi.util.,\
  161. com.ibm.stax.,\
  162. com.ibm.xml.jaxp.datatype.,\
  163. com.ibm.xml.resolver.,\
  164. com.ibm.xml.xlxp.api.event.,\
  165. com.ibm.xml.xlxp.api.jaxp.impl.,\
  166. com.ibm.xml.xlxp.api.sax.impl.,\
  167. com.ibm.xml.xlxp.api.stax.events.,\
  168. com.ibm.xml.xlxp.api.stax.msg.,\
  169. com.ibm.xml.xlxp.api.stax.serializer.,\
  170. com.ibm.xml.xlxp.api.util.,\
  171. com.ibm.xml.xlxp.scan.msg.,\
  172. com.ibm.xml.xlxp.scan.util.,\
  173. com.ibm.xtq.ast.parsers.xpath.,\
  174. com.ibm.xtq.ast.parsers.xslt.,\
  175. com.ibm.xtq.ast.res.,\
  176. com.ibm.xtq.ast.visit.,\
  177. com.ibm.xtq.bcel.,\
  178. com.ibm.xtq.common.utils.,\
  179. com.ibm.xtq.utils.,\
  180. com.ibm.xtq.xml.datamodel.,\
  181. com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
  182. com.ibm.xtq.xml.dtm.utils.,\
  183. com.ibm.xtq.xml.experimental.,\
  184. com.ibm.xtq.xml.res.,\
  185. com.ibm.xtq.xml.types.,\
  186. com.ibm.xtq.xml.unicode.normalize.,\
  187. com.ibm.xtq.xml.utils.,\
  188. com.ibm.xtq.xml.xdm.dom.,\
  189. com.ibm.xtq.xml.xdm.ref.,\
  190. com.ibm.xtq.xml.xdm.res.,\
  191. com.ibm.xtq.xpath.jaxp.,\
  192. com.ibm.xtq.xslt.cmdline.,\
  193. com.ibm.xtq.xslt.jaxp.interpreter.,\
  194. com.ibm.xtq.xslt.res.,\
  195. com.ibm.xtq.xslt.runtime.debug.,\
  196. com.ibm.xtq.xslt.runtime.output.,\
  197. com.ibm.xtq.xslt.runtime.res.,\
  198. com.ibm.xtq.xslt.runtime.v2.,\
  199. com.ibm.xtq.xslt.translator.v1.,\
  200. com.ibm.xtq.xslt.translator.v2.,\
  201. com.ibm.xtq.xslt.typechecker.,\
  202. com.ibm.xtq.xslt.xylem.autof.,\
  203. com.ibm.xtq.xslt.xylem.codegen.,\
  204. com.ibm.xtq.xslt.xylem.interpreter.,\
  205. com.ibm.xtq.xslt.xylem.optimizers.,\
  206. com.ibm.xtq.xslt.xylem.parser.,\
  207. com.ibm.xtq.xslt.xylem.partialeval.,\
  208. com.ibm.xtq.xslt.xylem.types.,\
  209. com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
  210. com.ibm.xtq.xslt.xylem.xpath20.parser.,\
  211. com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
  212. com.ibm.xylem.annot.meta.,\
  213. com.ibm.xylem.builders.,\
  214. com.ibm.xylem.codegen.,\
  215. com.ibm.xylem.commandline.,\
  216. com.ibm.xylem.config.,\
  217. com.ibm.xylem.drivers.,\
  218. com.ibm.xylem.interpreter.,\
  219. com.ibm.xylem.parser.,\
  220. com.ibm.xylem.res.,\
  221. com.ibm.xylem.types.,\
  222. com.ibm.xylem.utils.,\
  223. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  224. com.sun.org.apache.xerces.internal.dom.,\
  225. com.sun.org.apache.xerces.internal.jaxp.,\
  226. com.sun.org.apache.xerces.internal.parsers.,\
  227. com.sun.org.apache.xpath.internal.jaxp.,\
  228. com.sun.xml.internal.stream.,\
  229. org.apache.html.dom.,\
  230. org.apache.wml.,\
  231. org.apache.xalan.client.,\
  232. org.apache.xalan.extensions.,\
  233. org.apache.xalan.lib.sql.,\
  234. org.apache.xalan.res.,\
  235. org.apache.xalan.serialize.,\
  236. org.apache.xalan.templates.,\
  237. org.apache.xalan.trace.,\
  238. org.apache.xalan.transformer.,\
  239. org.apache.xalan.xslt.,\
  240. org.apache.xalan.xsltc.cmdline.,\
