- CryptoPro JCP на Linux. Как легко и безболезненно перейти на новый стандарт шифрования
- Содержание статьи
- Установка и настройка криптопровайдера
- Продолжение доступно только подписчикам
- Подпишись на «Хакер» по выгодной цене!
- Java Control Panel
- General
- About
- Network Settings
- Use browser settings
- Use proxy server
- Use automatic proxy configuration script
- Direct Connection
- Temporary Internet Files
- Update
- Update Panel Options
- Java Update Scheduler
- Java Runtime Environment Settings
- Example:
- Java Runtime Parameters
- Security
- Security Level Slider
- Exception Site List
- Deployment Rule Set
- Restore Security Prompts
- Certificates
- Certificate Types
- Trusted Certificates
- Secure site
- Signer CA
- Secure site CA
- Client Authentication
- User-Level Certificates
- Options
- Default Keystore Location
- Non-Default Keystore Location
- System-Level Certificates
- Options
- Default Keystore Location
- Non-Default Keystore Location
- Advanced
- Debugging
- Java Console
- Default Java for Browsers
- Shortcut Creation
- JNLP File/MIME Association
- Application Installation
- Secure Execution Environment
- Mixed code (sandboxed vs. trusted) security verification
- Perform certificate revocation checks on
- Check for certificate revocation using
- Advanced Security Settings
- Miscellaneous
- Command to launch default browser (Solaris, Linux, or Mac OS X only, not shown above)
CryptoPro JCP на Linux. Как легко и безболезненно перейти на новый стандарт шифрования
Содержание статьи
С 2020 года использование шифрования по ГОСТ Р 34.10—2001 окажется под запретом, а значит, все организации, которые взаимодействуют с госструктурами, вынуждены срочно внедрять следующий стандарт — 2012 года. Если ты работаешь в одной из них, то не проходи мимо: в этой статье мы поговорим о том, как решить проблему, используя сервер на CentOS 7 и пакет CryptoPro JCP.
Если же ты впервые слышишь обо всем этом, то вот небольшая историческая справка.
В 1994 году в ФСБ разработали ряд стандартов и мер, призванных защитить обмен документами между организациями и другими участниками этого процесса. Одной из таких мер безопасности стала электронная цифровая подпись документов, а одним из стандартов — ГОСТ Р 34.10—94, где описан алгоритм формирования и проверки электронной цифровой подписи. Принятый и введенный в действие постановлением Госстандарта России от 23 мая 1994 года за номером 154, он проработал до 2001 года.
На смену пришел всем известный ГОСТ Р 34.10—2001 — улучшенный стандарт, разработанный для обеспечения большей стойкости алгоритма. Но время не стоит на месте, меняются алгоритмы и методы криптозащиты, и спустя одиннадцать лет ГОСТ Р 34.10—2001 меняют на ГОСТ Р 34.10—2012.
В новом стандарте первый вариант требований к параметрам остался прежним. Длина секретного ключа составляет порядка 256 бит, и предусмотрено использование хеш-функции с длиной хеш-кода 256 или 512 бит. Главное же отличие нового стандарта — варианты с дополнительными параметрами и схемами, в том числе хешированием по стандарту ГОСТ Р 34.11—2012 «Стрибог».
В феврале 2014 года ФСБ объявила о начале перехода на использование нового национального стандарта ГОСТ Р 34.10—2012 в средствах электронной подписи для информации, не содержащей сведений, составляющих государственную тайну. В свет вышел документ за номером 149/7/1/3-58 от 31 января 2014 года «О порядке перехода к использованию новых стандартов ЭЦП и функции хэширования», он устанавливал следующие требования.
- После 31 декабря 2013 года прекратить сертификацию средств электронной подписи на соответствие требованиям к средствам электронной подписи, утвержденным приказом ФСБ России от 27.12.2011 года № 796, если в этих средствах не предусматривается реализация функций в соответствии с ГОСТ Р 34.10—2012.
- После 31 декабря 2018 года запретить использование ГОСТ Р 34.10—2001 для формирования электронной подписи.
