From 75fed50d8ad8dda379334f7ee773b8e1d47df267 Mon Sep 17 00:00:00 2001 From: Nick Sergeant Date: Mon, 6 Apr 2015 22:48:17 -0400 Subject: [PATCH] Disable RC4 cipher. --- salt/application/snipt.nginx.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/salt/application/snipt.nginx.conf b/salt/application/snipt.nginx.conf index 2c58a30..9373d59 100644 --- a/salt/application/snipt.nginx.conf +++ b/salt/application/snipt.nginx.conf @@ -24,7 +24,7 @@ upstream backend_snipt { ssl on; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; - ssl_ciphers "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA RC4 !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS"; + ssl_ciphers "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS"; ssl_certificate /etc/certs/{{ pillar.hostname }}.crt; ssl_certificate_key /etc/certs/{{ pillar.hostname }}.key; @@ -37,7 +37,7 @@ upstream backend_snipt { ssl on; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; - ssl_ciphers "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA RC4 !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS"; + ssl_ciphers "EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS"; ssl_certificate /etc/certs/{{ pillar.hostname }}.crt; ssl_certificate_key /etc/certs/{{ pillar.hostname }}.key;