Had it been on 5.x, I would have validated it immediately. But along with that, we have server upgrade going on from Windows 2008 to 2012/16 on most of the dev server my team uses. So I will need to request for some new certificates to test this out. So it my take some time, before I get to validate this.
In terms of TLS settings, this is what we currently use(except for ciphers) with SG.
searchguard.ssl.transport.keystore_type
searchguard.ssl.transport.keystore_filepath
searchguard.ssl.transport.keystore_alias
searchguard.ssl.transport.keystore_password
searchguard.ssl.transport.truststore_type
searchguard.ssl.transport.truststore_filepath
searchguard.ssl.transport.truststore_alias
searchguard.ssl.transport.truststore_password
searchguard.ssl.transport.enforce_hostname_verification
searchguard.ssl.transport.resolve_hostname
searchguard.ssl.transport.enabled_protocols
searchguard.ssl.transport.enabled_ciphers
This is what we have for ROR.
readonlyrest:
enable: true
ssl:
keystore_file: "keystore.jks"
keystore_pass: readonlyrest
key_pass: readonlyrest
Based on the code in BasicSettings class, I am going to guess, this is what it will need to look like.
readonlyrest:
ssl:
enable: true
keystore_file: "keystore.jks"
keystore_pass: readonlyrest
key_pass: readonlyrest
ssl_internode:
enable: true
keystore_file: "keystore.jks"
keystore_pass: readonlyrest
keystore_alias: mycertalias
key_pass: readonlyrest
allowed_protocols: ["TLSv1.2"]
Does this look right? Also, what about host name verification and resolve hostname?
Thanks!