Skip to content

Commit 4fa042a

Browse files
author
Chris Cho
authored
DOCSP-36306: fix openssl tool link (#155)
* DOCSP-36306: fix openssl tool link
1 parent db640e3 commit 4fa042a

File tree

1 file changed

+16
-16
lines changed
  • source/fundamentals/connection

1 file changed

+16
-16
lines changed

source/fundamentals/connection/tls.txt

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ or `MongoClientSettings <{+api+}/apidocs/mongodb-driver-core/com/mongodb/MongoCl
3030
.. note:: Debugging TLS/SSL
3131

3232
If you experience trouble setting up your TLS/SSL connection, you can
33-
use the ``-Djavax.net.debug=all`` system property to view additional
33+
use the ``-Djavax.net.debug=all`` system property to view more
3434
log statements. See `the Oracle guide to debugging TLS/SSL connections
3535
<https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/ReadDebug.html>`__
3636
for more information.
@@ -89,7 +89,7 @@ Configure Certificates
8989

9090
Kotlin applications that initiate TLS/SSL requests require access to
9191
cryptographic certificates that prove identity for the application
92-
itself as well as other applications with which the application
92+
itself and other applications with which the application
9393
interacts. You can configure access to these certificates in your application with
9494
the following mechanisms:
9595

@@ -124,7 +124,7 @@ application is genuine and secure from tampering by third parties.
124124
If your MongoDB instance uses a certificate that is signed by an
125125
authority that is not present in the JRE's default certificate store,
126126
your application must configure two system properties to initiate
127-
SSL/TLS requests. These properties ensure that your application is able to
127+
SSL/TLS requests. These properties ensure that your application can
128128
validate the TLS/SSL certificate presented by a connected MongoDB instance.
129129

130130
- ``javax.net.ssl.trustStore``: the path to a trust store containing the
@@ -148,8 +148,8 @@ Configure the JVM Key Store
148148
.. note::
149149

150150
By default, MongoDB instances do not perform client certificate
151-
validation. You only need to configure the key store if you explicitly
152-
configured your MongoDB instance to validate client certificates.
151+
validation. You must configure the key store if you configured your MongoDB
152+
instance to validate client certificates.
153153

154154
The JVM key store saves certificates that securely identify your Kotlin
155155
application to other applications. Using these certificates, other
@@ -168,11 +168,11 @@ the MongoDB server:
168168

169169
You can create a key store with the `keytool
170170
<https://docs.oracle.com/javase/8/docs/technotes/tools/unix/keytool.html>`__
171-
or `openssl <https://www.openssl.org/docs/apps/openssl.html>`__ command
172-
line tools.
171+
or `openssl <https://www.openssl.org/docs/manmaster/man1/openssl.html>`__
172+
command line tool.
173173

174174
For more information on configuring a Kotlin application to use TLS/SSL,
175-
please refer to the `JSSE Reference Guide
175+
please see the `JSSE Reference Guide
176176
<https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html>`__.
177177

178178
.. _tls-disable-hostname-verification:
@@ -195,7 +195,7 @@ Disable Hostname Verification
195195

196196
By default, the driver ensures that the hostname included in the server's
197197
TLS/SSL certificates matches the hostnames provided when constructing
198-
a ``MongoClient``. If you need to disable hostname verification for your
198+
a ``MongoClient``. To disable hostname verification for your
199199
application, you can explicitly disable this by setting the
200200
``invalidHostNameAllowed`` property of the builder to ``true`` in the
201201
``applytoSslSettings()`` builder lambda:
@@ -207,7 +207,7 @@ application, you can explicitly disable this by setting the
207207

208208
Disabling hostname verification can make your configuration
209209
`insecure <https://tlseminar.github.io/docs/mostdangerous.pdf>`__.
210-
You should only disable hostname verification for testing purposes or
210+
Disable hostname verification only for testing purposes or
211211
when there is no other alternative.
212212

213213
.. _tls-restrict-tls-1.2:
@@ -220,17 +220,17 @@ To restrict your application to use only the TLS 1.2 protocol, set the
220220

221221
.. note::
222222

223-
Java Runtime Environments (JREs) prior to Java 8 only enabled
223+
Java Runtime Environments (JREs) before Java 8 only enabled
224224
the TLS 1.2 protocol in update releases. If your JRE has not enabled
225-
the TLS 1.2 protocol, you may need to upgrade to a later release to
226-
connect using TLS 1.2.
225+
the TLS 1.2 protocol, upgrade to a later release to connect by using
226+
TLS 1.2.
227227

228228
.. _tls-custom-sslContext:
229229

230230
Customize TLS/SSL Configuration through the Java SE SSLContext
231231
--------------------------------------------------------------
232232

233-
If your TLS/SSL configuration requires additional customization, you can
233+
If your TLS/SSL configuration requires customization, you can
234234
set the ``sslContext`` property of your ``MongoClient`` by
235235
passing an `SSLContext
236236
<https://docs.oracle.com/javase/8/docs/api/javax/net/ssl/SSLContext.html>`__
@@ -274,7 +274,7 @@ Online Certificate Status Protocol (OCSP)
274274

275275
OCSP is a standard used to check whether X.509 certificates have been
276276
revoked. A certificate authority can add an X.509 certificate to the
277-
Certificate Revocation List (CRL) prior to the expiry time to invalidate
277+
Certificate Revocation List (CRL) before the expiry time to invalidate
278278
the certificate. When a client sends an X.509 certificate during the TLS
279279
handshake, the CA's revocation server checks the CRL and returns a status
280280
of "good", "revoked", or "unknown".
@@ -348,7 +348,7 @@ properties:
348348
|
349349
| If unset or set to ``false``, the connection can proceed regardless of the presence or status of the certificate revocation response.
350350

351-
For additional information about OCSP, check out the following resources:
351+
For more information about OCSP, check out the following resources:
352352

353353
- Oracle JDK 8 Documentation on `how to enable OCSP for an application <https://docs.oracle.com/javase/8/docs/technotes/guides/security/jsse/ocsp.html>`__
354354
- :rfc:`Official IETF specification for OCSP (RFC 6960) <6960>`

0 commit comments

Comments
 (0)