diff options
author | Eli Zaretskii <eliz@gnu.org> | 2018-07-08 17:46:32 +0300 |
---|---|---|
committer | Eli Zaretskii <eliz@gnu.org> | 2018-07-08 17:46:32 +0300 |
commit | 9c985a3d7a84bdfad17e11a12f671605bb31b3be (patch) | |
tree | bc5dc83a15b01b031538fba8668e625ff66f7183 /etc | |
parent | c6de1f1592745d98e58f06332ad35efc72160787 (diff) | |
download | emacs-9c985a3d7a84bdfad17e11a12f671605bb31b3be.tar.gz |
Minor improvements in recent NSM documentation changes
* doc/emacs/misc.texi (Network Security): Improve wording and
markup of last change.
* src/gnutls.c (Fgnutls_peer_status): Doc fix.
* etc/NEWS: Improve wording of last change.
Diffstat (limited to 'etc')
-rw-r--r-- | etc/NEWS | 15 |
1 files changed, 9 insertions, 6 deletions
@@ -136,12 +136,15 @@ of what checks to run via the `network-security-protocol-checks' variable. +++ -** Most of the checks for outdated, believed-to-be-weak TLS algorithms -and ciphers are now switched on by default. To get the old behaviour -back (where certificates are checked for validity, but no warnings -about weak cryptography are issued), you can either set -`network-security-protocol-checks' to nil, or adjust the elements in -that variable to only happen on the `high' security level. +** TLS connections have their security tightened by default. +Most of the checks for outdated, believed-to-be-weak TLS algorithms +and ciphers are now switched on by default. By default, the NSM will +flag connections using these weak algorithms and ask users whether to +allow them. To get the old behavior back (where certificates are +checked for validity, but no warnings about weak cryptography are +issued), you can either set 'network-security-protocol-checks' to nil, +or adjust the elements in that variable to only happen on the 'high' +security level (assuming you use the 'medium' level). +++ ** New function 'fill-polish-nobreak-p', to be used in 'fill-nobreak-predicate'. |