Министерство связи даже создало план по переходу на стандарт (PDF). Однако на практике оказалось, что все не так просто, и переход пришлось отложить аж до 31 декабря 2019 года. Причины следующие.
- Многие государственные и муниципальные органы не готовы перейти на использование нового стандарта электронной подписи ГОСТ-2012 из-за отсутствия поддержки на уровне ПО.
- Чтобы выпускать сертификаты нового образца, необходимо оборудование, которое поддерживает новый ГОСТ, и сертификат Головного удостоверяющего центра, сформированный с использованием ГОСТ-2012. Удостоверяющие центры получили его только летом 2018 года. Необходимо дополнительное время, чтобы выпустить сертификаты для всех пользователей.
Сейчас в ходу два стандарта криптозащиты для работы ЭЦП, но тем, кто использует ГОСТ-2001, срочно нужно что-то предпринимать. Зима, как говорится, близко, а это значит, что нас ждет череда испытаний при внедрении поддержки ГОСТ-2012.
Ссылки на официальную документацию:
Я расскажу, как развернуть сертифицированное ФСБ средство СКЗИ (CryptoPro JCP) на сервере Linux под управлением Java JDK. Кстати, если ты до сих пор используешь ГОСТ-2001, на сайте CryptoPro есть замечательная статья, советую тебе ее прочесть, лишним не будет.
Весь документооборот между участниками обмена происходит по принципу СМЭВ (система межведомственного электронного взаимодействия). Приложение может быть участником такой системы, но может и не быть им вовсе, принцип обмена документами от этого не меняется. Для простоты понимания я нарисовал небольшую схему.
Взаимодействие приложений при обмене данных с криптографической защитой в рамках СМЭВ
Как всегда, встает вопрос о лицензировании программного решения. CryptoPro JCP недешев, и если одна рабочая станция обойдется в 1200 рублей, то серверные лицензии стоят значительно дороже — порядка 30 000 за каждое ядро (или два ядра процессора Intel с отключенным Hyper Threading).
Установка и настройка криптопровайдера
В примерах я буду использовать виртуальную машину с CentOS 7, но ты не ограничен в выборе аппаратного обеспечения и дистрибутива Linux. Все действия и команды будут такими же.
Первым делом создадим локального пользователя, под которым будет работать ПО, использующее подпись документов.
Правильно установим Java JDK. Скачиваем необходимый дистрибутив.
Распаковываем архив и проверяем, готова ли папка с Java для копирования.
Копируем папку в раздел для прикладного ПО. Я обычно использую /opt .
Проверяем, что скопировалось правильно. Если необходимо, меняем владельца папки на root.
Прописываем переменные окружения для Java JDK для всех пользователей по умолчанию.
В файл пишем следующее:
Если на сервере стоит несколько версий Java JDK, то необходимо зарегистрировать альтернативы для новой версии.
В меню выбираем опцию 2 (или ту, что приведет к использованию более новой версии Java). Не забываем поправить права на JRE systemPrefs.
Проверяем установленную версию Java.
$ java -version
java version «1.8.0_191»
Java(TM) SE Runtime Environment (build 1.8.0_191-b12)
Java HotSpot(TM) 64-Bit Server VM (build 25.191-b12, mixed mode)
Копируем папку с дистрибутивом CryptoPro JCP в раздел для прикладного ПО.
Проверяем, что все скопировалось корректно.
Выдаем права на запуск скриптов.
Проверяем владельца и права на папку, должен быть root. Переходим в нее.
Чтобы избежать проблем при инсталляции, проверь количество ядер на процессоре и сверься с лицензией. Узнать число ядер можно командой nproc .
Переходим к установке криптопровайдера JCP. Во время установки необходимо будет ответить на ряд вопросов.
Продолжение доступно только подписчикам
Материалы из последних выпусков можно покупать отдельно только через два месяца после публикации. Чтобы продолжить чтение, необходимо купить подписку.
Подпишись на «Хакер» по выгодной цене!
Подписка позволит тебе в течение указанного срока читать ВСЕ платные материалы сайта. Мы принимаем оплату банковскими картами, электронными деньгами и переводами со счетов мобильных операторов. Подробнее о подписке
Источник
Java Control Panel
These documentation pages are no longer current. They remain available for archival purposes. Please visit https://docs.oracle.com/javase for the most up-to-date documentation.
