Chapter 3. Eclipse Temurin features
Eclipse Temurin does not contain structural changes from the upstream distribution of OpenJDK.
For more information about the changes and security fixes in the latest OpenJDK 11 release of Eclipse Temurin, see OpenJDK 11.0.27 Released.
3.1. New features and enhancements Copy linkLink copied to clipboard!
Eclipse Temurin 11.0.28 includes the following new features and enhancements.
Fix for problematic SunPKCS11 provider checks on PKCS11 mechanism
In OpenJDK 14, the SunPKCS11 provider introduced the concept of legacy mechanisms, which was subsequently backported to OpenJDK 11. If a mechanism was found to be using a weak algorithm, this mechanism was considered legacy and it was subsequently disabled.
However, this approach proved inflexible in earlier releases. For example, you could not override the legacy determination to enable a disabled mechanism. Also, even if encryption was not being used, a mechanism that was being used for signing could be considered legacy and therefore disabled if it had a weak encryption algorithm. Similarly, a weak signing algorithm prevented use of the mechanism as a cipher for encryption or decryption.
OpenJDK 11.0.28 resolves these issues by introducing a new allowLegacy configuration property for the PKCS11 provider. You can override the legacy determination by setting the allowLegacy property to true. This property is set to false by default. From this release onward, the legacy determination also considers the service type by checking encryption algorithms only for ciphers and by checking signature algorithms only for signatures.
See JDK-8293345 (JDK Bug System).
Sectigo CS and TLS root certificates added
In OpenJDK 11.0.28, the cacerts truststore includes four Sectigo root certificates, including two code-signing (CS) certificates and two TLS certificates:
- Certificate 1
- Name: Sectigo Limited
- Alias name: sectigocodesignroote46
- Distinguished name: CN=Sectigo Public Code Signing Root E46, O=Sectigo Limited, C=GB
- Certificate 2
- Name: Sectigo Limited
- Alias name: sectigocodesignrootr46
- Distinguished name: CN=Sectigo Public Code Signing Root R46, O=Sectigo Limited, C=GB
- Certificate 3
- Name: Sectigo Limited
- Alias name: sectigotlsroote46
- Distinguished name: CN=Sectigo Public Server Authentication Root E46, O=Sectigo Limited, C=GB
- Certificate 4
- Name: Sectigo Limited
- Alias name: sectigotlsrootr46
- Distinguished name: CN=Sectigo Public Server Authentication Root R46, O=Sectigo Limited, C=GB
3.2. Deprecated features Copy linkLink copied to clipboard!
The following pre-existing features have been either deprecated or removed in Eclipse Temurin 11.0.28:
Baltimore root certificate removed
From OpenJDK 11.0.28 onward, the cacerts truststore no longer includes the following Baltimore root certificate that expired in May 2025:
- Alias name: baltimorecybertrustca [jdk]
- Distinguished name: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
See JDK-8303770 (JDK Bug System).
Camerfirma root CA certificates removed
From OpenJDK 11.0.28 onward, the cacerts truststore no longer includes the following expired Camerfirma root certificates:
- Certificate 1
- Alias name: camerfirmachamberscommerceca [jdk]
- Distinguished name: CN=Chambers of Commerce Root OU=http://www.chambersign.org O=AC Camerfirma SA CIF A82743287 C=EU
- SHA256: 0C:25:8A:12:A5:67:4A:EF:25:F2:8B:A7:DC:FA:EC:EE:A3:48:E5:41:E6:F5:CC:4E:E6:3B:71:B3:61:60:6A:C3
- Certificate 2
- Alias name: camerfirmachambersignca [jdk]
- Distinguished name: CN=Global Chambersign Root - 2008 O=AC Camerfirma S.A. SERIALNUMBER=A82743287 L=Madrid (see current address at www.camerfirma.com/address) C=EU
- SHA256: 13:63:35:43:93:34:A7:69:80:16:A0:D3:24:DE:72:28:4E:07:9D:7B:52:20:BB:8F:BD:74:78:16:EE:BE:BA:CA
See JDK-8350498 (JDK Bug System).
Revised on 2025-07-24 17:40:35 UTC