Bug 467064 - Request for JCE signing code certificate for Orbit Bundle
Summary: Request for JCE signing code certificate for Orbit Bundle
Status: CLOSED MOVED
Alias: None
Product: Community
Classification: Eclipse Foundation
Component: Servers (show other bugs)
Version: unspecified   Edit
Hardware: PC Linux
: P3 enhancement (vote)
Target Milestone: ---   Edit
Assignee: Frederic Gurr CLA
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on: 532794
Blocks: 382212 478088 479371
  Show dependency tree
 
Reported: 2015-05-12 03:06 EDT by David Williams CLA
Modified: 2021-12-23 06:32 EST (History)
11 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description David Williams CLA 2015-05-12 03:06:42 EDT
I am not very knowledgeable of the topic domain, but am opening this bug to close the loop on some discussions taking place on orbit-dev list. 

Hopefully others can chime in, if there's questions. 

The issue is that there are some third party bundles that are security related, and have been signed by an "industry standard" signing certificate, JCE. 

These bundles consist of an API and an Implementation. To be valid, they both must be signed by this JCE certificate. 

Some of my web searches may be 'out of date', that is, there could be more recent references, but I get the impression it is not hard to get one of these (in terms of time or expense?) 

http://stackoverflow.com/questions/1756801/how-to-sign-a-custom-jce-security-provider

And more technical details are at 

http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/HowToImplAProvider.html#Step6

Our goal, in Orbit, is to "re-sign" some third party bundles, so that we can more easily tweak some names and data of these third party bundles, to conform to Eclipse and Orbit's requirements or conventions. 

It may be possible we can provide these bundles 'as is', already signed by the third party, ... but ... my intuition is this would be more difficult than re-signing them, with our own certificate. Not to mention, I think more "accurate", in that these bundles would then show as signed by "JCE from Eclipse Foundation" (I think) rather than generic JCE or JCE from someone else? 

I realize this is a bit vague of a request, but wanted to "get the ball rolling" and see if there was an opportunity here?
Comment 1 Matthias Sohn CLA 2015-05-12 05:03:32 EDT
Oracle's instructions how to order a JCE signing certificate
http://www.oracle.com/technetwork/java/javase/tech/getcodesigningcertificate-361306.html
Comment 2 David Williams CLA 2015-05-12 08:47:08 EDT
(In reply to Matthias Sohn from comment #1)
> Oracle's instructions how to order a JCE signing certificate
> http://www.oracle.com/technetwork/java/javase/tech/getcodesigningcertificate-
> 361306.html

Thanks, Matthias. I find that one "caution" paragraph confusing: 
= = = = = 
IMPORTANT NOTE: Oracle does not issue general code-signing certificates for applet or Web Start deployment. The process described here is only for obtaining certificates for use with the Java Cryptography Extensions framework.

A certificate received from this process will not work for anything other than authenticating JCE providers to the JCE framework (that is, the certificate will not work for deployment purposes.)

...
= = = = 
I assume the "will not work for deployment purposes" refers only to the "applet" and "web start" aspects ... I assume the certificate obtained can be used 
for "production quality and deployment of JCE providers" (just not applets, etc.)
Comment 3 Matthias Sohn CLA 2015-09-22 03:08:35 EDT
(In reply to David Williams from comment #2)
> (In reply to Matthias Sohn from comment #1)
> > Oracle's instructions how to order a JCE signing certificate
> > http://www.oracle.com/technetwork/java/javase/tech/getcodesigningcertificate-
> > 361306.html
> 
> Thanks, Matthias. I find that one "caution" paragraph confusing: 
> = = = = = 
> IMPORTANT NOTE: Oracle does not issue general code-signing certificates for
> applet or Web Start deployment. The process described here is only for
> obtaining certificates for use with the Java Cryptography Extensions
> framework.
> 
> A certificate received from this process will not work for anything other
> than authenticating JCE providers to the JCE framework (that is, the
> certificate will not work for deployment purposes.)
> 
> ...
> = = = = 
> I assume the "will not work for deployment purposes" refers only to the
> "applet" and "web start" aspects ... I assume the certificate obtained can
> be used 
> for "production quality and deployment of JCE providers" (just not applets,
> etc.)

