Download Java MSI x64 and x86 8.0.1710.11.
For installation with Configuration Manager use:
x86
msiexec.exe /i "jre1.8.0_171.msi" /qn JU=0 JAVAUPDATE=0 AUTOUPDATECHECK=0 RebootYesNo=No
x64
msiexec.exe /i "jre1.8.0_17164.msi" /qn JU=0 JAVAUPDATE=0 AUTOUPDATECHECK=0 RebootYesNo=No
For uninstall use:
x86
msiexec /x {26A24AE4-039D-4CA4-87B4-2F32180171F0} /qn /norestart
x64
msiexec /x {26A24AE4-039D-4CA4-87B4-2F64180171F0} /qn /norestart
Release Highlights
- IANA Data 2018c
JDK 8u171 contains IANA time zone data version 2018c. For more information, refer to Timezone Data Versions in the JRE Software. - New Feature: Enhanced KeyStore Mechanisms
A new security property namedjceks.key.serialFilter
has been introduced. If this filter is configured, the JCEKS KeyStore uses it during the deserialization of the encrypted Key object stored inside a SecretKeyEntry. If it is not configured or if the filter result is UNDECIDED (for example, none of the patterns match), then the filter configured byjdk.serialFilter
is consulted.
If the system propertyjceks.key.serialFilter
is also supplied, it supersedes the security property value defined here.
The filter pattern uses the same format asjdk.serialFilter
. The default pattern allowsjava.lang.Enum, java.security.KeyRep, java.security.KeyRep$Type
, andjavax.crypto.spec.SecretKeySpec
but rejects all the others.
Customers storing a SecretKey that does not serialize to the above types must modify the filter to make the key extractable.
JDK-8189997 (not public) - New Feature: System Property to Disable JRE Last Usage Tracking
A new system propertyjdk.disableLastUsageTracking
has been introduced to disable JRE last usage tracking for a running VM. This property can be set in the command line by using either-Djdk.disableLastUsageTracking=true
or-Djdk.disableLastUsageTracking
. With this system property set, JRE last usage tracking will be disabled regardless of thecom.oracle.usagetracker.track.last.usage
property value set inusagetracker.properties
.
JDK-8192039 (not public) - Note: CipherOutputStream Usage
The specification ofjavax.crypto.CipherOutputStream
has been clarified to indicate that this class catches BadPaddingException and other exceptions thrown by failed integrity checks during decryption. These exceptions are not re-thrown, so the client is not informed that integrity checks have failed. Because of this behavior, this class may not be suitable for use with decryption in an authenticated mode of operation (for example, GCM) if the application requires explicit notification when authentication fails. These applications can use the Cipher API directly as an alternative to using this class.
JDK-8182362 (not public) - Change: Additional TeliaSonera Root Certificate
“TeliaSonera Root CA v1” has been added to thecacerts
keystore.
JDK-8190851 (not public) - Change: XML Signatures Signed with EC Keys Less Than 224 Bits Disabled
To improve the strength of SSL/TLS connections, 3DES cipher suites have been disabled in SSL/TLS connections in the JDK via thejdk.tls.disabledAlgorithms
Security Property.
JDK-8175075 (not public) - Bug Fix: Server-side HTTP-tunneled RMI Connections Disabled
Server side HTTP-tunneled RMI connections have been disabled by default in this release. This behavior can be reverted by setting the runtime propertysun.rmi.server.disableIncomingHttp
property tofalse
. Note, this should not be confused with thesun.rmi.server.disableHttp
property, which disables HTTP-tunneling on the client side and isfalse
by default.
JDK-8193833 (not public)