You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This commit reviewed and deprecated the following SSL settings to comply with Logstash's naming convention:
- ssl_enable in favor of ssl_enabled
- ssl_cert in favor of ssl_certificate
- ssl_verify in favor of ssl_client_authentication when mode is server
- ssl_verify in favor of ssl_verification_mode when mode is client
It also added a few SSL configuration validations:
- Added a warning log when ssl_* configs are set but ssl_enabled => false
- ssl_ceritifcate & ssl_key config validation, including checking if both files are readable.
- Ensure no ssl_client_authentication when mode => client
- Ensure no ssl_verification_mode when mode => server
- Ensure an ssl_certificate is provided when mode => server
- Ensure ssl_certificate_authorities is provided when mode => server and it's using the new configuration (ssl_client_authentication)
Copy file name to clipboardExpand all lines: CHANGELOG.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,3 +1,11 @@
1
+
## 6.4.0
2
+
- Reviewed and deprecated SSL settings to comply with Logstash's naming convention [#213](https://github.com/logstash-plugins/logstash-input-tcp/pull/213)
3
+
- Deprecated `ssl_enable` in favor of `ssl_enabled`
4
+
- Deprecated `ssl_cert` in favor of `ssl_certificate`
5
+
- Deprecated `ssl_verify` in favor of `ssl_client_authentication` when mode is `server`
6
+
- Deprecated `ssl_verify` in favor of `ssl_verification_mode` when mode is `client`
7
+
- Added SSL configuration validations
8
+
1
9
## 6.3.5
2
10
- update netty to 4.1.94 and other dependencies [#216](https://github.com/logstash-plugins/logstash-input-tcp/pull/216)
For example, the Elastic Common Schema reserves the https://www.elastic.co/guide/en/ecs/current/ecs-host.html[top-level `host` field] for information about the host on which the event happened.
@@ -130,15 +130,19 @@ This plugin supports the following configuration options plus the <<plugins-{typ
130
130
| <<plugins-{type}s-{plugin}-mode>> |<<string,string>>, one of `["server", "client"]`|No
@@ -238,8 +252,33 @@ the table of supported https://docs.oracle.com/en/java/javase/11/docs/specs/secu
238
252
239
253
NOTE: To check the supported cipher suites locally run the following script: `$LS_HOME/bin/ruby -e 'p javax.net.ssl.SSLServerSocketFactory.getDefault.getSupportedCipherSuites'`.
Please note that the server does not validate the client certificate CN (Common Name) or SAN (Subject Alternative Name).
268
+
269
+
NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `server` and <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> is set.
270
+
241
271
[id="plugins-{type}s-{plugin}-ssl_enable"]
242
272
===== `ssl_enable`
273
+
deprecated[6.4.0, Replaced by <<plugins-{type}s-{plugin}-ssl_enabled>>]
274
+
275
+
* Value type is <<boolean,boolean>>
276
+
* Default value is `false`
277
+
278
+
Enable SSL (must be set for other `ssl_` options to take effect).
279
+
280
+
[id="plugins-{type}s-{plugin}-ssl_enabled"]
281
+
===== `ssl_enabled`
243
282
244
283
* Value type is <<boolean,boolean>>
245
284
* Default value is `false`
@@ -286,8 +325,27 @@ NOTE: If you configure the plugin to use `'TLSv1.1'` on any recent JVM, such as
286
325
the protocol is disabled by default and needs to be enabled manually by changing `jdk.tls.disabledAlgorithms` in
287
326
the *$JDK_HOME/conf/security/java.security* configuration file. That is, `TLSv1.1` needs to be removed from the list.
Defines how to verify the certificates presented by another party in the TLS connection:
335
+
336
+
`full` validates that the server certificate has an issue date that's within
337
+
the not_before and not_after dates; chains to a trusted Certificate Authority (CA), and
338
+
has a hostname or IP address that matches the names within the certificate.
339
+
340
+
`none` performs no certificate validation.
341
+
342
+
This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `client`.
343
+
344
+
WARNING: Setting certificate verification to `none` disables many security benefits of SSL/TLS, which is very dangerous. For more information on disabling certificate verification please read https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
345
+
289
346
[id="plugins-{type}s-{plugin}-ssl_verify"]
290
-
===== `ssl_verify`
347
+
===== `ssl_verify`
348
+
deprecated[6.4.0, Replaced by <<plugins-{type}s-{plugin}-ssl_client_authentication>> and <<plugins-{type}s-{plugin}-ssl_verification_mode>>]
0 commit comments