diff options
| author | Lars Magne Ingebrigtsen | 2014-12-08 22:51:54 +0100 |
|---|---|---|
| committer | Lars Magne Ingebrigtsen | 2014-12-08 22:51:54 +0100 |
| commit | e9aaf969661d134fa7e1548817fc9a05fa6b1bfb (patch) | |
| tree | cfb992af0e59242250b2d328224006249216f86f /doc | |
| parent | be6767d59b9f984ee28d444aada0ecdd0245ec6e (diff) | |
| download | emacs-e9aaf969661d134fa7e1548817fc9a05fa6b1bfb.tar.gz emacs-e9aaf969661d134fa7e1548817fc9a05fa6b1bfb.zip | |
Make NSM warn on `high' for older protocols, and document
* doc/emacs/misc.texi (Network Security): Mention the new protocol-level
`high' NSM checks.
(nsm-check-protocol): Also warn if using SSL3 or older.
Diffstat (limited to 'doc')
| -rw-r--r-- | doc/emacs/ChangeLog | 5 | ||||
| -rw-r--r-- | doc/emacs/misc.texi | 14 |
2 files changed, 19 insertions, 0 deletions
diff --git a/doc/emacs/ChangeLog b/doc/emacs/ChangeLog index 458a4782ffe..d969b8e2b07 100644 --- a/doc/emacs/ChangeLog +++ b/doc/emacs/ChangeLog | |||
| @@ -1,3 +1,8 @@ | |||
| 1 | 2014-12-08 Lars Magne Ingebrigtsen <larsi@gnus.org> | ||
| 2 | |||
| 3 | * misc.texi (Network Security): Mention the new protocol-level | ||
| 4 | `high' NSM checks. | ||
| 5 | |||
| 1 | 2014-12-08 Eric S. Raymond <esr@snark.thyrsus.com> | 6 | 2014-12-08 Eric S. Raymond <esr@snark.thyrsus.com> |
| 2 | 7 | ||
| 3 | * maintaining.texi: Suopport fo Arch has been moved to obolte, | 8 | * maintaining.texi: Suopport fo Arch has been moved to obolte, |
diff --git a/doc/emacs/misc.texi b/doc/emacs/misc.texi index 39632cbe077..39433056f15 100644 --- a/doc/emacs/misc.texi +++ b/doc/emacs/misc.texi | |||
| @@ -329,6 +329,20 @@ to be concerned about. However, if you are worried that your network | |||
| 329 | connections are being hijacked by agencies who have access to pliable | 329 | connections are being hijacked by agencies who have access to pliable |
| 330 | Certificate Authorities which issue new certificates for third-party | 330 | Certificate Authorities which issue new certificates for third-party |
| 331 | services, you may want to keep track of these changes. | 331 | services, you may want to keep track of these changes. |
| 332 | |||
| 333 | @item Diffie-Hellman low prime bits | ||
| 334 | When doing the public key exchange, the number of ``prime bits'' | ||
| 335 | should be high to ensure that the channel can't be eavesdropped on by | ||
| 336 | third parties. If this number is too low, you will be warned. | ||
| 337 | |||
| 338 | @item @acronym{RC4} stream cipher | ||
| 339 | The @acronym{RC4} stream cipher is believed to be of low quality and | ||
| 340 | may allow eavesdropping by third parties. | ||
| 341 | |||
| 342 | @item @acronym{SSL1}, @acronym{SSL2} and @acronym{SSL3} | ||
| 343 | The protocols older than @acronym{TLS1.0} are believed to be | ||
| 344 | vulnerable to a variety of attacks, and you may want to avoid using | ||
| 345 | these if what you're doing requires higher security. | ||
| 332 | @end table | 346 | @end table |
| 333 | 347 | ||
| 334 | Finally, if @code{network-security-level} is @code{paranoid}, you will | 348 | Finally, if @code{network-security-level} is @code{paranoid}, you will |