| Commit message (Collapse) | Author | Age | Files | Lines |
|\
| |
| | |
Comment SSLCACertificateFile
|
| | |
|
|\ \
| | |
| | | |
Update oldApache TLS support message
|
| |/
| |
| | |
Apache 2.2.23 and newer support TLS 1.1 and 1.2
|
|\ \
| | |
| | | |
use preferred haproxy header manipulation method
|
| |/ |
|
| | |
|
|/
|
|
|
|
| |
GitHub pages now support enforcing HTTPS (which has been enabled in
#144), so the client-side redirect can now be removed. See:
https://help.github.com/articles/securing-your-github-pages-site-with-https/
|
|
|
|
| |
Fix #128.
|
|
|
| |
Redirects with 301 HTTP to HTTPS and adds cipher and options by default to all SSL binds and servers.
|
| |
|
|\ |
|
| |\
| | |
| | | |
Add nginx HTTPS redirect with HSTS, HTTP/2, and IPv6
|
| | |
| | |
| | |
| | |
| | |
| | | |
- Enable HTTP/2 with nginx >=1.9.5
- Always listen on both IPv4 and IPv6
- Include a HTTP to HTTPS redirect when using HSTS
|
| | |
| | |
| | | |
Fix for #114
|
|/ / |
|
|/
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This commit is the result of several months of discussions and
maturation. It represents the state of the art in TLS configurations. It
has been rebased, but the history is shown below and can be read at:
https://github.com/mozilla/server-side-tls/pull/97
- V4: updated levels, added JSON
- Remove DHE from modern, add ChaCha20
- prefer aes256 in modern, add ecdh size parameter
- Remove TLSv1.1 from modern level
- Prefer AES256-GCM to ChaCha20 in modern configuration
- Recommend ECDSAWithSHA384 as cert signature in modern conf
- Remove unused document signature
- Change recommended curve in Modern to P256
- Convert certificate types, curves and signatures to lists to support multiple acceptable values
- readd EDH-RSA-DES-CBC3-SHA to intermediate and old
- Add DHE-RSA-AES256-GCM-SHA384 to intermediate level
- rename json keys
- Revisit old ciphersuites
- Update wiki document with latest recommendations and rationales
- Add paragraph on certificates switching
- Remove configuration samples & cleanup some stuff
- reset changes to conf generator
|
| |
|
|
|
| |
Rather than set the SSL default configuration inside of each virtual host, set it at the server level. Only virtual host specific customizations/overrides should be inside of the VirtualHost.
|
|\
| |
| | |
Updated checking version of Apache and hide unsupported directive
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
- SSLCompression is available in httpd version 2.2.24 or later. (with
OpenSSL 0.9.8)
- SSLSessionTickets is available in httpd version 2.4.11 or later.
https://httpd.apache.org/docs/2.2/mod/mod_ssl.html
https://httpd.apache.org/docs/2.4/mod/mod_ssl.html
|
|\ \
| | |
| | | |
nginx: ssl_session_tickets appeared first in 1.5.9
|
| |/
| |
| |
| |
| |
| | |
See http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_tickets
Also, replicate OpenSSL version constrain from 'case "apache"'.
|
|\ \
| |/
|/| |
Lighttpd support + tweaks
|
| |
| |
| | |
Fixed intermediary level lighttpd settings (SSLv3 should be disabled)
|
| |
| |
| | |
Quick fixes.
|
| |
| |
| | |
Added some lighttpd support, updated version numbers, implemented a tweak to snag the latest version from the array when switching between software configs
|
|\ \
| | |
| | | |
Apache 2.2.23 and up also support TLS 1.1 and 1.2
|
| | | |
|
| | |
| | |
| | | |
Closes #62
|
|\ \ \
| | | |
| | | | |
Disable TLS tickets by default
|
| | |/
| |/|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
By default, all servers enable TLS tickets. However, the keys are only renewed on server restart, leasing to the unfortunate situation that the secret key for the tickets doesn't change for a long time which effectively destroys the perfect-forward-secrecy guarantee. While all servers allow to specify a file which contains the key on disk, it is generally recommended to not use this as this allows the key to leak under effectively the same situations the private key could leak, which again defeats the purpose of PFS.
