Security configuration method for Nginx server cipher suite of SSR

An encryption suite and security configuration technology, applied to electrical components, transmission systems, etc., can solve problems such as insufficient security, achieve the effects of ensuring security, enhancing self-security, and improving security and stability

Inactive Publication Date: 2016-12-07
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Nginx is a high-performance HTTP and reverse proxy server, as well as an IMAP/POP3/SMTP server; and the architectur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0012] The security configuration method for the Nginx server cipher suite of SSR described in this embodiment mainly includes the following steps: 1) checking the SSR cipher suite; 2) analyzing the security of the SSR cipher suite; Modify the cipher suite in the server configuration file.

[0013] Among them, step 1) check the SSR cipher suite: check the cipher suite used by the SSR Nginx server; step 2) perform security analysis on the SSR cipher suite: analyze and determine which cipher suites the SSR Nginx server uses are safe , which are insecure; Step 3) Modify the encryption suite in the configuration file of the Nginx server of SSR: delete the unsafe encryption suite used by the Nginx server of SSR to disable this kind of encryption, and increase the specified encryption suite to achieve The specified encryption method.

[0014] Reasonably select the cipher suites provided by the Nginx server by default: by analyzing and comparing different parts of each cipher suite,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security configuration method for an Nginx server cipher suite of an SSR, and relates to the field of website security configuration. The cipher suite of an Nginx server is rationally selected, and the cipher suite of an Nginx server of the SSR is increased and decreased to realize an expected encryption accessory. The security configuration method mainly comprises the following steps: 1) checking the SSR cipher suite; 2) carrying out security analysis on the SSR cipher suite; and 3) modifying the cipher suite in an Nginx server configuration file of the SSR. According to the security configuration method disclosed by the invention, different parts of the suites are analyzed and compared; the unsecure cipher suite is selected and forbidden; a client and a server can only use the cipher suite with high security; the transmission security of transmission layer information is guaranteed; and the security of the SSR is enhanced, so that the SSR runs more safely.

Description

technical field [0001] The invention relates to the field of website security configuration, in particular to a security configuration method for the Nginx server encryption suite of SSR. Background technique [0002] With the development of computer technology, web applications are becoming more and more extensive, and the security requirements for B / S architecture software are getting higher and higher. Now we are vigorously developing network security. Due to the existence of malicious attackers and black industries, the requirements for network information security are also increasing. How to effectively improve the security of server products, ensure the reliability of software and the safe use of users has become a technical problem that needs to be solved urgently. The solution to this problem can be divided into security configuration and reinforcement of many parts from a technical aspect; in view of this, the present invention proposes a security configuration met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/205
Inventor 路廷文
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products