To be complete....
These are the files I added/modified
I modified ssl.conf (it's exactly the same as the ssl.conf I'm using on port 443)
I want to avoid problems with clients using old systems.
On the Plesk interface I could drop TLSv1 I think.
You should maybe drop it entirely (both on 443 and 8443)
cat /etc/sw-cp-server/conf.d/ssl.conf
cat /etc/sw-cp-server/conf.d/ssl_extra.conf
cat /etc/sw-cp-server/conf.d/headers.conf
These are the files I added/modified
I modified ssl.conf (it's exactly the same as the ssl.conf I'm using on port 443)
I want to avoid problems with clients using old systems.
On the Plesk interface I could drop TLSv1 I think.
You should maybe drop it entirely (both on 443 and 8443)
cat /etc/sw-cp-server/conf.d/ssl.conf
Code:
ssl_ciphers ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:!DSS;
ssl_prefer_server_ciphers on;
ssl_protocols TLSv1.1 TLSv1.2;
ssl_stapling on;
ssl_stapling_verify on;
cat /etc/sw-cp-server/conf.d/ssl_extra.conf
Code:
add_header Strict-Transport-Security max-age=15768000 always;
ssl_dhparam /etc/dhparam/dhparam4096.pem;
ssl_ecdh_curve secp521r1:secp384r1:prime256v1;
cat /etc/sw-cp-server/conf.d/headers.conf
Code:
add_header Referrer-Policy strict-origin-when-cross-origin;
add_header X-Frame-Options SAMEORIGIN;
add_header X-XSS-Protection "1; mode=block";
add_header X-Content-Type-Options nosniff;
Last edited: