Merge pull request #35 from jzelinskie/tls
Update lots of stuff in regards to TLS
This commit is contained in:
commit
66dad67661
3 changed files with 28 additions and 13 deletions
|
@ -7,18 +7,26 @@ http {
|
||||||
include hosted-http-base.conf;
|
include hosted-http-base.conf;
|
||||||
include rate-limiting.conf;
|
include rate-limiting.conf;
|
||||||
|
|
||||||
|
ssl_certificate ./stack/ssl.cert;
|
||||||
|
ssl_certificate_key ./stack/ssl.key;
|
||||||
|
ssl_ciphers "ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
|
||||||
|
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
||||||
|
ssl_session_cache shared:SSL:10m;
|
||||||
|
ssl_session_timeout 5m;
|
||||||
|
ssl_stapling on;
|
||||||
|
ssl_stapling_verify on;
|
||||||
|
ssl_prefer_server_ciphers on;
|
||||||
|
|
||||||
server {
|
server {
|
||||||
include server-base.conf;
|
include server-base.conf;
|
||||||
|
|
||||||
listen 443 default;
|
listen 443 default;
|
||||||
|
|
||||||
ssl on;
|
ssl on;
|
||||||
ssl_certificate ./stack/ssl.cert;
|
|
||||||
ssl_certificate_key ./stack/ssl.key;
|
# This header must be set only for HTTPS
|
||||||
ssl_session_timeout 5m;
|
add_header Strict-Transport-Security "max-age=63072000; preload";
|
||||||
ssl_protocols SSLv3 TLSv1;
|
|
||||||
ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP;
|
|
||||||
ssl_prefer_server_ciphers on;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
|
@ -28,11 +36,8 @@ http {
|
||||||
listen 8443 default proxy_protocol;
|
listen 8443 default proxy_protocol;
|
||||||
|
|
||||||
ssl on;
|
ssl on;
|
||||||
ssl_certificate ./stack/ssl.cert;
|
|
||||||
ssl_certificate_key ./stack/ssl.key;
|
# This header must be set only for HTTPS
|
||||||
ssl_session_timeout 5m;
|
add_header Strict-Transport-Security "max-age=63072000; preload";
|
||||||
ssl_protocols SSLv3 TLSv1;
|
|
||||||
ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP;
|
|
||||||
ssl_prefer_server_ciphers on;
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -8,6 +8,11 @@ if ($args ~ "_escaped_fragment_") {
|
||||||
rewrite ^ /snapshot$uri;
|
rewrite ^ /snapshot$uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Disable the ability to be embedded into iframes
|
||||||
|
add_header X-Frame-Options DENY;
|
||||||
|
|
||||||
|
|
||||||
|
# Proxy Headers
|
||||||
proxy_set_header X-Forwarded-For $proper_forwarded_for;
|
proxy_set_header X-Forwarded-For $proper_forwarded_for;
|
||||||
proxy_set_header X-Forwarded-Proto $scheme;
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
proxy_set_header Host $http_host;
|
proxy_set_header Host $http_host;
|
||||||
|
|
|
@ -98,6 +98,11 @@
|
||||||
A valid SSL certificate and private key files are required to use this option.
|
A valid SSL certificate and private key files are required to use this option.
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
|
<div class="co-alert co-alert-info" ng-if="config.PREFERRED_URL_SCHEME == 'https'">
|
||||||
|
Enabling SSL also enables <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security">HTTP Strict Transport Security</a>.<br/>
|
||||||
|
This prevents downgrade attacks and cookie theft, but browsers will reject all future insecure connections on this hostname.
|
||||||
|
</div>
|
||||||
|
|
||||||
<table class="config-table" ng-if="config.PREFERRED_URL_SCHEME == 'https'">
|
<table class="config-table" ng-if="config.PREFERRED_URL_SCHEME == 'https'">
|
||||||
<tr>
|
<tr>
|
||||||
<td class="non-input">Certificate:</td>
|
<td class="non-input">Certificate:</td>
|
||||||
|
|
Reference in a new issue