  241. org.apache.xerces.dom.events.,\
  242. org.apache.xerces.dom3.as.,\
  243. org.apache.xerces.impl.dtd.,\
  244. org.apache.xerces.impl.dv.util.,\
  245. org.apache.xerces.impl.io.,\
  246. org.apache.xerces.impl.msg.,\
  247. org.apache.xerces.impl.validation.,\
  248. org.apache.xerces.impl.xpath.,\
  249. org.apache.xerces.impl.xs.,\
  250. org.apache.xerces.util.,\
  251. org.apache.xerces.xinclude.,\
  252. org.apache.xerces.xni.grammars.,\
  253. org.apache.xerces.xpointer.,\
  254. org.apache.xerces.xs.datatypes.,\
  255. org.apache.xml.dtm.ref.dom2dtm.,\
  256. org.apache.xml.dtm.ref.sax2dtm.,\
  257. org.apache.xml.res.,\
  258. org.apache.xml.serializer.charmap.,\
  259. org.apache.xml.serializer.dom3.,\
  260. org.apache.xml.serializer.unicode.,\
  261. org.apache.xml.serializer.utils.,\
  262. org.apache.xml.utils.,\
  263. org.apache.xmlcommons.,\
  264. org.apache.xpath.axes.,\
  265. org.apache.xpath.compiler.,\
  266. org.apache.xpath.functions.,\
  267. org.apache.xpath.objects.,\
  268. org.apache.xpath.operations.,\
  269. org.apache.xpath.patterns.,\
  270. org.apache.xpath.res.,\
  271. oracle.jrockit.jfr.
  272. #
  273. # List of comma-separated packages that start with or equal this string
  274. # will cause a security exception to be thrown when
  275. # passed to checkPackageDefinition unless the
  276. # corresponding RuntimePermission ("defineClassInPackage."+package) has
  277. # been granted.
  278. #
  279. # by default, none of the class loaders supplied with the JDK call
  280. # checkPackageDefinition.
  281. #
  282. package.definition=sun.,\
  283. com.sun.xml.internal.,\
  284. com.sun.imageio.,\
  285. com.sun.istack.internal.,\
  286. com.sun.jmx.,\
  287. com.sun.naming.internal.,\
  288. com.sun.proxy.,\
  289. com.sun.corba.se.,\
  290. com.sun.script.,\
  291. com.sun.org.apache.bcel.internal.,\
  292. com.sun.org.apache.regexp.internal.,\
  293. com.sun.org.apache.xerces.internal.,\
  294. com.sun.org.apache.xpath.internal.,\
  295. com.sun.org.apache.xalan.internal.extensions.,\
  296. com.sun.org.apache.xalan.internal.lib.,\
  297. com.sun.org.apache.xalan.internal.res.,\
  298. com.sun.org.apache.xalan.internal.templates.,\
  299. com.sun.org.apache.xalan.internal.utils.,\
  300. com.sun.org.apache.xalan.internal.xslt.,\
  301. com.sun.org.apache.xalan.internal.xsltc.cmdline.,\
  302. com.sun.org.apache.xalan.internal.xsltc.compiler.,\
  303. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  304. com.sun.org.apache.xalan.internal.xsltc.util.,\
  305. com.sun.org.apache.xml.internal.res.,\
  306. com.sun.org.apache.xml.internal.serializer.utils.,\
  307. com.sun.org.apache.xml.internal.utils.,\
  308. com.sun.org.apache.xml.internal.security.,\
  309. com.sun.org.glassfish.,\
  310. org.jcp.xml.dsig.internal.,\
  311. com.sun.java.accessibility.,\
  312. com.ibm.stax.,\
  313. com.ibm.xml.jaxp.datatype.,\
  314. com.ibm.xml.resolver.,\
  315. com.ibm.xml.xlxp.api.event.,\
  316. com.ibm.xml.xlxp.api.jaxp.impl.,\
  317. com.ibm.xml.xlxp.api.sax.impl.,\
  318. com.ibm.xml.xlxp.api.stax.events.,\
  319. com.ibm.xml.xlxp.api.stax.msg.,\
  320. com.ibm.xml.xlxp.api.stax.serializer.,\
  321. com.ibm.xml.xlxp.api.util.,\
  322. com.ibm.xml.xlxp.scan.msg.,\
  323. com.ibm.xml.xlxp.scan.util.,\
  324. com.ibm.xtq.ast.parsers.xpath.,\
  325. com.ibm.xtq.ast.parsers.xslt.,\
  326. com.ibm.xtq.ast.res.,\
  327. com.ibm.xtq.ast.visit.,\
  328. com.ibm.xtq.bcel.,\
  329. com.ibm.xtq.common.utils.,\
  330. com.ibm.xtq.utils.,\
  331. com.ibm.xtq.xml.datamodel.,\
  332. com.ibm.xtq.xml.dtm.ref.sax2dtm.,\
  333. com.ibm.xtq.xml.dtm.utils.,\
  334. com.ibm.xtq.xml.experimental.,\
  335. com.ibm.xtq.xml.res.,\
  336. com.ibm.xtq.xml.types.,\
  337. com.ibm.xtq.xml.unicode.normalize.,\
  338. com.ibm.xtq.xml.utils.,\
  339. com.ibm.xtq.xml.xdm.dom.,\
  340. com.ibm.xtq.xml.xdm.ref.,\
  341. com.ibm.xtq.xml.xdm.res.,\
  342. com.ibm.xtq.xpath.jaxp.,\
  343. com.ibm.xtq.xslt.cmdline.,\
  344. com.ibm.xtq.xslt.jaxp.interpreter.,\
  345. com.ibm.xtq.xslt.res.,\
  346. com.ibm.xtq.xslt.runtime.debug.,\
  347. com.ibm.xtq.xslt.runtime.output.,\
  348. com.ibm.xtq.xslt.runtime.res.,\
  349. com.ibm.xtq.xslt.runtime.v2.,\
  350. com.ibm.xtq.xslt.translator.v1.,\
  351. com.ibm.xtq.xslt.translator.v2.,\
  352. com.ibm.xtq.xslt.typechecker.,\
  353. com.ibm.xtq.xslt.xylem.autof.,\
  354. com.ibm.xtq.xslt.xylem.codegen.,\
  355. com.ibm.xtq.xslt.xylem.interpreter.,\
  356. com.ibm.xtq.xslt.xylem.optimizers.,\
  357. com.ibm.xtq.xslt.xylem.parser.,\
  358. com.ibm.xtq.xslt.xylem.partialeval.,\
  359. com.ibm.xtq.xslt.xylem.types.,\
  360. com.ibm.xtq.xslt.xylem.xpath20.analysis.,\
  361. com.ibm.xtq.xslt.xylem.xpath20.parser.,\
  362. com.ibm.xtq.xslt.xylem.xpath20.typesystem.,\
  363. com.ibm.xylem.annot.meta.,\
  364. com.ibm.xylem.builders.,\
  365. com.ibm.xylem.codegen.,\
  366. com.ibm.xylem.commandline.,\
  367. com.ibm.xylem.config.,\
  368. com.ibm.xylem.drivers.,\
  369. com.ibm.xylem.interpreter.,\
  370. com.ibm.xylem.parser.,\
  371. com.ibm.xylem.res.,\
  372. com.ibm.xylem.types.,\
  373. com.ibm.xylem.utils.,\
  374. com.sun.org.apache.xalan.internal.xsltc.trax.,\
  375. com.sun.org.apache.xerces.internal.dom.,\
  376. com.sun.org.apache.xerces.internal.jaxp.,\
  377. com.sun.org.apache.xerces.internal.parsers.,\
  378. com.sun.org.apache.xpath.internal.jaxp.,\
  379. com.sun.xml.internal.stream.,\
  380. org.apache.html.dom.,\
  381. org.apache.wml.,\
  382. org.apache.xalan.client.,\
  383. org.apache.xalan.extensions.,\
  384. org.apache.xalan.lib.sql.,\
  385. org.apache.xalan.res.,\
  386. org.apache.xalan.serialize.,\
  387. org.apache.xalan.templates.,\
  388. org.apache.xalan.trace.,\
  389. org.apache.xalan.transformer.,\
  390. org.apache.xalan.xslt.,\
  391. org.apache.xalan.xsltc.cmdline.,\
  392. org.apache.xerces.dom.events.,\
  393. org.apache.xerces.dom3.as.,\
  394. org.apache.xerces.impl.dtd.,\
  395. org.apache.xerces.impl.dv.util.,\
  396. org.apache.xerces.impl.io.,\
  397. org.apache.xerces.impl.msg.,\
  398. org.apache.xerces.impl.validation.,\
