

openssl req -new -newkey rsa:4096 \
-nodes -keyout server.key \
-out server.csr/etc/apache2/sites-available/default-ssl.confSSLEngine on
SSLCertificateFile /path/server.crt
SSLCertificateKeyFile /path/server.key
SSLCertificateChainFile /path/chain.crt/etc/nginx/sites-available/defaultssl_certificate /path/fullchain.pem;
ssl_certificate_key /path/privkey.pem;
ssl_protocols TLSv1.2 TLSv1.3;curl -vI https://seusite.com exibe handshake TLS completo e headers de resposta.ssl_protocols TLSv1.3 TLSv1.2; com cifras modernas como ECDHE-RSA-AES256-GCM-SHA384.Strict-Transport-Security: max-age=31536000# 1. Gerar chave privada e CSR
openssl req -new -newkey rsa:4096 -nodes \
-keyout /etc/ssl/private/server.key \
-out /etc/ssl/certs/server.csr
# 2. Após receber certificado da CA, configurar Nginx
sudo nano /etc/nginx/sites-available/default
# 3. Adicionar configuração SSL
server {
listen 443 ssl http2;
server_name seudominio.com;
ssl_certificate /etc/ssl/certs/fullchain.pem;
ssl_certificate_key /etc/ssl/private/server.key;
ssl_protocols TLSv1.3 TLSv1.2;
ssl_ciphers HIGH:!aNULL:!MD5;
add_header Strict-Transport-Security "max-age=31536000" always;
}
# 4. Testar e recarregar
sudo nginx -t
sudo systemctl reload nginx