This is an automated email from the ASF dual-hosted git repository.
wave pushed a commit to branch add-ls-config-docs
in repository https://gitbox.apache.org/repos/asf/tooling-trusted-releases.git
The following commit(s) were added to refs/heads/add-ls-config-docs by this
push:
new fc97a0bd Clean up the linkage
fc97a0bd is described below
commit fc97a0bda306edbae231894ce38351cfe8ee3fdb
Author: Dave Fisher <[email protected]>
AuthorDate: Tue Mar 10 13:29:22 2026 -0700
Clean up the linkage
---
atr/docs/developer-guide.md | 1 +
atr/docs/index.md | 1 +
atr/docs/tls-security-configuration.md | 64 +++++++++++++++++-----------------
3 files changed, 34 insertions(+), 32 deletions(-)
diff --git a/atr/docs/developer-guide.md b/atr/docs/developer-guide.md
index 78a6792f..cd8c3ac5 100644
--- a/atr/docs/developer-guide.md
+++ b/atr/docs/developer-guide.md
@@ -22,6 +22,7 @@
* `3.12.` [Authentication security](authentication-security)
* `3.13.` [Authorization security](authorization-security)
* `3.14.` [Input validation](input-validation)
+* `3.15.` [TLS Security Configuration](tls-security-configuration)
**Sections**:
diff --git a/atr/docs/index.md b/atr/docs/index.md
index 6cd2c937..b84647c9 100644
--- a/atr/docs/index.md
+++ b/atr/docs/index.md
@@ -29,3 +29,4 @@ NOTE: This documentation is a work in progress.
* `3.12.` [Authentication security](authentication-security)
* `3.13.` [Authorization security](authorization-security)
* `3.14.` [Input validation](input-validation)
+ * `3.15.` [TLS Security Configuration](tls-security-configuration)
diff --git a/atr/docs/tls-security-configuration.md
b/atr/docs/tls-security-configuration.md
index 2b5a0304..e3e15ffc 100644
--- a/atr/docs/tls-security-configuration.md
+++ b/atr/docs/tls-security-configuration.md
@@ -1,8 +1,8 @@
-# 3.15 TLS Security Configuration
+# 3.15. TLS Security Configuration
**Up**: `3.` [Developer guide](developer-guide)
-**Prev**: `3.14.` [Input Validation](input-validation)
+**Prev**: `3.14.` [Input validation](input-validation)
**Next**: (none)
@@ -11,7 +11,7 @@
* [Overview](#overview)
* [Supported TLS Versions](#supported-tls-versions)
* [Elliptic Curve Selection](#elliptic-curve-selection)
-* [Cipher Suites (TLS 1.2)](#cipher-suites-tls-1.2)
+* [Cipher Suites (TLS 1.2)](#cipher-suites-tls-12)
* [Cipher Ordering](#cipher-ordering)
* [Session Security](#session-security)
* [OCSP Stapling](#ocsp-stapling)
@@ -56,12 +56,12 @@ SSLProxyProtocol -all +TLSv1.2 +TLSv1.3
These directives restrict both client connections and upstream proxy
connections to **TLS 1.2 and TLS 1.3 only**.
-| Version | Status | Reason
|
-| ------------- | -------- |
---------------------------------------------------------- |
-| TLS 1.3 | Enabled | Latest TLS standard with improved security and
performance |
-| TLS 1.2 | Enabled | Widely supported secure protocol
|
-| TLS 1.1 / 1.0 | Disabled | Deprecated and vulnerable to known attacks
|
-| SSLv3 / SSLv2 | Disabled | Insecure and obsolete
|
+Version | Status | Reason
+--------------|----------|-----------------------------------------------------------
+TLS 1.3 | Enabled | Latest TLS standard with improved security and
performance
+TLS 1.2 | Enabled | Widely supported secure protocol
+TLS 1.1 / 1.0 | Disabled | Deprecated and vulnerable to known attacks
+SSLv3 / SSLv2 | Disabled | Insecure and obsolete
TLS 1.3 cipher suites are negotiated automatically by OpenSSL and are not
controlled by the `SSLCipherSuite` directive.
@@ -75,11 +75,11 @@ SSLOpenSSLConfCmd Curves X25519:prime256v1:secp384r1
Defines the allowed curves for elliptic curve cryptography during TLS key
exchange.
-| Curve | Description
|
-| ---------------------- |
----------------------------------------------------------- |
-| **X25519** | Modern high-performance curve preferred by most TLS
clients |
-| **prime256v1 (P-256)** | Widely supported NIST curve
|
-| **secp384r1 (P-384)** | Higher strength NIST curve
|
+Curve | Description
+-----------------------|------------------------------------------------------------
+**X25519** | Modern high-performance curve preferred by most TLS
clients
+**prime256v1 (P-256)** | Widely supported NIST curve
+**secp384r1 (P-384)** | Higher strength NIST curve
The server and client negotiate the first mutually supported curve.
@@ -105,17 +105,17 @@ Most connections will use **ECDHE (Elliptic Curve
Diffie-Hellman Ephemeral)** fo
Example:
-```
+```apache
ECDHE-RSA-AES128-GCM-SHA256
```
-| Component | Meaning |
-| -------------------------- | ------------------------------------- |
-| ECDHE | Ephemeral elliptic curve key exchange |
-| RSA / ECDSA | Certificate authentication method |
-| AES128 / AES256 / CHACHA20 | Symmetric encryption algorithm |
-| GCM / POLY1305 | Authenticated encryption mode |
-| SHA256 / SHA384 | Handshake hash algorithm |
+Component | Meaning
+---------------------------|--------------------------------------
+ECDHE | Ephemeral elliptic curve key exchange
+RSA / ECDSA | Certificate authentication method
+AES128 / AES256 / CHACHA20 | Symmetric encryption algorithm
+GCM / POLY1305 | Authenticated encryption mode
+SHA256 / SHA384 | Handshake hash algorithm
#### AES-GCM Suites
@@ -198,7 +198,7 @@ Benefits include:
The stapling response is cached in shared memory:
-```
+```bash
/var/run/ocsp
```
@@ -208,15 +208,15 @@ The stapling response is cached in shared memory:
This TLS configuration provides the following protections:
-| Property | Description |
-| ----------------------------- | -------------------------------------- |
-| Modern TLS versions | Only TLS 1.2 and TLS 1.3 permitted |
-| Forward secrecy | Provided by ECDHE and DHE key exchange |
-| AEAD encryption | AES-GCM and ChaCha20-Poly1305 only |
-| No legacy algorithms | CBC, RC4, and 3DES excluded |
-| Secure curves | X25519 and modern NIST curves only |
-| Compression attacks prevented | TLS compression disabled |
-| Revocation checking | OCSP stapling enabled |
+Property | Description
+------------------------------|---------------------------------------
+Modern TLS versions | Only TLS 1.2 and TLS 1.3 permitted
+Forward secrecy | Provided by ECDHE and DHE key exchange
+AEAD encryption | AES-GCM and ChaCha20-Poly1305 only
+No legacy algorithms | CBC, RC4, and 3DES excluded
+Secure curves | X25519 and modern NIST curves only
+Compression attacks prevented | TLS compression disabled
+Revocation checking | OCSP stapling enabled
---
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]