Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- vim /etc/nginx/nginx.conf
- ######################################################################
- # nginx.conf
- # ssl redirect
- server {
- listen 80;
- return 302 https://$host$request_uri;
- }
- include /etc/nginx/conf.d/*.conf;
- ######################################################################
- # jira.conf into conf.d
- server {
- listen 443 ssl http2;
- listen [::]:443 ssl http2;
- server_name jiratest.anarcon.net;
- include /etc/nginx/conf.d/ssl_settings_jira.conf.ssl;
- proxy_connect_timeout 180;
- proxy_send_timeout 180;
- proxy_read_timeout 180;
- send_timeout 180;
- location /{
- proxy_set_header X-Forwarded-Host $host;
- proxy_set_header X-Forwarded-Server $host;
- proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
- proxy_pass http://localhost:8081;
- client_max_body_size 15M;
- }
- }
- ######################################################################
- # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
- ssl_certificate "/etc/letsencrypt/live/jiratest.anarcon.net/fullchain.pem";
- ssl_certificate_key "/etc/letsencrypt/live/jiratest.anarcon.net/privkey.pem";
- ssl_session_timeout 1d;
- ssl_session_cache shared:SSL:50m;
- ssl_session_tickets off;
- ## verify chain of trust of OCSP response using Root CA and Intermediate certs
- ssl_trusted_certificate /etc/letsencrypt/live/jiratest.anarcon.net/fullchain.pem;
- # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
- ssl_dhparam /etc/ssl/diffie/dhparams.pem;
- # intermediate configuration. tweak to your needs.
- ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
- ssl_ciphers 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256 :ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES12 8-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:E CDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECD HE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA25 6:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS';
- ssl_prefer_server_ciphers on;
- # HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
- add_header Strict-Transport-Security max-age=15768000;
- # OCSP Stapling ---
- # fetch OCSP records from URL in ssl_certificate and cache them
- ssl_stapling on;
- ssl_stapling_verify on;
- resolver 8.8.8.8 8.8.4.4 208.67.222.222 208.67.220.220 216.146.35.35 216.146.36.36 valid=300s;
- resolver_timeout 3s;
- ######################################################################
- systemctl restart nginx
- add-apt-repository ppa:certbot/certbot
- apt-get update
- apt-get install python-certbot-nginx
- certbot --nginx -d example.com -d www.example.com
- # Verify renewal process
- certbot renew --dry-run
- # confirm cronjob in
- /etc/cron.d
- mkdir -p /etc/ssl/diffie/
- openssl dhparam -out /etc/ssl/diffie/dhparams.pem 2048
- vim /opt/atlassian/jira/conf/server.xml
- # extend Connector
- proxyName="jira.forcam.com"
- proxyPort="443"
- scheme="https"
- secure="true"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement