Use nginx's official repo and improve TLS configuration
These packagea are newer than the 15.04 we had. We can enable HTTP2
This commit is contained in:
@@ -0,0 +1,14 @@
|
||||
# Improve performance
|
||||
ssl_session_timeout 1d;
|
||||
ssl_session_cache shared:SSL:50m;
|
||||
ssl_session_tickets off;
|
||||
# Disable insecure cyphers
|
||||
ssl_protocols TLSv1.2;
|
||||
ssl_prefer_server_ciphers on;
|
||||
# From https://mozilla.github.io/server-side-tls/ssl-config-generator/
|
||||
# Oldest compatible clients: Firefox 27, Chrome 30, IE 11 on Windows 7, Edge, Opera 17, Safari 9, Android 5.0, and Java 8
|
||||
# We don't have a lot of those cyphers (using Ubuntu 15.04), but CBC is insecure:
|
||||
# https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
|
||||
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';
|
||||
# Unique DH Group, see https://weakdh.org/sysadmin.html
|
||||
ssl_dhparam /etc/ssl/private/dhparams.pem;
|
||||
Reference in New Issue
Block a user