Sean Mullan

Java Security Tech Lead at Oracle. Lead of OpenJDK Security Group. Views are my own. He/Him.

2025-05-27

JEP 470: PEM Encodings of Cryptographic Objects (Preview) has been targeted to JDK 25 - openjdk.org/jeps/470

This is a Preview API, so we have time to make changes. Let us know if the API is easy to use and satisfies your use cases.

#openjdk #crypto #security #java

2025-05-16

JEP: 510: Key Derivation Function API has been targeted to JDK 25 - openjdk.org/jeps/510

This was a Preview API in JDK 24, and JDK 25 will contain the final, or permanent version of the API.

#openjdk #crypto #security #java

2025-04-29

PEM Encodings of Cryptographic Objects (Preview) is now a Candidate JEP - openjdk.org/jeps/470

This is a new API for encoding and decoding Java objects to and from the PEM format.

#openjdk #crypto #security #java

2025-04-16

JEP: 510: Key Derivation Function API is now a Candidate - openjdk.org/jeps/510

This was a Preview API in JDK 24, and we are now proposing to finalize the API.

#openjdk #crypto #security #java

2025-04-08

JDK 24 Security Enhancements: seanjmullan.org/blog/2025/04/0

Highlights of this release include 2 new core quantum-resistant cryptographic algorithms (ML-KEM and ML-DSA), a preview API for Key Derivation Functions, and the permanent disabling of the Security Manager.

#jdk #java #security #crypto

2025-03-25

We're hiring! The Java Platform Group is responsible for developing the JDK. Most work is in open source (OpenJDK). This opening is for the Java Security Libraries team. It can be on-site or remote.

linkedin.com/jobs/view/4161467

#security #crypto #hiring #java #jdk

2025-03-19

#JDK24 was released yesterday! This is a significant release for Java Security, as it contains two new core Quantum-Resistant cryptographic algorithms, ML-KEM for Key Encapsulation, and ML-DSA for Digital Signatures.

openjdk.org/projects/jdk/24/

#crypto #security #java #pqc

2025-03-13

#JavaOne is 5 days away! Don’t miss out on attending the conference that started it all! Network with #Java experts from #Oracle and the community. Register now: javaone.com

2025-02-25

We're hiring! The Java Platform Group is responsible for developing the JDK. Most work is in open source (OpenJDK). This opening is for the Java Security Libraries team. It can be on-site or remote.

linkedin.com/jobs/view/4046796

#security #crypto #hiring #java #jdk

Sean Mullan boosted:
OpenJDKopenjdk
2024-11-23

Targeted to JDK 24: JEP 496: Quantum-Resistant Module-Lattice-Based Key Encapsulation Mechanism: openjdk.org/jeps/496

Sean Mullan boosted:
OpenJDKopenjdk
2024-11-23

Targeted to JDK 24: JEP 497: Quantum-Resistant Module-Lattice-Based Digital Signature Algorithm: openjdk.org/jeps/497

2024-11-07

New Candidate JEPs for adding Quantum-Resistant Cryptographic Algorithms to the Java Platform:

- ML-KEM: openjdk.org/jeps/496
- ML-DSA: openjdk.org/jeps/497

#java #jdk #openjdk #crypto #security #pqc

Sean Mullan boosted:
OpenJDKopenjdk
2024-11-02

Proposed to target JDK 24: JEP 486: Permanently Disable the Security Manager: openjdk.org/jeps/486

2024-10-31

JEP 478 (Key Derivation Function API) has been targeted to JDK 24, the next release of the JDK. This is a new cryptographic API for deriving keys. The JEP also includes an implementation of HKDF (RFC 5869). This API will be important for future PQC work such as HPKE (RFC 9180) and stronger password hashing algorithms such as Argon2.

openjdk.org/jeps/478 #java #crypto #jdk24 #openjdk

Sean Mullan boosted:
OpenJDKopenjdk
2024-10-24

Proposed to target JDK 24: JEP 478: Key Derivation Function API (Preview): openjdk.org/jeps/478

2024-09-30

@stuartmarks Haha, I’m originally from NY, lived in Queens for a few years where I became a Mets fan for life! I like the Sox though and especially when they play the Yankees 😁

2024-09-30

OMG. The game. The season.
#mets #lindor

2024-09-26

New candidate JEP: 486: Permanently Disable the Security Manager: openjdk.org/jeps/486

#openjdk #jdk #java #security

2024-09-24

@fthevenet @bondolo

It isn’t as simple as it appears. Just a few issues: Mozilla doesn’t care about code signing certificates. The Java Platform does. CAs are starting to establish separate roots for different purposes, i.e. one for TLS, one for code signing. Mozilla implements some policies in NSS, like distrusting after a certain date, etc.

2024-09-23

@bondolo If you set it on the command line, the default TrustManager will use it, see docs.oracle.com/en/java/javase

The JDK includes its own root certs (in the cacerts keystore) so that is the default as it provides consistent behavior on all JDK supported platforms. The JDK includes most common CAs, so typically that should be sufficient for most servers, this is more if you want to be more closely tied to what MacOS uses or perhaps additional roots you may have imported into your keychain.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst