All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog. This project doesn't adhere to Semantic Versioning.
- javascript: replace bootstrap with bootstrap.native for Copy button tooltip
- javascript: preserve bootstrap 4 CSS; remove bootstrap, popper, jquery
- javascript: update packages
- javascript: remove highlight.js
- javascript: remove Handlebars; convert .hbs templates to .js per server
- javascript: parse semantic versions, with exception for parsing openssl < 3.0
- haproxy: prefer ssl-min-ver with haproxy 2.2+
- apache,oraclehttp: explicit SSLProtocol list
- lighttpd: explicit protocol list for openssl 1.0.2
- lighttpd: simplify configs when handled by lighttpd defaults
- nginx: allow ssl_session_tickets for nginx ≥1.23.2
- nginx: wrap
server
inhttp
context - postfix: add
smtp_tls_*
- initial intro text rather than defaulting to nginx config
- add eolBefore before versions; update current vers
- add warning to header for versions < eolBefore
- configure TLSv1.3 key exchange groups/curves (where supported)
- support OpenSSL 3.x: need SECLEVEL=0 to support Old config using TLSv1 and TLSv1.1
- haproxy: OpenSSL 3.x: ssl-security-level to support Old config with dhParamSize 1024
- caddy: fix syntax
- apache,oraclehttp: avoid double-percent-encode in rewrite
- stunnel: fix syntax; prefer sslVersionMin when available
- oraclehttp: OHS uses mod_ossl, based on custom RSA implementation
- oraclehttp: use IANA naming for ciphers; set usesOpenssl to false
- jetty: TLSv1.3 IncludeCipherSuites
- tomcat: set tls13 ciphersuites when tls12 ciphers defined
- dovecot: always set ssl_dh if usesDhe; revert an earlier change
- nginx: add
http2
directive - use Webpack 5
- use CDN hosted fonts instead of local ones
- support for stunnel
- support for coturn
- proftpd TLSStaplingCache directive syntax
5.7 - 2023-05-15
intermediate
configuration in order to appendTLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
to the bottom of the cipher list foriana
andopenssl
. mozilla/server-side-tls#285
5.6 - 2020-07-24
- support for caddy
- incorrect cipher ordering for the
intermediate
configuration forgo
andiana
5.5 - 2020-07-22
recommended_certificate_lifespan
of 90
maximum_certificate_lifespan
from 730 to 366
5.4 - 2020-01-21
intermediate
andold
configuration'scertificate_curves
list fromnull
toprime256v1
andsecp384r1
intermediate
configurationrsa_key_size
from 2048 tonull
5.3 - 2020-01-02
intermediate
andold
configuration'stls_curves
list, replacingsecp256r1
withprime256v1
5.2 - 2019-08-20
- support for
go
5.1 - 2019-07-16
This release has breaking changes due to the renaming of some JSON keys
- a new
ciphers
key to contain lists of ciphers for various clients - support for
iana
cipherFormat, an alternative toopenssl
- the
openssl_ciphersuites
key to be calledciphersuites
- the
openssl_ciphers
key to be a child of the newciphers
key and rename it fromopenssl_ciphers
toopenssl
5.0 - 2019-06-28
- three
certificate_signatures
to theintermediate
configuration :ecdsa-with-SHA256
,ecdsa-with-SHA384
andecdsa-with-SHA512
- the
ecdsa
certificate_type
to theintermediate
configuration Safari 9
to the list ofoldest_clients
for theintermediate
configuration- the new
maximum_certificate_lifespan
key - the new
ocsp_staple
key - the new
server_preferred_order
key
- the
ciphersuites
key, renaming it toopenssl_ciphers
- the
hsts_min_age
value for all configurations from 15768000 to 63072000 - the
tls_curves
for theintermediate
andmodern
configurations, removingsecp521r1
and addingX25519
to the top - the
openssl_ciphersuites
key from containing a colon-delimited string to containing a list - the
tls_versions
for theintermediate
configuration, removingTLSv1
andTLSv1.1
and addingTLSv1.3
- the
tls_versions
for themodern
configuration fromTLSv1.2
toTLSv1.3
- the
tls_versions
for theold
configuration, removingSSLv3
and addingTLSv1.3
- all of the
oldest_clients
in themodern
configuration - and added to the list of
oldest_clients
in theold
configuration - the entire order and list of
openssl_ciphers
andopenssl_ciphersuites
for all configurations. This was a very significant change.
sha256WithRSAEncryption
from themodern
certificate_signatures
listsecp521r1
from themodern
configuration'scertificate_curves
list
4.0 - 2016-02-13
Initial version