  399. org.apache.xerces.impl.xpath.,\
  400. org.apache.xerces.impl.xs.,\
  401. org.apache.xerces.util.,\
  402. org.apache.xerces.xinclude.,\
  403. org.apache.xerces.xni.grammars.,\
  404. org.apache.xerces.xpointer.,\
  405. org.apache.xerces.xs.datatypes.,\
  406. org.apache.xml.dtm.ref.dom2dtm.,\
  407. org.apache.xml.dtm.ref.sax2dtm.,\
  408. org.apache.xml.res.,\
  409. org.apache.xml.serializer.charmap.,\
  410. org.apache.xml.serializer.dom3.,\
  411. org.apache.xml.serializer.unicode.,\
  412. org.apache.xml.serializer.utils.,\
  413. org.apache.xml.utils.,\
  414. org.apache.xmlcommons.,\
  415. org.apache.xpath.axes.,\
  416. org.apache.xpath.compiler.,\
  417. org.apache.xpath.functions.,\
  418. org.apache.xpath.objects.,\
  419. org.apache.xpath.operations.,\
  420. org.apache.xpath.patterns.,\
  421. org.apache.xpath.res.,\
  422. oracle.jrockit.jfr.
  423. #
  424. # Determines whether this properties file can be appended to
  425. # or overridden on the command line via -Djava.security.properties
  426. #
  427. security.overridePropertiesFile=true
  428. #
  429. # Determines the default key and trust manager factory algorithms for
  430. # the javax.net.ssl package.
  431. #
  432. ssl.KeyManagerFactory.algorithm=IbmX509
  433. ssl.TrustManagerFactory.algorithm=PKIX
  434. #
  435. # The Java-level namelookup cache policy for successful lookups:
  436. #
  437. # any negative value: caching forever
  438. # any positive value: the number of seconds to cache an address for
  439. # zero: do not cache
  440. #
  441. # default value is forever (FOREVER). For security reasons, this
  442. # caching is made forever when a security manager is set. When a security
  443. # manager is not set, the default behavior in this implementation
  444. # is to cache for 30 seconds.
  445. #
  446. # NOTE: setting this to anything other than the default value can have
  447. # serious security implications. Do not set it unless
  448. # you are sure you are not exposed to DNS spoofing attack.
  449. #
  450. #networkaddress.cache.ttl=-1
  451. # The Java-level namelookup cache policy for failed lookups:
  452. #
  453. # any negative value: cache forever
  454. # any positive value: the number of seconds to cache negative lookup results
  455. # zero: do not cache
  456. #
  457. # In some Microsoft Windows networking environments that employ
  458. # the WINS name service in addition to DNS, name service lookups
  459. # that fail may take a noticeably long time to return (approx. 5 seconds).
  460. # For this reason the default caching policy is to maintain these
  461. # results for 10 seconds.
  462. #
  463. #
  464. networkaddress.cache.negative.ttl=10
  465. #
  466. # Properties to configure OCSP for certificate revocation checking
  467. #
  468. # Enable OCSP
  469. #
  470. # By default, OCSP is not used for certificate revocation checking.
  471. # This property enables the use of OCSP when set to the value "true".
  472. #
  473. # NOTE: SocketPermission is required to connect to an OCSP responder.
  474. #
  475. # Example,
  476. # ocsp.enable=true
  477. #
  478. # Location of the OCSP responder
  479. #
  480. # By default, the location of the OCSP responder is determined implicitly
  481. # from the certificate being validated. This property explicitly specifies
  482. # the location of the OCSP responder. The property is used when the
  483. # Authority Information Access extension (defined in RFC 3280) is absent
  484. # from the certificate or when it requires overriding.
  485. #
  486. # Example,
  487. # ocsp.responderURL=http://ocsp.example.net:80
  488. #
  489. # Subject name of the OCSP responder's certificate
  490. #
  491. # By default, the certificate of the OCSP responder is that of the issuer
  492. # of the certificate being validated. This property identifies the certificate
  493. # of the OCSP responder when the default does not apply. Its value is a string
  494. # distinguished name (defined in RFC 2253) which identifies a certificate in
  495. # the set of certificates supplied during cert path validation. In cases where
  496. # the subject name alone is not sufficient to uniquely identify the certificate
  497. # then both the "ocsp.responderCertIssuerName" and
  498. # "ocsp.responderCertSerialNumber" properties must be used instead. When this
  499. # property is set then those two properties are ignored.
  500. #
  501. # Example,
  502. # ocsp.responderCertSubjectName="CN=OCSP Responder, O=XYZ Corp"
  503. #
  504. # Issuer name of the OCSP responder's certificate
  505. #
  506. # By default, the certificate of the OCSP responder is that of the issuer
  507. # of the certificate being validated. This property identifies the certificate
  508. # of the OCSP responder when the default does not apply. Its value is a string
  509. # distinguished name (defined in RFC 2253) which identifies a certificate in
  510. # the set of certificates supplied during cert path validation. When this
  511. # property is set then the "ocsp.responderCertSerialNumber" property must also
  512. # be set. When the "ocsp.responderCertSubjectName" property is set then this
  513. # property is ignored.
  514. #
  515. # Example,
  516. # ocsp.responderCertIssuerName="CN=Enterprise CA, O=XYZ Corp"
  517. #
  518. # Serial number of the OCSP responder's certificate
  519. #
  520. # By default, the certificate of the OCSP responder is that of the issuer
  521. # of the certificate being validated. This property identifies the certificate
  522. # of the OCSP responder when the default does not apply. Its value is a string
  523. # of hexadecimal digits (colon or space separators may be present) which
  524. # identifies a certificate in the set of certificates supplied during cert path
  525. # validation. When this property is set then the "ocsp.responderCertIssuerName"
  526. # property must also be set. When the "ocsp.responderCertSubjectName" property
  527. # is set then this property is ignored.
  528. #
  529. # Example,
  530. # ocsp.responderCertSerialNumber=2A:FF:00
  531. #
  532. # Policy for failed Kerberos KDC lookups:
  533. #
  534. # When a KDC is unavailable (network error, service failure, etc), it is
  535. # put inside a blacklist and accessed less often for future requests. The
  536. # value (case-insensitive) for this policy can be:
  537. #
  538. # tryLast
  539. # KDCs in the blacklist are always tried after those not on the list.
  540. #
  541. # tryLess[:max_retries,timeout]
  542. # KDCs in the blacklist are still tried by their order in the configuration,
  543. # but with smaller max_retries and timeout values. max_retries and timeout
  544. # are optional numerical parameters (default 1 and 5000, which means once
  545. # and 5 seconds). Please notes that if any of the values defined here is
  546. # more than what is defined in krb5.conf, it will be ignored.
  547. #
  548. # Whenever a KDC is detected as available, it is removed from the blacklist.
  549. # The blacklist is reset when krb5.conf is reloaded. You can add
  550. # refreshKrb5Config=true to a JAAS configuration file so that krb5.conf is
  551. # reloaded whenever a JAAS authentication is attempted.
  552. #
  553. # Example,
  554. # krb5.kdc.bad.policy = tryLast
  555. # krb5.kdc.bad.policy = tryLess:2,2000
  556. krb5.kdc.bad.policy = tryLast
  557. # Algorithm restrictions for certification path (CertPath) processing
  558. #
  559. # In some environments, certain algorithms or key lengths may be undesirable
  560. # for certification path building and validation. For example, "MD2" is
  561. # generally no longer considered to be a secure hash algorithm. This section
  562. # describes the mechanism for disabling algorithms based on algorithm name
  563. # and/or key length. This includes algorithms used in certificates, as well
  564. # as revocation information such as CRLs and signed OCSP Responses.
