| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/virtualisation.podman.networkSocket.port | TCP port number for receiving TLS connections.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.path | Unix domain socket path to bind this listener to.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| packages/nixpkgs/linuxPackages_lqx.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/litterbox | Simple TLS-only IRC logger |
| packages/nixpkgs/linuxPackages_zen.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| options/nixos/virtualisation.podman.networkSocket.server | Choice of TLS proxy server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| packages/nixpkgs/ocamlPackages.logs-syslog | Logs reporter to syslog (UDP/TCP/TLS) |
| options/nixos/services.yggdrasil-jumper.appendListenAddresses | Append Yggdrasil router configuration with listeners on loopback
addresses (127.0.0.1) and preselected ports to support peering
using client-server protocols like quic and tls
|
| packages/nixpkgs/luajitPackages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| options/nixos/services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/virtualisation.podman.networkSocket.listenAddress | Interface address for receiving TLS connections.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.changedetection-io.behindProxy | Enable this option when changedetection-io runs behind a reverse proxy, so that it trusts X-* headers
|
| packages/nixpkgs/linuxPackages_xanmod.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxPackages_latest.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/luaPackages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.parsedmarc.settings.elasticsearch.ssl | Whether to use an encrypted SSL/TLS connection.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| packages/nixpkgs/lua53Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua52Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua51Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua54Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| packages/nixpkgs/lua55Packages.luasec | A binding for OpenSSL library to provide TLS/SSL communication over LuaSocket. |
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.connectTimeout | Timeout for establishing a new TCP connection to your origin server
|
| options/nixos/services.matrix-continuwuity.settings.global.address | Addresses (IPv4 or IPv6) to listen on for connections by the reverse proxy/tls terminator
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.ca_file | CA certificate to validate API server certificate with.
|
| packages/nixpkgs/ocamlPackages_latest.logs-syslog | Logs reporter to syslog (UDP/TCP/TLS) |
| packages/nixpkgs/python313Packages.acme-tiny | Tiny script to issue and renew TLS certs from Let's Encrypt |
| packages/nixpkgs/python314Packages.acme-tiny | Tiny script to issue and renew TLS certs from Let's Encrypt |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.kubernetes.apiserver.serviceAccountKeyFile | File containing PEM-encoded x509 RSA or ECDSA private or public keys,
used to verify ServiceAccount tokens
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| packages/nixpkgs/stubby | Local DNS Privacy stub resolver (using DNS-over-TLS) |
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/bearssl | Implementation of the SSL/TLS protocol written in C |
| packages/nixpkgs/openssl | Cryptographic library that implements the SSL and TLS protocols |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.server_name | ServerName extension to indicate the name of the server.
http://tools.ietf.org/html/rfc4366#section-3.1
|
| options/nixos/services.biboumi.settings.policy_directory | A directory that should contain the policy files,
used to customize Botan’s behaviour
when negotiating the TLS connections with the IRC servers.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.nextcloud.settings.mail_smtpsecure | This depends on mail_smtpmode
|
| packages/nixpkgs/wolfssl | Small, fast, portable implementation of TLS/SSL for embedded devices |
| options/nixos/services.parsedmarc.settings.elasticsearch.cert_path | The path to a TLS certificate bundle used to verify
the server's certificate.
|
| options/nixos/services.prometheus.exporters.imap-mailstat.accounts.<name>.serverport | imap port number (at the moment only tls connection is supported)
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/python314Packages.sslpsk-pmd3 | Adds TLS-PSK support to the Python ssl package |
| packages/nixpkgs/python313Packages.sslpsk-pmd3 | Adds TLS-PSK support to the Python ssl package |
| packages/nixpkgs/python312Packages.acme-tiny | Tiny script to issue and renew TLS certs from Let's Encrypt |
| packages/nixpkgs/python314Packages.trustme | High quality TLS certs while you wait, for the discerning tester |
| packages/nixpkgs/python313Packages.trustme | High quality TLS certs while you wait, for the discerning tester |
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/radsecproxy | Generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports |
| packages/nixpkgs/sslsplit | Transparent SSL/TLS interception |
| packages/nixpkgs/libressl | Free TLS/SSL implementation |
| options/nixos/services.matrix-synapse.workers.<name>.worker_listeners.*.path | Unix domain socket path to bind this listener to.
|
| packages/nixpkgs/certmitm | Tool for testing for certificate validation vulnerabilities of TLS connections |
| packages/nixpkgs/openssl_3 | Cryptographic library that implements the SSL and TLS protocols |
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.insecure_skip_verify | Disable validation of the server certificate.
|
| packages/nixpkgs/azure-sdk-for-cpp.openssl | Cryptographic library that implements the SSL and TLS protocols |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |
| packages/nixpkgs/linuxKernel.packages.linux_zen.ecapture | Capture SSL/TLS text content without CA certificate Using eBPF |