The Java Control Panel is a multipurpose control panel. It allows you to view and set a wide range of parameters controlling how, or if, Java technology runs on your computer. It lets you view and delete temporary files used by the Java Plug-in, which allows Java technology to be used by your Web browser to run applets; and Java Web Start, which allows you to run Java applications over the network. It allows you to control certificates, making it safe to run applets and applications over the network. It enables you to view an active deployment rule set, and to manage the exception site list. It allows you to set runtime parameters for applets that run with Java Plug-in and applications that run with Java Web Start. It provides a mechanism for updating your version of the Java platform so that you always have the latest Java Runtime Environment (JRE). And it allows you to set options for debugging, applet handling, etc. The Java Control Panel includes the following separately viewable panels:
Contents
General
The General panel looks like this:
It includes three subpanels: About, Network Settings, and Temporary Internet Files. As of the JDK 7u10 release, this panel also informs you whether Java is enabled in the browser. This setting is contolled in the Security panel.
About
The About. button displays version information for the latest JRE installed on the computer.
Network Settings
These settings are for network connections. Press the Network Settings. button to get the Network Settings dialog. There are four choices:
Use browser settings
Check this to use the browser default proxy settings. This is the default setting (checked).
Use proxy server
You have two choices here:
- You can set the Address and the Port for a proxy server with the option to bypass it for local addresses.
- You can press the Advanced . button to get the Advanced Network Settings dialog. In this panel you can individually set the proxy server for HTTP, Secure, FTP, and Socks connections. You can also provide a list of addresses for which you do not want to use a proxy server. The Advanced Network Settings panel looks like this:
Use automatic proxy configuration script
You can specify the location (URL) for the JavaScript file (.js or .pac extension) that contains the FindProxyForURL function. FindProxyForURL has the logic to determine the proxy server to use for a connection request.
Direct Connection
Select this for situations where you do not want to use a proxy.
Temporary Internet Files
You can do the following:
- Press the Settings. button to get the Temporary Files Settings dialog from which you can perform the following:
- Specify if you want to keep temporary files on your computer.
- Specify the location where temporary files are kept.
- Specify the compression level for JAR files.
- Specify the amount of disk space for storing temporary files.
- Delete temporary files by pressing the Delete Files. button, which displays the Delete Temporary Files dialog. From this dialog, you can specify which files you want to delete:
- Trace and Log Files
- Cached Applications and Applets
- Installed Applications and Applets
- Restore default settings for the Temporary Files Settings dialog by pressing the Restore Defaults button.
- Press the View. button to get the Java Cache Viewer dialog. This dialog enables you to list applications, resources, and deleted applications stored in the Java cache. In addition, you may perform the following:
- Run and visit the Web page of applications.
- View the JNLP file of applications and resources.
Update
On Microsoft Windows platforms, the Update panel looks like this:
The Update panel, in conjunction with the Java Update Scheduler ( jusched.exe ), is used to provide the latest Java updates to the end user.
Note: This panel is only available on Microsoft Windows and Mac OS X and only for users with Administrative privileges. On Microsoft Windows, if both the 32-bit and 64-bit versions of Java are installed, this panel is not available. In this event, you have to launch the Java Control Panel directly from the 32-bit directory command line (C:\Program Files (x86)\Java\jre7\bin\javacpl.exe).
Update Panel Options
There are two basic options on the Update tab:
- Automatic update: Available only on Microsoft Windows XP and higher, and set by default
- Manual update
Automatic update is performed on a scheduled basis and it is selected by checking the Check for Updates Automatically check box.
Manual update is performed by pressing the Update Now button.
If you select automatic update, you can then set the notification via the Notify Me: drop-down menu, and you can set the update schedule via the Advanced. button.
With notification, you can chose to be notified before an update is downloaded and before it is installed; or you can chose to be notified only before an update is installed (i.e., the download is automatic).
