diff --git a/src/nginxconfig.ejs b/src/nginxconfig.ejs index efbcc989f..c21a1ab4e 100644 --- a/src/nginxconfig.ejs +++ b/src/nginxconfig.ejs @@ -58,17 +58,16 @@ server { ssl_certificate <%= certFilePath %>; ssl_certificate_key <%= keyFilePath %>; ssl_session_timeout 5m; - ssl_session_cache shared:SSL:50m; + ssl_session_cache shared:MozSSL:10m; # about 40000 sessions + ssl_session_tickets off; - # https://bettercrypto.org/static/applied-crypto-hardening.pdf - # https://mozilla.github.io/server-side-tls/ssl-config-generator/ - # https://cipherli.st/ # https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html - ssl_prefer_server_ciphers on; - ssl_protocols TLSv1.2 TLSv1.3; # don't use SSLv3 ref: POODLE + # https://github.com/ssllabs/research/wiki/SSL-and-TLS-Deployment-Best-Practices#25-use-forward-secrecy + # ciphers according to https://ssl-config.mozilla.org/#server=nginx&version=1.14.0&config=intermediate&openssl=1.1.1&guideline=5.4 + ssl_protocols TLSv1.2 TLSv1.3; + ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; + ssl_prefer_server_ciphers off; - # ciphers according to https://mozilla.github.io/server-side-tls/ssl-config-generator/?server=nginx-1.10.3&openssl=1.0.2g&hsts=yes&profile=modern - ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256'; ssl_dhparam /home/yellowtent/boxdata/dhparams.pem; add_header Strict-Transport-Security "max-age=15768000";