Clarify settings in default SSL/TLS (#41930)

The settings listed under the "Default values for TLS/SSL settings"
heading are not actual settings, rather they are common suffixes that
are used for settings that exist in a variety of contexts.

This commit changes the way they are presented to reduce this
confusion.

Backport of: #41779
This commit is contained in:
Tim Vernum 2019-05-08 16:07:21 +10:00 committed by GitHub
parent 8bea3c3a58
commit e04953a2bf
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 10 additions and 5 deletions

View File

@ -1484,10 +1484,15 @@ through the list of URLs will continue until a successful connection is made.
[[ssl-tls-settings]] [[ssl-tls-settings]]
==== Default values for TLS/SSL settings ==== Default values for TLS/SSL settings
In general, the values below represent the default values for the various TLS In general, the values below represent the default values for the various TLS
settings. For more information, see settings.
The prefixes for these settings are based on the context in which they are
used (e.g. `xpack.security.authc.realms.ldap.corp_ldap.ssl.verification_mode`
or `xpack.security.transport.ssl.supported_protocols`).
For more information, see
{stack-ov}/encrypting-communications.html[Encrypting communications]. {stack-ov}/encrypting-communications.html[Encrypting communications].
`ssl.supported_protocols`:: `*.ssl.supported_protocols`::
Supported protocols with versions. Valid protocols: `SSLv2Hello`, Supported protocols with versions. Valid protocols: `SSLv2Hello`,
`SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. Defaults to `TLSv1.3,TLSv1.2,TLSv1.1` if `SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. Defaults to `TLSv1.3,TLSv1.2,TLSv1.1` if
the JVM supports TLSv1.3, otherwise `TLSv1.2,TLSv1.1`. the JVM supports TLSv1.3, otherwise `TLSv1.2,TLSv1.1`.
@ -1497,7 +1502,7 @@ NOTE: If `xpack.security.fips_mode.enabled` is `true`, you cannot use `SSLv2Hell
or `SSLv3`. See <<fips-140-compliance>>. or `SSLv3`. See <<fips-140-compliance>>.
-- --
`ssl.client_authentication`:: `*.ssl.client_authentication`::
Controls the server's behavior in regard to requesting a certificate Controls the server's behavior in regard to requesting a certificate
from client connections. Valid values are `required`, `optional`, and `none`. from client connections. Valid values are `required`, `optional`, and `none`.
`required` forces a client to present a certificate, while `optional` `required` forces a client to present a certificate, while `optional`
@ -1505,7 +1510,7 @@ requests a client certificate but the client is not required to present one.
Defaults to `required`, except for HTTP, which defaults to `none`. See Defaults to `required`, except for HTTP, which defaults to `none`. See
<<http-tls-ssl-settings>>. <<http-tls-ssl-settings>>.
`ssl.verification_mode`:: `*.ssl.verification_mode`::
Controls the verification of certificates. Valid values are: Controls the verification of certificates. Valid values are:
- `full`, which verifies that the provided certificate is signed by a trusted - `full`, which verifies that the provided certificate is signed by a trusted
authority (CA) and also verifies that the server's hostname (or IP authority (CA) and also verifies that the server's hostname (or IP
@ -1520,7 +1525,7 @@ Controls the verification of certificates. Valid values are:
+ +
The default value is `full`. The default value is `full`.
`ssl.cipher_suites`:: `*.ssl.cipher_suites`::
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[ Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
Java Cryptography Architecture documentation]. Defaults to `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`, Java Cryptography Architecture documentation]. Defaults to `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`,
`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`,