Skip to content

Instantly share code, notes, and snippets.

@kyledrake
Last active December 19, 2015 05:49
Show Gist options
  • Save kyledrake/5906731 to your computer and use it in GitHub Desktop.
Save kyledrake/5906731 to your computer and use it in GitHub Desktop.
Current SSL Cipher config for NeoCities, pulled from http://blog.cloudflare.com/new-ssl-vulnerabilities-cloudflare-users-prot
ssl_ciphers ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH;
@thoward
Copy link

thoward commented Jul 2, 2013

So it's pretty good as it is. You may be able to improve speeds though, with a small change to the cipher order. Also, if you don't have ssl_prefer_server_ciphers On; set, you should.

ssl_prefer_server_ciphers On;
ssl_ciphers AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH

This change prefers AES-GCM over ECDHE. While it's less secure (no forward secrecy), it should be faster, allowing you to handle more requests with less server resources.

Security conscious clients can disable AES support to bypass and fallback to ECDHE.

Note: I'm not completely sure that this will be faster. I would test the configuration. Easy way to do that is to remove one or the other of AES/ECDHE strings (whole string between colons). Check site w/ openssl to confirm which cipher is being used, then run siege tests for performance. Compare results between the two. Whichever one is faster should be at the beginning of the list. If security (and specifically anti-PRISM security) is important to you, leave the order as it is, preferring ECDHE, and don't worry about performance.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment