diff options
| author | Eli Zaretskii | 2014-11-24 20:07:51 +0200 |
|---|---|---|
| committer | Eli Zaretskii | 2014-11-24 20:07:51 +0200 |
| commit | a6248f13906a2846bdae7eefe3b97e605944bdec (patch) | |
| tree | 2f57b6214a062cb6f06be5884077f3717686a192 | |
| parent | e22f5c07d8bf514283221f337afb1ef7ca1cd2b8 (diff) | |
| download | emacs-a6248f13906a2846bdae7eefe3b97e605944bdec.tar.gz emacs-a6248f13906a2846bdae7eefe3b97e605944bdec.zip | |
doc/emacs/misc.texi (Network Security): Improve wording and indexing.
| -rw-r--r-- | doc/emacs/ChangeLog | 5 | ||||
| -rw-r--r-- | doc/emacs/misc.texi | 70 |
2 files changed, 41 insertions, 34 deletions
diff --git a/doc/emacs/ChangeLog b/doc/emacs/ChangeLog index 198de4f2636..3db0e851603 100644 --- a/doc/emacs/ChangeLog +++ b/doc/emacs/ChangeLog | |||
| @@ -1,3 +1,8 @@ | |||
| 1 | 2014-11-24 Eli Zaretskii <eliz@gnu.org> | ||
| 2 | |||
| 3 | * misc.texi (Network Security): Improve wording and indexing of | ||
| 4 | last change. | ||
| 5 | |||
| 1 | 2014-11-24 Lars Magne Ingebrigtsen <larsi@gnus.org> | 6 | 2014-11-24 Lars Magne Ingebrigtsen <larsi@gnus.org> |
| 2 | 7 | ||
| 3 | * misc.texi (Gnus Summary Buffer): Move the Network Security | 8 | * misc.texi (Gnus Summary Buffer): Move the Network Security |
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi index 2295414aa55..f2828c5426b 100644 --- a/doc/emacs/misc.texi +++ b/doc/emacs/misc.texi | |||
| @@ -252,27 +252,30 @@ Exit the summary buffer and return to the group buffer. | |||
| 252 | 252 | ||
| 253 | @node Network Security | 253 | @node Network Security |
| 254 | @section Network Security | 254 | @section Network Security |
| 255 | @cindex Network Security Manager | 255 | @cindex network security manager |
| 256 | @cindex NSM | ||
| 256 | @cindex encryption | 257 | @cindex encryption |
| 257 | @cindex SSL | 258 | @cindex SSL |
| 258 | @cindex TLS | 259 | @cindex TLS |
| 259 | @cindex STARTTLS | 260 | @cindex STARTTLS |
| 260 | 261 | ||
| 261 | After establishing a network connection, the connection is then passed | 262 | Whenever Emacs establishes any network connection, it passes the |
| 262 | on to the Network Security Manager (@acronym{NSM}). | 263 | established connection to the @dfn{Network Security Manager} |
| 264 | (@acronym{NSM}). @acronym{NSM} is responsible for enforcing the | ||
| 265 | network security under your control. | ||
| 263 | 266 | ||
| 264 | @vindex network-security-level | 267 | @vindex network-security-level |
| 265 | The @code{network-security-level} variable determines the security | 268 | The @code{network-security-level} variable determines the security |
| 266 | level. If this is @code{low}, no security checks are performed. | 269 | level that @acronym{NSM} enforces. If its value is @code{low}, no |
| 270 | security checks are performed. | ||
| 267 | 271 | ||
| 268 | If this variable is @code{medium} (which is the default), a number of | 272 | If this variable is @code{medium} (which is the default), a number of |
| 269 | checks will be performed. If the @acronym{NSM} determines that the | 273 | checks will be performed. If as result @acronym{NSM} determines that |
| 270 | network connection might be unsafe, the user is made aware of this, | 274 | the network connection might be unsafe, it will make you aware of |
| 271 | and the @acronym{NSM} will ask the user what to do about the network | 275 | that, and will ask you what to do about the network connection. |
| 272 | connection. | ||
| 273 | 276 | ||
| 274 | The user is given the choice of registering a permanent security | 277 | You can decide to register a permanent security exception for an |
| 275 | exception, a temporary one, or whether to refuse the connection | 278 | unsafe connection, a temporary exception, or refuse the connection |
| 276 | entirely. | 279 | entirely. |
| 277 | 280 | ||
| 278 | Below is a list of the checks done on the @code{medium} level. | 281 | Below is a list of the checks done on the @code{medium} level. |
| @@ -281,24 +284,23 @@ Below is a list of the checks done on the @code{medium} level. | |||
| 281 | 284 | ||
| 282 | @item unable to verify a @acronym{TLS} certificate | 285 | @item unable to verify a @acronym{TLS} certificate |
| 283 | If the connection is a @acronym{TLS}, @acronym{SSL} or | 286 | If the connection is a @acronym{TLS}, @acronym{SSL} or |
| 284 | @acronym{STARTTLS} connection, the @acronym{NSM} will check whether | 287 | @acronym{STARTTLS} connection, @acronym{NSM} will check whether |
| 285 | the certificate used to establish the identity of the server we're | 288 | the certificate used to establish the identity of the server we're |
| 286 | connecting to can be verified. | 289 | connecting to can be verified. |
| 287 | 290 | ||
| 288 | While an invalid certificate is often the cause for concern (there may | 291 | While an invalid certificate is often the cause for concern (there |
| 289 | be a Man-in-the-Middle hijacking your network connection and stealing | 292 | could be a Man-in-the-Middle hijacking your network connection and |
| 290 | your password), there may be valid reasons for going ahead with the | 293 | stealing your password), there may be valid reasons for going ahead |
| 291 | connection anyway. | 294 | with the connection anyway. For instance, the server may be using a |
| 292 | 295 | self-signed certificate, or the certificate may have expired. It's up | |
