blob: 03437b04fffc91dc12282f1b83c960a6daafd342 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
|
#
# Ansible managed.
#
#GLOBAL#######################################################
sslVersion = TLSv1.3
TIMEOUTidle = 600
TIMEOUTconnect = 5
renegotiation = no
FIPS = no
options = NO_SSLv2
options = NO_SSLv3
options = SINGLE_DH_USE
options = SINGLE_ECDH_USE
options = CIPHER_SERVER_PREFERENCE
syslog = yes
debug = 5
setuid = nobody
setgid = nobody
chroot = /var/stunnel/chroot
service = stunnel-nfs3
; cd /var/empty; mkdir -p stunnel/etc; cd stunnel/etc;
; echo '3d-nfsd: ALL EXCEPT 127.0.0.1' >> hosts.deny;
; chcon -t stunnel_etc_t hosts.deny
curve = secp521r1
; https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
ciphers=ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:RSA+AESGCM:RSA+AES:!aNULL:!MD5:!DSS
#CREDENTIALS##################################################
verify = 2
CAfile = /etc/pki/tls/certs/mon-ca.crt
CRLfile = /etc/pki/tls/certs/crt-crl.pem
cert = /etc/pki/tls/certs/matthieu.3.crt
key = /etc/pki/tls/private/matthieu.3.key
#ROLE#########################################################
client = yes
connect = nfs3-freeway.casperlefantom.net:443
|