The Advanced. allows you to select the desired frequency for updates: daily, weekly, or monthly (default). For daily updates, you can select the time of the day for the update. For weekly updates, you can select the day of the week and the time of the day. For monthly updates, you can select the day of the week and the time of the day. Monthly updates check weekly and notify you within 30 days that an update is available, however, if an update is considered critical you are notified within a week of its release.
You can do manual updates at any time by pressing the Update Now button. This allows you to do immediate, unscheduled updates.
Java Update Scheduler
On Microsoft Windows platforms, the Java Update Scheduler ( jusched.exe ) is used for launching automatic updates when Update Automatically is selected in the Update tab. jusched.exe runs as a background process that launches the Update Manager at predefined intervals set by the user through the Advanced. button of the Update tab. The Update Manager coordinates the update process.
jusched.exe is launched when the user reboots the computer after installing the SDK/JRE. It is normally transparent to the user but can be viewed in the Processes tab of the Windows Task Manager. Should a user for some reason not want the scheduler to run, it can be killed via End Process button of the Processes tab.
The Java panel looks like this:
Click the View. button to access the Java Runtime Environment Settings dialog.
Java Runtime Environment Settings
These settings will be used when a Java application is launched. The Java Runtime Environment Settings dialog looks like the following on Microsoft Windows:
Each row in the Java Runtime Versions panel represents a Java Runtime Environment that is installed in your computer. You may modify the value in each cell by double-clicking it:
- Platform: The version of the Java Runtime Environment
- Product: The full version number of the Java Runtime Environment (which includes the update number)
- Location: The URL that Java Update Scheduler uses to launch automatic updates
- Path: The full path name of the Java Runtime Environment
- Runtime Parameters: Optional custom options used to override the Java Plug-in default startup parameters
- Enabled: This option is for selecting which of the (older) JRE versions to consider when running an app using Java Plug-in or Java Web Start. If this check box is not selected, then Java Plug-in and Java Web Start will not use this JRE to launch Java apps. However, the current JRE might be used regardless of this checkbox. This checkbox does not affect stand alone applications, it is only for Java in the browser. Note that if all Java apps are disabled from running in the browser, by de-selecting Enable the Java content in the browser in the Security panel, enabling the JRE here has no effect.
Click the Find button to launch the JRE Finder. This utility searches for unregistered private Java Runtime Environments installed in your computer and adds them to the Java Runtime Versions panel.
Click the Add button to manually add a Java Runtime Environment to the Java Runtime Versions panel. When you click the Add button, a new row appears in the Java Runtime Versions panel; however, there are no values for Platform, Product, Path, Runtime Parameters, and Enabled; you must specify them yourself.
Click the Remove button to remove the selected Java Runtime Environment from the Java Runtime Versions panel.
Notes
There will always be at least one entry. It will be the most recently installed JRE; i.e., the JRE associated with the Java Control Panel.
Microsoft Windows will show all JREs installed on a computer. The Java Control Panel finds the JREs by looking in the registry. On Solaris, Linux, or Mac OS X, the situation is different. There is no registry so there is no easy way to find the JREs that a user may have installed. The JRE that Java Web Start or Java Plug-in is using to deploy applications is the JRE that is considered registered. Consequently, use the Find, Add, and Remove buttons to change which JREs are listed in the Java Runtime Environments panel. On Mac OS X, only the currently installed JRE is displayed, JDKs are not included.
For Solaris, Linux, or Mac OS X, only version 5.0 or higher should be added. For Microsoft Windows, where all JREs are found in the registry, version 1.3.1 or higher will be displayed.
Example:
Assume you are running on Microsoft Windows with Microsoft Internet Explorer, have first installed version 1.4.2, then version 5.0, and you want to run 1.4.2.
- Go to the j2re1.4.2\bin directory where JRE 1.4.2 was installed. On a Windows default installation, this would be here: C:\Program Files\Java\j2re1.4.2\bin
- Double-click the jpicpl32.exe file located there. It will launch the control panel for 1.4.2.
- Select the Browser tab. Microsoft Internet Explorer might still appear to be set (checked). However, when 5.0 was installed, the registration of the 1.4.2 JRE with Internet Explorer was overwritten by the 5.0 JRE.
- If Microsoft Internet Explorer is shown as checked, uncheck it and click Apply. You will see a confirmation dialog stating that browser settings have changed.
