|
| 1 | +groups: |
| 2 | + - id: registry.tls |
| 3 | + prefix: tls |
| 4 | + type: attribute_group |
| 5 | + brief: "This document defines semantic convention attributes in the TLS namespace." |
| 6 | + attributes: |
| 7 | + - id: cipher |
| 8 | + brief: > |
| 9 | + String indicating the [cipher](https://datatracker.ietf.org/doc/html/rfc5246#appendix-A.5) used during the current connection. |
| 10 | + type: string |
| 11 | + note: > |
| 12 | + The values allowed for `tls.cipher` MUST be one of the `Descriptions` of the |
| 13 | + [registered TLS Cipher Suits](https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#table-tls-parameters-4). |
| 14 | + examples: |
| 15 | + [ |
| 16 | + "TLS_RSA_WITH_3DES_EDE_CBC_SHA", |
| 17 | + "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", |
| 18 | + ] |
| 19 | + - id: client.certificate |
| 20 | + type: string |
| 21 | + brief: > |
| 22 | + PEM-encoded stand-alone certificate offered by the client. This is usually mutually-exclusive of `client.certificate_chain` since this value also exists in that list. |
| 23 | + examples: ["MII..."] |
| 24 | + - id: client.certificate_chain |
| 25 | + type: string[] |
| 26 | + brief: > |
| 27 | + Array of PEM-encoded certificates that make up the certificate chain offered by the client. |
| 28 | + This is usually mutually-exclusive of `client.certificate` since that value should be the first certificate in the chain. |
| 29 | + examples: ["MII...", "MI..."] |
| 30 | + - id: client.hash.md5 |
| 31 | + type: string |
| 32 | + brief: > |
| 33 | + Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the client. |
| 34 | + For consistency with other hash values, this value should be formatted as an uppercase hash. |
| 35 | + examples: ["0F76C7F2C55BFD7D8E8B8F4BFBF0C9EC"] |
| 36 | + - id: client.hash.sha1 |
| 37 | + type: string |
| 38 | + brief: > |
| 39 | + Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the client. |
| 40 | + For consistency with other hash values, this value should be formatted as an uppercase hash. |
| 41 | + examples: ["9E393D93138888D288266C2D915214D1D1CCEB2A"] |
| 42 | + - id: client.hash.sha256 |
| 43 | + type: string |
| 44 | + brief: > |
| 45 | + Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the client. |
| 46 | + For consistency with other hash values, this value should be formatted as an uppercase hash. |
| 47 | + examples: |
| 48 | + ["0687F666A054EF17A08E2F2162EAB4CBC0D265E1D7875BE74BF3C712CA92DAF0"] |
| 49 | + - id: client.issuer |
| 50 | + type: string |
| 51 | + brief: "Distinguished name of [subject](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6) of the issuer of the x.509 certificate presented by the client." |
| 52 | + examples: |
| 53 | + ["CN=Example Root CA, OU=Infrastructure Team, DC=example, DC=com"] |
| 54 | + - id: client.ja3 |
| 55 | + type: string |
| 56 | + brief: "A hash that identifies clients based on how they perform an SSL/TLS handshake." |
| 57 | + examples: ["d4e5b18d6b55c71272893221c96ba240"] |
| 58 | + - id: client.not_after |
| 59 | + type: string |
| 60 | + brief: "Date/Time indicating when client certificate is no longer considered valid." |
| 61 | + examples: ["2021-01-01T00:00:00.000Z"] |
| 62 | + - id: client.not_before |
| 63 | + type: string |
| 64 | + brief: "Date/Time indicating when client certificate is first considered valid." |
| 65 | + examples: ["1970-01-01T00:00:00.000Z"] |
| 66 | + - id: client.server_name |
| 67 | + type: string |
| 68 | + brief: "Also called an SNI, this tells the server which hostname to which the client is attempting to connect to." |
| 69 | + examples: ["opentelemetry.io"] |
| 70 | + - id: client.subject |
| 71 | + type: string |
| 72 | + brief: "Distinguished name of subject of the x.509 certificate presented by the client." |
| 73 | + examples: ["CN=myclient, OU=Documentation Team, DC=example, DC=com"] |
| 74 | + - id: client.supported_ciphers |
| 75 | + type: string[] |
| 76 | + brief: Array of ciphers offered by the client during the client hello. |
| 77 | + examples: |
| 78 | + [ |
| 79 | + '"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "..."', |
| 80 | + ] |
| 81 | + - id: curve |
| 82 | + brief: "String indicating the curve used for the given cipher, when applicable" |
| 83 | + type: string |
| 84 | + examples: ["secp256r1"] |
| 85 | + - id: established |
