Nginx 在 CentOS 上的 SSL 优化要点
一 基础安全与协议配置
server {
listen 443 ssl http2;
server_name example.com;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:
ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:
ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305;
ssl_prefer_server_ciphers on;
ssl_certificate /etc/letsencrypt/live/example.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/example.com/privkey.pem;
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload" always;
add_header X-Frame-Options DENY;
add_header X-Content-Type-Options nosniff;
server_tokens off;
}
以上做法可同时兼顾安全与性能,并符合现代浏览器与评测要求。
二 性能优化关键参数
ssl_session_cache shared:SSL:10m; # 约可缓存4万会话
ssl_session_timeout 1d;
ssl_session_tickets off; # 视业务与合规要求选择
ssl_stapling on;
ssl_stapling_verify on;
ssl_trusted_certificate /etc/letsencrypt/live/example.com/chain.pem;
resolver 223.5.5.5 8.8.8.8 valid=300s;
resolver_timeout 5s;
# 仅当业务可容忍重放风险时启用
# ssl_early_data on;
上述参数在保障安全的前提下,有效缩短首包时间并提升握手效率。
三 证书与自动续期
# 安装
sudo yum install -y epel-release
sudo yum install -y certbot python3-certbot-nginx
# 获取证书(自动修改 Nginx 配置)
sudo certbot --nginx -d example.com -d www.example.com
# 测试续期
sudo certbot renew --dry-run
# 生产环境建议每日检查(系统自带 cron 每天执行)
echo '0 3 * * * /usr/bin/certbot renew --quiet && systemctl reload nginx' | sudo tee -a /etc/crontab
以上流程可确保证书长期有效并减少人工运维成本。
四 验证与排错
sudo nginx -t && sudo systemctl reload nginx。openssl s_client -connect example.com:443 -servername example.com -tlsextdebug 2>&1 | grep -i "certificate\|protocol"curl -Iv https://example.com五 进阶场景与注意事项
location /wss/ {
proxy_pass http://127.0.0.1:8080;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";
proxy_read_timeout 3600s;
}
以上实践覆盖 HTTPS/WSS 全链路与安全合规要点。