mirror of
				https://github.com/mail-in-a-box/mailinabox.git
				synced 2025-11-03 19:30:54 +00:00 
			
		
		
		
	update to latest nginx ssl config from konklone
This commit is contained in:
		
							parent
							
								
									b5e21daa98
								
							
						
					
					
						commit
						1094358c73
					
				@ -1,22 +1,6 @@
 | 
			
		||||
# from: https://gist.github.com/konklone/6532544
 | 
			
		||||
###################################################################################
 | 
			
		||||
 | 
			
		||||
# Basically the nginx configuration I use at konklone.com. 
 | 
			
		||||
# I check it using https://www.ssllabs.com/ssltest/analyze.html?d=konklone.com
 | 
			
		||||
#
 | 
			
		||||
# To provide feedback, please tweet at @konklone or email eric@konklone.com.
 | 
			
		||||
# Comments on gists don't notify the author. 
 | 
			
		||||
# 
 | 
			
		||||
# Thanks to WubTheCaptain (https://wubthecaptain.eu) for his help and ciphersuites.
 | 
			
		||||
# Thanks to Ilya Grigorik (https://www.igvita.com) for constant inspiration.
 | 
			
		||||
 | 
			
		||||
# Path to certificate and private key.
 | 
			
		||||
# The .crt may omit the root CA cert, if it's a standard CA that ships with clients.
 | 
			
		||||
#ssl_certificate /path/to/unified.crt;
 | 
			
		||||
#ssl_certificate_key /path/to/my-private-decrypted.key;
 | 
			
		||||
 | 
			
		||||
# Tell browsers to require SSL (warning: difficult to change your mind)
 | 
			
		||||
add_header Strict-Transport-Security max-age=31536000;
 | 
			
		||||
# HTTP Strict Transport Security: tells browsers to require https:// without first checking
 | 
			
		||||
# the http:// version for a redirect.
 | 
			
		||||
# add_header Strict-Transport-Security 'max-age=31536000';
 | 
			
		||||
 | 
			
		||||
# Prefer certain ciphersuites, to enforce Forward Secrecy and avoid known vulnerabilities.
 | 
			
		||||
# 
 | 
			
		||||
@ -27,9 +11,7 @@ add_header Strict-Transport-Security max-age=31536000;
 | 
			
		||||
ssl_prefer_server_ciphers on;
 | 
			
		||||
ssl_ciphers 'kEECDH+ECDSA+AES128 kEECDH+ECDSA+AES256 kEECDH+AES128 kEECDH+AES256 kEDH+AES128 kEDH+AES256 DES-CBC3-SHA +SHA !aNULL !eNULL !LOW !MD5 !EXP !DSS !PSK !SRP !kECDH !CAMELLIA !RC4 !SEED';
 | 
			
		||||
 | 
			
		||||
# Cut out (the old, broken) SSLv3 entirely. 
 | 
			
		||||
# This **excludes IE6 users** and (apparently) Yandexbot.
 | 
			
		||||
# Just comment out if you need to support IE6, bless your soul.
 | 
			
		||||
# Cut out the old, broken, insecure SSLv2 and SSLv3 entirely. 
 | 
			
		||||
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
 | 
			
		||||
 | 
			
		||||
# Turn on session resumption, using a 10 min cache shared across nginx processes,
 | 
			
		||||
@ -53,14 +35,11 @@ spdy_headers_comp 0;
 | 
			
		||||
#
 | 
			
		||||
# Generated by OpenSSL with the following command:
 | 
			
		||||
#   openssl dhparam -outform pem -out dhparam2048.pem 2048
 | 
			
		||||
# 
 | 
			
		||||
# Note: raising the bits to 2048 excludes Java 6 clients. Comment out if a problem.
 | 
			
		||||
ssl_dhparam STORAGE_ROOT/ssl/dh2048.pem;
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
# OCSP stapling - means nginx will poll the CA for signed OCSP responses, 
 | 
			
		||||
# and send them to clients so clients don't make their own OCSP calls.
 | 
			
		||||
# http://en.wikipedia.org/wiki/OCSP_stapling
 | 
			
		||||
# https://en.wikipedia.org/wiki/OCSP_stapling
 | 
			
		||||
# 
 | 
			
		||||
# while the ssl_certificate above may omit the root cert if the CA is trusted,
 | 
			
		||||
# ssl_trusted_certificate below must point to a chain of **all** certs
 | 
			
		||||
 | 
			
		||||
		Loading…
	
		Reference in New Issue
	
	Block a user