|
|
|
@ -2252,13 +2252,19 @@ signed by the CA can be used to gain full access to Consul.
|
|
|
|
|
considered less secure; avoid using these if possible.
|
|
|
|
|
|
|
|
|
|
- `tls_cipher_suites` Added in Consul 0.8.2, this specifies the list of
|
|
|
|
|
supported ciphersuites as a comma-separated-list. The list of all supported
|
|
|
|
|
ciphersuites is available through
|
|
|
|
|
supported ciphersuites as a comma-separated-list. Applicable to TLS 1.2 and below only.
|
|
|
|
|
The list of all supported ciphersuites is available through
|
|
|
|
|
[this search](https://github.com/hashicorp/consul/search?q=cipherMap+%3A%3D+map&unscoped_q=cipherMap+%3A%3D+map).
|
|
|
|
|
|
|
|
|
|
~> **Note:** The ordering of cipher suites will not be guaranteed from Consul 1.11 onwards. See this
|
|
|
|
|
[post](https://go.dev/blog/tls-cipher-suites) for details.
|
|
|
|
|
|
|
|
|
|
- `tls_prefer_server_cipher_suites` Added in Consul 0.8.2, this
|
|
|
|
|
will cause Consul to prefer the server's ciphersuite over the client ciphersuites.
|
|
|
|
|
|
|
|
|
|
~> **Note:** This config will be deprecated in Consul 1.11. See this
|
|
|
|
|
[post](https://go.dev/blog/tls-cipher-suites) for details.
|
|
|
|
|
|
|
|
|
|
- `verify_incoming` - If set to true, Consul
|
|
|
|
|
requires that all incoming connections make use of TLS and that the client
|
|
|
|
|
provides a certificate signed by a Certificate Authority from the
|
|
|
|
|