Security Administration Guide

XMLWordPrintable

    • Type: Enhancement
    • Resolution: Unresolved
    • Priority: P4
    • tbd
    • Affects Version/s: None
    • Component/s: docs

      Algorithms evolve and previously strong ones become weak and obsolete. Sometimes we disable them, sometimes we don't recommend them. We see this in TLS ciphersuites, CertPath algorithms, default and supported algorithms of keytool and jarsigner, and allow_weak_crypto of Kerberos encryption types. We need a centralized place to describe all of them and the principal we are following as a security guide.

            Assignee:
            Raymond Gallardo
            Reporter:
            Weijun Wang
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

              Created:
              Updated: