Subject: CVS commit: pkgsrc/lang
From: Ryo ONODERA
Date: 2015-08-30 12:52:16
Message id: 20150830105216.24C0598@cvs.netbsd.org

Log Message:
Update to 8.0.60

Changelog:
From: https://www.java.com/en/download/faq/release_changes.xml
Java 8 Update 60 (8u60)
Release Highlights

    IANA Data 2015e
    JDK 8u60 contains IANA time zone data version 2015e. For more information, \ 
refer to Timezone Data Versions in the JRE Software.
    Bug Fix: dns_lookup_realm should be false by default
    The dns_lookup_realm setting in Kerberos' krb5.conf file is by default \ 
false. See 8080637.
    Bug Fix: Disable RC4 cipher suites
    RC4-based TLS ciphersuites (e.g. TLS_RSA_WITH_RC4_128_SHA) are now \ 
considered compromised and should no longer be used (see RFC 7465). Accordingly, \ 
RC4-based TLS ciphersuites have been deactivated by default in the Oracle JSSE \ 
implementation by adding "RC4" to \ 
"jdk.tls.disabledAlgorithms" security property, and by removing them \ 
from the default enabled ciphersuites list. These cipher suites can be \ 
reactivated by removing "RC4" form \ 
"jdk.tls.disabledAlgorithms" security property in the java.security \ 
file or by dynamically calling Security.setProperty(), and also readding them to \ 
the enabled ciphersuite list using the \ 
SSLSocket/SSLEngine.setEnabledCipherSuites() methods. You can also use the \ 
-Djava.security.properties command line option to override the \ 
jdk.tls.disabledAlgorithms security property. For example:
    java -Djava.security.properties=my.java.security ...
    where my.java.security is a file containing the property without RC4:
    jdk.tls.disabledAlgorithms=SSLv3
    Even with this option set from commandline, the RC4 based ciphersuites need \ 
to be re-added to the enabled ciphersuite list by using the \ 
SSLSocket/SSLEngine.setEnabledCipherSuites() methods. See 8076221.
    Bug Fix: Support keystore type detection for JKS and PKCS12 keystores
    Keystore Compatibility Mode: To aid interoperability, the Java keystore type \ 
JKS now supports keystore compatibility mode by default. This mode enables JKS \ 
keystores to access both JKS and PKCS12 file formats. To disable keystore \ 
compatibility mode set the Security property keystore.type.compat to the string \ 
value false. See 8062552.
    Bug Fix: Deprecate Unsafe monitor methods in JDK 8u release
    The methods monitorEnter, monitorExit and tryMonitorEnter on sun.misc.Unsafe \ 
are marked as deprecated in JDK 8u60 and will be removed in a future release. \ 
These methods are not used within the JDK itself and are very rarely used \ 
outside of the JDK. See 8069302.
    Bug Fix: Extract JFR recording from the core file using SA
    DumpJFR is a Serviceability Agent based tool that can be used to extract \ 
Java Flight Recorder(JFR) data from the core files and live Hotspot processes. \ 
DumpJFR can be used in one of the following methods:
        Attach DumpJFR to a live process:

        java -cp $JAVA_HOME/lib/sa-jdi.jar sun.jvm.hotspot.tools.DumpJFR <pid>

        Attach DumpJFR to a core file:

        java -cp $JAVA_HOME/lib/sa-jdi.jar sun.jvm.hotspot.tools.DumpJFR \ 
<java> <core>

    DumpJFR tool dumps the JFR data to a file called recording.jfr in the \ 
current working folder. See 8065301 (not public).
    Bug Fix: Local variables named 'enum' lead to spurious compiler crashes
    The javac parser is incorrectly parsing local variables with name 'enum'; \ 
this results in spurious failures when a program containing such local variables \ 
is compiled with a 'source' flag corresponding to a release in which the enum \ 
construct is not available (such as '-source 1.4'). See 8069181.

Java Development Kit for ARM Release 8u60

This release includes Java Development Kit for ARM Release 8u60 (JDK 8u60 for \ 
ARM). For ARM device support information, see JDK for ARM Downloads page. For \ 
system requirements, installation instructions and troubleshooting tips, see \ 
Installation Instructions page.

