Find JSRs
Submit this Search


Ad Banner
 
 
 
 

Summary  |  Proposal  |  Detail (Summary & Proposal)
JSRs: Java Specification Requests
JSR 76: RMI Security for J2SETM

Stage Access Start Finish
Rejected   21 Feb, 2001  
Community Draft Reconsideration Ballot View results 13 Feb, 2001 20 Feb, 2001
Community Draft Ballot Failed   16 Jan, 2001  
Community Draft Ballot View results 09 Jan, 2001 15 Jan, 2001
Community Review Login page 12 Dec, 2000 15 Jan, 2001
Expert Group Formation   15 Aug, 2000 22 Aug, 2000
JSR Review Ballot View results 01 Aug, 2000 14 Aug, 2000
Status: Rejected
Reason: This JSR was not approved by the SE/EE Executive Committee in Draft Approval/Reconsideration Ballots.
JCP version in use: 2.1
Java Specification Participation Agreement version in use: 1.0


Description:
Define a high-level API for network security in JavaTM 2 Standard Edition RMI, covering basic security mechanisms: authentication (including delegation), confidentiality, and integrity.

Please direct comments on this JSR to the Spec Lead(s)
Team

Specification Leads
  Bob Scheifler Sun Microsystems, Inc.
Expert Group
  Distributed Systems Technology Centre (DSTC) Eronen, Pasi Hewlett-Packard
  IBM Oracle Sun Microsystems, Inc.
  Ubizen
Contributors
       

This JSR has been Rejected
Reason: This JSR was not approved by the SE/EE Executive Committee in Draft Approval/Reconsideration Ballots.

Original Java Specification Request (JSR)

Identification | Request | Contributions

Section 1. Identification

Submitting Member: Sun Microsystems, Inc.

Name of Contact Person: Mark Hodapp

E-Mail Address: Mark.Hodapp@sun.com

Telephone Number: +1 781 442 2035

Fax Number: +1 781 442 1657


Specification Lead: Bob Scheifler

E-Mail Address: Bob.Scheifler@sun.com

Telephone Number: +1 781 442 0348

Fax Number: +1 781 442 1657



Section 2: Request

2.1 Please describe the proposed Specification:

The proposal is to define a high-level API for controlling network security in RMI, covering basic security mechanisms: authentication (including delegation), confidentiality, and integrity. The intent is not to define new security algorithms or protocols, but rather to define an API that allows applications to readily utilize existing algorithms and protocols in the context of RMI, in such a way that different algorithms and protocols (and different implementations of them) can be plugged in underneath without recoding the applications.

2.2 What is the target Java platform? (i.e., desktop, server, personal, embedded, card, etc.)

Java 2 Standard Edition

2.3 What need of the Java community will be addressed by the proposed specification?

- provides an API that supports a variety of network security implementations

- provides increased application portability across different network security implementations

- provides integration with other Java platform security mechanisms, such as the Java Authentication and Authorization Service (JAAS)

- provides support for non-uniform security: security needs and trust relationships that can vary according to the client, server, operation, and data involved

- allows a variety of access control (authorization) schemes to be used

- provides an extensible framework that allows other network security features to be added later

- allows applications to be written in such a way that network security can be configured without recoding the applications

2.4 Why isn't this need met by existing specifications?

RMI does not have any explicit security support today. Users must implement their own security using custom socket factories.

2.5 Please give a short description of the underlying technology or technologies:

The API should deal with basic network security:

- server authentication: proving to the client that the server is executing on behalf of some subject, so that the remote call can be terminated if the subject is not trusted by the client. The flip side of this is anonymity: allowing a server to remain anonymous when it wants to be

- client authentication: proving to the server that the client is executing on behalf of some subject, so that the server can perform only those tasks for which the subject is authorized. The flip side of this is anonymity: allowing a client to remain anonymous when it wants to be

- delegation: allowing the server to authenticate as the client in its own remote calls, thus allowing the server to act on a client's behalf when dealing with third party remote servers, in cases where the identity of the client (not the server) is what matters to the third party

- confidentiality: making sure that the data sent over the network cannot be interpreted by third parties

- integrity: making sure that the data sent over the network is not tampered with by third parties

The API should be usable with a variety of underlying network security protocols and cryptographic protocols. For example, the API should be usable with providers implemented using SSL/TLS, Kerberos, GSS-API, and IPsec.

2.6 Is there a proposed package name for the API Specification? (i.e., javapi.something, org.something, etc.)

java.rmi

2.7 Does the proposed specification have any dependencies on specific operating systems, CPUs, or I/O devices that you know of?

No.

2.8 Are there any security issues that cannot be addressed by the current security model?

No.

2.9 Are there any internationalization or localization issues?

No.

2.10 Are there any existing specifications that might be rendered obsolete, deprecated, or in need of revision as a result of this work?

No.

2.11 Please describe the anticipated schedule for the development of this specification.

Member ReviewAugust-September 2000
Public ReviewOctober-November 2000
RI and TCK AvailableQ4 2001

We will include a preliminary implementation of this API in Merlin Beta for prototyping purposes.





Section 3: Contributions

3.1 Please list any existing documents, specifications, or implementations that describe the technology. Please include links to the documents if they are publicly available.

JavaTM RMI Security - Early Look Draft 3

3.2 Explanation of how these items might be used as a starting point for the work.

The draft cited is our current proposal for the RMI security API.