This module enables HTTPS support.
It supports checking client certificates with two limitations:
By default the module is not built, it is necessary to specify that it be built with with the --with-http_ssl_module parameter to ./configure. Building this module requires the OpenSSL libraries and include-files, often are the necessary files in separate packages.
The following is an example configuration, to reduce the CPU load it is recommended to run one worker process only and to enable keep-alive connections:
worker_processes 1;
http {
server {
listen 443;
ssl on;
ssl_certificate /usr/local/nginx/conf/cert.pem;
ssl_certificate_key /usr/local/nginx/conf/cert.key;
keepalive_timeout 70;
}
}
When using chain certificates, just append the extra certificates into your .crt file (cert.pem in the example). Your own certificate needs to be on top of the file, otherwise key get a mismatch with the key.
To generate dummy certficates you can do this steps:
$ cd /usr/local/nginx/conf
$ openssl genrsa -des3 -out server.key 1024
$ openssl req -new -key server.key -out server.csr
$ cp server.key server.key.org
$ openssl rsa -in server.key.org -out server.key
$ openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
Configure the new certificate into nginx.conf:
server {
server_name YOUR_DOMAINNAME_HERE;
listen 443;
ssl on;
ssl_certificate /usr/local/nginx/conf/server.crt;
ssl_certificate_key /usr/local/nginx/conf/server.key;
}
Restart Nginx.
Now all ready to access using:
https://YOUR_DOMAINNAME_HERE
syntax:*ssl [on|off]*
default:*ssl off*
context:*main, server*
Enables HTTPS for a server.
syntax:*ssl_certificate file*
default:*ssl_certificate cert.pem*
context:*main, server*
Indicates file with the certificate in PEM format for this virtual server. The same file can contain other certificates, and also secret key in PEM format. Since version 0.6.7 the file path is relative to directory of nginx configuration file nginx.conf, but not to nginx prefix directory.
syntax:*ssl_certificate_key file*
default:*ssl_certificate_key cert.pem*
context:*main, server*
Indicates file with the secret key in PEM format for this virtual server. Since version 0.6.7 the filename path is relative to directory of nginx configuration file nginx.conf, but not to nginx prefix directory.
syntax:*ssl_client_certificate file*
default:*none*
context:*main, server*
Indicates file with certificates CA in PEM format, utilized for checking the client certificates.
syntax:*ssl_dhparam file*
default:*none*
context:*main, server*
Indicates file with Diffie-Hellman parameters in PEM format, utilized for negotiating TLS session keys.
syntax:*ssl_ciphers file*
default:*ssl_ciphers ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP*
context:*main, server*
Directive describes the permitted ciphers. Ciphers are assigned in the formats supported by OpenSSL, for example:
ssl_ciphersALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP;
Complete list can be looked with the following command:
openssl ciphers
syntax:*ssl_crl file*
default:*none*
context:*http, server*
This directive (0.8.7+) specifies a file with the revoked certificates (CRL) in the PEM, which is used to check for client certificates.
syntax:*ssl_prefer_server_ciphers [on|off]*
default:*ssl_prefer_server_ciphers off*
context:*main, server*
Requires protocols SSLv3 and TLSv1 server ciphers be preferred over the client's ciphers.
syntax:*ssl_protocols [SSLv2] [SSLv3] [TLSv1]*
default:*ssl_protocols SSLv2 SSLv3 TLSv1*
context:*main, server*
Directive enables the protocols indicated.
syntax:*ssl_verify_client on|off|ask*
default:*ssl_verify_client off*
context:*main, server*
Directive enables verifying client certificates. Parameter 'ask' checks a client certificate if it was offered.
syntax:*ssl_verify_depth number*
default:*ssl_verify_depth 1*
context:*main, server*
Sets depth checking in the chain of client certificates.
syntax:*ssl_session_cache off|none|builtin:size and/or shared:name:size*
default:*ssl_session_cache off*
context:*main, server*
The directive sets the types and sizes of caches to store the SSL sessions.
The cache types are:
It is possible to use both types of cache simultaneously, for example:
ssl_session_cache builtin:1000 shared:SSL:10m;
However, the only shared cache usage without that builtin should be more effective.
syntax:*ssl_session_timeout time*
default:*ssl_session_timeout 5m*
context:*main, server*
Assigns the time during which the client can repeatedly use the parameters of the session, which is stored in the cache.
This module supports several nonstandard error codes which can be used for debugging with the aid of directive error_page:
Debugging is done after the request is completely dismantled and are accessible via variables such as $request_uri, $uri, $arg and others. Built-in variables Module ngx_http_ssl_module supports several built-in variables:
syntax:*ssl_engine*
This allows specifying the OpenSSL engine to use, like Padlock for example. It requires a more recent version of OpenSSL.
Original DocumentationSSL Memory Fragmentation and new default status for ssl_session_cache