Add option to disable OCSP stapling
This commit is contained in:
parent
bf26abf935
commit
5768f8ef01
3 changed files with 12 additions and 0 deletions
|
@ -502,6 +502,9 @@ https://www.openssl.org/docs/manmaster/apps/dhparam.html
|
||||||
https://wiki.mozilla.org/Security/Server_Side_TLS#DHE_handshake_and_dhparam
|
https://wiki.mozilla.org/Security/Server_Side_TLS#DHE_handshake_and_dhparam
|
||||||
http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_dhparam
|
http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_dhparam
|
||||||
|
|
||||||
|
**ssl-enable-ocsp:** Enable the stapling of OCSP responses. Ingress must have internet access when this option is enabled
|
||||||
|
http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_stapling
|
||||||
|
|
||||||
**ssl-protocols:** Sets the [SSL protocols](http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_protocols) to use.
|
**ssl-protocols:** Sets the [SSL protocols](http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_protocols) to use.
|
||||||
The default is: `TLSv1.2`.
|
The default is: `TLSv1.2`.
|
||||||
|
|
||||||
|
@ -615,6 +618,7 @@ The following table shows the options, the default value and a description.
|
||||||
|ssl-buffer-size|4k|
|
|ssl-buffer-size|4k|
|
||||||
|ssl-ciphers||
|
|ssl-ciphers||
|
||||||
|ssl-dh-param|value from openssl|
|
|ssl-dh-param|value from openssl|
|
||||||
|
|ssl-enable-ocsp|"true"
|
||||||
|ssl-protocols|TLSv1 TLSv1.1 TLSv1.2|
|
|ssl-protocols|TLSv1 TLSv1.1 TLSv1.2|
|
||||||
|ssl-session-cache|"true"|
|
|ssl-session-cache|"true"|
|
||||||
|ssl-session-cache-size|10m|
|
|ssl-session-cache-size|10m|
|
||||||
|
|
|
@ -289,6 +289,11 @@ type Configuration struct {
|
||||||
// http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_dhparam
|
// http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_dhparam
|
||||||
SSLDHParam string `json:"ssl-dh-param,omitempty"`
|
SSLDHParam string `json:"ssl-dh-param,omitempty"`
|
||||||
|
|
||||||
|
// Enables or disables the stapling of OCSP responses to verify Certificates
|
||||||
|
// If enabled, Ingress must have internet access
|
||||||
|
// http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_stapling
|
||||||
|
SSLEnableOCSP bool `json:"ssl-enable-ocsp"`
|
||||||
|
|
||||||
// SSL enabled protocols to use
|
// SSL enabled protocols to use
|
||||||
// http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_protocols
|
// http://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_protocols
|
||||||
SSLProtocols string `json:"ssl-protocols,omitempty"`
|
SSLProtocols string `json:"ssl-protocols,omitempty"`
|
||||||
|
@ -452,6 +457,7 @@ func NewDefault() Configuration {
|
||||||
SSLBufferSize: sslBufferSize,
|
SSLBufferSize: sslBufferSize,
|
||||||
SSLCiphers: sslCiphers,
|
SSLCiphers: sslCiphers,
|
||||||
SSLECDHCurve: "auto",
|
SSLECDHCurve: "auto",
|
||||||
|
SSLEnableOCSP: true,
|
||||||
SSLProtocols: sslProtocols,
|
SSLProtocols: sslProtocols,
|
||||||
SSLSessionCache: true,
|
SSLSessionCache: true,
|
||||||
SSLSessionCacheSize: sslSessionCacheSize,
|
SSLSessionCacheSize: sslSessionCacheSize,
|
||||||
|
|
|
@ -584,10 +584,12 @@ stream {
|
||||||
ssl_certificate_key {{ $server.SSLCertificate }};
|
ssl_certificate_key {{ $server.SSLCertificate }};
|
||||||
{{ if not (empty $server.SSLFullChainCertificate)}}
|
{{ if not (empty $server.SSLFullChainCertificate)}}
|
||||||
ssl_trusted_certificate {{ $server.SSLFullChainCertificate }};
|
ssl_trusted_certificate {{ $server.SSLFullChainCertificate }};
|
||||||
|
{{ if $cfg.SSLEnableOCSP }}
|
||||||
ssl_stapling on;
|
ssl_stapling on;
|
||||||
ssl_stapling_verify on;
|
ssl_stapling_verify on;
|
||||||
{{ end }}
|
{{ end }}
|
||||||
{{ end }}
|
{{ end }}
|
||||||
|
{{ end }}
|
||||||
|
|
||||||
{{ if (and (not (empty $server.SSLCertificate)) $all.Cfg.HSTS) }}
|
{{ if (and (not (empty $server.SSLCertificate)) $all.Cfg.HSTS) }}
|
||||||
more_set_headers "Strict-Transport-Security: max-age={{ $all.Cfg.HSTSMaxAge }}{{ if $all.Cfg.HSTSIncludeSubdomains }}; includeSubDomains{{ end }};{{ if $all.Cfg.HSTSPreload }} preload{{ end }}";
|
more_set_headers "Strict-Transport-Security: max-age={{ $all.Cfg.HSTSMaxAge }}{{ if $all.Cfg.HSTSIncludeSubdomains }}; includeSubDomains{{ end }};{{ if $all.Cfg.HSTSPreload }} preload{{ end }}";
|
||||||
|
|
Loading…
Reference in a new issue