The use of server-stored sessions (identified by session ids) is not affected by this and is always safe.
Because of this, The Document™ specifies at https://wiki.mozilla.org/Security/Server_Side_TLS#TLS_tickets_.28RFC_5077.29 that support for TLS tickets should be disabled if possible. This patch adds the relevant config options.
Note that Apache only supports this setting since 2.2.30 when used with OpenSSL >= 0.9.8f - http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslsessiontickets
Some versions of HAProxy (i.e >= 1.6-dev2 allow to set the key via the stats socket. This however requires custom scripts and good maintenance on the side of the operator. A safe default in any case is to disable session tickets.
|
| | | |
|
|/ / |
|
| | |
|
| | |
|
|/
|
|
| |
Fixes #60
|
|
|
| |
In version 3.6 of the Server Side TLS document, the DH size in the intermediate was bumped to 2048 bits. With ECDHE available in the cipher list, even Java 7 should be able to connect. See https://wiki.mozilla.org/Security/Server_Side_TLS#DHE_and_Java for more information.
|
|
|
| |
aws.amazon.com and en.wikipedia.org support HTTPS. So update these links to: https://aws.amazon.com/cloudformation/, https://aws.amazon.com/elasticloadbalancing/, and https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security.
|
|
|
| |
Is it better to use "Header always set Strict-Transport-Security" than "Header always add Strict-Transport-Security", in order to prevent adding duplicate HSTS headers?
|
| |
|
|\ |
|
| |\
| | |
| | | |
Adding ELB template generation
|
| | | |
|
| |/ |
|
|/
|
|
|
| |
This fixes Safari not seeing the tooltip
This doesn't solve mobile devices not being able to mouseover
|
| |
|
|
|
|
|
| |
This autocomplete allows for typing in values not present in the list which should accommodate new web server and openssl versions that come out over time
Fixes #39
|
|
|
|
| |
Fixing permalink when fallbackprofile is used
|
|
|
|
|
|
| |
Restructuring profile data
Changing default profile to intermediate
Fixes #37
|
|\
| |
| | |
Max DH Key size is constrained by Java support
|
| |
| |
| |
| | |
Fixes #31
|
| |
| |
| |
| |
| | |
This is recommended here : https://docs.google.com/presentation/d/1BH9DI1XlmukCzU2i8OvxLIfgQf_aGlZgZyvWDSyYyzs/present?slide=id.g41fa27ab0_4_18
Relates to PR #24
|
|\ \ |
|
| |\ \
| | | |
| | | |
| | | |
| | | | |
# Conflicts:
# ssl-config-generator/index.html
|
| | |/
| |/| |
|
| | | |
|
| |/
|/| |
|
|\ \
| |/
|/| |
Adding new semver test for OpenSSL grammar and code to disable `modern` profile for old versions of OpenSSL
|
| |
| |
| |
| | |
Adding detail to message about modern profile being unavailable
|
| |
| |
| |
| |
| |
| |
| | |
profile for old versions of OpenSSL
Setting more common default values for Apache and OpenSSL
Resolves #26
|
|\ \
| | |
| | | |
Conditionally displays SSLCertificateChainFile based on Apache version
|
| | |
| | |
| | |
| | | |
Resolves Issue #21
|
|\ \ \
| |_|/
|/| | |
Implement 'permalinks'
|
| |/ |
|
| | |
|
|/ |
|
|
|
|
| |
Resolves #18
|
| |
|
| |
|
|
|
|
| |
Added tabzilla
|
|
|
|
|
|
| |
error pages and redirects.
Resolves #16
|
|
|
|
|
|
| |
seconds to months
Resolves #15
|
|
|
|
|
|
| |
work correctly as the per `listen` directive ssl arguments weren't available at that point.
Relates to Issue #12
|
|
|
|
| |
Resolves #14
|
| |
|
|
|
|
| |
Resolves #2
|
|
|
| |
Resolves #6
|
| |
|
|
|
|
|
|
| |
nginx config.
Fixes #1
|
|
|
|
| |
http://httpd.apache.org/docs/current/mod/mod_ssl.html#sslstaplingcache
|
| |
|
| |
|
|
|