Limitation: Native Memory Tracking support is limited in JDK for ARM. The java \ 
command line option XX:NativeMemoryTracking=detail is not supported for ARM \ 
targets (an error message is displayed to user). Instead, use the following \ 
option:
XX:NativeMemoryTracking=summary
Documentation Updates due to Nashorn Enhancements
JDK 8u60 includes new enhancements to Nashorn. As a result the following \ 
documentation changes should be read in conjunction with the current Nashorn \ 
documentation:

    Addition: In the previous section, we mentioned that every JavaScript object \ 
when exposed to Java APIs implements the java.util.Map interface. This is true \ 
even for JavaScript arrays. However, this behavior is often not desired or \ 
expected when the Java code expects JSON-parsed objects. Java libraries that \ 
manipulate JSON-parsed objects usually expect arrays to expose the \ 
java.util.List interface instead. If you need to expose your JavaScript objects \ 
so that arrays are exposed as lists and not maps, you can use the \ 
Java.asJSONCompatible(obj) function, where obj is the root of your JSON object \ 
tree.
    Correction: The caution mentioned at the end of Mapping Data Types section, \ 
is no longer applicable. Nashorn ensures that internal JavaScript strings are \ 
converted to java.lang.String when exposed externally.
    Correction: The statement in the section Mapping Data Types, that mentions \ 
"For example, arrays must be explicitly converted,..." is not correct. \ 
Arrays are automatically converted to Java array types, such as java.util.List, \ 
java.util.Collection, java.util.Queue and java.util.Deque and so on.

Changes in Deployment Rule Set v1.2
JDK 8u60 implements Deployment Rule Set (DRS) 1.2, which includes the following \ 
changes:

    Add "checksum" element as sub element of "id" which can \ 
allow unsigned jars to be identified by the SHA-256 checksum of the uncompressed \ 
form of a jar:
        The "checksum" element will match only unsigned jars, and the \ 
given hash will be compared only against the uncompressed form of the jar.
        The "checksum" element (similar to "certificate" \ 
element) has two arguments "hash" and "algorithm", however, \ 
unlike "certificate" element, the only supported value for \ 
"algorithm" is "SHA-256". Any other value provided will be \ 
ignored.
    Allow "message" element to apply to all rule types, where \ 
previously it only applied to a block rule:
        In a run rule, a message sub element will cause a message dialog to be \ 
displayed where without a run rule, the default behavior would be to show \ 
certificate or unsigned dialog. The message will be displayed in the message \ 
dialog.
        In a default rule, the message will only be displayed if the default \ 
action is to block. In such a case the message will be included in the block \ 
dialog.
    Echo "customer" blocks in the Java Console, trace files, and Java \ 
Usage Tracker records.
        Previous to DRS 1.2, "customer" elements could be included \ 
(with any sub-elements) in the ruleset.xml file. This element and all its sub \ 
elements are ignored. In DRS 1.2, the elements are still functionally ignored. \ 
However:
            When parsing the ruleset.xml file, all "customer" blocks \ 
will be echoed to the Java Console and deployment trace file (if Console and \ 
Tracing are enabled).
            When using a rule, all "customer" records included within \ 
that rule will be added to the Java Usage Tracker (JUT) record (if JUT is \ 
enabled).

As a result of the above changes, the DTD for DRS 1.2 is as follows:

<!ELEMENT ruleset (rule*)>
<!ATTRIBUTE ruleset href CDATA #IMPLIED>
<!ATTRIBUTE ruleset version CDATA #REQUIRED>

<!ELEMENT rule (id, action)>

<!ELEMENT id (certificate?) (checksum?) >
<!ATTRIBUTE id title CDATA #IMPLIED>
<!ATTRIBUTE id location CDATA #IMPLIED>

<!ELEMENT certificate EMPTY>
<!ATTLIST certificate algorithm CDATA #IMPLIED>
<!ATTLIST certificate hash CDATA #REQUIRED>

<!ELEMENT checksum EMPTY>
<!ATTLIST checksum algorithm CDATA #IMPLIED>
<!ATTLIST checksum hash CDATA #REQUIRED>

<!ELEMENT action (message?)>
<!ATTRIBUTE permission (run | block | default) #REQUIRED>
<!ATTRIBUTE version CDATA #IMPLIED>
<!ATTRIBUTE force (true|false) "false">

<!ELEMENT message (#PCDATA)>
<!ATTLIST message locale CDATA #IMPLIED>

Java Expiration Date

The expiration date for 8u60 is October 20, 2015. Java expires whenever a new \ 
release with security vulnerability fixes becomes available. For systems unable \ 
to reach the Oracle Servers, a secondary mechanism expires this JRE (version \ 
8u60) on November 20, 2015. After either condition is met (new release becoming \ 
available or expiration date reached), Java will provide additional warnings and \ 
reminders to users to update to the newer version.
Bug Fixes

For a list of bug fixes included in this release, see JDK 8u60 Bug Fixes page.

