Skip to content

Commit d9b444e

Browse files
authored
Merge pull request #46395 from MichalMaler/TLS-guide-rev
TLS guide Review
2 parents d0768d3 + 342005b commit d9b444e

File tree

2 files changed

+6
-7
lines changed

2 files changed

+6
-7
lines changed

docs/src/main/asciidoc/http-reference.adoc

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,7 @@ Look at the xref:web-dependency-locator.adoc[Web dependency locator] guide for d
4040

4141
Static resources can be served from a local directory by installing an additional route in the Vert.x router.
4242

43-
For instance, to serve resources from the `static/` directory relative to the current path at http://localhost:8080/static/,
44-
you can install the following route:
43+
For instance, to serve resources from the `static/` directory relative to the current path at http://localhost:8080/static/, you can install the following route:
4544

4645
[source,java]
4746
----

docs/src/main/asciidoc/tls-registry-reference.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -670,20 +670,20 @@ While this feature can provide flexibility, it also introduces a potential secur
670670

671671
When a client initiates a new TLS handshake, the server typically consumes significantly more CPU resources than the client. This resource asymmetry can be exploited to launch denial-of-service (DoS) attacks, overwhelming the server with renegotiation requests.
672672

673-
TLS 1.3 completely removes support for renegotiation, effectively closing this potential attack vector. However, if you are using TLS 1.2 or an older version, you need to take additional steps to secure your application.
674-
675-
To prevent client-initiated renegotiation in TLS 1.2 and earlier versions, set the `jdk.tls.rejectClientInitiatedRenegotiation` system property to true:
673+
TLS 1.3 completely removes support for renegotiation, effectively closing this potential attack vector.
676674

675+
* To secure TLS 1.2 and earlier, set `jdk.tls.rejectClientInitiatedRenegotiation` to `true` to prevent client-initiated renegotiation.
676+
+
677677
[source]
678678
----
679679
# JVM mode:
680680
java -Djdk.tls.rejectClientInitiatedRenegotiation=true -jar ...
681681
# Native mode
682682
./application -Djdk.tls.rejectClientInitiatedRenegotiation=true
683683
----
684-
684+
+
685685
If you are using the Quarkus-provided `Dockerfile` in JVM mode, you can disable renegotiation by adding the property to the `JAVA_OPTS_APPEND` environment variable:
686-
686+
+
687687
[source]
688688
----
689689
ENV JAVA_OPTS_APPPEND="-Dquarkus.http.host=0.0.0.0 -Djava.util.logging.manager=org.jboss.logmanager.LogManager -Djdk.tls.rejectClientInitiatedRenegotiation=true"

0 commit comments

Comments
 (0)