The Mozilla configuration tool for ciphers is generally the best source for cipher information, they update it regularly as things change in terms of "best ciphers to utilize" and security issues crop up.

All of those ciphers, in my opinion, are fine.  The discussion of whether these ciphers are free from vulnerabilities however is not an NGINX issue, and an OpenSSL / SSL Spec discussion that extends far beyond NGINX.


Thomas


On 5/3/21 12:47 PM, Kaushal Shriyan wrote:
Hi,

I am using Lets Encrypt SSL Certificates for Nginx 1.20.00 webserver running on CentOS Linux release 7.9.2009 (Core). I will appreciate it if someone can guide me to set the cipher suites in the Nginx Webserver config. I am referring to https://ssl-config.mozilla.org/ <https://ssl-config.mozilla.org/>. Is there a way to verify if the below cipher suites set are accurate and are free from any vulnerabilities?

$openssl version
OpenSSL 1.0.2k-fips  26 Jan 2017
$cat /etc/redhat-release
CentOS Linux release 7.9.2009 (Core)
$nginx -v
nginx version: nginx/1.20.0

ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;

Please guide and I look forward to hearing from you. Thanks in Advance.

Best Regards,

Kaushal

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to