Clarify settings in default SSL/TLS (#41930)
The settings listed under the "Default values for TLS/SSL settings" heading are not actual settings, rather they are common suffixes that are used for settings that exist in a variety of contexts. This commit changes the way they are presented to reduce this confusion. Backport of: #41779
This commit is contained in:
parent
8bea3c3a58
commit
e04953a2bf
|
@ -1484,10 +1484,15 @@ through the list of URLs will continue until a successful connection is made.
|
||||||
[[ssl-tls-settings]]
|
[[ssl-tls-settings]]
|
||||||
==== Default values for TLS/SSL settings
|
==== Default values for TLS/SSL settings
|
||||||
In general, the values below represent the default values for the various TLS
|
In general, the values below represent the default values for the various TLS
|
||||||
settings. For more information, see
|
settings.
|
||||||
|
The prefixes for these settings are based on the context in which they are
|
||||||
|
used (e.g. `xpack.security.authc.realms.ldap.corp_ldap.ssl.verification_mode`
|
||||||
|
or `xpack.security.transport.ssl.supported_protocols`).
|
||||||
|
|
||||||
|
For more information, see
|
||||||
{stack-ov}/encrypting-communications.html[Encrypting communications].
|
{stack-ov}/encrypting-communications.html[Encrypting communications].
|
||||||
|
|
||||||
`ssl.supported_protocols`::
|
`*.ssl.supported_protocols`::
|
||||||
Supported protocols with versions. Valid protocols: `SSLv2Hello`,
|
Supported protocols with versions. Valid protocols: `SSLv2Hello`,
|
||||||
`SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. Defaults to `TLSv1.3,TLSv1.2,TLSv1.1` if
|
`SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. Defaults to `TLSv1.3,TLSv1.2,TLSv1.1` if
|
||||||
the JVM supports TLSv1.3, otherwise `TLSv1.2,TLSv1.1`.
|
the JVM supports TLSv1.3, otherwise `TLSv1.2,TLSv1.1`.
|
||||||
|
@ -1497,7 +1502,7 @@ NOTE: If `xpack.security.fips_mode.enabled` is `true`, you cannot use `SSLv2Hell
|
||||||
or `SSLv3`. See <<fips-140-compliance>>.
|
or `SSLv3`. See <<fips-140-compliance>>.
|
||||||
--
|
--
|
||||||
|
|
||||||
`ssl.client_authentication`::
|
`*.ssl.client_authentication`::
|
||||||
Controls the server's behavior in regard to requesting a certificate
|
Controls the server's behavior in regard to requesting a certificate
|
||||||
from client connections. Valid values are `required`, `optional`, and `none`.
|
from client connections. Valid values are `required`, `optional`, and `none`.
|
||||||
`required` forces a client to present a certificate, while `optional`
|
`required` forces a client to present a certificate, while `optional`
|
||||||
|
@ -1505,7 +1510,7 @@ requests a client certificate but the client is not required to present one.
|
||||||
Defaults to `required`, except for HTTP, which defaults to `none`. See
|
Defaults to `required`, except for HTTP, which defaults to `none`. See
|
||||||
<<http-tls-ssl-settings>>.
|
<<http-tls-ssl-settings>>.
|
||||||
|
|
||||||
`ssl.verification_mode`::
|
`*.ssl.verification_mode`::
|
||||||
Controls the verification of certificates. Valid values are:
|
Controls the verification of certificates. Valid values are:
|
||||||
- `full`, which verifies that the provided certificate is signed by a trusted
|
- `full`, which verifies that the provided certificate is signed by a trusted
|
||||||
authority (CA) and also verifies that the server's hostname (or IP
|
authority (CA) and also verifies that the server's hostname (or IP
|
||||||
|
@ -1520,7 +1525,7 @@ Controls the verification of certificates. Valid values are:
|
||||||
+
|
+
|
||||||
The default value is `full`.
|
The default value is `full`.
|
||||||
|
|
||||||
`ssl.cipher_suites`::
|
`*.ssl.cipher_suites`::
|
||||||
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
|
Supported cipher suites can be found in Oracle's http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html[
|
||||||
Java Cryptography Architecture documentation]. Defaults to `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`,
|
Java Cryptography Architecture documentation]. Defaults to `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`,
|
||||||
`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`,
|
`TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`,
|
||||||
|
|
Loading…
Reference in New Issue