nginx-basic/etc/nginx/conf.d/mozModern_ssl.conf

40 lines
1.6 KiB
Plaintext

#######
### NGINX SSL configuration
### Generated with help from Mozilla Configuration Generator
### (https://mozilla.github.io/server-side-tls/ssl-config-generator/)
### 'Modern' profile for NGINX 1.15.8 with OpenSSL 1.1.1b HSTS optional
### Last generated: January 4, 2019
#######
# SSL certificates should be defined in the relevant server block
# SSL parameters
ssl_session_timeout 1d;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
# SSL ciphers
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers 'TLS-CHACHA20-POLY1305-SHA256:TLS-AES-256-GCM-SHA384:TLS-AES-128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
ssl_prefer_server_ciphers on;
# if your NGINX build supports this and is using TLSv1.3, then enable
#ssl_early_data on;
# Diffie-Hellman parameter for DHE cipher suites, using 4096 bits
ssl_dhparam <path/to/your_dhparam.pem>;
# HSTS -- please understand the implications of HSTS before enabling it
# do NOT implement while still testing configurations or site parameters
# (15768000 seconds = 6 months)
#add_header Strict-Transport-Security max-age=15768000;
# OCSP Stapling
# fetch OCSP records from URL in ssl_certificate and cache them
ssl_stapling on;
ssl_stapling_verify on;
# verify chain of trust of OCSP response using Root CA and Intermediate certs
ssl_trusted_certificate <path/to/your_CA_bundle.crt>;
# resolver should be specified in nginx.conf or in networking configuration