that's also my understanding
Comment 4 Matthias Sohn CLA 2015-09-22 03:18:44 EDT
Since our CQs for the bouncycastle libraries are approved now 
https://dev.eclipse.org/ipzilla/show_bug.cgi?id=9552
https://dev.eclipse.org/ipzilla/show_bug.cgi?id=9553
https://dev.eclipse.org/ipzilla/show_bug.cgi?id=9554
I'd like to add these libraries to Orbit now.

We had to remove some classes from the bouncycastle JCE provider bcprov-jdk15on.jar due to legal issues so we need the JCE signing certificate in order to re-sign the modified library for adding it to Orbit so that we can redistribute it with JGit.

So could the foundation order an JCE signing certificate and make it available on build.eclipse.org ?
Comment 5 Denis Roy CLA 2015-09-22 11:57:28 EDT
Once we issue a CSR we'll be asked to sign and fax this document:
http://www.oracle.com/ocom/groups/public/@otn/documents/digitalasset/2138834.pdf

Since this involves cryptography and export control, I will consult with Legal.
Comment 6 David Williams CLA 2015-09-22 13:12:18 EDT
Since this is "moving along" now, I have opened Orbit bug 

Bug 478088 - Need change of build process to sign some jars with JCE certificate

The process we use in Orbit, depends on the process defined by the Eclipse Foundation, but I would imagine something for the "batch zip-file" process where we'd simply put the jars/zip in another directory, defined for the JCE signature. 

I think the CBI maven jar-signer already has the ability to specify a different URL/port for signing ... so assume JCE made available via some other port, and any bundle needing that, simply override the "standard" url/port in their individual pom file. But, will add Mikael for confirmation and awareness. 

One slight uncertainty -- perhaps you, Matthias, know -- is how this plays with a "signed jar" certificate. Off hand, I would assume it is "the same thing", just a little more special -- that is, the jar does not have to be signed twice, once with a jar signing certificate, and once with the JCE certificate. And that any thing in the rest of our code that's checking for "signed jar" certificate, would see a JCE certificate as also a signed jar certificate. 

Depending on how that uncertainty is answered, there *might* be some effect on Equinox or p2 installation process? But, if it appears, to equinox and p2, as a normal "signed jar certificate", then it would not impact them at all. But, I'll add Tom and Pascal, just in case they know anything about it, or need some "early warning".
Comment 7 Mikaël Barbero CLA 2015-10-28 07:07:58 EDT
(In reply to David Williams from comment #6)
> I think the CBI maven jar-signer already has the ability to specify a
> different URL/port for signing ... so assume JCE made available via some
> other port, and any bundle needing that, simply override the "standard"
> url/port in their individual pom file. But, will add Mikael for confirmation
> and awareness. 

We can setup a new webservice at a different url, e.g. http://build.eclipse.org:31338/jce-sign once we have the JCE certificate. This url can be specified in the maven cbi-jarsign-plugin configuration (either with <configuration> in the pom or with -Dcbi.jarsigner.signerUrl). Orbit can also decide to use the webservice directly (e.g. by using curl). We still have to figure out whether this signing service can be accessed by any committer at eclipse (like the standard signing service) or if it has to be restricted to the Orbit's HIPP.
Comment 8 Matthias Sohn CLA 2016-02-28 18:47:12 EST
(In reply to Denis Roy from comment #5)
> Once we issue a CSR we'll be asked to sign and fax this document:
> http://www.oracle.com/ocom/groups/public/@otn/documents/digitalasset/2138834.
> pdf
> 
> Since this involves cryptography and export control, I will consult with
> Legal.

Any progress on this ? 

I have added the bouncycastle libraries to orbit-recipes.

Currently the build is failing since eclipse-jarsigner can't sign the original bundles which are already signed with a JCE signature.

I pushed a workaround
https://git.eclipse.org/r/#/c/67506
stripping the original JCE signatures so that eclipse-jarsigner can sign these bundles until the JCE certificate and corresponding signing service are available.
Comment 9 Denis Roy CLA 2016-04-28 14:38:36 EDT
This has to be put on hold until our new release engineer can set up a signing service.
Comment 10 Matthias Sohn CLA 2016-08-26 17:51:05 EDT
ping, any idea when this could be tackled ?
Comment 11 Frederic Gurr CLA 2016-08-29 08:16:45 EDT
Denis, do we have the required JCE certificates in place?
Comment 12 Denis Roy CLA 2016-08-29 10:49:29 EDT
I have not looked at this at all, sorry.
Comment 13 Matthias Sohn CLA 2017-03-08 13:29:41 EST
Can we please get this done somewhen in the near future ?
Comment 14 Denis Roy CLA 2017-03-08 13:53:15 EST
Fred, can you assess what we need to do here? As far as I know, we don't have any other certs other than the code signing cert we use currently.
Comment 15 Frederic Gurr CLA 2017-03-09 10:30:27 EST
As discussed, we will need to get a JCE certificate. As mentioned in comment 5 you wanted to consult with legal first.
Comment 16 Denis Roy CLA 2017-03-15 13:42:18 EDT
I am looking into this with Legal.
Comment 17 Denis Roy CLA 2017-03-16 15:30:12 EDT
"Send, via email, the CSR for your Java Cryptography Extension provider"

I can produce a CSR using openssl, but since this is Java specific, something tells me the CSR needs to be issued from Java's keytool or even from within Java API

http://www.journaldev.com/223/generating-a-certificate-signing-request-using-java-api


Fred/Mikael, since you guys will be setting up and running the signing webservice, can you produce the CSR, or is an openssl CSR sufficient?
Comment 18 David Williams CLA 2017-03-22 15:49:50 EDT
(In reply to Denis Roy from comment #17)
> "Send, via email, the CSR for your Java Cryptography Extension provider"
> 
> I can produce a CSR using openssl, but since this is Java specific,
> something tells me the CSR needs to be issued from Java's keytool or even
> from within Java API
> 
> http://www.journaldev.com/223/generating-a-certificate-signing-request-using-
> java-api
> 
> 
> Fred/Mikael, since you guys will be setting up and running the signing
> webservice, can you produce the CSR, or is an openssl CSR sufficient?

My guess is either keytool or openssl could be made to work, but since the official directions [1] show the use of keytool I would just go with that. 

[1] https://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/HowToImplAProvider.html#Step6
Comment 19 Denis Roy CLA 2017-07-14 12:34:17 EDT
I have created a CSR and have submitted the request.
Comment 20 Denis Roy CLA 2017-07-25 14:26:23 EDT
Response back:

"I noticed that in your description, you have "providers" instead of "provider".
One more question: are you applying certificate for signing your own provider or acting as a sub-CA to sign other JCE providers.
Only requests for signing their own provider will be accepted."
Comment 21 David Williams CLA 2017-07-25 14:39:26 EDT
(In reply to Denis Roy from comment #20)
> Response back:
> 
> "I noticed that in your description, you have "providers" instead of
> "provider".
> One more question: are you applying certificate for signing your own
> provider or acting as a sub-CA to sign other JCE providers.
> Only requests for signing their own provider will be accepted."

