|
85 | 85 | ## |
86 | 86 | ## Related doc guide: https://rabbitmq.com/ssl.html. |
87 | 87 | ## |
| 88 | +# listeners.ssl.1 = 5671 |
| 89 | +# |
88 | 90 | # ssl_options.verify = verify_peer |
89 | 91 | # ssl_options.fail_if_no_peer_cert = false |
90 | 92 | # ssl_options.cacertfile = /path/to/cacert.pem |
91 | 93 | # ssl_options.certfile = /path/to/cert.pem |
92 | 94 | # ssl_options.keyfile = /path/to/key.pem |
93 | 95 | # |
| 96 | +## These are highly recommended but must be disabled if |
| 97 | +## TLSv1.3 is enabled. |
94 | 98 | # ssl_options.honor_cipher_order = true |
95 | 99 | # ssl_options.honor_ecc_order = true |
96 | | - |
| 100 | +# |
| 101 | +## Limits what TLS versions the server enables for client TLS |
| 102 | +## connections. See https://www.rabbitmq.com/ssl.html#tls-versions for details. |
| 103 | +## |
| 104 | +## Cutting edge TLS version which requires recent client runtime |
| 105 | +## versions and has no cipher suite in common with earlier TLS versions. |
| 106 | +# ssl_options.versions.1 = tlsv1.3 |
| 107 | +## Enables TLSv1.2 for best compatibility |
| 108 | +# ssl_options.versions.2 = tlsv1.2 |
| 109 | +## Older TLS versions have known vulnerabilities and are being phased out |
| 110 | +## from wide use. |
| 111 | + |
| 112 | +## Limits what cipher suites the server will use for client TLS |
| 113 | +## connections. Narrowing this down can prevent some clients |
| 114 | +## from connecting. |
| 115 | +## If TLSv1.3 is enabled and cipher suites are overridden, TLSv1.3-specific |
| 116 | +## cipher suites must also be explicitly enabled. |
| 117 | +## See https://www.rabbitmq.com/ssl.html#cipher-suites and https://wiki.openssl.org/index.php/TLS1.3#Ciphersuites |
| 118 | +## for details. |
| 119 | +# |
| 120 | +## The example below uses TLSv1.3 cipher suites only |
| 121 | +# |
| 122 | +# ssl_options.ciphers.1 = TLS_AES_256_GCM_SHA384 |
| 123 | +# ssl_options.ciphers.2 = TLS_AES_128_GCM_SHA256 |
| 124 | +# ssl_options.ciphers.3 = TLS_CHACHA20_POLY1305_SHA256 |
| 125 | +# ssl_options.ciphers.4 = TLS_AES_128_CCM_SHA256 |
| 126 | +# ssl_options.ciphers.5 = TLS_AES_128_CCM_8_SHA256 |
| 127 | +# |
| 128 | +## The example below uses TLSv1.2 cipher suites only |
| 129 | +# |
97 | 130 | # ssl_options.ciphers.1 = ECDHE-ECDSA-AES256-GCM-SHA384 |
98 | 131 | # ssl_options.ciphers.2 = ECDHE-RSA-AES256-GCM-SHA384 |
99 | 132 | # ssl_options.ciphers.3 = ECDHE-ECDSA-AES256-SHA384 |
|
0 commit comments