Skip to content

Commit c76ac76

Browse files
authored
Apply suggestions from code review
1 parent 1ea34ae commit c76ac76

File tree

1 file changed

+5
-11
lines changed

1 file changed

+5
-11
lines changed

content/nginx/admin-guide/security-controls/securing-http-traffic-upstream.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ type:
99
- how-to
1010
---
1111

12-
This article explains how to encrypt HTTP traffic between NGINX and an upstream group or an proxied server.
12+
This article explains how to encrypt HTTP traffic between NGINX and an upstream group or a proxied server.
1313

1414

1515
## Prerequisites
@@ -20,10 +20,8 @@ This article explains how to encrypt HTTP traffic between NGINX and an upstream
2020

2121
## Obtaining SSL Server Certificates
2222

23-
2423
You can purchase a server certificate from a trusted certificate authority (CA). You can create own internal CA with an [OpenSSL](https://www.openssl.org/) library and generate your own certificate instead. The server certificate, along with a private key, should be placed on each upstream server.
2524

26-
2725
<span id="client_certs"></span>
2826
## Obtaining an SSL Client Certificate
2927

@@ -34,7 +32,7 @@ You will also need to configure the upstream servers to require client certifica
3432
<span id="config"></span>
3533
## Configuring NGINX
3634

37-
First, change the URL to an upstream group to support SSL connections. Specify the “https” protocol for the proxied server in the NGINX configuration file. (In the proxy_pass](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_pass) directive, specify an upstream group.)
35+
First, change the URL to an upstream group to support SSL connections. Specify the “https” protocol for the proxied server in the NGINX configuration file. Alternatively, [in the proxy_pass](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_pass) directive, specify an upstream group.)
3836

3937
```nginx
4038
location /upstream {
@@ -180,16 +178,12 @@ In this example, the “`https`” protocol in the [proxy_pass](https://nginx.or
180178

181179
When a secure connection is passed from NGINX to the upstream server for the first time, the full handshake process is performed:
182180

183-
* The [proxy_ssl_certificate](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_certificate) directive defines the location of the PEM-format certificate required by the upstream server.
184-
185-
* The [proxy_ssl_certificate_key](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_certificate_key) directive defines the location of the certificate’s private key.
186-
187-
* The [proxy_ssl_protocols](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_protocols and [proxy_ssl_ciphers](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_ciphers) directives control which protocols and ciphers are used.
181+
- The [proxy_ssl_certificate](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_certificate) directive defines the location of the PEM-format certificate required by the upstream server.
182+
- The [proxy_ssl_certificate_key](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_certificate_key) directive defines the location of the certificate’s private key.
183+
- The [proxy_ssl_protocols](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_protocols and [proxy_ssl_ciphers](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_ciphers) directives control which protocols and ciphers are used.
188184

189185
The next time NGINX passes a connection to the upstream server, session parameters will be reused because of the [proxy_ssl_session_reuse](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_session_reuse) directive, and the secured connection is established faster.
190186

191187
The trusted CA certificates in the file named by the [proxy_ssl_trusted_certificate](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_trusted_certificate) directive are used to verify the certificate on the upstream.
192-
193188
The [proxy_ssl_verify_depth](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_verify_depth) directive specifies that two certificates in the certificates chain are checked.
194-
195189
The [proxy_ssl_verify](https://nginx.org/en/docs/http/ngx_http_proxy_module.html#proxy_ssl_verify) directive verifies the validity of certificates.

0 commit comments

Comments
 (0)