comparison xml/en/docs/http/configuring_https_servers.xml @ 393:b83d332fbdaa

Documented SSL changes in the upcoming 1.0.12 release.
author Ruslan Ermilov <ru@nginx.com>
date Mon, 06 Feb 2012 08:54:43 +0000
parents a413dffb0557
children 6135f3c95bf6
comparison
equal deleted inserted replaced
392:5fd99d37a3e6 393:b83d332fbdaa
48 can be used to limit connections 48 can be used to limit connections
49 to include only the strong versions and ciphers of SSL/TLS. 49 to include only the strong versions and ciphers of SSL/TLS.
50 Since version 1.0.5, nginx uses “<literal>ssl_protocols SSLv3 TLSv1</literal>” 50 Since version 1.0.5, nginx uses “<literal>ssl_protocols SSLv3 TLSv1</literal>”
51 and “<literal>ssl_ciphers HIGH:!aNULL:!MD5</literal>” by default, 51 and “<literal>ssl_ciphers HIGH:!aNULL:!MD5</literal>” by default,
52 so configuring them explicitly only makes sense for the earlier nginx versions. 52 so configuring them explicitly only makes sense for the earlier nginx versions.
53 Since version 1.1.13, nginx uses 53 Since versions 1.1.13 and 1.0.12, nginx uses
54 “<literal>ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2</literal>” by default. 54 “<literal>ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2</literal>” by default.
55 </para> 55 </para>
56 56
57 <para> 57 <para>
58 CBC-mode ciphers might be vulnerable to a number of attacks and to 58 CBC-mode ciphers might be vulnerable to a number of attacks and to