diff --git a/config/nginx/nginx.conf b/config/nginx/nginx.conf index 3d2209d..e6b253a 100644 --- a/config/nginx/nginx.conf +++ b/config/nginx/nginx.conf @@ -15,7 +15,7 @@ upstream frontend server { - listen 443 ssl; # managed by Certbot + listen 443 ssl http2; # managed by Certbot server_tokens off; server_name crm.logidex.ru www.crm.logidex.ru; @@ -28,7 +28,7 @@ server ssl_certificate /var/www/certbot/live/crm.logidex.ru/fullchain.pem; # managed by Certbot ssl_certificate_key /var/www/certbot/live/crm.logidex.ru/privkey.pem; # managed by Certbot - add_header Strict-Transport-Security "max-age=63072000" always; + add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" always; # intermediate configuration @@ -37,7 +37,7 @@ server ssl_session_cache shared:le_nginx_SSL:10m; ssl_session_timeout 1440m; ssl_session_tickets off; - ssl_prefer_server_ciphers off; + ssl_prefer_server_ciphers on; ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"; ssl_dhparam /var/www/certbot/live/crm.logidex.ru/dhparam.pem; # managed by Certbot @@ -48,7 +48,7 @@ server ssl_stapling_verify on; # verify chain of trust of OCSP response using Root CA and Intermediate certs - ssl_trusted_certificate /var/www/certbot/live/crm.logidex.ru/chain.pem; + ssl_trusted_certificate /var/www/certbot/live/crm.logidex.ru/fullchain.pem; # replace with the IP address of your resolver; # async 'resolver' is important for proper operation of OCSP stapling