This is an automated email from the ASF dual-hosted git repository.
jinrongtong pushed a commit to branch new-official-website
in repository https://gitbox.apache.org/repos/asf/rocketmq-site.git
The following commit(s) were added to refs/heads/new-official-website by this
push:
new 6ed86d5cef Improve security documentation page (#758)
6ed86d5cef is described below
commit 6ed86d5cef8bded0667fd91ffa0bed4ee6f752dd
Author: rongtong <[email protected]>
AuthorDate: Wed Jan 7 10:07:44 2026 +0800
Improve security documentation page (#758)
* Improve security documentation page
* fix
---
.../01security.md} | 29 +++++++++++++++-----
docs/12-security/_category_.json | 4 +++
docs/12-securityModel/_category_.json | 4 ---
docusaurus.config.js | 2 +-
.../en/docusaurus-plugin-content-docs/current.json | 6 ++--
.../01security.md} | 31 +++++++++++++++------
.../version-5.0.json | 6 ++--
.../01security.md} | 31 +++++++++++++++------
i18n/en/docusaurus-theme-classic/footer.json | 2 +-
.../01security.md} | 32 +++++++++++++++++-----
.../version-5.0/14-security/_category_.json | 4 +++
.../version-5.0/14-securityModel/_category_.json | 4 ---
12 files changed, 109 insertions(+), 46 deletions(-)
diff --git a/docs/12-securityModel/01security-model.md
b/docs/12-security/01security.md
similarity index 65%
rename from docs/12-securityModel/01security-model.md
rename to docs/12-security/01security.md
index 1090d5a38c..efa03bb1ef 100644
--- a/docs/12-securityModel/01security-model.md
+++ b/docs/12-security/01security.md
@@ -1,15 +1,17 @@
-# 安全模型
+# 安全
+
+## 安全模型
Apache RocketMQ 项目自身提供了 ACL、TLS 等安全特性,但最终的安全效果仍取决于运维人员对 **网络、主机、账户与数据** 的整体防护。
-## 1. 认证与授权(ACL)
+### 1. 认证与授权(ACL)
- 自 RocketMQ 4.4.0 起支持 ACL 1.0
- 5.3.0 起引入安全性更高的 **ACL 2.0**
- 5.3.3 移除了 ACL 1.0
- 建议所有使用 Apache RocketMQ ACL 的用户迁移到 **ACL 2.0**
-## 2. 控制台 (Dashboard) 与可观测组件暴露
+### 2. 控制台 (Dashboard) 与可观测组件暴露
RocketMQ Dashboard 及部分可观测组件(例如 RocketMQ Prometheus Exporter)默认不启用强认证,任何可访问
HTTP 端口的用户都可读取集群元数据。强烈建议:
@@ -19,21 +21,34 @@ RocketMQ Dashboard 及部分可观测组件(例如 RocketMQ Prometheus Exporte
> 否则可能导致信息泄露风险,该风险属于部署方责任而非 RocketMQ 漏洞。
-## 3. 传输加密与数据加密
+### 3. 传输加密与数据加密
- 客户端与服务端可通过 TLS 加密通信,若数据中包含敏感信息可以开启
- 消息体由业务定义,RocketMQ 不会解析或持久化解密后的内容
- 若消息包含敏感信息,应在业务侧进行字段或整体加密,避免明文落盘
-## 4. 序列化与反序列化风险
+### 4. 序列化与反序列化风险
- RocketMQ 仅传输字节数组,不做对象反序列化
- 消费端若需反序列化,应选用安全格式(如 JSON-Binding、Protobuf 等),并对不可信数据进行校验
-## 5. SDK 与版本管理
+### 5. SDK 与版本管理
- 始终使用官方最新稳定版客户端,以获得最新漏洞修复与改进
-## 6. 日志管理
+### 6. 日志管理
- 请妥善保管 RocketMQ 相关日志(包括 Broker、Namesrver、Proxy、Client等),避免敏感信息泄漏
+
+## 安全策略
+
+Apache RocketMQ 是 Apache Software Foundation(ASF)旗下项目,遵循 ASF 的漏洞处理流程。
+
+### 漏洞报告
+
+如果你发现了新的安全漏洞,请遵循 ASF 官方的漏洞报告流程进行私下披露与提交:
+https://apache.org/security/#reporting-a-vulnerability
+
+为便于评估与修复,建议在报告中包含:受影响的组件/版本、复现步骤、影响说明,以及 PoC(如有)。
+
+> 请勿在修复发布前通过公开 Issue、邮件列表或社交媒体披露可被立即利用的细节。
diff --git a/docs/12-security/_category_.json b/docs/12-security/_category_.json
new file mode 100644
index 0000000000..5112b41073
--- /dev/null
+++ b/docs/12-security/_category_.json
@@ -0,0 +1,4 @@
+{
+ "label": "安全",
+ "position": 13
+}
\ No newline at end of file
diff --git a/docs/12-securityModel/_category_.json
b/docs/12-securityModel/_category_.json
deleted file mode 100644
index fc652b4db4..0000000000
--- a/docs/12-securityModel/_category_.json
+++ /dev/null
@@ -1,4 +0,0 @@
-{
- "label": "安全模型",
- "position": 13
-}
\ No newline at end of file
diff --git a/docusaurus.config.js b/docusaurus.config.js
index 76996778f1..5c41c3ffb4 100644
--- a/docusaurus.config.js
+++ b/docusaurus.config.js
@@ -460,7 +460,7 @@ const darkCodeTheme =
require("prism-react-renderer/themes/dracula");
},
{
label: 'Security',
- href: 'https://www.apache.org/security/',
+ to: '/docs/security/01security',
},
{
label: 'Thanks',
diff --git a/i18n/en/docusaurus-plugin-content-docs/current.json
b/i18n/en/docusaurus-plugin-content-docs/current.json
index 8bebb99c71..bde021ad3f 100644
--- a/i18n/en/docusaurus-plugin-content-docs/current.json
+++ b/i18n/en/docusaurus-plugin-content-docs/current.json
@@ -51,8 +51,8 @@
"message": "Contribution Guide",
"description": "The label for category 贡献指南 in sidebar
myAutogeneratedSidebar"
},
- "sidebar.myAutogeneratedSidebar.category.安全模型": {
- "message": "Security Model",
- "description": "The label for category 安全模型 in sidebar
myAutogeneratedSidebar"
+ "sidebar.myAutogeneratedSidebar.category.安全": {
+ "message": "Security",
+ "description": "The label for category 安全 in sidebar
myAutogeneratedSidebar"
}
}
diff --git
a/i18n/en/docusaurus-plugin-content-docs/current/12-securityModel/01security-model.md
b/i18n/en/docusaurus-plugin-content-docs/current/12-security/01security.md
similarity index 68%
rename from
i18n/en/docusaurus-plugin-content-docs/current/12-securityModel/01security-model.md
rename to
i18n/en/docusaurus-plugin-content-docs/current/12-security/01security.md
index e0b3b1a60c..deccd1a976 100644
---
a/i18n/en/docusaurus-plugin-content-docs/current/12-securityModel/01security-model.md
+++ b/i18n/en/docusaurus-plugin-content-docs/current/12-security/01security.md
@@ -1,15 +1,17 @@
-# Security Model
+# Security
+
+## Security Model
The Apache RocketMQ project itself provides security features such as ACL and
TLS, but the final security effectiveness still depends on the operator’s
comprehensive protection of **network, hosts, accounts, and data**.
-## 1. Authentication and Authorization (ACL)
+### 1. Authentication and Authorization (ACL)
- ACL 1.0 has been supported since RocketMQ 4.4.0
- The more secure **ACL 2.0** was introduced in 5.3.0
- ACL 1.0 was removed in 5.3.3
- It is recommended that all users who use Apache RocketMQ ACL migrate to
**ACL 2.0**
-## 2. Dashboard & Observability Exposure
+### 2. Dashboard & Observability Exposure
RocketMQ Dashboard and some observability components (such as RocketMQ
Prometheus Exporter) do **not** enable strong authentication by default; anyone
who can access the HTTP port can read cluster metadata. Strongly recommended:
@@ -19,21 +21,34 @@ RocketMQ Dashboard and some observability components (such
as RocketMQ Prometheu
> Otherwise, information-leakage risks may occur; such risks are the
> responsibility of the deployment side rather than RocketMQ vulnerabilities.
-## 3. Transport Encryption and Data Encryption
+### 3. Transport Encryption and Data Encryption
- Clients and servers can communicate through **TLS** encryption; enable it if
sensitive data is involved
- The message body is defined by the business; RocketMQ will **not** parse or
persist decrypted content
- If messages contain sensitive information, perform field-level or overall
encryption on the business side to avoid storing plaintext
-## 4. Serialization and Deserialization Risks
+### 4. Serialization and Deserialization Risks
- RocketMQ only transmits byte arrays and does **not** perform object
deserialization
- If consumers need to deserialize, they should choose secure formats (such as
**JSON-Binding, Protobuf** etc.) and validate untrusted data
-## 5. SDK and Version Management
+### 5. SDK and Version Management
- Always use the latest official stable client to obtain the latest
vulnerability fixes and improvements
-## 6. Log Management
+### 6. Log Management
+
+- Properly keep RocketMQ-related logs (including **Broker, NameServer, Proxy,
Client**, etc.) to avoid leakage of sensitive information
+
+## Security Policy
+
+Apache RocketMQ is a project of the Apache Software Foundation (ASF) and
follows the ASF vulnerability handling process.
+
+### Reporting a Vulnerability
+
+To report a new vulnerability you have discovered, please follow the ASF
vulnerability reporting process:
+https://apache.org/security/#reporting-a-vulnerability
+
+To help us assess and address the issue, please include the affected
component(s)/version(s), reproduction steps, impact analysis, and a PoC if
available.
-- Properly keep RocketMQ-related logs (including **Broker, NameServer, Proxy,
Client**, etc.) to avoid leakage of sensitive information
\ No newline at end of file
+> Please do not disclose exploitable details via public issues, mailing lists,
or social media before a fix is available.
\ No newline at end of file
diff --git a/i18n/en/docusaurus-plugin-content-docs/version-5.0.json
b/i18n/en/docusaurus-plugin-content-docs/version-5.0.json
index 6e6968b447..10aa4a8ee6 100644
--- a/i18n/en/docusaurus-plugin-content-docs/version-5.0.json
+++ b/i18n/en/docusaurus-plugin-content-docs/version-5.0.json
@@ -55,8 +55,8 @@
"message": "Contribution Guide",
"description": "The label for category 贡献指南 in sidebar
myAutogeneratedSidebar"
},
- "sidebar.myAutogeneratedSidebar.category.安全模型": {
- "message": "Security Model",
- "description": "The label for category 安全模型 in sidebar
myAutogeneratedSidebar"
+ "sidebar.myAutogeneratedSidebar.category.安全": {
+ "message": "Security",
+ "description": "The label for category 安全 in sidebar
myAutogeneratedSidebar"
}
}
\ No newline at end of file
diff --git
a/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-securityModel/01security-model.md
b/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-security/01security.md
similarity index 68%
rename from
i18n/en/docusaurus-plugin-content-docs/version-5.0/14-securityModel/01security-model.md
rename to
i18n/en/docusaurus-plugin-content-docs/version-5.0/14-security/01security.md
index e0b3b1a60c..deccd1a976 100644
---
a/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-securityModel/01security-model.md
+++
b/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-security/01security.md
@@ -1,15 +1,17 @@
-# Security Model
+# Security
+
+## Security Model
The Apache RocketMQ project itself provides security features such as ACL and
TLS, but the final security effectiveness still depends on the operator’s
comprehensive protection of **network, hosts, accounts, and data**.