- Check Microsoft Internet Explorer and click Apply. You should see a confirmation dialog.
- Restart the browser. It should now use the 1.4.2 JRE for conventional APPLET tags.
You can add a JRE by pressing Add and specifying its location (see notes above).
For Windows and Solaris, Linux, or Mac OS X you can optionally set Java Runtime Settings for the JRE.
Java Runtime Parameters
You can override the Java Plug-in default startup parameters by specifying custom options in the Java Runtime Parameters field. With the exception of setting classpath and cp , classpath and cp below)—> the syntax is the same as used with parameters to the java command line invocation. See the java launcher for a full list of command line options:
Below are some examples of Java runtime parameters.
Setting classpath and cp
The following format should be used for setting classpath and cp in Java Plug-in. It differs slightly from the java command line format, which uses a space instead of the equal ( = ) sign.
Enabling and disabling assertion support
To enable assertion support, the following system property must be specified in the Java Runtime Parameters:
To disable assertion in the Java Plug-in, specify the following in the Java Runtime Parameters:
Assertion is disabled in Java Plug-in code by default. Since the effect of assertion is determined during Java Plug-in startup, changing assertion settings in the Java Plug-in Control Panel will require a browser restart in order for the new settings to take effect.
Because Java code in Java Plug-in also has built-in assertion, it is possible to enable the assertion in Java Plug-in code through the following:
Tracing and logging support
Tracing is a facility to redirect any output in the Java Console to a trace file ( .plugin .trace ).
If you do not want to use the default trace file name:
Similar to tracing, logging is a facility to redirect any output in the Java Console to a log file (.plugin .log ) using the Java Logging API. Logging can be turned on by enabling the property javaplugin.logging .
If you do not want to use the default log file name, enter:
Furthermore, if you do not want to overwrite the trace and log files each session, you can set the property:
If the property is set to false , then trace and log files will be uniquely named for each session. If the default trace and log file names are used, then the files would be named as follows
Tracing and logging set through the Control Panel will take effect when the Plug-in is launched, but changes made through the Control Panel while a Plug-in is running will have no effect until a restart.
Debugging applets in Java Plug-in
The following options are used when debugging applets in the Java Plug-in.
The can be any string (example: 2502 ) which is used by the Java Debugger ( jdb ) later to connect to the JVM
Default connection timeout
When a connection is made by an applet to a server and the server doesn’t respond properly, the applet may appear to hang and may also cause the browser to hang, since by default there is no network connection timeout.
To avoid this problem, Java Plug-in 1.4 has added a default network timeout value (2 minutes) for all HTTP connections. You can override this setting in the Java Runtime Parameters:
Another networking property that you can set is sun.net.client.defaultReadTimeout .
Note
Java Plug-in does not set sun.net.client.defaultReadTimeout by default. If you want to set it, do so through the Java Runtime Parameters as shown above.
Networking properties description:
These properties specify, respectively, the default connect and read timeout values for the protocol handlers used by java.net.URLConnection . The default value set by the protocol handlers is -1 , which means there is no timeout set.
sun.net.client.defaultConnectTimeout specifies the timeout (in milliseconds) to establish the connection to the host. For example, for http connections it is the timeout when establishing the connection to the http server. For ftp connections it is the timeout when establishing the connection to ftp servers.
sun.net.client.defaultReadTimeout specifies the timeout (in milliseconds) when reading from an input stream when a connection is established to a resource.
For the official description of these properties, see Networking Properties.
Security
As of the JDK 7u51 release, the Security panel looks like this:
De-selecting the Enable Java content in the browser button, which is selected by default, will prevent any Java application from running in the browser.
Security Level Slider
When the Enable Java content in the browser option is selected, the Security Level slider becomes available. As the security level is increased, more restrictions are placed on allowing an application to run, and stronger warnings are issued to the user.
The default security level setting is High. The available settings are:
Very High — Applications that are signed with a valid certificate that is located in the Signer CA keystore, and include the Permissions attribute in the manifest for the main JAR file are allowed to run with security prompts. All other applications are blocked.
