mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 01:45:54 +03:00
[GH-ISSUE #27] Default HTTPs site behavior #25
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#25
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @jlesage on GitHub (Nov 14, 2018).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/27
Hello,
This is about commit
github.com/jc21/nginx-proxy-manager@f9876326c9. Not sure if you saw my comment there, but I think that keepingssl_ciphers aNULLis a better approach.With valid ciphers, the browser will show a warning about self-signed certificate. After the user accepts to continue, nginx will close the connection (because of the return code 444).
Using
ssl_ciphers aNULLmakes the connection fails immediately, even before the browser shows any certificate warning.Since the goal of the default HTTPs site is to make sure that no page is served, it seems better to avoid the certificate warning.
@jc21 commented on GitHub (Nov 26, 2018):
Sorry for late response, holidays.
Yeah I saw your message after I changed it. I did think it was a bug at the time and since I couldn't see the default page over https, I assumed the handshake was broken by accident.
The impact of your idea vs what I changed is trivial. If it's what you really want, feel free to create another pr. Either way, the initial bug of seeing a non-default site as the default over ssl is solved.
@jlesage commented on GitHub (Nov 26, 2018):
Thanks for coming back on this!
I will create a new PR as you suggested.
@jlesage commented on GitHub (Nov 28, 2018):
PR #30 merged. Closing the issue.