refactor(CONFIG): update SSL configurations
This commit is contained in:
parent
5433019e2f
commit
ccc303f597
@ -1,10 +1,8 @@
|
|||||||
#######
|
#
|
||||||
### NGINX SSL configuration
|
# NGINX SSL configuration (https://ssl-config.mozilla.org)
|
||||||
### Generated using the Mozilla SSL Configuration Generator
|
# 'Intermediate' profile for NGINX (TLS 1.2+)
|
||||||
### (https://ssl-config.mozilla.org)
|
# Generated: January 5, 2021
|
||||||
### 'Intermediate' profile for NGINX 1.17 with OpenSSL 1.1.1c HSTS optional
|
#
|
||||||
### Last generated: October 16, 2019
|
|
||||||
#######
|
|
||||||
|
|
||||||
# SSL certificates should be defined in the relevant server block
|
# SSL certificates should be defined in the relevant server block
|
||||||
|
|
||||||
@ -15,7 +13,8 @@ ssl_session_tickets off;
|
|||||||
|
|
||||||
# SSL protocols and ciphers
|
# SSL protocols and ciphers
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;ssl_prefer_server_ciphers off;
|
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
|
||||||
|
ssl_prefer_server_ciphers off;
|
||||||
|
|
||||||
# Diffie-Hellman parameter for DHE cipher suites, using 4096 bits
|
# Diffie-Hellman parameter for DHE cipher suites, using 4096 bits
|
||||||
ssl_dhparam /certs/dhparam.pem;
|
ssl_dhparam /certs/dhparam.pem;
|
||||||
@ -31,4 +30,4 @@ ssl_stapling_verify on;
|
|||||||
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
||||||
ssl_trusted_certificate /certs/chain.pem;
|
ssl_trusted_certificate /certs/chain.pem;
|
||||||
|
|
||||||
# resolver should be specified in nginx.conf or in networking configuration
|
# resolver should be specified in nginx.conf or in networking configuration
|
@ -1,10 +1,8 @@
|
|||||||
#######
|
#
|
||||||
### NGINX SSL configuration
|
# NGINX SSL configuration (https://ssl-config.mozilla.org)
|
||||||
### Generated using the Mozilla SSL Configuration Generator
|
# 'Modern' profile for NGINX (TLS 1.3 only)
|
||||||
### (https://ssl-config.mozilla.org)
|
# Generated: January 5, 2021
|
||||||
### 'Modern' profile for NGINX 1.17 with OpenSSL 1.1.1c HSTS optional
|
#
|
||||||
### Last generated: October 16, 2019
|
|
||||||
#######
|
|
||||||
|
|
||||||
# SSL certificates should be defined in the relevant server block
|
# SSL certificates should be defined in the relevant server block
|
||||||
|
|
||||||
@ -28,4 +26,4 @@ ssl_stapling_verify on;
|
|||||||
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
||||||
ssl_trusted_certificate /certs/chain.pem;
|
ssl_trusted_certificate /certs/chain.pem;
|
||||||
|
|
||||||
# resolver should be specified in nginx.conf or in networking configuration
|
# resolver should be specified in nginx.conf or in networking configuration
|
Loading…
Reference in New Issue
Block a user