[packages/nginx] update ssl paramters
glen
glen at pld-linux.org
Sat Apr 16 02:19:20 CEST 2016
commit 548f12d177b34002a5a7b9a9a886114aa979c0c1
Author: Elan Ruusamäe <glen at delfi.ee>
Date: Sat Apr 16 03:16:14 2016 +0300
update ssl paramters
from mozilla suggested generated config for Intermediate profile
https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.9.10&openssl=1.0.1e&hsts=yes&profile=intermediate
nginx.conf | 35 +++++++++++++++++++++++++----------
1 file changed, 25 insertions(+), 10 deletions(-)
---
diff --git a/nginx.conf b/nginx.conf
index 5e908c8..19abb88 100644
--- a/nginx.conf
+++ b/nginx.conf
@@ -20,20 +20,35 @@ http {
listen 80;
# listen 443 ssl;
- # Leave only secure protocols (so disable unsecure SSLv2/SSLv3)
- # ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
-
# https://wiki.mozilla.org/Security/Server_Side_TLS
- # perfect forward secrecy
- # ssl_prefer_server_ciphers on;
- # ssl_ciphers "ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-DSS-AES128-GCM-SHA256 kEDH+AESGCM ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-DSS-AES128-SHA256 DHE-RSA-AES256-SHA256 DHE-DSS-AES256-SHA DHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA AES CAMELLIA DES-CBC3-SHA !aNULL !eNULL !EXPORT !DES !RC4 !MD5 !PSK !aECDH !EDH-DSS-DES-CBC3-SHA !EDH-RSA-DES-CBC3-SHA !KRB5-DES-CBC3-SHA";
+
+ # Certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
+ #ssl_certificate /etc/nginx/server.crt;
+ #ssl_certificate_key /etc/nginx/server.key;
# Session resumption (caching)
- # ssl_session_cache shared:SSL:50m;
- # ssl_session_timeout 5m;
+ #ssl_session_timeout 1d;
+ #ssl_session_cache shared:SSL:50m;
+ #ssl_session_tickets off;
+
+ # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
+ #ssl_dhparam /etc/nginx/dhparam.pem;
+
+ # intermediate configuration. tweak to your needs.
+ #ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
+ #ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
+ #ssl_prefer_server_ciphers on;
+
+ # HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
+ #add_header Strict-Transport-Security max-age=15768000;
+
+ # OCSP Stapling ---
+ # fetch OCSP records from URL in ssl_certificate and cache them
+ #ssl_stapling on;
+ #ssl_stapling_verify on;
- # ssl_certificate /etc/nginx/server.crt;
- # ssl_certificate_key /etc/nginx/server.key;
+ # verify chain of trust of OCSP response using Root CA and Intermediate certs
+ #ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;
server_name localhost;
access_log /var/log/nginx/nginx- at type@_access.log main;
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/nginx.git/commitdiff/27ce902f4910989df3a78064af748c5eb190a30e
More information about the pld-cvs-commit
mailing list