Skip to content

Conversation

md5
Copy link
Contributor

@md5 md5 commented May 21, 2015

This PR uses jessie-backports to get OpenJDK 8 under Debian Jessie.

I haven't yet made the necessary updates to update.sh since it's a bit tricky. The docker run statement that's used to check apt-cache show will need to conditionally add a Apt source list for jessie-backports. I could make it work, but it's going to be a hack.

@tianon
Copy link
Member

tianon commented May 27, 2015

docker-library/official-images#762 might help 😉

@md5
Copy link
Contributor Author

md5 commented May 27, 2015

🤘

@md5
Copy link
Contributor Author

md5 commented May 27, 2015

@tianon Any chance you're thinking of doubling the number of tags on buildpack-deps to include buildpack-deps:jessie-backports-curl and buildpack-deps:jessie-backports-scm?

@tianon
Copy link
Member

tianon commented May 27, 2015 via email

@md5
Copy link
Contributor Author

md5 commented May 27, 2015

Then I'm thinking that debian:jessie-backports won't be much help here, unfortunately.

@tianon
Copy link
Member

tianon commented May 27, 2015 via email

@tianon
Copy link
Member

tianon commented May 27, 2015 via email

@md5
Copy link
Contributor Author

md5 commented May 27, 2015

@tianon Good idea. That seems preferable to bloating the number of buildpack-deps tags.

@md5
Copy link
Contributor Author

md5 commented May 27, 2015

Pushed 6e8a2bf to update the update.sh script.

@tianon
Copy link
Member

tianon commented May 27, 2015

LGTM

1 similar comment
@yosifkit
Copy link
Member

LGTM

yosifkit added a commit that referenced this pull request May 27, 2015
Use Debian Jessie as base image for Java 8
@yosifkit yosifkit merged commit 43b1402 into docker-library:master May 27, 2015
@md5 md5 deleted the java-8-jessie branch May 28, 2015 00:03
@md5 md5 mentioned this pull request Jun 24, 2015
@Godin
Copy link

Godin commented May 2, 2016

While switching from java:openjdk-8u45-jdk to java:8 we've noticed that this move to Jessie has a negative impact on curl+HTTPS ( SonarSource/docker-sonarqube#18 (comment) ) due to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812708 . Wondering if someone else faced the same problem? And what will be the best way to deal with this?

@md5
Copy link
Contributor Author

md5 commented May 3, 2016

@Godin After reading through Debian issue 812708, it looks like the issue is that a number of 1024 bit certificates were removed from the ca-certificates package, including Thawte_Premium_Server_CA.crt and GTE_CyberTrust_Global_Root.crt.

It seems that these certificates were used to sign a number of other CA certificates that are still part of ca-certificates, so the child certificates should be trusted according the the specs. However, due to a couple of bugs in OpenSSL affecting versions older than 1.0.2, certificate chains using the intermediate CAs as the trust root can't be verified.

Since Debian jessie has version 1.0.1 of openssl, the combination of the CA removal and the OpenSSL bugs means that many certificate chains in the wild can no longer be verified. Debian stretch and sid use version 1.0.2 of openssl, so they are unaffected.

The fix is to add the two removed certificates back. You should be able to get them from an older version of the ca-certificates package.

More information about the 1024 bit CA removal can be found here: https://blog.mozilla.org/security/2015/01/28/phase-2-phasing-out-certificates-with-1024-bit-rsa-keys/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants