| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990 |
- ##--------------------------------------------------------------------
- ## SSL Listener
- ##
- ## Add a SSL Listener
- ##--------------------------------------------------------------------
- ## Note: This is an example of how to configure this feature
- ## you should copy and paste the below data into the emqx.conf for working
- ## The SSL listener also supports all the fields listed in listeners.tcp.conf.example
- ## only the SSL-specific fields are shown here
- ## Note: Modifying the 'sslname' to what you need
- listeners.ssl.sslname {
- ## Port or Address to listen on, 0 means disable
- bind = 8883 ## or with an IP e.g. "127.0.0.1:8883"
- enabled = true
- acceptors = 16
- enable_authn = true
- max_connections = infinity
- mountpoint = ""
- proxy_protocol = false
- proxy_protocol_timeout = 3s
- tcp_options {
- active_n = 100
- backlog = 1024
- buffer = 4KB
- high_watermark = 1MB
- keepalive = none
- nodelay = true
- reuseaddr = true
- send_timeout = 15s
- send_timeout_close = true
- }
- ssl_options {
- ## Trusted PEM format CA certificates bundle file
- cacertfile = "data/certs/cacert.pem"
- ## PEM format certificates chain file
- certfile = "data/certs/cert.pem"
- ## PEM format private key file
- keyfile = "data/certs/key.pem"
- ## Enable or disable peer verification
- verify = verify_none ## use verify_peer to enable
- ## if `verify' is enabled, whit true, the connection fails if the client does not have a certificate to send
- fail_if_no_peer_cert = false
- ## Enable TLS session reuse
- reuse_sessions = true
- ## Maximum number of non-self-issued intermediate certificates that can follow the peer certificate in a valid certification path
- depth = 10
- ## Which versions are to be supported
- versions = [tlsv1.3, tlsv1.2]
- ## TLS cipher suite names
- ## Note: By default, all available suites are supported, you do not need to set this
- ciphers = ["TLS_AES_256_GCM_SHA384","TLS_AES_128_GCM_SHA256"]
- ## Allows a client and a server to renegotiate the parameters of the SSL connection on the fly
- secure_renegotiate = true
- ## Log level for SSL communication
- ## Type: emergency | alert | critical | error | warning | notice | info | debug | none | all
- log_level = notice
- ## Hibernate the SSL process after idling for amount of time reducing its memory footprint
- hibernate_after = 5s
- ## Forces the cipher to be set based on the server-specified order instead of the client-specified order
- honor_cipher_order = true
- ## Setting this to false to disable client-initiated renegotiation
- client_renegotiation = true
- ## Maximum time duration allowed for the handshake to complete
- handshake_timeout = 15s
- ocsp {
- enable_ocsp_stapling = false
- responder_url = "http://ocsp.example.com"
- issuer_pem = true
- refresh_http_timeout = 15s
- refresh_interval = 5m
- }
- }
- }
|