33 lines
1.1 KiB
Plaintext
33 lines
1.1 KiB
Plaintext
#
|
|
# NGINX SSL configuration (https://ssl-config.mozilla.org)
|
|
# 'Intermediate' profile for NGINX (TLS 1.2+)
|
|
# Generated: January 5, 2021
|
|
#
|
|
|
|
# SSL certificates should be defined in the relevant server block
|
|
|
|
# SSL parameters
|
|
ssl_session_timeout 1d;
|
|
ssl_session_cache shared:SSL:10m;
|
|
ssl_session_tickets off;
|
|
|
|
# SSL protocols and ciphers
|
|
ssl_protocols TLSv1.2 TLSv1.3;
|
|
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
|
|
ssl_prefer_server_ciphers off;
|
|
|
|
# Diffie-Hellman parameter for DHE cipher suites, using 4096 bits
|
|
ssl_dhparam /certs/dhparam.pem;
|
|
|
|
# HSTS (6 months = 15768000 seconds)
|
|
#add_header Strict-Transport-Security "max-age=15768000" always;
|
|
|
|
# OCSP Stapling
|
|
# fetch OCSP records from URL in ssl_certificate and cache them
|
|
ssl_stapling on;
|
|
ssl_stapling_verify on;
|
|
|
|
# verify chain of trust of OCSP response using Root CA and Intermediate certs
|
|
ssl_trusted_certificate /certs/chain.pem;
|
|
|
|
# resolver should be specified in nginx.conf or in networking configuration |