| 86 | + brief: "Boolean flag indicating if the TLS negotiation was successful and transitioned to an encrypted tunnel." |
| 87 | + type: boolean |
| 88 | + examples: [true] |
| 89 | + - id: next_protocol |
| 90 | + brief: > |
| 91 | + String indicating the protocol being tunneled. |
| 92 | + Per the values in the [IANA registry](https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids), |
| 93 | + this string should be lower case. |
| 94 | + type: string |
| 95 | + examples: ["http/1.1"] |
| 96 | + - id: protocol.name |
| 97 | + brief: > |
| 98 | + Normalized lowercase protocol name parsed from original string of the negotiated [SSL/TLS protocol version](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES) |
| 99 | + type: |
| 100 | + allow_custom_values: true |
| 101 | + members: |
| 102 | + - id: ssl |
| 103 | + value: ssl |
| 104 | + - id: tls |
| 105 | + value: tls |
| 106 | + - id: protocol.version |
| 107 | + brief: > |
| 108 | + Numeric part of the version parsed from the original string of the negotiated [SSL/TLS protocol version](https://www.openssl.org/docs/man1.1.1/man3/SSL_get_version.html#RETURN-VALUES) |
| 109 | + type: string |
| 110 | + examples: ["1.2", "3"] |
| 111 | + - id: resumed |
| 112 | + brief: "Boolean flag indicating if this TLS connection was resumed from an existing TLS negotiation." |
| 113 | + type: boolean |
| 114 | + examples: [true] |
| 115 | + - id: server.certificate |
| 116 | + type: string |
| 117 | + brief: > |
| 118 | + PEM-encoded stand-alone certificate offered by the server. This is usually mutually-exclusive of `server.certificate_chain` since this value also exists in that list. |
| 119 | + examples: ["MII..."] |
| 120 | + - id: server.certificate_chain |
| 121 | + type: string[] |
| 122 | + brief: > |
| 123 | + Array of PEM-encoded certificates that make up the certificate chain offered by the server. |
| 124 | + This is usually mutually-exclusive of `server.certificate` since that value should be the first certificate in the chain. |
| 125 | + examples: ["MII...", "MI..."] |
| 126 | + - id: server.hash.md5 |
| 127 | + type: string |
| 128 | + brief: > |
| 129 | + Certificate fingerprint using the MD5 digest of DER-encoded version of certificate offered by the server. |
| 130 | + For consistency with other hash values, this value should be formatted as an uppercase hash. |
| 131 | + examples: ["0F76C7F2C55BFD7D8E8B8F4BFBF0C9EC"] |
| 132 | + - id: server.hash.sha1 |
| 133 | + type: string |
| 134 | + brief: > |
| 135 | + Certificate fingerprint using the SHA1 digest of DER-encoded version of certificate offered by the server. |
| 136 | + For consistency with other hash values, this value should be formatted as an uppercase hash. |
| 137 | + examples: ["9E393D93138888D288266C2D915214D1D1CCEB2A"] |
| 138 | + - id: server.hash.sha256 |
| 139 | + type: string |
| 140 | + brief: > |
| 141 | + Certificate fingerprint using the SHA256 digest of DER-encoded version of certificate offered by the server. |
| 142 | + For consistency with other hash values, this value should be formatted as an uppercase hash. |
| 143 | + examples: |
| 144 | + ["0687F666A054EF17A08E2F2162EAB4CBC0D265E1D7875BE74BF3C712CA92DAF0"] |
| 145 | + - id: server.issuer |
| 146 | + type: string |
| 147 | + brief: "Distinguished name of [subject](https://datatracker.ietf.org/doc/html/rfc5280#section-4.1.2.6) of the issuer of the x.509 certificate presented by the client." |
| 148 | + examples: |
| 149 | + ["CN=Example Root CA, OU=Infrastructure Team, DC=example, DC=com"] |
| 150 | + - id: server.ja3s |
| 151 | + type: string |
| 152 | + brief: "A hash that identifies servers based on how they perform an SSL/TLS handshake." |
| 153 | + examples: ["d4e5b18d6b55c71272893221c96ba240"] |
| 154 | + - id: server.not_after |
| 155 | + type: string |
| 156 | + brief: "Date/Time indicating when server certificate is no longer considered valid." |
| 157 | + examples: ["2021-01-01T00:00:00.000Z"] |
| 158 | + - id: server.not_before |
| 159 | + type: string |
| 160 | + brief: "Date/Time indicating when server certificate is first considered valid." |
| 161 | + examples: ["1970-01-01T00:00:00.000Z"] |
| 162 | + - id: server.subject |
| 163 | + type: string |
| 164 | + brief: "Distinguished name of subject of the x.509 certificate presented by the server." |
| 165 | + examples: ["CN=myserver, OU=Documentation Team, DC=example, DC=com"] |
0 commit comments