X-Git-Url: https://git.rapsys.eu/blogbundle/blobdiff_plain/f496e6ba2eac7cd06a4ea3296f99511020f0c3f5..HEAD:/Fixture/BlogFixture.php?ds=sidebyside diff --git a/Fixture/BlogFixture.php b/Fixture/BlogFixture.php index 0c8992f..48429e4 100644 --- a/Fixture/BlogFixture.php +++ b/Fixture/BlogFixture.php @@ -299,7 +299,7 @@ class BlogFixture extends Fixture { 'description' => 'Intermediate server application between two hosts to improve privacy, security and performance' ], 'fr_fr' => [ - 'title' => 'Serveur mandataire', + 'title' => 'Proxy', 'description' => 'Application serveur intermédiaire entre deux hôtes pour améliorer la confidentialité, la sécurité et les performances' ] ], @@ -412,7 +412,7 @@ Depending on how likely you are to have transparency in each cases you might wan Big thanks to these articles which expains how these parts work in a bit more detail: - -- +- - Hope this helps someone else out there.' @@ -469,7 +469,7 @@ Selon les probabilités de rencontrer les différents cas de transparence vous p Un grand merci à ces articles qui expliquent plus en détail comment fonctionnent les différentes parties de ce code: - -- +- - En espérant que cela puisse aider quelques personnes.' @@ -857,13 +857,13 @@ global key-base /etc/pki/tls/private # Don\'t load extra files ssl-load-extra-files none - # Disable SSL-v3 TLSv1.0 TLSv1.1 and TLS tickets - ssl-default-server-options ssl-min-ver TLSv1.2 no-tls-tickets # Do not verify certificate ssl-server-verify none - # Supported bind ciphers + # Supported bind ciphersuites #XXX: https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended-configurations - ssl-default-bind-ciphers TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 + ssl-default-bind-ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + # Disable SSL-v3 TLSv1.0 TLSv1.1 and TLSv1.2 without TLS tickets + ssl-default-bind-options ssl-min-ver TLSv1.3 # SSL/TLS session cache size tune.ssl.cachesize 20000 @@ -1384,13 +1384,13 @@ global key-base /etc/pki/tls/private # Don\'t load extra files ssl-load-extra-files none - # Disable SSL-v3 TLSv1.0 TLSv1.1 and TLS tickets - ssl-default-server-options ssl-min-ver TLSv1.2 no-tls-tickets # Do not verify certificate ssl-server-verify none - # Supported bind ciphers + # Supported bind ciphersuites #XXX: https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended-configurations - ssl-default-bind-ciphers TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 + ssl-default-bind-ciphersuites TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256 + # Disable SSL-v3 TLSv1.0 TLSv1.1 and TLSv1.2 without TLS tickets + ssl-default-bind-options ssl-min-ver TLSv1.3 # SSL/TLS session cache size tune.ssl.cachesize 20000