aboutsummaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorLars Magne Ingebrigtsen2014-12-08 22:51:54 +0100
committerLars Magne Ingebrigtsen2014-12-08 22:51:54 +0100
commite9aaf969661d134fa7e1548817fc9a05fa6b1bfb (patch)
treecfb992af0e59242250b2d328224006249216f86f /doc
parentbe6767d59b9f984ee28d444aada0ecdd0245ec6e (diff)
downloademacs-e9aaf969661d134fa7e1548817fc9a05fa6b1bfb.tar.gz
emacs-e9aaf969661d134fa7e1548817fc9a05fa6b1bfb.zip
Make NSM warn on `high' for older protocols, and document
* doc/emacs/misc.texi (Network Security): Mention the new protocol-level `high' NSM checks. (nsm-check-protocol): Also warn if using SSL3 or older.
Diffstat (limited to 'doc')
-rw-r--r--doc/emacs/ChangeLog5
-rw-r--r--doc/emacs/misc.texi14
2 files changed, 19 insertions, 0 deletions
diff --git a/doc/emacs/ChangeLog b/doc/emacs/ChangeLog
index 458a4782ffe..d969b8e2b07 100644
--- a/doc/emacs/ChangeLog
+++ b/doc/emacs/ChangeLog
@@ -1,3 +1,8 @@
12014-12-08 Lars Magne Ingebrigtsen <larsi@gnus.org>
2
3 * misc.texi (Network Security): Mention the new protocol-level
4 `high' NSM checks.
5
12014-12-08 Eric S. Raymond <esr@snark.thyrsus.com> 62014-12-08 Eric S. Raymond <esr@snark.thyrsus.com>
2 7
3 * maintaining.texi: Suopport fo Arch has been moved to obolte, 8 * maintaining.texi: Suopport fo Arch has been moved to obolte,
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi
index 39632cbe077..39433056f15 100644
--- a/doc/emacs/misc.texi
+++ b/doc/emacs/misc.texi
@@ -329,6 +329,20 @@ to be concerned about. However, if you are worried that your network
329connections are being hijacked by agencies who have access to pliable 329connections are being hijacked by agencies who have access to pliable
330Certificate Authorities which issue new certificates for third-party 330Certificate Authorities which issue new certificates for third-party
331services, you may want to keep track of these changes. 331services, you may want to keep track of these changes.
332
333@item Diffie-Hellman low prime bits
334When doing the public key exchange, the number of ``prime bits''
335should be high to ensure that the channel can't be eavesdropped on by
336third parties. If this number is too low, you will be warned.
337
338@item @acronym{RC4} stream cipher
339The @acronym{RC4} stream cipher is believed to be of low quality and
340may allow eavesdropping by third parties.
341
342@item @acronym{SSL1}, @acronym{SSL2} and @acronym{SSL3}
343The protocols older than @acronym{TLS1.0} are believed to be
344vulnerable to a variety of attacks, and you may want to avoid using
345these if what you're doing requires higher security.
332@end table 346@end table
333 347
334Finally, if @code{network-security-level} is @code{paranoid}, you will 348Finally, if @code{network-security-level} is @code{paranoid}, you will