Crypto-agility configuration for NGINX is described below.

All the requests in Desktop Managers and Tenants on the Backbone network pass through Nginx.

  • Location of the file for setting ciphers for Nginx:
    /etc/nginx/nginx.conf
  • Location of ciphers in the file:
    # disable SSLv3(enabled by default since nginx 0.8.19) since it's less secure then TLS http://en.wikipedia.org/wiki/Secure_Sockets_Layer#SSL_3.0 ssl_protocols TLSv1.1 TLSv1.2;
    
    # ciphers chosen for forward secrecy and compatibility
      # https://wiki.eng.vmware.com/VSECR/vSDL/PSP/PSPRequirements#.C2.A0.C2.A0.5B3.3.E2.80.93M.5D_TLS_Cipher-Suites
      ssl_ciphers "!aNULL:kECDH+AES:ECDH+AES:RSA+AES:@STRENGTH";
      #Uncomment the line below and comment out above line when DH need to enabled
      #ssl_ciphers "!aNULL:kECDH+AES:ECDH+AES:RSA+AES:DH:@STRENGTH";
    
  • Post modification, restart nginx service in the appliance by using the command:
    sudo service nginx restart