commit: 51f6e1e4c920c494b0565b893a99540430139767
parent aa9c49838c8eb6ad91bc278c91848cd94cfebe8c
Author: Haelwenn (lanodan) Monnier <contact@hacktivis.me>
Date:   Thu, 16 Feb 2017 15:52:22 +0100
antisèche-nginx: Simplification et suppression de DHE
Diffstat:
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/antisèche-nginx.shtml b/antisèche-nginx.shtml
@@ -36,9 +36,9 @@ server {
 	ssl_certificate_key ssl/hacktivis.me.key; # pour RSA mettre du 3072 bits minimum
 
 	# Merci <a href="https://blog.imirhil.fr/cryptcheck-verifiez-vos-implementations-de-tls.html">aeris</a> ;3
-	ssl_ciphers 'EECDH+CHACHA20:EECDH+AESGCM:DHE+CHACHA20:DHE+AESGCM'; # or EECDH+CHACHA20:EECDH+AES:DHE+CHACHA20:DHE+AES:+SHA
+	ssl_ciphers 'EECDH+CHACHA20:EECDH+AESGCM'; # or EECDH+CHACHA20:EECDH+AES:DHE+CHACHA20:DHE+AES:+SHA
 	ssl_prefer_server_ciphers on; # Parceque les clients on une config TLS toute pouritte
-	ssl_protocols +TLSv1.2 -TLSv1.1 -TLSv1 -SSLv3 -SSLv2; # POODLE sur ≤TLS1.1
+	ssl_protocols TLSv1.2; # POODLE sur ≤TLS1.1
 	ssl_dhparam ssl/dhparam.pem; # “openssl dhparam -out dhparam.pem 2048” (4096 est <strong>très</strong> long)
 	ssl_dhparam secp384r1:secp521r1; # if("failed: unknown curve"): ssl_dhparam secp384r1;
 	ssl_stapling on;