CT Nginx: Disable OCSP/ssl_stapling by default
Disableing this due to LE dropping support for it on May 7th, 2025
This commit is contained in:
@@ -37,8 +37,6 @@ http {
|
|||||||
ssl_ecdh_curve secp384r1;
|
ssl_ecdh_curve secp384r1;
|
||||||
ssl_session_cache shared:le_nginx_SSL:1m;
|
ssl_session_cache shared:le_nginx_SSL:1m;
|
||||||
ssl_session_timeout 1440m;
|
ssl_session_timeout 1440m;
|
||||||
ssl_stapling on;
|
|
||||||
ssl_stapling_verify on;
|
|
||||||
ssl_prefer_server_ciphers on;
|
ssl_prefer_server_ciphers on;
|
||||||
ssl_protocols TLSv1.2 TLSv1.3;
|
ssl_protocols TLSv1.2 TLSv1.3;
|
||||||
ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";
|
ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";
|
||||||
|
|||||||
@@ -64,7 +64,7 @@ if $request; then
|
|||||||
service nginx reload
|
service nginx reload
|
||||||
|
|
||||||
#Enabling SSL
|
#Enabling SSL
|
||||||
/opt/acmesh/acme.sh --config-home '/etc/acmesh/data' --issue --nginx --ocsp --keylength 'ec-384' -d "$domain"
|
/opt/acmesh/acme.sh --config-home '/etc/acmesh/data' --issue --nginx --keylength 'ec-384' -d "$domain"
|
||||||
certsatus=$?
|
certsatus=$?
|
||||||
|
|
||||||
if test $certsatus -eq 0
|
if test $certsatus -eq 0
|
||||||
|
|||||||
Reference in New Issue
Block a user