This is an automated email from the ASF dual-hosted git repository.

jinrongtong pushed a commit to branch new-official-website
in repository https://gitbox.apache.org/repos/asf/rocketmq-site.git


The following commit(s) were added to refs/heads/new-official-website by this 
push:
     new 6e8c65d044 Add security model (#733)
6e8c65d044 is described below

commit 6e8c65d044c38ac34d8d830fc59831847323938c
Author: rongtong <[email protected]>
AuthorDate: Mon Jul 7 10:46:58 2025 +0800

    Add security model (#733)
    
    * Add security model
    
    * Add security model
---
 docs/12-securityModel/01security-model.md          | 39 ++++++++++++++++++++++
 docs/12-securityModel/_category_.json              |  4 +++
 .../current/12-securityModel/01security-model.md   | 39 ++++++++++++++++++++++
 .../14-securityModel/01security-model.md           | 39 ++++++++++++++++++++++
 .../14-securityModel/01security-model.md           | 39 ++++++++++++++++++++++
 .../version-5.0/14-securityModel/_category_.json   |  4 +++
 6 files changed, 164 insertions(+)

diff --git a/docs/12-securityModel/01security-model.md 
b/docs/12-securityModel/01security-model.md
new file mode 100644
index 0000000000..1090d5a38c
--- /dev/null
+++ b/docs/12-securityModel/01security-model.md
@@ -0,0 +1,39 @@
+# 安全模型
+
+Apache RocketMQ 项目自身提供了 ACL、TLS 等安全特性,但最终的安全效果仍取决于运维人员对 **网络、主机、账户与数据** 的整体防护。
+
+## 1. 认证与授权(ACL)
+
+- 自 RocketMQ 4.4.0 起支持 ACL 1.0
+- 5.3.0 起引入安全性更高的 **ACL 2.0**
+- 5.3.3 移除了 ACL 1.0
+- 建议所有使用 Apache RocketMQ ACL 的用户迁移到 **ACL 2.0**
+
+## 2. 控制台 (Dashboard) 与可观测组件暴露
+
+RocketMQ Dashboard 及部分可观测组件(例如 RocketMQ Prometheus Exporter)默认不启用强认证,任何可访问 
HTTP 端口的用户都可读取集群元数据。强烈建议:
+
+- Dashboard 监听地址 绑定至内网或受信任 VPC
+- 在 网关 / Ingress / 反向代理 上配置 ACL / IP 白名单
+- 如需公网运维,务必叠加 VPN、HTTP Basic/OAuth 鉴权或 WAF
+
+> 否则可能导致信息泄露风险,该风险属于部署方责任而非 RocketMQ 漏洞。
+
+## 3. 传输加密与数据加密
+
+- 客户端与服务端可通过 TLS 加密通信,若数据中包含敏感信息可以开启
+- 消息体由业务定义,RocketMQ 不会解析或持久化解密后的内容
+- 若消息包含敏感信息,应在业务侧进行字段或整体加密,避免明文落盘
+
+## 4. 序列化与反序列化风险
+
+- RocketMQ 仅传输字节数组,不做对象反序列化
+- 消费端若需反序列化,应选用安全格式(如 JSON-Binding、Protobuf 等),并对不可信数据进行校验
+
+## 5. SDK 与版本管理
+
+- 始终使用官方最新稳定版客户端,以获得最新漏洞修复与改进
+
+## 6. 日志管理
+
+- 请妥善保管 RocketMQ 相关日志(包括 Broker、Namesrver、Proxy、Client等),避免敏感信息泄漏
diff --git a/docs/12-securityModel/_category_.json 
b/docs/12-securityModel/_category_.json
new file mode 100644
index 0000000000..fc652b4db4
--- /dev/null
+++ b/docs/12-securityModel/_category_.json
@@ -0,0 +1,4 @@
+{
+  "label": "安全模型",
+  "position": 13
+}
\ No newline at end of file
diff --git 
a/i18n/en/docusaurus-plugin-content-docs/current/12-securityModel/01security-model.md
 
b/i18n/en/docusaurus-plugin-content-docs/current/12-securityModel/01security-model.md
new file mode 100644
index 0000000000..e0b3b1a60c
--- /dev/null
+++ 
b/i18n/en/docusaurus-plugin-content-docs/current/12-securityModel/01security-model.md
@@ -0,0 +1,39 @@
+# Security Model
+
+The Apache RocketMQ project itself provides security features such as ACL and 
TLS, but the final security effectiveness still depends on the operator’s 
comprehensive protection of **network, hosts, accounts, and data**.
+
+## 1. Authentication and Authorization (ACL)
+
+- ACL 1.0 has been supported since RocketMQ 4.4.0
+- The more secure **ACL 2.0** was introduced in 5.3.0
+- ACL 1.0 was removed in 5.3.3
+- It is recommended that all users who use Apache RocketMQ ACL migrate to 
**ACL 2.0**
+
+## 2. Dashboard  &  Observability Exposure
+
+RocketMQ Dashboard and some observability components (such as RocketMQ 
Prometheus Exporter) do **not** enable strong authentication by default; anyone 
who can access the HTTP port can read cluster metadata. Strongly recommended:
+
+- Bind the Dashboard listening address to the intranet or a trusted VPC
+- Configure ACL / IP allow-lists on the gateway / Ingress / reverse proxy
+- If public-network operation and maintenance is required, be sure to add a 
VPN, HTTP Basic/OAuth authentication, or a WAF
+
+> Otherwise, information-leakage risks may occur; such risks are the 
responsibility of the deployment side rather than RocketMQ vulnerabilities.
+
+## 3. Transport Encryption and Data Encryption
+
+- Clients and servers can communicate through **TLS** encryption; enable it if 
sensitive data is involved
+- The message body is defined by the business; RocketMQ will **not** parse or 
persist decrypted content
+- If messages contain sensitive information, perform field-level or overall 
encryption on the business side to avoid storing plaintext
+
+## 4. Serialization and Deserialization Risks
+
+- RocketMQ only transmits byte arrays and does **not** perform object 
deserialization
+- If consumers need to deserialize, they should choose secure formats (such as 
**JSON-Binding, Protobuf** etc.) and validate untrusted data
+
+## 5. SDK and Version Management
+
+- Always use the latest official stable client to obtain the latest 
vulnerability fixes and improvements
+
+## 6. Log Management
+
+- Properly keep RocketMQ-related logs (including **Broker, NameServer, Proxy, 
Client**, etc.) to avoid leakage of sensitive information
\ No newline at end of file
diff --git 
a/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-securityModel/01security-model.md
 
