aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorEli Zaretskii2018-07-08 17:46:32 +0300
committerEli Zaretskii2018-07-08 17:46:32 +0300
commit9c985a3d7a84bdfad17e11a12f671605bb31b3be (patch)
treebc5dc83a15b01b031538fba8668e625ff66f7183
parentc6de1f1592745d98e58f06332ad35efc72160787 (diff)
downloademacs-9c985a3d7a84bdfad17e11a12f671605bb31b3be.tar.gz
emacs-9c985a3d7a84bdfad17e11a12f671605bb31b3be.zip
Minor improvements in recent NSM documentation changes
* doc/emacs/misc.texi (Network Security): Improve wording and markup of last change. * src/gnutls.c (Fgnutls_peer_status): Doc fix. * etc/NEWS: Improve wording of last change.
-rw-r--r--doc/emacs/misc.texi23
-rw-r--r--etc/NEWS15
-rw-r--r--src/gnutls.c2
3 files changed, 22 insertions, 18 deletions
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi
index 96651381962..3d3441401dd 100644
--- a/doc/emacs/misc.texi
+++ b/doc/emacs/misc.texi
@@ -315,26 +315,27 @@ unverified connection, a temporary exception, or refuse the connection
315entirely. 315entirely.
316 316
317@vindex network-security-protocol-checks 317@vindex network-security-protocol-checks
318In addition to the basic certificate corrections checks, 318In addition to the basic certificate correctness checks, several
319several @acronym{TLS} algorithm checks are available. Some encryption 319@acronym{TLS} algorithm checks are available. Some encryption
320technologies that were previously thought to be secure have shown 320technologies that were previously thought to be secure have shown
321themselves to be fragile, and Emacs will (by default) warn the users 321themselves to be fragile, so Emacs (by default) warns you about some
322about some of these problems. 322of these problems.
323 323
324The protocol network checks is controlled via the 324The protocol network checks is controlled via the
325@code{network-security-protocol-checks} variable. 325@code{network-security-protocol-checks} variable.
326 326
327It's an alist where the first element is the name of the check, 327It's an alist where the first element of each association is the name
328the second is the security level where the check kicks in, and the 328of the check, the second element is the security level where the check
329optional third element is a parameter supplied to the check. 329should be used, and the optional third element is a parameter supplied
330to the check.
330 331
331An element like @code{(rc4 medium)} will result in the function 332An element like @code{(rc4 medium)} will result in the function
332@code{nsm-protocol-check--rc4} being called like thus: 333@code{nsm-protocol-check--rc4} being called like thus:
333@code{(nsm-protocol-check--rc4 host port status optional-parameter)}. 334@w{@code{(nsm-protocol-check--rc4 host port status optional-parameter)}}.
334The function should return non-@code{nil} if the connection should 335The function should return non-@code{nil} if the connection should
335proceed and @code{nil} otherwise. 336proceed and @code{nil} otherwise.
336 337
337Below is a list of the checks done on the @code{medium} level. 338Below is a list of the checks done on the default @code{medium} level.
338 339
339@table @asis 340@table @asis
340 341
@@ -374,8 +375,8 @@ connection to be encrypted. If the connection isn't encrypted,
374 375
375@item Diffie-Hellman low prime bits 376@item Diffie-Hellman low prime bits
376When doing the public key exchange, the number of prime bits should be 377When doing the public key exchange, the number of prime bits should be
377high to ensure that the channel can't be eavesdropped on by third 378high enough to ensure that the channel can't be eavesdropped on by third
378parties. If this number is too low, you will be warned. (This is the 379parties. If this number is too low, Emacs will warn you. (This is the
379@code{diffie-hellman-prime-bits} check in 380@code{diffie-hellman-prime-bits} check in
380@code{network-security-protocol-checks}). 381@code{network-security-protocol-checks}).
381 382
diff --git a/etc/NEWS b/etc/NEWS
index 8883066237b..dae028be7b0 100644
--- a/etc/NEWS
+++ b/etc/NEWS
@@ -136,12 +136,15 @@ of what checks to run via the `network-security-protocol-checks'
136variable. 136variable.
137 137
138+++ 138+++
139** Most of the checks for outdated, believed-to-be-weak TLS algorithms 139** TLS connections have their security tightened by default.
140and ciphers are now switched on by default. To get the old behaviour 140Most of the checks for outdated, believed-to-be-weak TLS algorithms
141back (where certificates are checked for validity, but no warnings 141and ciphers are now switched on by default. By default, the NSM will
142about weak cryptography are issued), you can either set 142flag connections using these weak algorithms and ask users whether to
143`network-security-protocol-checks' to nil, or adjust the elements in 143allow them. To get the old behavior back (where certificates are
144that variable to only happen on the `high' security level. 144checked for validity, but no warnings about weak cryptography are
145issued), you can either set 'network-security-protocol-checks' to nil,
146or adjust the elements in that variable to only happen on the 'high'
147security level (assuming you use the 'medium' level).
145 148
146+++ 149+++
147** New function 'fill-polish-nobreak-p', to be used in 'fill-nobreak-predicate'. 150** New function 'fill-polish-nobreak-p', to be used in 'fill-nobreak-predicate'.
diff --git a/src/gnutls.c b/src/gnutls.c
index dfbbecfc870..d7a4ee474f7 100644
--- a/src/gnutls.c
+++ b/src/gnutls.c
@@ -1217,7 +1217,7 @@ The return value is a property list with top-level keys :warnings and
1217The :warnings entry is a list of symbols you can get a description of 1217The :warnings entry is a list of symbols you can get a description of
1218with `gnutls-peer-status-warning-describe', and :certificates is the 1218with `gnutls-peer-status-warning-describe', and :certificates is the
1219certificate chain for the connection, with the host certificate 1219certificate chain for the connection, with the host certificate
1220first, and intermediary certificates (if any) follow. 1220first, and intermediary certificates (if any) following it.
1221 1221
1222In addition, for backwards compatibility, the host certificate is also 1222In addition, for backwards compatibility, the host certificate is also
1223returned as the :certificate entry. */) 1223returned as the :certificate entry. */)