-## 1. Authentication and Authorization (ACL)
+### 1. Authentication and Authorization (ACL)
- ACL 1.0 has been supported since RocketMQ 4.4.0
- The more secure **ACL 2.0** was introduced in 5.3.0
- ACL 1.0 was removed in 5.3.3
- It is recommended that all users who use Apache RocketMQ ACL migrate to
**ACL 2.0**
-## 2. Dashboard & Observability Exposure
+### 2. Dashboard & Observability Exposure
RocketMQ Dashboard and some observability components (such as RocketMQ
Prometheus Exporter) do **not** enable strong authentication by default; anyone
who can access the HTTP port can read cluster metadata. Strongly recommended:
@@ -19,21 +21,34 @@ RocketMQ Dashboard and some observability components (such
as RocketMQ Prometheu
> Otherwise, information-leakage risks may occur; such risks are the
> responsibility of the deployment side rather than RocketMQ vulnerabilities.
-## 3. Transport Encryption and Data Encryption
+### 3. Transport Encryption and Data Encryption
- Clients and servers can communicate through **TLS** encryption; enable it if
sensitive data is involved
- The message body is defined by the business; RocketMQ will **not** parse or
persist decrypted content
- If messages contain sensitive information, perform field-level or overall
encryption on the business side to avoid storing plaintext
-## 4. Serialization and Deserialization Risks
+### 4. Serialization and Deserialization Risks
- RocketMQ only transmits byte arrays and does **not** perform object
deserialization
- If consumers need to deserialize, they should choose secure formats (such as
**JSON-Binding, Protobuf** etc.) and validate untrusted data
-## 5. SDK and Version Management
+### 5. SDK and Version Management
- Always use the latest official stable client to obtain the latest
vulnerability fixes and improvements
-## 6. Log Management
+### 6. Log Management
+
+- Properly keep RocketMQ-related logs (including **Broker, NameServer, Proxy,
Client**, etc.) to avoid leakage of sensitive information
+
+## Security Policy
+
+Apache RocketMQ is a project of the Apache Software Foundation (ASF) and
follows the ASF vulnerability handling process.
+
+### Reporting a Vulnerability
+
+To report a new vulnerability you have discovered, please follow the ASF
vulnerability reporting process:
+https://apache.org/security/#reporting-a-vulnerability
+
+To help us assess and address the issue, please include the affected
component(s)/version(s), reproduction steps, impact analysis, and a PoC if
available.
-- Properly keep RocketMQ-related logs (including **Broker, NameServer, Proxy,
Client**, etc.) to avoid leakage of sensitive information
\ No newline at end of file
+> Please do not disclose exploitable details via public issues, mailing lists,
or social media before a fix is available.
