Commit Graph

383 Commits

Author SHA1 Message Date
Mark Woon d65cd97761 Use regexp in MIME-types based maps (#221)
Fix #220

Co-authored-by: Léo Colombaro <git@colombaro.fr>
2019-03-09 02:34:15 +01:00
Léo Colombaro 50a6d793ce
Remove duplicated .conf in include 2019-02-13 14:45:52 +01:00
Léo Colombaro f600128203
Add Referrer-Policy for html document by default 2019-02-13 14:31:53 +01:00
Léo Colombaro c04dcb232f
Bump server-configs-test 2019-02-13 14:26:52 +01:00
Léo Colombaro 48277fbc14
Bump server-configs-test 2019-02-13 14:16:45 +01:00
Léo Colombaro 3cf23ea499
Bump server-configs-test 2019-02-13 14:10:36 +01:00
Léo Colombaro 94a9cec172 Release v3.0.0 2019-02-12 17:03:13 +01:00
Léo Colombaro efafc1f52a
Use minimal env for Travis-CI builds 2019-02-12 12:53:16 +01:00
Léo Colombaro 0acfbbd8fa
Bump server-configs-test 2019-02-12 12:31:41 +01:00
Léo Colombaro 51f5ffab82
Clean up and prepare docs for v3 2019-02-12 12:25:30 +01:00
Léo Colombaro 92a1c5df93
Let default servers be HTTP/2 compatible 2019-02-11 19:12:17 +01:00
Léo Colombaro 3883f59739
Remove "duplicated" deferred
These suggestions are more complicated to use than just commenting them
out.
Users may face an errored situation.

Ref: a36387848f

Fix #199
2019-02-11 19:11:21 +01:00
Romario Maxwell a7b8831a12 fix typo in example.com.conf header comment 2019-02-11 18:03:04 +01:00
Léo Colombaro 52e13535b4 Add test vhosts and Travis CI config 2019-02-11 16:18:43 +01:00
Léo Colombaro 283b292c5e
Add default recommended headers
Since no more location directive is used, making these header
available everywhere is possible without breaking servers.
2019-02-10 22:20:05 +01:00
Léo Colombaro a4c9e2da8e
Better default certificates folder
Mapped as Docker Nginx image
2019-02-10 22:13:25 +01:00
Léo Colombaro 6dd4cc27ed Switch from location directives to maps based on MIME-types
* Expire
* X-XSS-Protection
* X-Frame-Options
* X-UA-Compatible
* Content-Security-Policy
* Access-Control-Allow-Origin
2019-02-10 21:56:10 +01:00
Léo Colombaro 2d135053cb
Move MIME-type and charset declaration into their own conf files 2019-02-10 20:40:50 +01:00
Léo Colombaro 452b630330
Update gzipped MIME-type following web standard
Source https://github.com/jshttp/mime-db
2019-02-10 20:38:23 +01:00
Léo Colombaro e21aec5822
Block access to file #.*#
Used to contain sensitive data
2019-02-10 20:36:26 +01:00
Léo Colombaro 1f5d6359be
Bump supported Nginx to 1.8.0 2019-02-10 20:33:30 +01:00
Léo Colombaro fe7ff95a7f
Fix MIME-type
Add application/wasm and text/calendar
2019-02-10 20:32:53 +01:00
Léo Colombaro 8a4a1ce706
Delete inline script
Not used internally and not maintained
2019-02-10 20:31:54 +01:00
Léo Colombaro 8919496406
Remove outdated docs and fix repo structure
Trying to make maintenance as easier as we can
2019-02-04 14:09:06 +01:00
Léo Colombaro 76be9604e3 Reflect conf.d change is doc 2019-02-01 21:57:51 +01:00
Léo Colombaro 306af367e9 Move server config to conf.d folder
Aligning with nginx docker image
Fix #95
2019-02-01 21:57:51 +01:00
Léo Colombaro d2531ac605 Rotate ssl policies to modernize protocols recommendations
Closes #210
2019-02-01 16:13:22 +01:00
Léo Colombaro 3472f5ab0e
Exclude repo file on export 2019-02-01 13:05:28 +01:00
Léo Colombaro 930980a517
Typo 2018-12-03 15:38:57 +01:00
Ewout van Mansom eeeebd0da6 Add new TLS policy 'future' (#211)
This new TLS policy embraces the best security practices and performance characteristics by sacrificing compatibility with older clients.
2018-12-02 18:40:25 +01:00
Léo Colombaro df4be14a73
Improve cache-file-descriptors.conf doc
Closes #203
2018-12-02 17:23:44 +01:00
Ewout van Mansom df23e0ba8c Add DH parameters note to policy_intermediate.conf (#212)
For DHE ciphersuites, adding a diffie hellman parameter is a good practice. Only the intermediate policy uses DHE ciphersuites.
2018-12-02 17:05:11 +01:00
Léo Colombaro 86d8ed33ca
Improve SSL directives declarations, order and descriptions 2018-12-02 12:57:01 +01:00
Ewout van Mansom 5a2f750c53 Add note explaining secure eleptic curve situation for modern TLS profile preset (#209) 2018-11-30 12:12:02 +01:00
a22375 5f3ce4f73c Add back web_performance_cache_expiration (#206)
remove double include h5bp/location/security_file_access.conf;
2018-11-30 11:40:33 +01:00
Ewout van Mansom 8141562756 Add eleptic curves for intermediate profile preset
prime256v1 (NIST P-256), secp384r1 (NIST P-384) and secp521r1 (NIST P-521) have been deemed insecure as per Daniel J. Bernstein's research (https://cr.yp.to/newelliptic/nistecc-20160106.pdf, https://safecurves.cr.yp.to/).

