diff options
| author | Eli Zaretskii | 2018-07-08 17:46:32 +0300 |
|---|---|---|
| committer | Eli Zaretskii | 2018-07-08 17:46:32 +0300 |
| commit | 9c985a3d7a84bdfad17e11a12f671605bb31b3be (patch) | |
| tree | bc5dc83a15b01b031538fba8668e625ff66f7183 | |
| parent | c6de1f1592745d98e58f06332ad35efc72160787 (diff) | |
| download | emacs-9c985a3d7a84bdfad17e11a12f671605bb31b3be.tar.gz emacs-9c985a3d7a84bdfad17e11a12f671605bb31b3be.zip | |
Minor improvements in recent NSM documentation changes
* doc/emacs/misc.texi (Network Security): Improve wording and
markup of last change.
* src/gnutls.c (Fgnutls_peer_status): Doc fix.
* etc/NEWS: Improve wording of last change.
| -rw-r--r-- | doc/emacs/misc.texi | 23 | ||||
| -rw-r--r-- | etc/NEWS | 15 | ||||
| -rw-r--r-- | src/gnutls.c | 2 |
3 files changed, 22 insertions, 18 deletions
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi index 96651381962..3d3441401dd 100644 --- a/doc/emacs/misc.texi +++ b/doc/emacs/misc.texi | |||
| @@ -315,26 +315,27 @@ unverified connection, a temporary exception, or refuse the connection | |||
| 315 | entirely. | 315 | entirely. |
| 316 | 316 | ||
| 317 | @vindex network-security-protocol-checks | 317 | @vindex network-security-protocol-checks |
| 318 | In addition to the basic certificate corrections checks, | 318 | In addition to the basic certificate correctness checks, several |
| 319 | several @acronym{TLS} algorithm checks are available. Some encryption | 319 | @acronym{TLS} algorithm checks are available. Some encryption |
| 320 | technologies that were previously thought to be secure have shown | 320 | technologies that were previously thought to be secure have shown |
| 321 | themselves to be fragile, and Emacs will (by default) warn the users | 321 | themselves to be fragile, so Emacs (by default) warns you about some |
| 322 | about some of these problems. | 322 | of these problems. |
| 323 | 323 | ||
| 324 | The protocol network checks is controlled via the | 324 | The protocol network checks is controlled via the |
| 325 | @code{network-security-protocol-checks} variable. | 325 | @code{network-security-protocol-checks} variable. |
| 326 | 326 | ||
| 327 | It's an alist where the first element is the name of the check, | 327 | It's an alist where the first element of each association is the name |
| 328 | the second is the security level where the check kicks in, and the | 328 | of the check, the second element is the security level where the check |
| 329 | optional third element is a parameter supplied to the check. | 329 | should be used, and the optional third element is a parameter supplied |
| 330 | to the check. | ||
| 330 | 331 | ||
| 331 | An element like @code{(rc4 medium)} will result in the function | 332 | An element like @code{(rc4 medium)} will result in the function |
| 332 | @code{nsm-protocol-check--rc4} being called like thus: | 333 | @code{nsm-protocol-check--rc4} being called like thus: |
| 333 | @code{(nsm-protocol-check--rc4 host port status optional-parameter)}. | 334 | @w{@code{(nsm-protocol-check--rc4 host port status optional-parameter)}}. |
| 334 | The function should return non-@code{nil} if the connection should | 335 | The function should return non-@code{nil} if the connection should |
| 335 | proceed and @code{nil} otherwise. | 336 | proceed and @code{nil} otherwise. |
| 336 | 337 | ||
| 337 | Below is a list of the checks done on the @code{medium} level. | 338 | Below is a list of the checks done on the default @code{medium} level. |
| 338 | 339 | ||
| 339 | @table @asis | 340 | @table @asis |
| 340 | 341 | ||
| @@ -374,8 +375,8 @@ connection to be encrypted. If the connection isn't encrypted, | |||
| 374 | 375 | ||
| 375 | @item Diffie-Hellman low prime bits | 376 | @item Diffie-Hellman low prime bits |
| 376 | When doing the public key exchange, the number of prime bits should be | 377 | When doing the public key exchange, the number of prime bits should be |
| 377 | high to ensure that the channel can't be eavesdropped on by third | 378 | high enough to ensure that the channel can't be eavesdropped on by third |
| 378 | parties. If this number is too low, you will be warned. (This is the | 379 | parties. If this number is too low, Emacs will warn you. (This is the |
| 379 | @code{diffie-hellman-prime-bits} check in | 380 | @code{diffie-hellman-prime-bits} check in |
| 380 | @code{network-security-protocol-checks}). | 381 | @code{network-security-protocol-checks}). |
| 381 | 382 | ||
| @@ -136,12 +136,15 @@ of what checks to run via the `network-security-protocol-checks' | |||
| 136 | variable. | 136 | variable. |
| 137 | 137 | ||
| 138 | +++ | 138 | +++ |
| 139 | ** Most of the checks for outdated, believed-to-be-weak TLS algorithms | 139 | ** TLS connections have their security tightened by default. |
| 140 | and ciphers are now switched on by default. To get the old behaviour | 140 | Most of the checks for outdated, believed-to-be-weak TLS algorithms |
| 141 | back (where certificates are checked for validity, but no warnings | 141 | and ciphers are now switched on by default. By default, the NSM will |
| 142 | about weak cryptography are issued), you can either set | 142 | flag connections using these weak algorithms and ask users whether to |
| 143 | `network-security-protocol-checks' to nil, or adjust the elements in | 143 | allow them. To get the old behavior back (where certificates are |
| 144 | that variable to only happen on the `high' security level. | 144 | checked for validity, but no warnings about weak cryptography are |
| 145 | issued), you can either set 'network-security-protocol-checks' to nil, | ||
| 146 | or adjust the elements in that variable to only happen on the 'high' | ||
| 147 | security level (assuming you use the 'medium' level). | ||
| 145 | 148 | ||
| 146 | +++ | 149 | +++ |
| 147 | ** New function 'fill-polish-nobreak-p', to be used in 'fill-nobreak-predicate'. | 150 | ** New function 'fill-polish-nobreak-p', to be used in 'fill-nobreak-predicate'. |
diff --git a/src/gnutls.c b/src/gnutls.c index dfbbecfc870..d7a4ee474f7 100644 --- a/src/gnutls.c +++ b/src/gnutls.c | |||
| @@ -1217,7 +1217,7 @@ The return value is a property list with top-level keys :warnings and | |||
| 1217 | The :warnings entry is a list of symbols you can get a description of | 1217 | The :warnings entry is a list of symbols you can get a description of |
| 1218 | with `gnutls-peer-status-warning-describe', and :certificates is the | 1218 | with `gnutls-peer-status-warning-describe', and :certificates is the |
| 1219 | certificate chain for the connection, with the host certificate | 1219 | certificate chain for the connection, with the host certificate |
| 1220 | first, and intermediary certificates (if any) follow. | 1220 | first, and intermediary certificates (if any) following it. |
| 1221 | 1221 | ||
| 1222 | In addition, for backwards compatibility, the host certificate is also | 1222 | In addition, for backwards compatibility, the host certificate is also |
| 1223 | returned as the :certificate entry. */) | 1223 | returned as the :certificate entry. */) |