\ No newline at end of file
diff --git a/i18n/en/docusaurus-theme-classic/footer.json
b/i18n/en/docusaurus-theme-classic/footer.json
index 5ae17900f2..ed3e999bdc 100644
--- a/i18n/en/docusaurus-theme-classic/footer.json
+++ b/i18n/en/docusaurus-theme-classic/footer.json
@@ -77,7 +77,7 @@
},
"link.item.label.Security": {
"message": "Security",
- "description": "The label of footer link with label=Security linking to
https://www.apache.org/security/"
+ "description": "The label of footer link with label=Security linking to
/docs/security/01security"
},
"link.item.label.Thanks": {
"message": "Thanks",
diff --git a/versioned_docs/version-5.0/14-securityModel/01security-model.md
b/versioned_docs/version-5.0/14-security/01security.md
similarity index 65%
rename from versioned_docs/version-5.0/14-securityModel/01security-model.md
rename to versioned_docs/version-5.0/14-security/01security.md
index 1090d5a38c..a250e3e0a7 100644
--- a/versioned_docs/version-5.0/14-securityModel/01security-model.md
+++ b/versioned_docs/version-5.0/14-security/01security.md
@@ -1,15 +1,17 @@
-# 安全模型
+# 安全
+
+## 安全模型
Apache RocketMQ 项目自身提供了 ACL、TLS 等安全特性,但最终的安全效果仍取决于运维人员对 **网络、主机、账户与数据** 的整体防护。
-## 1. 认证与授权(ACL)
+### 1. 认证与授权(ACL)
- 自 RocketMQ 4.4.0 起支持 ACL 1.0
- 5.3.0 起引入安全性更高的 **ACL 2.0**
- 5.3.3 移除了 ACL 1.0
- 建议所有使用 Apache RocketMQ ACL 的用户迁移到 **ACL 2.0**
-## 2. 控制台 (Dashboard) 与可观测组件暴露
+### 2. 控制台 (Dashboard) 与可观测组件暴露
RocketMQ Dashboard 及部分可观测组件(例如 RocketMQ Prometheus Exporter)默认不启用强认证,任何可访问
HTTP 端口的用户都可读取集群元数据。强烈建议:
@@ -19,21 +21,37 @@ RocketMQ Dashboard 及部分可观测组件(例如 RocketMQ Prometheus Exporte
> 否则可能导致信息泄露风险,该风险属于部署方责任而非 RocketMQ 漏洞。
-## 3. 传输加密与数据加密
+### 3. 传输加密与数据加密
- 客户端与服务端可通过 TLS 加密通信,若数据中包含敏感信息可以开启
- 消息体由业务定义,RocketMQ 不会解析或持久化解密后的内容
- 若消息包含敏感信息,应在业务侧进行字段或整体加密,避免明文落盘
-## 4. 序列化与反序列化风险
+### 4. 序列化与反序列化风险
- RocketMQ 仅传输字节数组,不做对象反序列化
- 消费端若需反序列化,应选用安全格式(如 JSON-Binding、Protobuf 等),并对不可信数据进行校验
-## 5. SDK 与版本管理
+### 5. SDK 与版本管理
- 始终使用官方最新稳定版客户端,以获得最新漏洞修复与改进
-## 6. 日志管理
+### 6. 日志管理
- 请妥善保管 RocketMQ 相关日志(包括 Broker、Namesrver、Proxy、Client等),避免敏感信息泄漏
+
+
+## 安全策略
+
+Apache RocketMQ 是 Apache Software Foundation(ASF)旗下项目,遵循 ASF 的漏洞处理流程。
+
+### 漏洞报告
+
+如果你发现了新的安全漏洞,请遵循 ASF 官方的漏洞报告流程进行私下披露与提交:
+https://apache.org/security/#reporting-a-vulnerability
+
+为便于评估与修复,建议在报告中包含:受影响的组件/版本、复现步骤、影响说明,以及 PoC(如有)。
+
+> 请勿在修复发布前通过公开 Issue、邮件列表或社交媒体披露可被立即利用的细节。
+
+
diff --git a/versioned_docs/version-5.0/14-security/_category_.json
b/versioned_docs/version-5.0/14-security/_category_.json
new file mode 100644
index 0000000000..8b4ef17aca
--- /dev/null
+++ b/versioned_docs/version-5.0/14-security/_category_.json
@@ -0,0 +1,4 @@
+{
+ "label": "安全",
+ "position": 14
+}
\ No newline at end of file
diff --git a/versioned_docs/version-5.0/14-securityModel/_category_.json
b/versioned_docs/version-5.0/14-securityModel/_category_.json
deleted file mode 100644
index a23a247f9b..0000000000
--- a/versioned_docs/version-5.0/14-securityModel/_category_.json
+++ /dev/null
@@ -1,4 +0,0 @@
-{
- "label": "安全模型",
- "position": 14
-}
\ No newline at end of file