remove SPDY due to buffer overflow
[discourse_docker.git] / templates / web.ssl.template.yml
1 run:
2 - replace:
3 filename: "/etc/nginx/conf.d/discourse.conf"
4 from: /server.+{/
5 to: |
6 server {
7 listen 80;
8 rewrite ^ https://$$ENV_DISCOURSE_HOSTNAME$request_uri? permanent;
9 }
10 server {
11 - replace:
12 filename: "/etc/nginx/conf.d/discourse.conf"
13 from: /listen 80;\s+gzip on;/m
14 to: |
15 # No SPDY till nginx 1.4.7 or up (buffer overflow)
16 listen 443 ssl;
17 spdy_keepalive_timeout 300; # up from 180 secs default
18
19 ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
20
21 # courtesy of https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_Ciphersuite
22 ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:AES128:AES256:RC4-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK;
23 ssl_prefer_server_ciphers on;
24
25 ssl_certificate /shared/ssl/ssl.crt;
26 ssl_certificate_key /shared/ssl/ssl.key;
27
28 #ssl_session_tickets off;
29
30 # enable SPDY header compression
31 # spdy_headers_comp 6;
32
33 # remember the certificate for a year and automatically connect to HTTPS
34 add_header Strict-Transport-Security 'max-age=31536000; includeSubDomains';
35
36 gzip on;
37
38 if ($http_host != $$ENV_DISCOURSE_HOSTNAME) {
39 rewrite (.*) https://$$ENV_DISCOURSE_HOSTNAME$1 permanent;
40 }