Download Java MSI x64 and x86 8.0.1710.11

Download Java MSI x64 and x86 8.0.1710.11.

For installtion with Configuration Manager use:


msiexec.exe /i "jre1.8.0_171.msi" /qn JU=0 JAVAUPDATE=0 AUTOUPDATECHECK=0 RebootYesNo=No


msiexec.exe /i "jre1.8.0_17164.msi" /qn JU=0 JAVAUPDATE=0 AUTOUPDATECHECK=0 RebootYesNo=No

For uninstall use:


msiexec /x {26A24AE4-039D-4CA4-87B4-2F32180171F0} /qn /norestart



msiexec /x {26A24AE4-039D-4CA4-87B4-2F64180171F0} /qn /norestart

Release Highlights

  • IANA Data 2018c
    JDK 8u171 contains IANA time zone data version 2018c. For more information, refer to Timezone Data Versions in the JRE Software.
  • New Feature: Enhanced KeyStore Mechanisms
    A new security property named jceks.key.serialFilter has been introduced. If this filter is configured, the JCEKS KeyStore uses it during the deserialization of the encrypted Key object stored inside a SecretKeyEntry. If it is not configured or if the filter result is UNDECIDED (for example, none of the patterns match), then the filter configured by jdk.serialFilter is consulted.
    If the system property jceks.key.serialFilter is also supplied, it supersedes the security property value defined here.
    The filter pattern uses the same format as jdk.serialFilter. The default pattern allows java.lang.Enum,,$Type, and javax.crypto.spec.SecretKeySpec but rejects all the others.
    Customers storing a SecretKey that does not serialize to the above types must modify the filter to make the key extractable.
    JDK-8189997 (not public)
  • New Feature: System Property to Disable JRE Last Usage Tracking
    A new system property jdk.disableLastUsageTracking has been introduced to disable JRE last usage tracking for a running VM. This property can be set in the command line by using either -Djdk.disableLastUsageTracking=true or -Djdk.disableLastUsageTracking. With this system property set, JRE last usage tracking will be disabled regardless of the property value set in
    JDK-8192039 (not public)
  • Note: CipherOutputStream Usage
    The specification of javax.crypto.CipherOutputStream has been clarified to indicate that this class catches BadPaddingException and other exceptions thrown by failed integrity checks during decryption. These exceptions are not re-thrown, so the client is not informed that integrity checks have failed. Because of this behavior, this class may not be suitable for use with decryption in an authenticated mode of operation (for example, GCM) if the application requires explicit notification when authentication fails. These applications can use the Cipher API directly as an alternative to using this class.
    JDK-8182362 (not public)
  • Change: Additional TeliaSonera Root Certificate
    “TeliaSonera Root CA v1” has been added to the cacerts keystore.
    JDK-8190851 (not public)
  • Change: XML Signatures Signed with EC Keys Less Than 224 Bits Disabled
    To improve the strength of SSL/TLS connections, 3DES cipher suites have been disabled in SSL/TLS connections in the JDK via the jdk.tls.disabledAlgorithms Security Property.
    JDK-8175075 (not public)
  • Bug Fix: Server-side HTTP-tunneled RMI Connections Disabled
    Server side HTTP-tunneled RMI connections have been disabled by default in this release. This behavior can be reverted by setting the runtime property sun.rmi.server.disableIncomingHttp property to false. Note, this should not be confused with the sun.rmi.server.disableHttp property, which disables HTTP-tunneling on the client side and is false by default.
    JDK-8193833 (not public)



You might also like

Leave a Reply

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More