Skip to content

Commit

Permalink
Update docs for tls_cipher_suites
Browse files Browse the repository at this point in the history
  • Loading branch information
kisunji committed Sep 16, 2021
1 parent 2dc62aa commit aa1a478
Showing 1 changed file with 8 additions and 2 deletions.
10 changes: 8 additions & 2 deletions website/content/docs/agent/options.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -2251,13 +2251,19 @@ signed by the CA can be used to gain full access to Consul.
considered less secure; avoid using these if possible.

- `tls_cipher_suites` Added in Consul 0.8.2, this specifies the list of
supported ciphersuites as a comma-separated-list. The list of all supported
ciphersuites is available through
supported ciphersuites as a comma-separated-list. Applicable to TLS 1.2 and below only.
The list of all supported ciphersuites is available through
[this search](https://github.com/hashicorp/consul/search?q=cipherMap+%3A%3D+map&unscoped_q=cipherMap+%3A%3D+map).

~> **Note:** The ordering of cipher suites will not be guaranteed in future versions on Consul. See this
[post](https://go.dev/blog/tls-cipher-suites) for details.

- `tls_prefer_server_cipher_suites` Added in Consul 0.8.2, this
will cause Consul to prefer the server's ciphersuite over the client ciphersuites.
~> **Note:** This config will be deprecated in future versions of Consul. See this
[post](https://go.dev/blog/tls-cipher-suites) for details.
- `verify_incoming` - If set to true, Consul
requires that all incoming connections make use of TLS and that the client
provides a certificate signed by a Certificate Authority from the
Expand Down

0 comments on commit aa1a478

Please sign in to comment.