common-defs.asciidoc 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. tag::ssl-certificate[]
  2. Specifies the path for the PEM encoded certificate (or certificate chain) that is
  3. associated with the key.
  4. //TBD: This setting can be used only if `ssl.key` is set.
  5. end::ssl-certificate[]
  6. tag::ssl-certificate-authorities[]
  7. List of paths to PEM encoded certificate files that should be trusted.
  8. //TBD: You cannot use this setting and `ssl.truststore.path` at the same time.
  9. end::ssl-certificate-authorities[]
  10. tag::ssl-cipher-suites-values[]
  11. Supported cipher suites vary depending on which version of Java you use. For
  12. example, for version 12 the default value is `TLS_AES_256_GCM_SHA384`,
  13. `TLS_AES_128_GCM_SHA256`, `TLS_CHACHA20_POLY1305_SHA256`,
  14. `TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384`, `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256`,
  15. `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`, `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256`,
  16. `TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256`, `TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256`,
  17. `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`,
  18. `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`,
  19. `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`, `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`,
  20. `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`,
  21. `TLS_RSA_WITH_AES_256_GCM_SHA384`, `TLS_RSA_WITH_AES_128_GCM_SHA256`,
  22. `TLS_RSA_WITH_AES_256_CBC_SHA256`, `TLS_RSA_WITH_AES_128_CBC_SHA256`,
  23. `TLS_RSA_WITH_AES_256_CBC_SHA`, `TLS_RSA_WITH_AES_128_CBC_SHA`.
  24. For more information, see Oracle's
  25. https://docs.oracle.com/en/java/javase/11/security/oracle-providers.html#GUID-7093246A-31A3-4304-AC5F-5FB6400405E2[Java Cryptography Architecture documentation].
  26. end::ssl-cipher-suites-values[]
  27. tag::ssl-cipher-suites-values-java11[]
  28. Supported cipher suites vary depending on which version of Java you use. For
  29. example, for version 11 the default value is `TLS_AES_256_GCM_SHA384`,
  30. `TLS_AES_128_GCM_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384`,
  31. `TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256`, `TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384`,
  32. `TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384`,
  33. `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384`,
  34. `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256`, `TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA`,
  35. `TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA`, `TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA`,
  36. `TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA`, `TLS_RSA_WITH_AES_256_GCM_SHA384`,
  37. `TLS_RSA_WITH_AES_128_GCM_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA256`,
  38. `TLS_RSA_WITH_AES_128_CBC_SHA256`, `TLS_RSA_WITH_AES_256_CBC_SHA`,
  39. `TLS_RSA_WITH_AES_128_CBC_SHA`. For more information, see Oracle's
  40. https://docs.oracle.com/en/java/javase/11/security/oracle-providers.html#GUID-7093246A-31A3-4304-AC5F-5FB6400405E2[Java Cryptography Architecture documentation].
  41. end::ssl-cipher-suites-values-java11[]
  42. tag::ssl-key-pem[]
  43. Path to a PEM encoded file containing the private key.
  44. //TBD: You cannot use this setting and `ssl.keystore.path` at the same time.
  45. end::ssl-key-pem[]
  46. tag::ssl-key-passphrase[]
  47. The passphrase that is used to decrypt the private key. Since the key might not
  48. be encrypted, this value is optional.
  49. //TBD: You cannot use this setting and `ssl.secure_key_passphrase` at the same time.
  50. end::ssl-key-passphrase[]
  51. tag::ssl-keystore-key-password[]
  52. The password for the key in the keystore. The default is the keystore password.
  53. //TBD: You cannot use this setting and `ssl.keystore.secure_key_password` at the same time.
  54. end::ssl-keystore-key-password[]
  55. tag::ssl-keystore-password[]
  56. The password for the keystore.
  57. //TBD: You cannot use this setting and `ssl.keystore.secure_password` at the same time.
  58. end::ssl-keystore-password[]
  59. tag::ssl-keystore-path[]
  60. The path for the keystore file that contains a private key and certificate.
  61. //TBD: It must be either a Java keystore (jks) or a PKCS#12 file.
  62. //TBD: You cannot use this setting and `ssl.key` at the same time.
  63. end::ssl-keystore-path[]
  64. tag::ssl-keystore-secure-key-password[]
  65. The password for the key in the keystore. The default is the keystore password.
  66. //TBD: You cannot use this setting and `ssl.keystore.key_password` at the same time.
  67. end::ssl-keystore-secure-key-password[]
  68. tag::ssl-keystore-secure-password[]
  69. The password for the keystore.
  70. //TBD: You cannot use this setting and `ssl.keystore.password` at the same time.
  71. end::ssl-keystore-secure-password[]
  72. tag::ssl-keystore-type-pkcs12[]
  73. The format of the keystore file. It must be either `jks` or `PKCS12`. If the
  74. keystore path ends in ".p12", ".pfx", or ".pkcs12", this setting defaults
  75. to `PKCS12`. Otherwise, it defaults to `jks`.
  76. end::ssl-keystore-type-pkcs12[]
  77. tag::ssl-secure-key-passphrase[]
  78. The passphrase that is used to decrypt the private key. Since the key might not
  79. be encrypted, this value is optional.
  80. //TBD: You cannot use this setting and `ssl.key_passphrase` at the same time.
  81. end::ssl-secure-key-passphrase[]
  82. tag::ssl-supported-protocols[]
  83. Supported protocols with versions. Valid protocols: `SSLv2Hello`,
  84. `SSLv3`, `TLSv1`, `TLSv1.1`, `TLSv1.2`, `TLSv1.3`. If the JVM's SSL provider supports TLSv1.3,
  85. the default is `TLSv1.3,TLSv1.2,TLSv1.1`. Otherwise, the default is
  86. `TLSv1.2,TLSv1.1`.
  87. +
  88. --
  89. NOTE: If `xpack.security.fips_mode.enabled` is `true`, you cannot use `SSLv2Hello`
  90. or `SSLv3`. See <<fips-140-compliance>>.
  91. --
  92. end::ssl-supported-protocols[]
  93. tag::ssl-truststore-password[]
  94. The password for the truststore.
  95. //TBD: You cannot use this setting and `ssl.truststore.secure_password` at the same time.
  96. end::ssl-truststore-password[]
  97. tag::ssl-truststore-path[]
  98. The path for the keystore that contains the certificates to trust. It must be
  99. either a Java keystore (jks) or a PKCS#12 file.
  100. //TBD: You cannot use this setting and `ssl.certificate_authorities` at the same time.
  101. end::ssl-truststore-path[]
  102. tag::ssl-truststore-secure-password[]
  103. Password for the truststore.
  104. //TBD: You cannot use this setting and `ssl.truststore.password` at the same time.
  105. end::ssl-truststore-secure-password[]
  106. tag::ssl-truststore-type[]
  107. The format of the truststore file. It must be either `jks` or `PKCS12`. If the
  108. file name ends in ".p12", ".pfx" or "pkcs12", the default is `PKCS12`.
  109. Otherwise, it defaults to `jks`.
  110. end::ssl-truststore-type[]
  111. tag::ssl-truststore-type-pkcs11[]
  112. The format of the truststore file. For the Java keystore format, use `jks`. For
  113. PKCS#12 files, use `PKCS12`. For a PKCS#11 token, use `PKCS11`. The default is
  114. `jks`.
  115. end::ssl-truststore-type-pkcs11[]
  116. tag::ssl-verification-mode-values[]
  117. Valid values are:
  118. - `full`, which verifies that the provided certificate is signed by a trusted
  119. authority (CA) and also verifies that the server's hostname (or IP address)
  120. matches the names identified within the certificate.
  121. - `certificate`, which verifies that the provided certificate is signed by a
  122. trusted authority (CA), but does not perform any hostname verification.
  123. - `none`, which performs _no verification_ of the server's certificate. This
  124. mode disables many of the security benefits of SSL/TLS and should only be used
  125. after very careful consideration. It is primarily intended as a temporary
  126. diagnostic mechanism when attempting to resolve TLS errors; its use on
  127. production clusters is strongly discouraged.
  128. +
  129. The default value is `full`.
  130. end::ssl-verification-mode-values[]