]> git.pld-linux.org Git - packages/nginx.git/commitdiff
update ssl paramters
authorElan Ruusamäe <glen@delfi.ee>
Sat, 16 Apr 2016 00:16:14 +0000 (03:16 +0300)
committerElan Ruusamäe <glen@delfi.ee>
Sat, 16 Apr 2016 00:16:14 +0000 (03:16 +0300)
from mozilla suggested generated config for Intermediate profile

https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.9.10&openssl=1.0.1e&hsts=yes&profile=intermediate

nginx.conf

index 5e908c89a34b5519c43a4d73e2e6bcb2dda7835d..19abb8871166d2150258e1df1230f15da7728b8b 100644 (file)
@@ -20,20 +20,35 @@ http {
                listen          80;
                # listen 443 ssl;
 
-               # Leave only secure protocols (so disable unsecure SSLv2/SSLv3)
-               # ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
-
                # https://wiki.mozilla.org/Security/Server_Side_TLS
-               # perfect forward secrecy
-               # ssl_prefer_server_ciphers on;
-               # ssl_ciphers "ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-DSS-AES128-GCM-SHA256 kEDH+AESGCM ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-DSS-AES128-SHA256 DHE-RSA-AES256-SHA256 DHE-DSS-AES256-SHA DHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA AES CAMELLIA DES-CBC3-SHA !aNULL !eNULL !EXPORT !DES !RC4 !MD5 !PSK !aECDH !EDH-DSS-DES-CBC3-SHA !EDH-RSA-DES-CBC3-SHA !KRB5-DES-CBC3-SHA";
+
+               # Certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
+               #ssl_certificate /etc/nginx/server.crt;
+               #ssl_certificate_key /etc/nginx/server.key;
 
                # Session resumption (caching)
-               # ssl_session_cache shared:SSL:50m;
-               # ssl_session_timeout 5m;
+               #ssl_session_timeout 1d;
+               #ssl_session_cache shared:SSL:50m;
+               #ssl_session_tickets off;
+
+               # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
+               #ssl_dhparam /etc/nginx/dhparam.pem;
+
+               # intermediate configuration. tweak to your needs.
+               #ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
+               #ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
+               #ssl_prefer_server_ciphers on;
+
+               # HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
+               #add_header Strict-Transport-Security max-age=15768000;
+
+               # OCSP Stapling ---
+               # fetch OCSP records from URL in ssl_certificate and cache them
+               #ssl_stapling on;
+               #ssl_stapling_verify on;
 
-               # ssl_certificate /etc/nginx/server.crt;
-               # ssl_certificate_key /etc/nginx/server.key;
+               # verify chain of trust of OCSP response using Root CA and Intermediate certs
+               #ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;
 
                server_name     localhost;
                access_log      /var/log/nginx/nginx-@type@_access.log main;
This page took 0.267577 seconds and 4 git commands to generate.