Little that I know, I'd say

Yes, "provider", The Eclipse Foundation and no -- no sub-CA going on -- we are only signing jars that would normally be signed by the Eclipse Foundation.
Comment 22 Denis Roy CLA 2017-07-25 14:43:22 EDT
Agreed, David. I've forwarded the response.
Comment 23 Mikaël Barbero CLA 2017-07-26 03:38:00 EDT
(In reply to Denis Roy from comment #20)
> One more question: are you applying certificate for signing your own
> provider or acting as a sub-CA to sign other JCE providers.
> Only requests for signing their own provider will be accepted."

While we will sign a custom version of bountycastle (a JCE provider), it is not really "our own", just a modified version of https://bouncycastle.org/java.html. Signing a JCE and a jar may be the same technical process, but the process to get the certificates are very different.
Comment 24 Denis Roy CLA 2017-07-26 11:27:49 EDT
"Ok then,  Oracle has recently rolled out a new CA that signs certificates using SHA-2 and uses a different Root CA certificate.  Would you like us to issue your cert from this new root CA?  One thing to be aware of is that this new JCE provider root was added to 8u111/7u121/6u131 so earlier versions of Oracle JDK/JRE would not load your provider if signed by a certificate issued from this new CA.  OpenJDK doesn't have this restriction and should load and run your provider, as would the aforementioned Oracle JDK/JRE releases and anything later.  Please let us know if you would like to proceed with this new CA."

Thoughts?
Comment 25 Mikaël Barbero CLA 2017-07-26 11:36:45 EDT
I think we should stick with a certificate issued from the "old" CA. It may be too restrictive to ask users to use 8u111/7u121/6u131 or later. 

Matthias, you are the targeted primary user, what do you think?
Comment 26 Matthias Sohn CLA 2017-08-13 09:00:02 EDT
(In reply to Mikaël Barbero from comment #25)
> I think we should stick with a certificate issued from the "old" CA. It may
> be too restrictive to ask users to use 8u111/7u121/6u131 or later. 
> 
> Matthias, you are the targeted primary user, what do you think?

yes, let's stick to a certificate issued by the old CA so we don't impose additional restrictions on our users which Java version they need to have. JGit requires Java 8 since 4.6 (latest release is 4.8)
Comment 27 Denis Roy CLA 2017-08-14 12:33:17 EDT
Response sent. Thanks
Comment 28 Denis Roy CLA 2017-08-24 13:50:12 EDT
The completed certification form has been sent.

http://www.oracle.com/ocom/groups/public/@otn/documents/digitalasset/2138834.pdf
Comment 29 Matthias Sohn CLA 2017-08-24 16:49:14 EDT
thanks a lot, finally we are making progress :)
Comment 30 Denis Roy CLA 2017-08-30 10:03:17 EDT
We've got the signed certificate, now to create a signing service.
Comment 31 Matthias Sohn CLA 2017-08-30 12:00:56 EDT
nice, I owe you a beer at EclipseCon Ludwigsburg
Comment 32 Mikaël Barbero CLA 2018-02-26 10:00:55 EST
The slow process is on me. We've been having the certificate for quite some time now, but the bug slipped through my watch. 

To offer the signing capability, we need to expose a new URL but the service will be basically the same as https://wiki.eclipse.org/IT_Infrastructure_Doc#Web_service_.28Instant.29

I would propose http://build.eclipse.org:31338/jce-signing-service

curl -o signedfile.jar -F file=@unsigned-jar.jar http://build.eclipse.org:31338/jce-signing-service
Comment 33 Denis Roy CLA 2018-02-26 10:18:36 EST
+1
Comment 34 Matthias Sohn CLA 2018-02-26 11:44:35 EST
+1

could we then call this new service in the orbit-recipes Tycho build using eclipse-jar-signer maven plugin and setting cbi.jarsigner.signerUrl=http://build.eclipse.org:31338/jce-signing-service ?
Comment 35 Mikaël Barbero CLA 2018-02-26 11:46:25 EST
(In reply to Matthias Sohn from comment #34)
> +1
> 
> could we then call this new service in the orbit-recipes Tycho build using
> eclipse-jar-signer maven plugin and setting
> cbi.jarsigner.signerUrl=http://build.eclipse.org:31338/jce-signing-service ?

