You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-14Lines changed: 14 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -150,12 +150,12 @@ Finally, start your containers with `VIRTUAL_HOST` environment variables.
150
150
$ docker run -e VIRTUAL_HOST=foo.bar.com ...
151
151
### SSL Support using letsencrypt
152
152
153
-
[letsencrypt-nginx-proxy-companion](https://github.com/JrCs/docker-letsencrypt-nginx-proxy-companion) is a lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically.
153
+
[letsencrypt-nginx-proxy-companion](https://github.com/JrCs/docker-letsencrypt-nginx-proxy-companion) is a lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically.
154
154
155
-
Set `GENERATE_DHPARAM` environment variable to `false` to disabled Diffie-Hellman parameters completely. This will also ignore auto-generation made by `nginx-proxy`.
155
+
Set `DHPARAM_GENERATION` environment variable to `false` to disabled Diffie-Hellman parameters completely. This will also ignore auto-generation made by `nginx-proxy`.
156
156
The default value is `true`
157
157
158
-
$ docker run -e GENERATE_DHPARAM=false ....
158
+
$ docker run -e DHPARAM_GENERATION=false ....
159
159
### SSL Support
160
160
161
161
SSL is supported using single host, wildcard and SNI certificates using naming conventions for
@@ -187,7 +187,7 @@ at startup. Since it can take minutes to generate a new `dhparam.pem`, it is do
187
187
background. Once generation is complete, the `dhparams.pem` is saved on a persistent volume and nginx
188
188
is reloaded. This generation process only occurs the first time you start `nginx-proxy`.
189
189
190
-
> COMPATIBILITY WARNING: The default generated `dhparam.pem` key is 2048 bits for A+ security. Some
190
+
> COMPATIBILITY WARNING: The default generated `dhparam.pem` key is 2048 bits for A+ security. Some
191
191
> older clients (like Java 6 and 7) do not support DH keys with over 1024 bits. In order to support these
192
192
> clients, you must either provide your own `dhparam.pem`, or tell `nginx-proxy` to generate a 1024-bit
193
193
> key on startup by passing `-e DHPARAM_BITS=1024`.
@@ -210,7 +210,7 @@ The SSL cipher configuration is based on the [Mozilla nginx intermediate profile
210
210
should provide compatibility with clients back to Firefox 1, Chrome 1, IE 7, Opera 5, Safari 1,
211
211
Windows XP IE8, Android 2.3, Java 7. Note that the DES-based TLS ciphers were removed for security.
212
212
The configuration also enables HSTS, PFS, OCSP stapling and SSL session caches. Currently TLS 1.0, 1.1 and 1.2
213
-
are supported. TLS 1.0 is deprecated but its end of life is not until June 30, 2018. It is being
213
+
are supported. TLS 1.0 is deprecated but its end of life is not until June 30, 2018. It is being
214
214
included because the following browsers will stop working when it is removed: Chrome < 22, Firefox < 27,
0 commit comments