b/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-securityModel/01security-model.md
new file mode 100644
index 0000000000..e0b3b1a60c
--- /dev/null
+++ 
b/i18n/en/docusaurus-plugin-content-docs/version-5.0/14-securityModel/01security-model.md
@@ -0,0 +1,39 @@
+# Security Model
+
+The Apache RocketMQ project itself provides security features such as ACL and 
TLS, but the final security effectiveness still depends on the operator’s 
comprehensive protection of **network, hosts, accounts, and data**.
+
+## 1. Authentication and Authorization (ACL)
+
+- ACL 1.0 has been supported since RocketMQ 4.4.0
+- The more secure **ACL 2.0** was introduced in 5.3.0
+- ACL 1.0 was removed in 5.3.3
+- It is recommended that all users who use Apache RocketMQ ACL migrate to 
**ACL 2.0**
+
+## 2. Dashboard  &  Observability Exposure
+
+RocketMQ Dashboard and some observability components (such as RocketMQ 
Prometheus Exporter) do **not** enable strong authentication by default; anyone 
who can access the HTTP port can read cluster metadata. Strongly recommended:
+
+- Bind the Dashboard listening address to the intranet or a trusted VPC
+- Configure ACL / IP allow-lists on the gateway / Ingress / reverse proxy
+- If public-network operation and maintenance is required, be sure to add a 
VPN, HTTP Basic/OAuth authentication, or a WAF
+
+> Otherwise, information-leakage risks may occur; such risks are the 
responsibility of the deployment side rather than RocketMQ vulnerabilities.
+
+## 3. Transport Encryption and Data Encryption
+
+- Clients and servers can communicate through **TLS** encryption; enable it if 
sensitive data is involved
+- The message body is defined by the business; RocketMQ will **not** parse or 
persist decrypted content
+- If messages contain sensitive information, perform field-level or overall 
encryption on the business side to avoid storing plaintext
+
+## 4. Serialization and Deserialization Risks
+
+- RocketMQ only transmits byte arrays and does **not** perform object 
deserialization
+- If consumers need to deserialize, they should choose secure formats (such as 
**JSON-Binding, Protobuf** etc.) and validate untrusted data
+
+## 5. SDK and Version Management
+
+- Always use the latest official stable client to obtain the latest 
vulnerability fixes and improvements
+
+## 6. Log Management
+
+- Properly keep RocketMQ-related logs (including **Broker, NameServer, Proxy, 
Client**, etc.) to avoid leakage of sensitive information
\ No newline at end of file
diff --git a/versioned_docs/version-5.0/14-securityModel/01security-model.md 
b/versioned_docs/version-5.0/14-securityModel/01security-model.md
new file mode 100644
index 0000000000..1090d5a38c
--- /dev/null
+++ b/versioned_docs/version-5.0/14-securityModel/01security-model.md
@@ -0,0 +1,39 @@
+# 安全模型
+
+Apache RocketMQ 项目自身提供了 ACL、TLS 等安全特性,但最终的安全效果仍取决于运维人员对 **网络、主机、账户与数据** 的整体防护。
+
+## 1. 认证与授权(ACL)
+
+- 自 RocketMQ 4.4.0 起支持 ACL 1.0
+- 5.3.0 起引入安全性更高的 **ACL 2.0**
+- 5.3.3 移除了 ACL 1.0
+- 建议所有使用 Apache RocketMQ ACL 的用户迁移到 **ACL 2.0**
+
+## 2. 控制台 (Dashboard) 与可观测组件暴露
+
+RocketMQ Dashboard 及部分可观测组件(例如 RocketMQ Prometheus Exporter)默认不启用强认证,任何可访问 
HTTP 端口的用户都可读取集群元数据。强烈建议:
+
+- Dashboard 监听地址 绑定至内网或受信任 VPC
+- 在 网关 / Ingress / 反向代理 上配置 ACL / IP 白名单
+- 如需公网运维,务必叠加 VPN、HTTP Basic/OAuth 鉴权或 WAF
+
+> 否则可能导致信息泄露风险,该风险属于部署方责任而非 RocketMQ 漏洞。
+
+## 3. 传输加密与数据加密
+
+- 客户端与服务端可通过 TLS 加密通信,若数据中包含敏感信息可以开启
+- 消息体由业务定义,RocketMQ 不会解析或持久化解密后的内容
+- 若消息包含敏感信息,应在业务侧进行字段或整体加密,避免明文落盘
+
+## 4. 序列化与反序列化风险
+
+- RocketMQ 仅传输字节数组,不做对象反序列化
+- 消费端若需反序列化,应选用安全格式(如 JSON-Binding、Protobuf 等),并对不可信数据进行校验
+
+## 5. SDK 与版本管理
+
+- 始终使用官方最新稳定版客户端,以获得最新漏洞修复与改进
+
+## 6. 日志管理
+
+- 请妥善保管 RocketMQ 相关日志(包括 Broker、Namesrver、Proxy、Client等),避免敏感信息泄漏
diff --git a/versioned_docs/version-5.0/14-securityModel/_category_.json 
b/versioned_docs/version-5.0/14-securityModel/_category_.json
new file mode 100644
index 0000000000..a23a247f9b
--- /dev/null
+++ b/versioned_docs/version-5.0/14-securityModel/_category_.json
@@ -0,0 +1,4 @@
+{
+  "label": "安全模型",
+  "position": 14
+}
\ No newline at end of file

Reply via email to