Yes, this is goal. Will keep you posted as soon as the service is up and running (should be on Wed. at worst).
Comment 36 Mikaël Barbero CLA 2018-02-28 11:58:20 EST
I'm a bit late with that. I'm still confident to have this done by end of the week. 

Thanks for your patience.
Comment 37 Mikaël Barbero CLA 2018-03-02 16:29:36 EST
You can now sign jars with a JCE certificate by using the following URL

http://build.eclipse.org:31338/api/sign/jce

Note that you still need to sign your jar with the standard certificate as well. JCE certificates are not general purpose code signing ones. 

Unfortunately, there is still an issue today: both our certificates have the same short name. Thus, the signature files will be overridden by the last one used. I will fix that early next week. You can already play with this today.
Comment 38 Mikaël Barbero CLA 2018-03-07 08:42:55 EST
(In reply to Mikaël Barbero from comment #37)
> Unfortunately, there is still an issue today: both our certificates have the
> same short name. Thus, the signature files will be overridden by the last
> one used. I will fix that early next week. You can already play with this
> today.

This is fixed. You can know sign jar with a JCE certificate by using the http://build.eclipse.org:31338/api/sign/jce service URL
Comment 39 Matthias Sohn CLA 2018-03-14 18:51:13 EDT
(In reply to Mikaël Barbero from comment #37)
> You can now sign jars with a JCE certificate by using the following URL
> 
> http://build.eclipse.org:31338/api/sign/jce
> 
> Note that you still need to sign your jar with the standard certificate as
> well. JCE certificates are not general purpose code signing ones. 

How can I sign the same jar twice using the eclipse-jarsigner-plugin ?
And in which order should I do this double signing ?

Here is the change trying to sign bcprov using JCE signing service
https://git.eclipse.org/r/#/c/119370/
Comment 40 Matthias Sohn CLA 2018-03-14 18:53:25 EDT
the corresponding test build including maven debug log is currently running here
https://ci.eclipse.org/orbit/job/gerrit-orbit-recipes/563/console

This build log (it's huge) can be downloaded using 
$ curl -O https://ci.eclipse.org/orbit/job/gerrit-orbit-recipes/562/consoleText
Comment 41 Matthias Sohn CLA 2018-03-14 19:23:49 EDT
pasted the wrong URL, this is the correct build log URL
$ curl -O https://ci.eclipse.org/orbit/job/gerrit-orbit-recipes/563/consoleText
Comment 42 Mikaël Barbero CLA 2018-03-15 04:17:22 EDT
(In reply to Matthias Sohn from comment #39)
> How can I sign the same jar twice using the eclipse-jarsigner-plugin ?
> And in which order should I do this double signing ?
> 
> Here is the change trying to sign bcprov using JCE signing service
> https://git.eclipse.org/r/#/c/119370/

You need to define 2 executions with 2 different configurations:

<plugin>
  <groupId>org.eclipse.cbi.maven.plugins</groupId>
  <artifactId>eclipse-jarsigner-plugin</artifactId>
  <version>1.1.4</version>
  <executions>
    <execution>
      <id>sign</id>
      <phase>package</phase>
      <goals>
        <goal>sign</goal>
      </goals>
      <configuration>
        <resigningStrategy>OVERWRITE</resigningStrategy>
        <signerUrl>http://build.eclipse.org:31338/sign</signerUrl>
      </configuration>
    </execution>
    <execution>
      <id>sign-jce</id>
      <phase>package</phase>
      <goals>
        <goal>sign</goal>
      </goals>
      <configuration>
        <resigningStrategy>OVERWRITE</resigningStrategy>
        <signerUrl>http://build.eclipse.org:31338/api/sign/jce</signerUrl>
      </configuration>
    </execution>
  </executions>
</plugin>