High — Applications that are signed with a valid or expired certificate that is located in the Signer CA keystore, and include the Permissions attribute in the manifest for the main JAR file are allowed to run with security prompts. Applications are also allowed to run with security prompts when the revocation status of the certificate cannot be checked. All other applications are blocked.
Medium — All applications are allowed to run with security prompts.
See Rich Internet Application Deployment Process for information on how the decision to run or block an application is made.
The Security Level setting affects plug-in applets, Java Web Start applications, embedded JavaFX applications, and access to the native deployment toolkit plug-ins. This setting does not affect stand alone Java applications.
Exception Site List
The exception site list contains a list of URLs that host RIAs that users want to run even if the RIAs are normally blocked by security checks. RIAs from the sites listed are allowed to run with applicable security prompts. Click Edit Site List to add, edit, and remove items.
See Exception Site List for more information.
Deployment Rule Set
If an active deployment rule set is installed on the system, the link View the active Deployment Rule Set is shown before the Manage Certificates button. Click the link to view the rule set. When a rule set is available, the rules determine if a RIA is run without security prompts, run with security prompts, or blocked. For more information on deployment rules, see Deployment Rule Set. For more information on security prompts, see Security Dialogs.
Restore Security Prompts
An option to hide a prompt in the future is included in some security prompts that are shown when an application starts. To insure the continued security of your system, it is recommended that you periodically restore the prompts that were hidden. Seeing the prompts again provides an opportunity to review the applications and ensure that you still want them to run.
To restore the prompts that were previously hidden, click Restore Security Prompts. When asked to confirm the selection, click Restore All. The next time an application is started, the security prompt for that application is shown.
Certificates
Click Manage Certificates to get the Certificates dialog, which looks like this:
Certificate Types
It handles both User- and System-Level (enterprise-wide) certificates of the following types:
Trusted Certificates
These are certificates for signed applets and applications that are trusted.
Secure site
These are certificates for secure sites.
Signer CA
These are certificates of Certificate Authorities (CAs) for Trusted Certificates; Certificate Authorities are the ones who issue the certificates to the signers of Trusted Certificates.
Secure site CA
These are certificates of Certificate Authorities (CAs) for secure sites; Certificate Authorities are the ones who issue the certificates for secure sites.
Client Authentication
These are certificates for a client to authenticate itself to a server.
User-Level Certificates
Options
For user-level certificates, there are four options: Import, Export, Remove, and Details. The user can import, export, remove, and view the details of a certificate.
Default Keystore Location
The following table shows the default locations of the of the keystore files.
Operating System | Location | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Solaris, Linux, or Mac OS X | $ | |||||||||||||||||||||||||||||||||
Microsoft Windows |
Certificate Type | Property Name |
---|---|
Trusted Certificates | deployment.user.security.trusted.certs |
Secure site | deployment.user.security.trusted.jssecerts |
Signer CA | deployment.user.security.trusted.cacerts |
Secure site CA | deployment.user.security.trusted.jssecacerts |
Client Authentication | deployment.user.security.trusted.clientcerts |
System-Level Certificates
Options
For System-Level certificates, the only options a user has are Export and Details.
Default Keystore Location
Trusted, Secure Site, and Client Authentication certificate keystore files do not exist by default. Thus there are no default locations for them.
The default location for the Signer CA keystore is:
Operating System | Location | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Solaris, Linux, or Mac OS X | $JAVA_HOME/lib/security/cacerts | ||||||||||||||||
Microsoft Windows |
Operating System | Location | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Solaris, Linux, or Mac OS X | $JAVA_HOME/lib/security/jssecacerts | |||||||||||
Microsoft Windows |
Certificate Type | Property Name |
---|---|
Trusted Certificates | deployment.system.security.trusted.certs |
Secure site | deployment.system.security.trusted.jssecerts |
Signer CA | deployment.system.security.trusted.cacerts |
Secure site CA | deployment.system.security.trusted.jssecacerts |
Client Authentication | deployment.system.security.trusted.clientcerts |
Advanced
The Advanced panel looks like this (three screenshots are required to show the entire list of options):
It includes options for Debugging, Java console, Default Java for browsers, Shortcut Creation, JNLP File/MIME Association, Application Installation, Secure Execution Environment, Mixed code security verification, Certificate revocation checks, Advanced Security Settings, and Miscellaneous.
