Skip to content

Commit 90af609

Browse files
AntonEliatrakolchfa-awsnatebower
authored
adding new settings for hostname_verification (opensearch-project#10543)
* adding new settings for hostname_verification Signed-off-by: Anton Rubin <[email protected]> * Apply suggestions from code review Co-authored-by: kolchfa-aws <[email protected]> Signed-off-by: AntonEliatra <[email protected]> * Update _security/configuration/tls.md Signed-off-by: Nathan Bower <[email protected]> --------- Signed-off-by: Anton Rubin <[email protected]> Signed-off-by: AntonEliatra <[email protected]> Signed-off-by: Nathan Bower <[email protected]> Co-authored-by: kolchfa-aws <[email protected]> Co-authored-by: Nathan Bower <[email protected]>
1 parent 0a8deaa commit 90af609

File tree

5 files changed

+10
-8
lines changed

5 files changed

+10
-8
lines changed

_install-and-configure/configuring-opensearch/security-settings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -241,9 +241,9 @@ The Security plugin supports the following audit log settings:
241241

242242
The Security plugin supports the following hostname verification and DNS lookup settings:
243243

244-
- `plugins.security.ssl.transport.enforce_hostname_verification` (Static): Whether to verify hostnames on the transport layer. Optional. Default is `true`.
244+
- `transport.ssl.enforce_hostname_verification` (Static): Whether to verify hostnames on the transport layer. Optional. Default is `true`.
245245

246-
- `plugins.security.ssl.transport.resolve_hostname` (Static): Whether to resolve hostnames against DNS on the transport layer. Optional. Default is `true`. Only works if hostname verification is enabled.
246+
- `transport.ssl.resolve_hostname` (Static): Whether to resolve hostnames against DNS on the transport layer. Optional. Default is `true`. Only works if hostname verification is enabled.
247247

248248
For more information, see [Hostname verification and DNS lookup]({{site.url}}{{site.baseurl}}/security/configuration/tls/#advanced-hostname-verification-and-dns-lookup).
249249

@@ -397,7 +397,7 @@ plugins.security.roles_mapping_resolution: MAPPING_ONLY
397397
plugins.security.ssl.transport.pemcert_filepath: esnode.pem
398398
plugins.security.ssl.transport.pemkey_filepath: esnode-key.pem
399399
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
400-
plugins.security.ssl.transport.enforce_hostname_verification: false
400+
transport.ssl.enforce_hostname_verification: false
401401
plugins.security.ssl.http.enabled: true
402402
plugins.security.ssl.http.pemcert_filepath: esnode.pem
403403
plugins.security.ssl.http.pemkey_filepath: esnode-key.pem

_install-and-configure/install-opensearch/docker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -473,7 +473,7 @@ After configuring security settings, your custom `opensearch.yml` file might loo
473473
plugins.security.ssl.transport.pemcert_filepath: node1.pem
474474
plugins.security.ssl.transport.pemkey_filepath: node1-key.pem
475475
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
476-
plugins.security.ssl.transport.enforce_hostname_verification: false
476+
transport.ssl.enforce_hostname_verification: false
477477
plugins.security.ssl.http.enabled: true
478478
plugins.security.ssl.http.pemcert_filepath: node1.pem
479479
plugins.security.ssl.http.pemkey_filepath: node1-key.pem

_security/configuration/generate-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ openssl req -new -key admin-key.pem -out admin.csr
7777

7878
Follow the prompts to fill in the details. You don't need to specify a challenge password. As noted in the [OpenSSL Cookbook](https://www.feistyduck.com/books/openssl-cookbook/){:target='\_blank'}, "Having a challenge password does not increase the security of the CSR in any way."
7979

80-
If you generate TLS certificates and have enabled hostname verification by setting `plugins.security.ssl.transport.enforce_hostname_verification` to `true` (default), be sure to specify a common name (CN) for each certificate signing request (CSR) that matches the corresponding DNS A record of the intended node.
80+
If you generate TLS certificates and have enabled hostname verification by setting `transport.ssl.enforce_hostname_verification` to `true` (default), be sure to specify a common name (CN) for each certificate signing request (CSR) that matches the corresponding DNS A record of the intended node.
8181

8282
If you want to use the same node certificate on all nodes (not recommended), set hostname verification to `false`. For more information, see [Configure TLS certificates]({{site.url}}{{site.baseurl}}/security/configuration/tls/#advanced-hostname-verification-and-dns-lookup).
8383

_security/configuration/tls.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -156,8 +156,10 @@ In addition, when `resolve_hostname` is enabled, the Security plugin resolves th
156156

157157
Name | Description
158158
:--- | :---
159-
`plugins.security.ssl.transport.enforce_hostname_verification` | Whether to verify hostnames on the transport layer. Optional. Default is `true`.
160-
`plugins.security.ssl.transport.resolve_hostname` | Whether to resolve hostnames against DNS on the transport layer. Optional. Default is `true`. Only works if hostname verification is also enabled.
159+
`transport.ssl.enforce_hostname_verification` | Whether to verify hostnames on the transport layer. Optional. Default is `true`.
160+
`plugins.security.ssl.transport.enforce_hostname_verification` (Deprecated) | This setting has been deprecated. Use `transport.ssl.enforce_hostname_verification` instead.
161+
`transport.ssl.resolve_hostname` | Whether to resolve hostnames using DNS on the transport layer. Optional. Default is `true`. Only works if hostname verification is enabled.
162+
`plugins.security.ssl.transport.resolve_hostname` (Deprecated) | This setting has been deprecated. Use `transport.ssl.resolve_hostname` instead.
161163

162164

163165
## (Advanced) Client authentication

_security/configuration/yaml.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,7 @@ In addition to many OpenSearch settings, the `opensearch.yml` file contains path
321321
plugins.security.ssl.transport.pemcert_filepath: esnode.pem
322322
plugins.security.ssl.transport.pemkey_filepath: esnode-key.pem
323323
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
324-
plugins.security.ssl.transport.enforce_hostname_verification: false
324+
transport.ssl.enforce_hostname_verification: false
325325
plugins.security.ssl.http.enabled: true
326326
plugins.security.ssl.http.pemcert_filepath: esnode.pem
327327
plugins.security.ssl.http.pemkey_filepath: esnode-key.pem

0 commit comments

Comments
 (0)