This is only needed in	bouncycastle/pom.xml, you can keep your releng/mavenparent/pom.xml file untouched.
Comment 43 Mikaël Barbero CLA 2018-03-15 04:17:37 EDT
(reopening)
Comment 44 Matthias Sohn CLA 2018-03-15 20:39:27 EDT
(In reply to Mikaël Barbero from comment #42)
> (In reply to Matthias Sohn from comment #39)
> > How can I sign the same jar twice using the eclipse-jarsigner-plugin ?
> > And in which order should I do this double signing ?
> > 
> > Here is the change trying to sign bcprov using JCE signing service
> > https://git.eclipse.org/r/#/c/119370/
> 
> You need to define 2 executions with 2 different configurations:
> 
> <plugin>
>   <groupId>org.eclipse.cbi.maven.plugins</groupId>
>   <artifactId>eclipse-jarsigner-plugin</artifactId>
>   <version>1.1.4</version>
>   <executions>
>     <execution>
>       <id>sign</id>
>       <phase>package</phase>
>       <goals>
>         <goal>sign</goal>
>       </goals>
>       <configuration>
>         <resigningStrategy>OVERWRITE</resigningStrategy>
>         <signerUrl>http://build.eclipse.org:31338/sign</signerUrl>
>       </configuration>
>     </execution>
>     <execution>
>       <id>sign-jce</id>
>       <phase>package</phase>
>       <goals>
>         <goal>sign</goal>
>       </goals>
>       <configuration>
>         <resigningStrategy>OVERWRITE</resigningStrategy>
>         <signerUrl>http://build.eclipse.org:31338/api/sign/jce</signerUrl>
>       </configuration>
>     </execution>
>   </executions>
> </plugin>
> 
> This is only needed in	bouncycastle/pom.xml, you can keep your
> releng/mavenparent/pom.xml file untouched.

How is that going to work? Wouldn't resigningStrategy OVERWRITE for the second jce signing overwrite signing of the previous signing step ?

Any idea how to configure that using profiles ? Can I put the same profile defined in mavenparent/pom.xml and bcprov/pom.xml with different configuration ?
Comment 45 Mikaël Barbero CLA 2018-03-16 04:32:29 EDT
> How is that going to work? Wouldn't resigningStrategy OVERWRITE for the
> second jce signing overwrite signing of the previous signing step ?

Indeed, it's a stupid copy/paste.

> Any idea how to configure that using profiles ? Can I put the same profile
> defined in mavenparent/pom.xml and bcprov/pom.xml with different
> configuration ?

My best idea to handle you use case would be to keep your parent pom as-is (ie as on master, without introducing jarsigner.signerUrl property), and just modify org.bouncycastle.bcprov_1.52.0/pom.xml, adding 
<build>
<plugins>
<plugin>
  <groupId>org.eclipse.cbi.maven.plugins</groupId>
  <artifactId>eclipse-jarsigner-plugin</artifactId>
  <version>1.1.4</version>
  <executions>
    <execution>
      <id>sign-jce</id>
      <phase>package</phase>
      <goals>
        <goal>sign</goal>
      </goals>
      <configuration>
        <signerUrl>http://build.eclipse.org:31338/api/sign/jce</signerUrl>
      </configuration>
    </execution>
  </executions>
</plugin>
</plugins>
</build>

both executions (sign and sign-jce) should execute. I'm not able to say out of the box in which order, and then which one needs the OVERWRITE resigningStrategy. Printing the effective pom for org.bouncycastle.bcprov_1.52.0/pom.xml  with the command "mvn help:effective-pom" should help you find the order (plugin are executed in the order they are defined in the <build/plugins> section of the effective pom).
Comment 46 Matthias Sohn CLA 2018-03-21 19:24:49 EDT
Ok, I configured that and configured the orbit gerrit validation job to sign this build. This fails with the following error

https://ci.eclipse.org/orbit/job/gerrit-orbit-recipes/569/console

[WARNING] [Wed Mar 21 19:12:02 EDT 2018] HTTP request failed.
HTTP Error 500 (reason: Server Error)
HTTP Error 500
Problem accessing '/jar-signing-service'
Reason: Server Error

Caused by: java.io.IOException: The '/usr/java/jdk1.8.0_51/bin/jarsigner' command exited with value '1'
'/usr/java/jdk1.8.0_51/bin/jarsigner' output:
jarsigner: unable to open jar file: /tmp/jce-jar-signing/SigningServlet-1713966440573346507-org.bouncycastle.bcprov-1.52.0-SNAPSHOT.jar

	at org.eclipse.cbi.webservice.signing.jar.JarSigner.signJar(JarSigner.java:231)
	at org.eclipse.cbi.webservice.signing.jar.SigningServlet.doSign(SigningServlet.java:66)
	at org.eclipse.cbi.webservice.signing.jar.SigningServlet.doPost(SigningServlet.java:54)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:707)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
	at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:860)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:535)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:188)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1595)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:188)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1253)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:168)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:473)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1564)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:166)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1155)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141)
...<troncated output>... For complete output, see '/jobs/genie.orbit/gerrit-orbit-recipes/workspace/bouncycastle/org.bouncycastle.bcprov_1.52.0/target/org.bouncycastle.bcprov-1.52.0-SNAPSHOT.jar-8640549432963972734-RemoteJarSigner.log'


is the signing service down or is this a problem on my end in https://git.eclipse.org/r/#/c/119370/ ?
Comment 47 Mikaël Barbero CLA 2018-03-23 04:21:04 EDT
The signing service is not down. I'm looking into it.
Comment 48 Frederic Gurr CLA 2019-07-05 10:55:46 EDT
Closing.
Comment 49 Roland Grunberg CLA 2021-09-22 14:05:17 EDT
Does anyone know what the new path is for the JCE signing (previously http://build.eclipse.org:31338/api/sign/jce ) ? I've tried https://cbi.eclipse.org/api/sign/jce but that doesn't seem to be it.
Comment 50 Mikaël Barbero CLA 2021-09-23 03:06:43 EDT
URL is https://cbi.eclipse.org/jarsigner/jce/sign
Comment 51 Mikaël Barbero CLA 2021-09-23 03:36:48 EDT
@Roland 

The certificate expired on Apr 25 07:00:00 2020 GMT though. Do you need a new one? If so, please reopoen this ticket. Thanks!
Comment 52 Matthias Sohn CLA 2021-09-23 05:33:11 EDT
I think we need a new signing certificate otherwise we can't sign the bouncycastle JCE provider anymore so that Java accepts it as a JCE provider
Comment 53 Mikaël Barbero CLA 2021-09-23 05:36:51 EDT
@Denis, would you mind issuing a new CSR as you did in comment #19? Thanks.
Comment 54 Denis Roy CLA 2021-09-23 11:07:31 EDT
Is this still the correct process to follow?
https://www.oracle.com/java/technologies/javase/getcodesigningcertificate.html

@Mikael In the past I've used the keystore on build.e.o to issue code signing CSRs. Is there a better place to do that now?
Comment 55 Matthias Sohn CLA 2021-09-23 11:55:47 EDT
(In reply to Denis Roy from comment #54)
> Is this still the correct process to follow?
> https://www.oracle.com/java/technologies/javase/getcodesigningcertificate.
> html

looks like this is still correct
Comment 56 Mikaël Barbero CLA 2021-09-24 03:20:02 EDT
(In reply to Mikaël Barbero from comment #53)
> @Denis, would you mind issuing a new CSR as you did in comment #19? Thanks.

I've sent instructions via email.
Comment 57 Frederic Gurr CLA 2021-12-23 06:32:52 EST
This issue has been migrated to https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/issues/195.