What if Java self-updated on end users machines?
--
You received this message because you are subscribed to the Google Groups "The Java Posse" group.To post to this group, send email to java...@googlegroups.com.
To unsubscribe from this group, send email to javaposse+...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/javaposse?hl=en.
> Java can be configured to automatically update on Windows:
> http://java.com/en/download/help/java_update.xml. On Linux and OS X, the
> package manager, and Mac Update mechanism usually takes care of that for
> you.
The only embarrassing moment in my career happened at the times of Java
1.3 (don't remember precisely). The day before the official acceptance
tests everything was fine. The day of the official acceptance tests, in
presence of a big boss of the customer, everything failed. I don't recall
precisely the details (it should be stuff circa 2000/2001), but our Java
Web Start got an update when running the acceptance tests and got a change
in the management of digital certificates. Before the update, the JRE was
able to access the certstore of Internet Explorer. After the update it
wasn't. We were using a customer self-signed certificate that the official
procedure presumed was loaded by first connecting to the website home
page, then it would have been available to the Java applet that was going
to run. Without the certificate, the applet was completely broken.
The incident was understood a few hours later and caused no big
consequences, because the customers' technicians understood what happened.
But, you know, a failure, even temporary, in face of a non technical boss
*may* have bad consequences even after a clarification.
So, for an industrial environment, auto-update for me is a big NO. In the
sense that I must be able to control it: I will always explicitly put a
dependency on a specific Java version. We can say that auto update may
even occur, but not replacing the older version, and the newer won't be
used until somebody first tests everything in a pre-production environment
and then gives green light for production.
For end users, it makes probably sense because they are not technical,
lazy and wouldn't run the update manually, thus exposing to potential
security flaws. But for sure an automatic update, sooner or later, is
going to break some piece of software. Probably in most cases it's a minor
damage than a security breach.
Short story: ok to automatic updates, but there must be a switch. I
personally would always switch it off, even for personal use.
--
Fabrizio Giudici - Java Architect, Project Manager
Tidalwave s.a.s. - "We make Java work. Everywhere."
fabrizio...@tidalwave.it
http://tidalwave.it - http://fabriziogiudici.it
--
You received this message because you are subscribed to the Google Groups "The Java Posse" group.
To view this discussion on the web visit https://groups.google.com/d/msg/javaposse/-/V6IJJs2ocIsJ.
But then Chrome showed them differently, and now even Microsoft is going to start self-updating the browser.
Then those end user applications could use an auto-update mechanism as appropriate.
If a client is running a video game based on an old JVM, what kind of security attacks could exploit that?
> How does a multiplayer game present security risks? And how does an
> embedded Java make security risks worse than C or other dev platforms?
>
> As long as the embedded VM isn't being used to run potentially
> malicious applets and web start programs from around the Internet,
> users shouldn't be at any more risk than with any other mulitplayer
> game written in C.
A security risk can potentially arise when the VM is launched, not
necessarily as an applet, as in general security risks are everywhere
(even though I think most of security holes were with applets).
Sure, Java is more secure than C. But when a C-based application exposes a
security risk, the bad press will be for the application. If the problem
is with Java, the bad press will be for Java (and it would be the same for
Silverlight or Flash, etc...).