server {
	listen   443 ssl;
	listen   [::]:443 ssl;

    
    

	access_log off;
	error_log /dev/null crit;

    
    ssl_certificate                 /etc/ssl/certs/*.hamburg.freifunk.net.crt;
    ssl_certificate_key             /etc/ssl/private/*.hamburg.freifunk.net.key;
    

	ssl_prefer_server_ciphers on;
	ssl_session_cache shared:SSL:10m;
	ssl_session_timeout 10m;

	# Only strong ciphers in PFS mode
	ssl_ciphers ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA;
	ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

	# Don't allow to get framed by sites that aren't on the same domain
	add_header X-Frame-Options SAMEORIGIN;

	# Tell clients never to use http or self-signed (!) certificates
	# There's no way to bypass this option after it has been cached!
	add_header Strict-Transport-Security max-age=31536000;

	location ~ /\. {
		deny all;
		access_log off;
		log_not_found off;
	}

    
    
}