From 21479d6a75899cf9958b3d31fbf5435efa44353f Mon Sep 17 00:00:00 2001 From: timebug Date: Tue, 10 Mar 2015 23:49:58 +0800 Subject: [PATCH] add disqus comments --- _includes/disqus.html | 14 ++++++++++++++ _layouts/post.html | 2 ++ _posts/2015-03-10-strong-ssl-security.markdown | 7 +++++++ 3 files changed, 23 insertions(+) create mode 100644 _includes/disqus.html diff --git a/_includes/disqus.html b/_includes/disqus.html new file mode 100644 index 0000000..399b654 --- /dev/null +++ b/_includes/disqus.html @@ -0,0 +1,14 @@ +
+ + diff --git a/_layouts/post.html b/_layouts/post.html index 99c764a..4dae4bc 100644 --- a/_layouts/post.html +++ b/_layouts/post.html @@ -13,3 +13,5 @@

{{ page.title }}

+ +{% if page.comments %}{% include disqus.html %}{% endif %} diff --git a/_posts/2015-03-10-strong-ssl-security.markdown b/_posts/2015-03-10-strong-ssl-security.markdown index 73432b8..e83a320 100644 --- a/_posts/2015-03-10-strong-ssl-security.markdown +++ b/_posts/2015-03-10-strong-ssl-security.markdown @@ -3,6 +3,7 @@ layout: post title: 改善 HTTPS 访问安全性 date: 2015-03-10 11:43:23 author: timebug +comments: true --- 2014 年 4 月 OpenSSL 的心血漏洞 [Heartbleed](http://heartbleed.com/) 着实让大家对互联网安全捏了一把冷汗。同年 10 月份又相继爆出 [POODLE](http://en.wikipedia.org/wiki/POODLE) 安全漏洞攻击,该漏洞可以让攻击者利用 SSLv3 协议设计中的缺陷,通过中间人攻击的手段来窃取用户信息,Google 研究员最先披露了有关该漏洞的[细节](http://googleonlinesecurity.blogspot.co.uk/2014/10/this-poodle-bites-exploiting-ssl-30.html)。 @@ -155,3 +156,9 @@ server { ~~~ 以上配置在 NGINX 1.7.10 和 OpenSSL 1.0.2 上经过测试,同时也建议大家及时升级到相应的最新版本。 + +其他参考: + +* [http://nginx.com/blog/nginx-poodle-ssl/]() +* [https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html]() +* [http://nginx.com/blog/nginx-05-june-2014-openssl-security-advisory/]()