Skip to content
Snippets Groups Projects
Commit d94503c3 authored by nimrod's avatar nimrod
Browse files

SSL legacy support.

Up to now I supported older browsers by supporting older versions of TLS
and cipher suites. I still think it makes sense for my blog, etc. but
not for Nextcloud or GitLab. So here's the first step, make the previous
default SSL configuration be ssl-legacy (split out the common parts to
ssl-common) and next is ssl-modern.
parent 28413e0e
No related branches found
No related tags found
No related merge requests found
...@@ -8,6 +8,6 @@ server { ...@@ -8,6 +8,6 @@ server {
server { server {
listen 443 ssl http2 default_server; listen 443 ssl http2 default_server;
listen [::]:443 ssl http2 default_server; listen [::]:443 ssl http2 default_server;
include snippets/ssl.conf; include snippets/ssl-legacy.conf;
location / { return 301 https://www.shore.co.il$request_uri; } location / { return 301 https://www.shore.co.il$request_uri; }
} }
map $host $matrix { default synapse; }
server {
listen 80;
listen [::]:80;
server_name matrix.shore.co.il;
include snippets/robots-disallow-all.conf;
include snippets/ads-txt.conf;
include snippets/security-txt.conf;
include snippets/www-acme-challenge.conf;
include snippets/redirect-https.conf;
}
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name matrix.shore.co.il;
include snippets/robots-disallow-all.conf;
include snippets/ads-txt.conf;
include snippets/security-txt.conf;
include snippets/ssl.conf;
location / {
proxy_pass http://$matrix:8008;
proxy_http_version 1.1;
client_max_body_size 512m;
include snippets/proxy-headers.conf;
}
location /_synapse/admin {
proxy_pass http://$matrix:8008;
proxy_http_version 1.1;
client_max_body_size 512m;
include snippets/proxy-headers.conf;
include snippets/allow-shore-ips.conf;
}
}
...@@ -4,8 +4,6 @@ include snippets/common-headers.conf; ...@@ -4,8 +4,6 @@ include snippets/common-headers.conf;
ssl_certificate /var/ssl/site.crt; ssl_certificate /var/ssl/site.crt;
ssl_certificate_key /var/ssl/site.key; ssl_certificate_key /var/ssl/site.key;
ssl_dhparam /var/ssl/dhparams; ssl_dhparam /var/ssl/dhparams;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_ciphers !AESCCM:!kRSA:!3DES:!RC4:!DES:!MD5:!aNULL:!NULL:AESGCM+ECDH:ECDH+CHACHA20:AES256+ECDH:AES128:CHACHA20:+SHA1;
ssl_prefer_server_ciphers on; ssl_prefer_server_ciphers on;
ssl_session_cache shared:SSL:50m; ssl_session_cache shared:SSL:50m;
ssl_session_timeout 5m; ssl_session_timeout 5m;
......
include snippets/ssl-common.conf;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;
ssl_ciphers !AESCCM:!kRSA:!3DES:!RC4:!DES:!MD5:!aNULL:!NULL:AESGCM+ECDH:ECDH+CHACHA20:AES256+ECDH:AES128:CHACHA20:+SHA1;
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment