Change SSL ciphers and add ssl_buffer_size
This commit is contained in:
parent
78a7eef119
commit
1b6f8979a5
@ -2,7 +2,7 @@
|
||||
# and recommend further improvements.
|
||||
|
||||
# Don't use outdated SSLv3 protocol. Protects against BEAST and POODLE attacks.
|
||||
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
|
||||
ssl_protocols TLSv1.2 TLSv1.3;
|
||||
|
||||
# Use secure ciphers
|
||||
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA';
|
||||
@ -20,4 +20,10 @@ add_header Strict-Transport-Security "max-age=31536000;";
|
||||
|
||||
# The default key used by DHE is weak and it's recommended to use a 2048 bit key.
|
||||
# Uncomment this line if you have generated a custom key using `cd /etc/ssl/; sudo openssl dhparam -out dhparams.pem 2048`
|
||||
# ssl_dhparam /etc/ssl/dhparams.pem;
|
||||
# ssl_dhparam /etc/ssl/dhparams.pem;
|
||||
|
||||
|
||||
# By default, the buffer size is 16k, which corresponds to minimal overhead when
|
||||
# sending big responses. To minimize Time To First Byte it may be beneficial to
|
||||
# use smaller values.
|
||||
ssl_buffer_size 4k;
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user