Skip to content

Commit 9cb1ace

Browse files
tvernumlcawlppf2
authored
Expand docs on TLSv1 breaking change (elastic#49352)
The breaking changes cover the removal of TLSv1 from the default protocols, but assume that users who need to retain TLSv1 support will understand all the places where they may used it. This has proven not to be true, as it is easy to be unaware that (for example) an LDAP server is using TLSv1. This change explicitly lists all the places where TLS protocols may need to be configured. Co-Authored-By: Lisa Cawley <[email protected]> Co-Authored-By: Pius <[email protected]>
1 parent d2e92a1 commit 9cb1ace

File tree

1 file changed

+58
-1
lines changed

1 file changed

+58
-1
lines changed

docs/reference/migration/migrate_7_0/settings.asciidoc

+58-1
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,64 @@ used.
147147
TLS version 1.0 is now disabled by default as it suffers from
148148
https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet#Rule_-_Only_Support_Strong_Protocols[known security issues].
149149
The default protocols are now TLSv1.3 (if supported), TLSv1.2 and TLSv1.1.
150-
You can enable TLS v1.0 by configuring the relevant `ssl.supported_protocols` setting to include `"TLSv1"`, for example:
150+
151+
You can enable TLS v1.0 by configuring the relevant `ssl.supported_protocols`
152+
setting to include `"TLSv1"`.
153+
Depending on your local configuration and the TLS protocols that are in use
154+
on your network, you may need to enable TLS v1.0 support in any or all of the
155+
following places:
156+
157+
`xpack.security.http.ssl.supported_protocols`::
158+
For incoming HTTP connections to Elasticsearch's HTTP (Rest) interface.
159+
If there are clients that connect to {es} and do not support newer TLS versions,
160+
you must update this setting.
161+
162+
`xpack.http.ssl.supported_protocols`::
163+
For outgoing HTTP connections from {watcher}.
164+
If you have watches that connect to external HTTP servers and do not support
165+
newer TLS versions, you must update this setting.
166+
167+
`xpack.security.authc.realms.ldap.{name}.ssl.supported_protocols`::
168+
For outgoing LDAP connections from {es} {security-features}.
169+
If you have an LDAP realm enabled and the LDAP directory to which that realm
170+
connects does not support newer TLS versions, you must update this setting.
171+
172+
`xpack.security.authc.realms.active_directory.{name}.ssl.supported_protocols`::
173+
For outgoing Active Directory (LDAP) connections from {es} {security-features}.
174+
If you have an AD realm enabled and the directory server to which that realm
175+
connects does not support newer TLS versions, you must update this setting.
176+
177+
`xpack.security.authc.realms.saml.{name}.ssl.supported_protocols`::
178+
For outgoing HTTP connections to retrieve SAML metadata.
179+
If you have a SAML realm enabled and the realm is configured to retrieve
180+
metadata over HTTPS (that is, `idp.metadata.path` is a URL starting with
181+
`https://`) and the web server which hosts the metadata does not support newer
182+
TLS versions, you must update this setting.
183+
184+
`xpack.security.authc.realms.oidc.{name}.ssl.supported_protocols`::
185+
For outgoing HTTP connections to an OpenId Connect Provider.
186+
If you have an OpenId Connect ("oidc") realm enabled and the realm is configured
187+
to connect to a remote OpenID Connect Provider which does not support newer TLS
188+
versions, you must update this setting.
189+
190+
`xpack.monitoring.exporters.{name}.ssl.supported_protocols`::
191+
For remote monitoring data.
192+
If your monitoring data is exported to a remote monitoring cluster and that
193+
cluster is configured to only support TLSv1, you must update this setting.
194+
195+
`reindex.ssl.supported_protocols`::
196+
For reindex from remote.
197+
If you reindex data from a remote {es} cluster which has SSL enabled on the
198+
`http` interface and that cluster is configured to only support TLSv1, you must
199+
update this setting.
200+
201+
`xpack.security.transport.ssl.supported_protocols`::
202+
For incoming connections between {es} nodes. If you have specialized network
203+
equipment which inspects TLS packets between your nodes, and that equipment
204+
enforces TLSv1 you must update this setting.
205+
206+
207+
The following is an example that enables TLS v1.0 for incoming HTTP connections:
151208
[source,yaml]
152209
--------------------------------------------------
153210
xpack.security.http.ssl.supported_protocols: [ "TLSv1.3", "TLSv1.2", "TLSv1.1", "TLSv1" ]

0 commit comments

Comments
 (0)