Debugging
You can enable tracing and logging.
Java Console
There are three options:
- Show the console
- Hide the console (default)
- Do not start the console
Default Java for Browsers
There are two options; both are selected by default:
- Microsoft Internet Explorer
- Mozilla Family
This option enables settings in your browser that enable you to use the JRE installed in your computer.
In addition, if you enable this option for Mozilla Family, and your browser is Firefox, then the extension Java Console appears in the Add-ons list, where is the version of the JRE installed in your computer. (Access the Add-ons list from the Tools menu in the menu bar.)
Shortcut Creation
This provides options for Java Web Start for creating shortcuts on the desktop. The options are:
- Always allow
- Always allow if hinted
- Prompt user
- Prompt user if hinted (default)
- Never allow
JNLP File/MIME Association
This allows you to associate files with the JNLP MIME type. The options are (radio button, select only one):
- Always allow
- Prompt user (default)
- Never allow
Application Installation
There are four options:
- Install if hinted (default)
- Install if shortcut created
- Install if hinted and shortcut
- Never install
A Java application or applet that is launched with Java Web Start can either be installed or cached on the client computer. If the Java application is cached, then Java Web Start stores the entire application in its cache; the application is removed from the client computer when Java Web Start empties its cache. If the Java application is installed, then the application will have an entry in the Add or Remove Programs applet in Windows Control Panel.
A Java application or applet can specify if it prefers to be cached or installed; if the Java application specifies that it prefers to be installed, then it is hinted. By default, Java applications that are hinted are installed on the client computer. You can also specify that a Java application is installed if it creates a shortcut on the client computer’s desktop.
Secure Execution Environment
These options are check boxes. You can select any number of available options. All options are checked by default except for those specified. The following are the various Java security options:
- Allow user to grant permissions to signed content
- Show sandbox warning banner
- Allow user to accept JNLP security requests
- Don’t prompt for client certificate selection when no certificates or only one exists
- Warn if site certificate does not match hostname
- Show site certificate from server even if it is valid (not checked by default)
Mixed code (sandboxed vs. trusted) security verification
The Mixed code options are radio buttons. You can select only one option. For more information, see Mixing Privileged Code and Sandbox Code.
- Enable — show warning if needed (selected by default)
- Enable — hide warning and run with protections
- Enable — hide warning and don’t run untrusted code
- Disable verification (not recommended)
Perform certificate revocation checks on
Before a signed applet or Java Web Start application is run, the certificates used to sign the JAR file can be checked to ensure that none have been revoked. You can have all certificates checked, or only the certificate from the publisher of the app. If a certificate has been revoked, any app that is signed with the certificate is not allowed to run. This check can be disabled, but that is not recommended. You can select only one of the following options:
- Publisher’s certificate only
- All certificates in the chain of trust (selected by default)
- Do not check (not recommended)
Check for certificate revocation using
The following options indicate what to use to determine if a certificate has been revoked:
- Certificate Revocations Lists (CRLs)
- Online Certificate Status Protocol (OCSP)
- Both CRLs and OCSP (selected by default)
If Do Not Check is selected for Perform certificate revocation checks on, this setting is ignored.
Advanced Security Settings
These options are check boxes. You can select any number of available options. All options are checked by default except for those specified. The following are the various Java security options:
- Use certificates and keys in browser keystore
- Enable blacklist revocation check
- Enable caching password for authentication
- Use SSL 2.0 compatible ClientHello format (not checked by default)
- Use SSL 3.0
- Use TLS 1.0
- Use TLS 1.1 (not checked by default)
- Use TLS 1.2 (not checked by default)
Miscellaneous
The following options are available, none are checked by default:
Place Java icon in system tray
Suppress sponsor offers when installing or updating Java
Select this option if you do not want to be provided with offers from sponsors during the installation or update process.
Java Quick Starter (Microsoft Windows only)
Command to launch default browser (Solaris, Linux, or Mac OS X only, not shown above)
Allows you to specify the location of the default browser to be launched.
Источник