v1.1.1 - TLS 1.2 support

This commit is contained in:
bunkerity 2020-10-30 11:39:01 +01:00
parent 8623510f8c
commit 95752ff0c4
No known key found for this signature in database
GPG Key ID: 654FFF51CEF7CC47
3 changed files with 4 additions and 3 deletions

View File

@ -10,7 +10,7 @@ Avoid the hassle of following security best practices each time you need a web s
Non-exhaustive list of features :
- HTTPS support with transparent Let's Encrypt automation
- State-of-the-art web security : HTTP security headers, php.ini hardening, prevent leaks, ...
- State-of-the-art web security : HTTP security headers, prevent leaks, TLS hardening, ...
- Integrated ModSecurity WAF with the OWASP Core Rule Set
- Automatic ban of strange behaviors with fail2ban
- Antibot challenge through cookie, javascript, captcha or recaptcha v3
@ -367,6 +367,7 @@ If set to yes, nginx will use HTTP2 protocol when HTTPS is enabled.
`HTTPS_PROTOCOLS`
Values : *TLSv1.2* | *TLSv1.3* | *TLSv1.2 TLSv1.3*
Default value : *TLSv1.2 TLSv1.3*
The supported version of TLS. We recommend the default value *TLSv1.2 TLSv1.3* for compatibility reasons.
## ModSecurity

View File

@ -1 +1 @@
1.1.0
1.1.1

View File

@ -45,7 +45,7 @@ function spaces_to_lua() {
}
# copy stub confs
cp /opt/confs/*.conf /etc/nginx
cp /opt/confs/* /etc/nginx
cp /opt/logs/rsyslog.conf /etc/rsyslog.conf
cp /opt/logs/logrotate.conf /etc/logrotate.conf
cp -r /opt/lua/* /usr/local/lib/lua