Well, for me it sounds like Oracle decided to strengthen applet security requirements. Here is what I found on CodeRanch :
Make SecurityManager enable socket permissions check:
System.getSecurityManager().checkPermission(new SocketPermission("50.31.1.13:2255", "accept, connect, listen"));
Now flow-related checks:
System.getSecurityManager().checkPermission(new RuntimePermission("readerThread"));
These lines should be placed at the beginning of the main() method.
The second thing to do is sign your jar/war/ear file. First create a keystore:
keytool -genkey -alias philip -keystore keystore
Now put the signed CA into your trust certificate or create a self-signed certificate:
keytool -selfcert -alias philip -keystore keystore
And finally, sign the file:
jarsigner -keystore keystore -signedjar WhatYouWantTheSignedJarToBeNamed.jar ThePreviousJARYouCreated.jar philip
Actually, for a signed JAR file, the SecurityManager magic can be invoice, but, in my opinion, it is safer to do both.
Also keep in mind that sometimes you may need to sign the external JAR s, not just the JAR where your applet is located.
Alexey Malev
source share