From dfe7677eb54e12146b0cc322946d6ec66b7f43e0 Mon Sep 17 00:00:00 2001 From: Teoh Han Hui Date: Mon, 19 Sep 2016 15:23:46 +0800 Subject: [PATCH] Enable OCSP stapling if certificate trust chain is provided Previously disabled in 080a5157e6b1de3637e339a7cf54105f0316cfa7 --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c3f7643..a3b490c 100644 --- a/README.md +++ b/README.md @@ -206,7 +206,7 @@ and `CERT_NAME=shared` will then use this shared cert. The SSL cipher configuration is based on the [Mozilla nginx intermediate profile](https://wiki.mozilla.org/Security/Server_Side_TLS#Nginx) which should provide compatibility with clients back to Firefox 1, Chrome 1, IE 7, Opera 5, Safari 1, Windows XP IE8, Android 2.3, Java 7. Note that the DES-based TLS ciphers were removed for security. -The configuration also enables HSTS, PFS, and SSL session caches. Currently TLS 1.0, 1.1 and 1.2 +The configuration also enables HSTS, PFS, OCSP stapling and SSL session caches. Currently TLS 1.0, 1.1 and 1.2 are supported. TLS 1.0 is deprecated but its end of life is not until June 30, 2018. It is being included because the following browsers will stop working when it is removed: Chrome < 22, Firefox < 27, IE < 11, Safari < 7, iOS < 5, Android Browser < 5.