  565. #
  566. # The syntax of the disabled algorithm string is described as this Java
  567. # BNF-style:
  568. # DisabledAlgorithms:
  569. # " DisabledAlgorithm { , DisabledAlgorithm } "
  570. #
  571. # DisabledAlgorithm:
  572. # AlgorithmName [Constraint]
  573. #
  574. # AlgorithmName:
  575. # (see below)
  576. #
  577. # Constraint:
  578. # KeySizeConstraint
  579. #
  580. # KeySizeConstraint:
  581. # keySize Operator DecimalInteger
  582. #
  583. # Operator:
  584. # <= | < | == | != | >= | >
  585. #
  586. # DecimalInteger:
  587. # DecimalDigits
  588. #
  589. # DecimalDigits:
  590. # DecimalDigit {DecimalDigit}
  591. #
  592. # DecimalDigit: one of
  593. # 1 2 3 4 5 6 7 8 9 0
  594. #
  595. # The "AlgorithmName" is the standard algorithm name of the disabled
  596. # algorithm. See "Java Cryptography Architecture Standard Algorithm Name
  597. # Documentation" for information about Standard Algorithm Names. Matching
  598. # is performed using a case-insensitive sub-element matching rule. (For
  599. # example, in "SHA1withECDSA" the sub-elements are "SHA1" for hashing and
  600. # "ECDSA" for signatures.) If the assertion "AlgorithmName" is a
  601. # sub-element of the certificate algorithm name, the algorithm will be
  602. # rejected during certification path building and validation. For example,
  603. # the assertion algorithm name "DSA" will disable all certificate algorithms
  604. # that rely on DSA, such as NONEwithDSA, SHA1withDSA. However, the assertion
  605. # will not disable algorithms related to "ECDSA".
  606. #
  607. # A "Constraint" provides further guidance for the algorithm being specified.
  608. # The "KeySizeConstraint" requires a key of a valid size range if the
  609. # "AlgorithmName" is of a key algorithm. The "DecimalInteger" indicates the
  610. # key size specified in number of bits. For example, "RSA keySize <= 1024"
  611. # indicates that any RSA key with key size less than or equal to 1024 bits
  612. # should be disabled, and "RSA keySize < 1024, RSA keySize > 2048" indicates
  613. # that any RSA key with key size less than 1024 or greater than 2048 should
  614. # be disabled. Note that the "KeySizeConstraint" only makes sense to key
  615. # algorithms.
  616. #
  617. # Note: This property is currently used by Oracle's PKIX implementation. It
  618. # is not guaranteed to be examined and used by other implementations.
  619. #
  620. # Example:
  621. # jdk.certpath.disabledAlgorithms=MD2, DSA, RSA keySize < 2048
  622. #
  623. #
  624. jdk.certpath.disabledAlgorithms=MD2, RSA keySize < 1024
  625. # Algorithm restrictions for Secure Socket Layer/Transport Layer Security
  626. # (SSL/TLS) processing
  627. #
  628. # In some environments, certain algorithms or key lengths may be undesirable
  629. # when using SSL/TLS. This section describes the mechanism for disabling
  630. # algorithms during SSL/TLS security parameters negotiation, including cipher
  631. # suites selection, peer authentication and key exchange mechanisms.
  632. #
  633. # For PKI-based peer authentication and key exchange mechanisms, this list
  634. # of disabled algorithms will also be checked during certification path
  635. # building and validation, including algorithms used in certificates, as
  636. # well as revocation information such as CRLs and signed OCSP Responses.
  637. # This is in addition to the jdk.certpath.disabledAlgorithms property above.
  638. #
  639. # See the specification of "jdk.certpath.disabledAlgorithms" for the
  640. # syntax of the disabled algorithm string.
  641. #
  642. # Note: This property is currently used by Oracle's JSSE implementation.
  643. # It is not guaranteed to be examined and used by other implementations.
  644. #
  645. # Example:
  646. # jdk.tls.disabledAlgorithms=MD5, SHA1, DSA, RSA keySize < 2048