Commit graph

14 commits

Author SHA1 Message Date
Alexandre Aubin
1cc3e44038 nginx: Refine experimental CSP header (in the end still gotta enable unsafe-inline and unsafe-eval for a bunch of things, but better than no policy at all...) 2021-11-06 16:45:25 +01:00
Alexandre Aubin
bcb803c0c3 Add new setting to enable experimental security features 2021-08-18 22:10:25 +02:00
Laurent Peuch
a0b32d5f1b [enh] add header to disallow FLoC
https://diaspodon.fr/@etienne/106070042112522839
2021-04-15 17:56:50 +02:00
Alexandre Aubin
f3a4334a13 Upgrade nginx configuration according to Mozilla guidelines now that we're on Buster 2020-08-14 14:50:54 +02:00
Alexandre Aubin
1cfa815aaa
Propagate location change for ffdhe2048.pem 2020-06-04 18:44:02 +02:00
Alexandre Aubin
9906617aa1
Add comments about where the DH param comes from 2020-06-04 18:41:05 +02:00
SohKa
d4bea7dd34 Add pre-defined DHE group and set up Nginx to use it 2020-05-26 19:17:03 +02:00
Alexandre Aubin
0fba21f924 Enforce CSP rules for real on webadmin 2020-04-29 01:07:07 +02:00
Alexandre Aubin
c0c026613f Add wss: to default to get rid of angry CSP on webadmin 2020-04-27 02:15:14 +02:00
Alexandre Aubin
c06fe42078 Hmgn don't change the value for the session cache size otherwise that break test for restore from old version for stupid reasons -.- 2020-04-08 21:33:34 +02:00
Alexandre Aubin
71cc4fde97 We in fact only have ssl 1.1.0l, not 1.1.1l on Stretch. 2020-04-08 19:59:27 +02:00
Alexandre Aubin
f390f02077 Update nginx security.conf.inc with new Mozilla recommendation 2020-04-08 19:59:27 +02:00
Alexandre Aubin
4d99cbe870 Add ref for security headers 2020-04-06 16:55:20 +02:00
pitchum
1f09abfa51 Rationalize some nginx config into security.conf.inc. 2020-03-25 11:51:57 +01:00