Alan Orth
bb55506464
I didn't realize Linode had DNS resolvers, but they are much closer than anything else (obviously). Here is OpenDNS: # mtr --report 208.67.222.222 Start: Sun Mar 22 15:31:50 2015 HOST: mjanja Loss% Snt Last Avg Best Wrst StDev 1.|-- router1-lon.linode.com 0.0% 10 0.5 0.9 0.5 3.4 0.7 2.|-- 212.111.33.233 0.0% 10 1.4 1.4 1.2 1.9 0.0 3.|-- 217.20.44.194 0.0% 10 0.7 0.8 0.7 1.2 0.0 4.|-- lonap.rtr1.lon.opendns.co 0.0% 10 1.2 1.1 0.9 1.4 0.0 5.|-- resolver1.opendns.com 0.0% 10 1.0 0.9 0.8 1.0 0.0 And here is Linode's: # mtr --report 109.74.192.20 Start: Sun Mar 22 15:32:30 2015 HOST: mjanja Loss% Snt Last Avg Best Wrst StDev 1.|-- router2-lon.linode.com 0.0% 10 0.5 0.6 0.5 0.8 0.0 2.|-- resolver1.london.linode.c 0.0% 10 0.4 0.4 0.3 0.8 0.0 Signed-off-by: Alan Orth <alan.orth@gmail.com>
37 lines
1.5 KiB
Django/Jinja
37 lines
1.5 KiB
Django/Jinja
{% set domain_name = item.nginx_domain_name %}
|
|
|
|
# concatenated key + cert
|
|
# See: http://nginx.org/en/docs/http/configuring_https_servers.html
|
|
ssl_certificate {{ tls_key_dir }}/{{ domain_name }}.crt.pem;
|
|
ssl_certificate_key {{ tls_key_dir }}/{{ domain_name }}.crt.pem;
|
|
|
|
ssl_session_timeout 24h; # 24 hour timeout
|
|
ssl_session_cache shared:SSL:1m; # 1MB -> 4,000 sessions
|
|
ssl_buffer_size 1400; # 1400 bytes to fit in one MTU
|
|
|
|
ssl_dhparam /etc/ssl/certs/dhparam.pem;
|
|
ssl_protocols {{ nginx_tls_protocols }};
|
|
ssl_ciphers "{{ tls_cipher_suite }}";
|
|
ssl_prefer_server_ciphers on;
|
|
|
|
# OCSP stapling...
|
|
ssl_stapling on;
|
|
ssl_stapling_verify on;
|
|
resolver 109.74.192.20 109.74.193.20;
|
|
|
|
# nginx does not auto-rotate session ticket keys: only a HUP / restart will do so and
|
|
# when a restart is performed the previous key is lost, which resets all previous
|
|
# sessions. The fix for this is to setup a manual rotation mechanism:
|
|
# http://trac.nginx.org/nginx/changeset/1356a3b9692441e163b4e78be4e9f5a46c7479e9/nginx
|
|
#
|
|
# Note that you'll have to define and rotate the keys securely by yourself. In absence
|
|
# of such infrastructure, consider turning off session tickets:
|
|
ssl_session_tickets off;
|
|
|
|
# enable SPDY header compression
|
|
spdy_headers_comp 6;
|
|
|
|
# Enable this if you want HSTS (recommended, but be careful)
|
|
add_header Strict-Transport-Security max-age=15768000 always;
|
|
|