changeset 56:b706454b2ab8

- About RC4-SHA
author Andrey Alexeev <andrew@nginx.com>
date Mon, 03 Oct 2011 15:54:53 +0000
parents 8213f3f1c93d
children 12f1de4539b4
files xml/en/docs/http/configuring_https_servers.xml
diffstat 1 files changed, 15 insertions(+), 3 deletions(-) [+]
line wrap: on
line diff
--- a/xml/en/docs/http/configuring_https_servers.xml	Mon Oct 03 12:07:55 2011 +0000
+++ b/xml/en/docs/http/configuring_https_servers.xml	Mon Oct 03 15:54:53 2011 +0000
@@ -44,13 +44,25 @@
 
 <para>
 The directives <dirname>ssl_protocols</dirname> and
-<dirname>ssl_ciphers</dirname> may be used to limit connections
-to strong SSL protocol versions and ciphers.
+<dirname>ssl_ciphers</dirname> can be used to limit connections
+to include only the strong versions and ciphers of SSL/TLS.
 Since version 1.0.5, nginx uses <dirname>ssl_protocols SSLv3 TLSv1</dirname>
 and <dirname>ssl_ciphers HIGH:!aNULL:!MD5</dirname> by default,
-so they should only be set for earlier nginx versions.
+so configuring them explicitly only makes sense for the earlier nginx versions.
 </para>
 
+<para>
+CBC-mode ciphers might be vulnerable to a number of attacks and to
+the BEAST attack in particular (see 
+<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389">CVE-2011-3389</a>).
+Configuration of ciphers can be adjusted to prefer RC4-SHA as the following:
+</para>
+
+<programlisting>
+    ssl_ciphers RC4:HIGH:!aNULL:!MD5;
+    ssl_prefer_server_ciphers on;
+</programlisting>
+
 </section>