| 293 | For instance, the server may be using a self-signed certificate, or | 296 | to you to determine whether it's acceptable to continue with the |
| 294 | the certificate may have expired. It's up to the user to determine | 297 | connection. |
| 295 | whether it's acceptable to continue the connection. | ||
| 296 | 298 | ||
| 297 | @item a self-signed certificate has changed | 299 | @item a self-signed certificate has changed |
| 298 | If you've previously accepted a self-signed certificate, but it has | 300 | If you've previously accepted a self-signed certificate, but it has |
| 299 | now changed, that either means that the server has just changed the | 301 | now changed, that could mean that the server has just changed the |
| 300 | certificate, or this might mean that the network connection has been | 302 | certificate, but it might also mean that the network connection has |
| 301 | hijacked. | 303 | been hijacked. |
| 302 | 304 | ||
| 303 | @item previously encrypted connection now unencrypted | 305 | @item previously encrypted connection now unencrypted |
| 304 | If the connection is unencrypted, but it was encrypted in previous | 306 | If the connection is unencrypted, but it was encrypted in previous |
| @@ -311,44 +313,44 @@ When connecting to an @acronym{IMAP} or @acronym{POP3} server, these | |||
| 311 | should usually be encrypted, because it's common to send passwords | 313 | should usually be encrypted, because it's common to send passwords |
| 312 | over these connections. Similarly, if you're sending email via | 314 | over these connections. Similarly, if you're sending email via |
| 313 | @acronym{SMTP} that requires a password, you usually want that | 315 | @acronym{SMTP} that requires a password, you usually want that |
| 314 | connection to be encrypted. If the connection isn't encrypted, the | 316 | connection to be encrypted. If the connection isn't encrypted, |
| 315 | @acronym{NSM} will warn you. | 317 | @acronym{NSM} will warn you. |
| 316 | 318 | ||
| 317 | @end table | 319 | @end table |
| 318 | 320 | ||
| 319 | If @code{network-security-level} is @code{high}, the following checks | 321 | If @code{network-security-level} is @code{high}, the following checks |
| 320 | will be made: | 322 | will be made, in addition to the above: |
| 321 | 323 | ||
| 322 | @table @asis | 324 | @table @asis |
| 323 | @item a validated certificate changes the public key | 325 | @item a validated certificate changes the public key |
| 324 | Servers change their keys occasionally, and that is normally nothing | 326 | Servers change their keys occasionally, and that is normally nothing |
| 325 | to be concerned about. However, if you are worried that your network | 327 | to be concerned about. However, if you are worried that your network |
| 326 | connections are being hijacked by agencies who have access to pliable | 328 | connections are being hijacked by agencies who have access to pliable |
| 327 | Certificate Authorities that issue new certificates for third-party | 329 | Certificate Authorities which issue new certificates for third-party |
| 328 | services, you may want to keep track of these changes. | 330 | services, you may want to keep track of these changes. |
| 329 | @end table | 331 | @end table |
| 330 | 332 | ||
| 331 | Finally, if @code{network-security-level} is @code{paranoid}, you will | 333 | Finally, if @code{network-security-level} is @code{paranoid}, you will |
| 332 | also be notified the first time the @acronym{NSM} sees any new | 334 | also be notified the first time @acronym{NSM} sees any new |
| 333 | certificate. This will allow you to inspect all the certificates from | 335 | certificate. This will allow you to inspect all the certificates from |
| 334 | all the connections that Emacs makes. | 336 | all the connections that Emacs makes. |
| 335 | 337 | ||
| 336 | The following additional variables can be used to control | 338 | The following additional variables can be used to control details of |
| 337 | @acronym{NSM} details. | 339 | @acronym{NSM} operation: |
| 338 | 340 | ||
| 339 | @table @code | 341 | @table @code |
| 340 | @item nsm-settings-file | 342 | @item nsm-settings-file |
| 341 | @vindex nsm-settings-file | 343 | @vindex nsm-settings-file |
| 342 | The @acronym{NSM} stores details on the connections in this file. It | 344 | This is the file where @acronym{NSM} stores details about connections. |
| 343 | defaults to @file{~/.emacs.d/network-security.data}. | 345 | It defaults to @file{~/.emacs.d/network-security.data}. |
| 344 | 346 | ||
| 345 | @item nsm-save-host-names | 347 | @item nsm-save-host-names |
| 346 | @vindex nsm-save-host-names | 348 | @vindex nsm-save-host-names |
| 347 | By default, host names will not be saved per non-@code{STARTTLS} | 349 | By default, host names will not be saved for non-@code{STARTTLS} |
| 348 | connection. Instead a host/port hash is used to identify connections. | 350 | connections. Instead a host/port hash is used to identify connections. |
| 349 | This means that one can't casually read the settings file to see what | 351 | This means that one can't casually read the settings file to see what |
| 350 | servers the user has connected to. If this variable is @code{t}, host | 352 | servers the user has connected to. If this variable is @code{t}, |
| 351 | names will be saved in the file, too. | 353 | @acronym{NSM} will also save host names in the nsm-settings-file. |
| 352 | @end table | 354 | @end table |
| 353 | 355 | ||
| 354 | 356 | ||