Do we really need these cipher settings in elasticsearch.yml file according to ES official documentaion i version 8.19.3

set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[0]" "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[1]" "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[2]" "TLS_AES_256_GCM_SHA384" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[3]" "TLS_CHACHA20_POLY1305_SHA256" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[4]" "TLS_AES_128_GCM_SHA256" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[5]" "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[6]" "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[7]" "TLS_AES_128_CCM_8_SHA256" &&
set_yaml "${elasticsearch_conf}" "[xpack.security.transport.ssl.cipher_suites].[8]" "TLS_AES_128_CCM_SHA256" &&

Do we really need these cipher settings in elasticsearch.yml file according to ES official documentaion i version 8.19.3
Or We dont need any of them Or some needed?

It is up to you, if you do not set them, it will use the default ciphers, mentioned here in the documentation.

If you do not any reason to limit which cipers are being used, there is no need to set this.

2 Likes

Thanks @leandrojmp , for being very helpful.
Have a Great Day!!