[packages/nginx] update ssl paramters

glen glen at pld-linux.org
Sat Apr 16 02:19:20 CEST 2016


commit 548f12d177b34002a5a7b9a9a886114aa979c0c1
Author: Elan Ruusamäe <glen at delfi.ee>
Date:   Sat Apr 16 03:16:14 2016 +0300

    update ssl paramters
    
    from mozilla suggested generated config for Intermediate profile
    
    https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.9.10&openssl=1.0.1e&hsts=yes&profile=intermediate

 nginx.conf | 35 +++++++++++++++++++++++++----------
 1 file changed, 25 insertions(+), 10 deletions(-)
---
diff --git a/nginx.conf b/nginx.conf
index 5e908c8..19abb88 100644
--- a/nginx.conf
+++ b/nginx.conf
@@ -20,20 +20,35 @@ http {
 		listen		80;
 		# listen 443 ssl;
 
-		# Leave only secure protocols (so disable unsecure SSLv2/SSLv3)
-		# ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
-
 		# https://wiki.mozilla.org/Security/Server_Side_TLS
-		# perfect forward secrecy
-		# ssl_prefer_server_ciphers on;
-		# ssl_ciphers "ECDHE-RSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-DSS-AES128-GCM-SHA256 kEDH+AESGCM ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES256-SHA DHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA DHE-DSS-AES128-SHA256 DHE-RSA-AES256-SHA256 DHE-DSS-AES256-SHA DHE-RSA-AES256-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 AES128-SHA256 AES256-SHA256 AES128-SHA AES256-SHA AES CAMELLIA DES-CBC3-SHA !aNULL !eNULL !EXPORT !DES !RC4 !MD5 !PSK !aECDH !EDH-DSS-DES-CBC3-SHA !EDH-RSA-DES-CBC3-SHA !KRB5-DES-CBC3-SHA";
+
+		# Certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
+		#ssl_certificate /etc/nginx/server.crt;
+		#ssl_certificate_key /etc/nginx/server.key;
 
 		# Session resumption (caching)
-		# ssl_session_cache shared:SSL:50m;
-		# ssl_session_timeout 5m;
+		#ssl_session_timeout 1d;
+		#ssl_session_cache shared:SSL:50m;
+		#ssl_session_tickets off;
+
+		# Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
+		#ssl_dhparam /etc/nginx/dhparam.pem;
+
+		# intermediate configuration. tweak to your needs.
+		#ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
+		#ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
+		#ssl_prefer_server_ciphers on;
+
+		# HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
+		#add_header Strict-Transport-Security max-age=15768000;
+
+		# OCSP Stapling ---
+		# fetch OCSP records from URL in ssl_certificate and cache them
+		#ssl_stapling on;
+		#ssl_stapling_verify on;
 
-		# ssl_certificate /etc/nginx/server.crt;
-		# ssl_certificate_key /etc/nginx/server.key;
+		# verify chain of trust of OCSP response using Root CA and Intermediate certs
+		#ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;
 
 		server_name	localhost;
 		access_log	/var/log/nginx/nginx- at type@_access.log main;
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/nginx.git/commitdiff/27ce902f4910989df3a78064af748c5eb190a30e



More information about the pld-cvs-commit mailing list