提交 eb6b5f34 编写于 作者: D David Yozie

Update docs around ssl_ciphers default, default behavior, TLS 1.2 rec… (#10034)

* Update docs around ssl_ciphers default, default behavior, TLS 1.2 recommendations

* Update cipher string per Stanley's feedback
上级 00377e02
......@@ -8410,8 +8410,16 @@
<topic id="ssl_ciphers">
<title>ssl_ciphers</title>
<body>
<p>Specifies a list of SSL ciphers that are allowed to be used on secure connections. See the
openssl manual page for a list of supported ciphers. </p>
<p>Specifies a list of SSL ciphers that are allowed to be used on secure connections.
<codeph>ssl_ciphers</codeph>
<i>overrides</i> any ciphers string specified in <codeph>/etc/openssl.cnf</codeph>. The
default value <codeph>ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH</codeph> enables all ciphers except
for ADH, LOW, EXP, and MD5 ciphers, and prioritizes ciphers by their strength. </p>
<note>With TLS 1.2 some ciphers in MEDIUM and HIGH strength still use NULL encryption (no
encryption for transport), which the default <codeph>ssl_ciphers</codeph> string allows. To
bypass NULL ciphers with TLS 1.2 use a string such as
<codeph>TLSv1.2:!eNULL:!aNULL</codeph>.</note>
<p>See the openssl manual page for a list of supported ciphers.</p>
<table id="ssl_ciphers_table">
<tgroup cols="3">
<colspec colnum="1" colname="col1" colwidth="1*"/>
......@@ -8427,7 +8435,7 @@
<tbody>
<row>
<entry colname="col1">string</entry>
<entry colname="col2">ALL</entry>
<entry colname="col2">ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH</entry>
<entry colname="col3">master<p>system</p><p>restart</p></entry>
</row>
</tbody>
......
......@@ -532,7 +532,15 @@ Hostssl testdb all 192.168.0.0/16 cert map=gpuser
<li><codeph>ssl_renegotiation_limit</codeph>
<i>integer</i>. Specifies the data limit before key renegotiation.</li>
<li><codeph>ssl_ciphers</codeph>
<i>string</i>. Lists SSL ciphers that are allowed.</li>
<i>string</i>. Configures the list SSL ciphers that are allowed.
<codeph>ssl_ciphers</codeph>
<i>overrides</i> any ciphers string specified in <codeph>/etc/openssl.cnf</codeph>.
The default value <codeph>ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH</codeph> enables all
ciphers except for ADH, LOW, EXP, and MD5 ciphers, and prioritizes ciphers by their
strength.<note>With TLS 1.2 some ciphers in MEDIUM and HIGH strength still use NULL
encryption (no encryption for transport), which the default
<codeph>ssl_ciphers</codeph> string allows. To bypass NULL ciphers with TLS 1.2
use a string such as <codeph>TLSv1.2:!eNULL:!aNULL</codeph>.</note></li>
</ul></p>
<p>The following SSL server files can be found in the Master Data Directory: <ul
id="ul_gzs_b22_jr">
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册