Skip to content

Conversation

@mcpowers
Copy link
Contributor

@mcpowers mcpowers commented Dec 19, 2025

JDK-8369282


Progress

  • Change must be properly reviewed (1 review required, with at least 1 Reviewer)
  • Change must not contain extraneous whitespace
  • Commit message must refer to an issue
  • Change requires CSR request JDK-8374054 to be approved

Issues

  • JDK-8369282: Distrust TLS server certificates anchored by Chunghwa ePKI Root CA (Enhancement - P3)
  • JDK-8374054: Distrust TLS server certificates anchored by Chunghwa ePKI Root CA (CSR)

Reviewing

Using git

Checkout this PR locally:
$ git fetch https://git.openjdk.org/jdk.git pull/28930/head:pull/28930
$ git checkout pull/28930

Update a local copy of the PR:
$ git checkout pull/28930
$ git pull https://git.openjdk.org/jdk.git pull/28930/head

Using Skara CLI tools

Checkout this PR locally:
$ git pr checkout 28930

View PR using the GUI difftool:
$ git pr show -t 28930

Using diff file

Download this PR as a diff file:
https://git.openjdk.org/jdk/pull/28930.diff

Using Webrev

Link to Webrev Comment

@bridgekeeper
Copy link

bridgekeeper bot commented Dec 19, 2025

👋 Welcome back mpowers! A progress list of the required criteria for merging this PR into master will be added to the body of your pull request. There are additional pull request commands available for use with this pull request.

@openjdk
Copy link

openjdk bot commented Dec 19, 2025

❗ This change is not yet ready to be integrated.
See the Progress checklist in the description for automated requirements.

@openjdk openjdk bot added csr Pull request needs approved CSR before integration security [email protected] labels Dec 19, 2025
@openjdk
Copy link

openjdk bot commented Dec 19, 2025

@mcpowers The following label will be automatically applied to this pull request:

  • security

When this pull request is ready to be reviewed, an "RFR" email will be sent to the corresponding mailing list. If you would like to change these labels, use the /label pull request command.

@openjdk openjdk bot added the rfr Pull request is ready for review label Dec 19, 2025
@mlbridge
Copy link

mlbridge bot commented Dec 19, 2025

Webrevs

* is at index 0, the trust anchor at index n-1.
* @throws ValidatorException if the certificate is distrusted
*/
static void checkDistrust(X509Certificate[] chain)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: checkDistrust is an odd name for a method throwing an error and not returning anything in my opinion. But since it's used in other files and behaves the same I think it's fine.

return X509CertImpl.getFingerprint("SHA-256", cert, debug);
}

private static void checkNotBefore(LocalDate notBeforeDate,
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I might be wrong, but wouldn't 'Not Before' mean that it would also include the date ('Equals or After'). I think renaming it to checkIsAfter would be better, what do you think?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree. However, notBefore was probably chosen because it is also a field in the X509Certificate. The name appears in many places. What about adding a comment:
Check whether the certificate's notBeforeDate is after the distrust date for the anchor (root CA).
Throw ValidatorException if it is after the distrust date.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That would be fine with me and I think would be helpful. Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

csr Pull request needs approved CSR before integration rfr Pull request is ready for review security [email protected]

Development

Successfully merging this pull request may close these issues.

2 participants