Java 8 Update 51 (8u51)
Release Highlights

    IANA Data 2015d
    JDK 8u51 contains IANA time zone data version 2015d. For more information, \ 
refer to Timezone Data Versions in the JRE Software.
    Bug Fix: Add new Comodo roots to root CAs
    Four new root certificates have been added for Commodo:
        COMODO ECC Certification Authority
        alias: comodoeccca
        DN: CN=COMODO ECC Certification Authority, O=COMODO CA Limited, \ 
L=Salford, ST=Greater Manchester, C=GB
        COMODO RSA Certification Authority
        alias: comodorsaca
        DN: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, \ 
L=Salford, ST=Greater Manchester, C=GB
        USERTrust ECC Certification Authority
        alias: usertrusteccca
        DN: CN=USERTrust ECC Certification Authority, O=The USERTRUST Network, \ 
L=Jersey City, ST=New Jersey, C=US
        USERTrust RSA Certification Authority
        alias: usertrustrsaca
        DN: CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, \ 
L=Jersey City, ST=New Jersey, C=US
    See JDK-8077997 (not public).
    Bug Fix: Add new GlobalSign roots to root CAs
    Two root certificates have been added for GlobalSign:
        GlobalSign ECC Root CA - R4
        alias: globalsigneccrootcar4
        DN: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R4
        GlobalSign ECC Root CA - R5
        alias: globalsigneccrootcar5
        DN: CN=GlobalSign, O=GlobalSign, OU=GlobalSign ECC Root CA - R5
    See JDK-8077995 (not public).
    Bug Fix: Add Actalis to root CAs
    Added one new root certificate:
    Actalis Authentication Root CA
    alias: actalisauthenticationrootca
    DN: CN=Actalis Authentication Root CA, O=Actalis S.p.A./03358520967, \ 
L=Milan, C=IT
    See JDK-8077903 (not public).
    Bug Fix: Add new Entrust ECC root
    Added one new root certificate:
    Entrust Root Certification Authority - EC1
    alias: entrustrootcaec1
    DN: CN=Entrust Root Certification Authority - EC1, OU="(c) 2012 \ 
Entrust, Inc. - for authorized use only", OU=See \ 
www.entrust.net/legal-terms, O="Entrust, Inc.", C=US
    See JDK-8073286 (not public).
    Bug Fix: Remove old Valicert Class 1 and 2 Policy roots
    Removed two root certificates with 1024-bit keys:
        ValiCert Class 1 Policy Validation Authority
        alias: secomvalicertclass1ca
        DN: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, \ 
OU=ValiCert Class 1 Policy Validation Authority, O="ValiCert, Inc.", \ 
L=ValiCert Validation Network
        ValiCert Class 2 Policy Validation Authority
        alias: valicertclass2ca
        DN: EMAILADDRESS=info@valicert.com, CN=http://www.valicert.com/, \ 
OU=ValiCert Class 2 Policy Validation Authority, O="ValiCert, Inc.", \ 
L=ValiCert Validation Network
    See JDK-8077886 (not public).
    Bug Fix: Remove old Thawte roots
    Removed two root certificates with 1024-bit keys:
        Thawte Server CA
        alias: thawteserverca
        DN: EMAILADDRESS=server-certs@thawte.com, CN=Thawte Server CA, \ 
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, \ 
ST=Western Cape, C=ZA
        Thawte Personal Freemail CA
        alias: thawtepersonalfreemailca
        DN: EMAILADDRESS=personal-freemail@thawte.com, CN=Thawte Personal \ 
Freemail CA, OU=Certification Services Division, O=Thawte Consulting, L=Cape \ 
Town, ST=Western Cape, C=ZA
    See JDK-8074423 (not public).
    Bug Fix: Remove more old Verisign, Equifax, and Thawte roots
    Removed five root certificates with 1024-bit keys:
        Verisign Class 3 Public Primary Certification Authority - G2
        alias: verisignclass3g2ca
        DN: OU=VeriSign Trust Network, OU="(c) 1998 VeriSign, Inc. - For \ 
authorized use only", OU=Class 3 Public Primary Certification Authority - \ 
G2, O="VeriSign, Inc.", C=US
        Thawte Premium Server CA
        alias: thawtepremiumserverca
        DN: EMAILADDRESS=premium-server@thawte.com, CN=Thawte Premium Server CA, \ 
OU=Certification Services Division, O=Thawte Consulting cc, L=Cape Town, \ 
ST=Western Cape, C=ZA
        Equifax Secure Certificate Authority
        alias: equifaxsecureca
        DN: OU=Equifax Secure Certificate Authority, O=Equifax, C=US
        Equifax Secure eBusiness CA-1
        alias: equifaxsecureebusinessca1
        DN: CN=Equifax Secure eBusiness CA-1, O=Equifax Secure Inc., C=US
        Equifax Secure Global eBusiness CA-1,
        alias: equifaxsecureglobalebusinessca1
        DN: CN=Equifax Secure Global eBusiness CA-1, O=Equifax Secure Inc., C=US
    See JDK-8076202 (not public).
    Bug Fix: Remove TrustCenter CA roots from cacerts
    Removed three root certificates:
        TC TrustCenter Universal CA I
        alias: trustcenteruniversalcai
        DN: CN=TC TrustCenter Universal CA I, OU=TC TrustCenter Universal CA, \ 
O=TC TrustCenter GmbH, C=DE
        TC TrustCenter Class 2 CA II
        alias: trustcenterclass2caii
        DN: CN=TC TrustCenter Class 2 CA II, OU=TC TrustCenter Class 2 CA, O=TC \ 
TrustCenter GmbH, C=DE
        TC TrustCenter Class 4 CA II
        alias: trustcenterclass4caii
        DN: CN=TC TrustCenter Class 4 CA II, OU=TC TrustCenter Class 4 CA, O=TC \ 
TrustCenter GmbH, C=DE
    See JDK-8072958 (not public).
    Bug Fix: Deprecate RC4 in SunJSSE provider
    RC4 is now considered as a weak cipher. Servers should not select RC4 unless \ 
there is no other stronger candidate in the client requested cipher suites. A \ 
new security property, jdk.tls.legacyAlgorithms, is added to define the legacy \ 
algorithms in Oracle JSSE implementation. RC4 related algorithms are added to \ 
the legacy algorithms list. See JDK-8074006 (not public).
    Bug Fix: Prohibit RC4 cipher suites
    RC4 is now considered as a compromised cipher. RC4 cipher suites have been \ 
removed from both client and server default enabled cipher suite list in Oracle \ 
JSSE implementation. These cipher suites can still be enabled by \ 
SSLEngine.setEnabledCipherSuites() and SSLSocket.setEnabledCipherSuites() \ 
methods. See JDK-8077109 (not public).
    Bug Fix: Improved certification checking
    With this fix, JSSE endpoint identification does not perform reverse name \ 
lookup for IP addresses by default in JDK. If an application does need to \ 
perform reverse name lookup for raw IP addresses in SSL/TLS connections, and \ 
encounter endpoint identification compatibility issue, System property \ 
"jdk.tls.trustNameService" can be used to switch on reverse name \ 
lookup. Note that if the name service is not trustworthy, enabling reverse name \ 
lookup may be susceptible to MITM attacks. See JDK-8067695 (not public).

Java Expiration Date

The expiration date for 8u51 is October 20, 2015. Java expires whenever a new \ 
release with security vulnerability fixes becomes available. For systems unable \ 
to reach the Oracle Servers, a secondary mechanism expires this JRE (version \ 
8u51) on November 20, 2015. After either condition is met (new release becoming \ 
available or expiration date reached), Java will provide additional warnings and \ 
reminders to users to update to the newer version.
Bug Fixes

This release contains fixes for security vulnerabilities. For more information, \ 
see Oracle Java SE Critical Patch Update Advisory.

For a list of bug fixes included in this release, see JDK 8u51 Bug Fixes page.

Files:
RevisionActionfile
1.2modifypkgsrc/lang/oracle-jdk8/PLIST.linux-i386
1.2modifypkgsrc/lang/oracle-jdk8/PLIST.linux-x86_64
1.2modifypkgsrc/lang/oracle-jdk8/distinfo
1.2modifypkgsrc/lang/oracle-jre8/Makefile.common
1.2modifypkgsrc/lang/oracle-jre8/PLIST.linux-i386
1.2modifypkgsrc/lang/oracle-jre8/PLIST.linux-x86_64
1.2modifypkgsrc/lang/oracle-jre8/PLIST.solaris-x86_64
1.2modifypkgsrc/lang/oracle-jre8/distinfo
1.2modifypkgsrc/lang/oracle-jre8/sfiles-linux-i386.mk
1.2modifypkgsrc/lang/oracle-jre8/sfiles-linux-x86_64.mk
1.2modifypkgsrc/lang/oracle-jre8/sfiles-solaris-x86_64.mk