Despite that, the adoption of X25519 is too slim. Limiting to that curve would mean dropping compatibility with Safari, Edge and Internet Explorer.
2018-11-30 11:38:25 +01:00
Ewout van Mansom 9b369d23a5 Add eleptic curves for modern profile preset
prime256v1 (NIST P-256), secp384r1 (NIST P-384) and secp521r1 (NIST P-521) have been deemed insecure as per Daniel J. Bernstein's research (https://cr.yp.to/newelliptic/nistecc-20160106.pdf, https://safecurves.cr.yp.to/).

Despite that, the adoption of X25519 is too slim. Limiting to that curve would mean dropping compatibility with Safari, Edge and Internet Explorer.
2018-11-30 10:21:38 +01:00
Léo Colombaro 959839d81f Add a modern profile for SSL policy
TLSv1.0 & TLSv1.1 suffer from [POODLE](blog.qualys.com/ssllabs/2014/12/08/poodle-bites-tls) and other [padding oracle attack](blog.cloudflare.com/padding-oracles-and-the-decline-of-cbc-mode-ciphersuites)
You need to support only TLSv1.2 to expect closing those weakness (and use only AEAD cipher suite in case of padding oracle).

The same, non PFS cipher suite is not at all recommended (see heartbleed effect).
DHE support [is dropped](digicert.com/blog/google-plans-to-deprecate-dhe-cipher-suites) from any decent user agent and can lead to [mitm attack](media.ccc.de/v/32c3-7288-logjam_diffie-hellman_discrete_logs_the_nsa_and_you#t=1357) (arround ~25min in the video) with only one side supporting weak cipher suite.
3DES is deprecated and suffer from [sweet32](sweet32.info)

So I recommend using only the `EECDH+CHACHA20:EECDH+AES` cipher suite, which has [quite good compatibility](cryptcheck.fr/suite/EECDH+CHACHA20:EECDH+AES) and a very better security than the actual cipher suite.

Fix #201
Fix #183
Fix #190
Prepare #180

Co-authored-by: aeris <aeris@users.noreply.github.com>
2018-11-29 10:39:33 +01:00
Léo Colombaro 10fc3a39a6 Split SSL config
Prepare #180
2018-11-29 10:39:33 +01:00
Léo Colombaro 1b2b4eb276
Merge #202 2018-11-27 21:43:18 +01:00
Léo Colombaro 3071e67d04
Tweaks and lint 2018-11-25 22:07:01 +01:00
Léo Colombaro 70aff1c744
Create CODEOWNERS 2018-11-25 18:25:04 +01:00
Léo Colombaro 16284ab91e
Fix TOC link in doc 2018-11-23 18:22:35 +01:00
Léo Colombaro f6b7e4f635
Reflect updated structure in site configs 2018-11-23 18:21:34 +01:00
Léo Colombaro fb88c34cde
Reflect updated structure in doc
Also refer to inline documentation to simplify maintenance
2018-11-23 17:20:05 +01:00
Léo Colombaro 496af1cfd5
Split directives to enforce atomic structure
* Enforce H5BP style
* Improve inline documentation to simplify maintenance
* Prepare v3
2018-11-23 17:19:51 +01:00
Léo Colombaro b935688c2b
Fix external links 2018-11-23 14:45:12 +01:00
Léo Colombaro e69311d295
Fix some typos and phrasing in CONTRIBUTING.md 2018-11-23 14:30:39 +01:00
Léo Colombaro a6d489ceab
Add .editorconfig file 2018-11-23 14:29:32 +01:00
Léo Colombaro 8f186e9205
Update repo documentation 2018-11-23 13:32:36 +01:00