Created
July 15, 2016 01:58
-
-
Save mattparlane/6d1c40017849da2cdc398422681fcf94 to your computer and use it in GitHub Desktop.
h2o.conf
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
hosts: | |
walnutblock.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/walnutblock.co.nz.key" | |
certificate-file: "/etc/ssl/walnutblock.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.walnutblock.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.walnutblock.co.nz.key" | |
certificate-file: "/etc/ssl/www.walnutblock.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
easystrip.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/easystrip.co.nz.key" | |
certificate-file: "/etc/ssl/easystrip.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.easystrip.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.easystrip.co.nz.key" | |
certificate-file: "/etc/ssl/www.easystrip.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cavendishgrounds.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cavendishgrounds.com.key" | |
certificate-file: "/etc/ssl/www.cavendishgrounds.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
criminallawyer-auckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/criminallawyer-auckland.co.nz.key" | |
certificate-file: "/etc/ssl/criminallawyer-auckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.karltrotter.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.karltrotter.co.nz.key" | |
certificate-file: "/etc/ssl/www.karltrotter.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
karltrotter.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/karltrotter.co.nz.key" | |
certificate-file: "/etc/ssl/karltrotter.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.criminallawyer-auckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.criminallawyer-auckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.criminallawyer-auckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
m.karltrotter.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/m.karltrotter.co.nz.key" | |
certificate-file: "/etc/ssl/m.karltrotter.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.barndale.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.barndale.co.nz.key" | |
certificate-file: "/etc/ssl/www.barndale.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
barndale.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/barndale.co.nz.key" | |
certificate-file: "/etc/ssl/barndale.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.catterynorthshore.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.catterynorthshore.co.nz.key" | |
certificate-file: "/etc/ssl/www.catterynorthshore.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
catterynorthshore.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/catterynorthshore.co.nz.key" | |
certificate-file: "/etc/ssl/catterynorthshore.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.barndale.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.barndale.nz.key" | |
certificate-file: "/etc/ssl/www.barndale.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
barndale.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/barndale.nz.key" | |
certificate-file: "/etc/ssl/barndale.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
capitalfire.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/capitalfire.co.nz.key" | |
certificate-file: "/etc/ssl/capitalfire.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
commercialfireprotection.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/commercialfireprotection.co.nz.key" | |
certificate-file: "/etc/ssl/commercialfireprotection.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.capitalfire.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.capitalfire.co.nz.key" | |
certificate-file: "/etc/ssl/www.capitalfire.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.commercialfireprotection.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.commercialfireprotection.co.nz.key" | |
certificate-file: "/etc/ssl/www.commercialfireprotection.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
capitalfireextinguishers.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/capitalfireextinguishers.nz.key" | |
certificate-file: "/etc/ssl/capitalfireextinguishers.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
capitalfireprotection.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/capitalfireprotection.nz.key" | |
certificate-file: "/etc/ssl/capitalfireprotection.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.capitalfireprotection.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.capitalfireprotection.nz.key" | |
certificate-file: "/etc/ssl/www.capitalfireprotection.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.capitalfireextinguishers.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.capitalfireextinguishers.nz.key" | |
certificate-file: "/etc/ssl/www.capitalfireextinguishers.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
commercialfireprotection.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/commercialfireprotection.nz.key" | |
certificate-file: "/etc/ssl/commercialfireprotection.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.commercialfireprotection.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.commercialfireprotection.nz.key" | |
certificate-file: "/etc/ssl/www.commercialfireprotection.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
generalfireprotection.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/generalfireprotection.nz.key" | |
certificate-file: "/etc/ssl/generalfireprotection.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
firewatchwellington.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/firewatchwellington.nz.key" | |
certificate-file: "/etc/ssl/firewatchwellington.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.generalfireprotection.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.generalfireprotection.nz.key" | |
certificate-file: "/etc/ssl/www.generalfireprotection.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
generalfire.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/generalfire.nz.key" | |
certificate-file: "/etc/ssl/generalfire.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.firewatchwgtn.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.firewatchwgtn.nz.key" | |
certificate-file: "/etc/ssl/www.firewatchwgtn.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.firewatchwellington2014.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.firewatchwellington2014.nz.key" | |
certificate-file: "/etc/ssl/www.firewatchwellington2014.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
firewatchwellington2014.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/firewatchwellington2014.nz.key" | |
certificate-file: "/etc/ssl/firewatchwellington2014.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
firewatchwgtn.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/firewatchwgtn.nz.key" | |
certificate-file: "/etc/ssl/firewatchwgtn.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.firewatchwellington.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.firewatchwellington.nz.key" | |
certificate-file: "/etc/ssl/www.firewatchwellington.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.generalfire.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.generalfire.nz.key" | |
certificate-file: "/etc/ssl/www.generalfire.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
firewatchwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/firewatchwellington.co.nz.key" | |
certificate-file: "/etc/ssl/firewatchwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.firewatchwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.firewatchwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.firewatchwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
walnutblockwines.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/walnutblockwines.co.nz.key" | |
certificate-file: "/etc/ssl/walnutblockwines.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.walnutblockwines.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.walnutblockwines.co.nz.key" | |
certificate-file: "/etc/ssl/www.walnutblockwines.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
watkinsplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/watkinsplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/watkinsplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.watkinsplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.watkinsplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/www.watkinsplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
martinboroughwinetours.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/martinboroughwinetours.co.nz.key" | |
certificate-file: "/etc/ssl/martinboroughwinetours.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.martinboroughwinetours.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.martinboroughwinetours.co.nz.key" | |
certificate-file: "/etc/ssl/www.martinboroughwinetours.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.temporaryfences.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.temporaryfences.co.nz.key" | |
certificate-file: "/etc/ssl/www.temporaryfences.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
temporaryfences.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/temporaryfences.co.nz.key" | |
certificate-file: "/etc/ssl/temporaryfences.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
furnitureupholstery.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/furnitureupholstery.co.nz.key" | |
certificate-file: "/etc/ssl/furnitureupholstery.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
suitedoctors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/suitedoctors.co.nz.key" | |
certificate-file: "/etc/ssl/suitedoctors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.furnitureupholstery.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.furnitureupholstery.co.nz.key" | |
certificate-file: "/etc/ssl/www.furnitureupholstery.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.suitedoctors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.suitedoctors.co.nz.key" | |
certificate-file: "/etc/ssl/www.suitedoctors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.racklink.com.au: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.racklink.com.au.key" | |
certificate-file: "/etc/ssl/www.racklink.com.au.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
racklink.com.au: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/racklink.com.au.key" | |
certificate-file: "/etc/ssl/racklink.com.au.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.easyswim.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.easyswim.co.nz.key" | |
certificate-file: "/etc/ssl/www.easyswim.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
easyswim.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/easyswim.co.nz.key" | |
certificate-file: "/etc/ssl/easyswim.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
manorhouse.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/manorhouse.co.nz.key" | |
certificate-file: "/etc/ssl/manorhouse.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.manorhouse.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.manorhouse.co.nz.key" | |
certificate-file: "/etc/ssl/www.manorhouse.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
a1portablecabins.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/a1portablecabins.co.nz.key" | |
certificate-file: "/etc/ssl/a1portablecabins.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.a1portablecabins.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.a1portablecabins.co.nz.key" | |
certificate-file: "/etc/ssl/www.a1portablecabins.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.aboutkids.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.aboutkids.co.nz.key" | |
certificate-file: "/etc/ssl/www.aboutkids.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.inhomechildcare.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.inhomechildcare.co.nz.key" | |
certificate-file: "/etc/ssl/www.inhomechildcare.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
inhomechildcare.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/inhomechildcare.co.nz.key" | |
certificate-file: "/etc/ssl/inhomechildcare.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
aboutkids.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/aboutkids.co.nz.key" | |
certificate-file: "/etc/ssl/aboutkids.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
candoelectrical.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/candoelectrical.co.nz.key" | |
certificate-file: "/etc/ssl/candoelectrical.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.candoelectrical.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.candoelectrical.co.nz.key" | |
certificate-file: "/etc/ssl/www.candoelectrical.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kler.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kler.co.nz.key" | |
certificate-file: "/etc/ssl/kler.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kler.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kler.co.nz.key" | |
certificate-file: "/etc/ssl/www.kler.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kler.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kler.nz.key" | |
certificate-file: "/etc/ssl/www.kler.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kler.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kler.nz.key" | |
certificate-file: "/etc/ssl/kler.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
ohaugravels.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/ohaugravels.co.nz.key" | |
certificate-file: "/etc/ssl/ohaugravels.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.ohaugravels.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.ohaugravels.co.nz.key" | |
certificate-file: "/etc/ssl/www.ohaugravels.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
ohauwines.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/ohauwines.co.nz.key" | |
certificate-file: "/etc/ssl/ohauwines.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.ohauwines.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.ohauwines.co.nz.key" | |
certificate-file: "/etc/ssl/www.ohauwines.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wovenstone.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wovenstone.co.nz.key" | |
certificate-file: "/etc/ssl/wovenstone.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wovenstone.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wovenstone.co.nz.key" | |
certificate-file: "/etc/ssl/www.wovenstone.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.earlychildcareupperhutt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.earlychildcareupperhutt.co.nz.key" | |
certificate-file: "/etc/ssl/www.earlychildcareupperhutt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
earlychildcareupperhutt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/earlychildcareupperhutt.co.nz.key" | |
certificate-file: "/etc/ssl/earlychildcareupperhutt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.helensville-drainage.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.helensville-drainage.co.nz.key" | |
certificate-file: "/etc/ssl/www.helensville-drainage.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
helensville-drainage.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/helensville-drainage.co.nz.key" | |
certificate-file: "/etc/ssl/helensville-drainage.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kapitihearing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kapitihearing.co.nz.key" | |
certificate-file: "/etc/ssl/www.kapitihearing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
thestreet.org.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/thestreet.org.nz.key" | |
certificate-file: "/etc/ssl/thestreet.org.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.thestreet.org.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.thestreet.org.nz.key" | |
certificate-file: "/etc/ssl/www.thestreet.org.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.earlychildcarelevin.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.earlychildcarelevin.co.nz.key" | |
certificate-file: "/etc/ssl/www.earlychildcarelevin.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
earlychildcarelevin.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/earlychildcarelevin.co.nz.key" | |
certificate-file: "/etc/ssl/earlychildcarelevin.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.earlychildcarekapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.earlychildcarekapiti.co.nz.key" | |
certificate-file: "/etc/ssl/www.earlychildcarekapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
earlychildcarekapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/earlychildcarekapiti.co.nz.key" | |
certificate-file: "/etc/ssl/earlychildcarekapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wiseowl.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wiseowl.co.nz.key" | |
certificate-file: "/etc/ssl/www.wiseowl.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wiseowl.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wiseowl.co.nz.key" | |
certificate-file: "/etc/ssl/wiseowl.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.summerlea.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.summerlea.co.nz.key" | |
certificate-file: "/etc/ssl/www.summerlea.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
summerlea.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/summerlea.co.nz.key" | |
certificate-file: "/etc/ssl/summerlea.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.zebrano.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.zebrano.co.nz.key" | |
certificate-file: "/etc/ssl/www.zebrano.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
zebrano.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/zebrano.co.nz.key" | |
certificate-file: "/etc/ssl/zebrano.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.zebrano.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.zebrano.nz.key" | |
certificate-file: "/etc/ssl/www.zebrano.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
zebrano.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/zebrano.nz.key" | |
certificate-file: "/etc/ssl/zebrano.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.foxtonpreschoolandnursery.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.foxtonpreschoolandnursery.co.nz.key" | |
certificate-file: "/etc/ssl/www.foxtonpreschoolandnursery.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
foxtonpreschoolandnursery.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/foxtonpreschoolandnursery.co.nz.key" | |
certificate-file: "/etc/ssl/foxtonpreschoolandnursery.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.priscillakay.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.priscillakay.co.nz.key" | |
certificate-file: "/etc/ssl/www.priscillakay.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.priscillakay.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.priscillakay.com.key" | |
certificate-file: "/etc/ssl/www.priscillakay.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
lilys.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/lilys.co.nz.key" | |
certificate-file: "/etc/ssl/lilys.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.lilys.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.lilys.co.nz.key" | |
certificate-file: "/etc/ssl/www.lilys.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
walnutblockcottages.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/walnutblockcottages.co.nz.key" | |
certificate-file: "/etc/ssl/walnutblockcottages.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.walnutblockcottages.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.walnutblockcottages.co.nz.key" | |
certificate-file: "/etc/ssl/www.walnutblockcottages.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bedandbreakfastupperhutt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bedandbreakfastupperhutt.co.nz.key" | |
certificate-file: "/etc/ssl/www.bedandbreakfastupperhutt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bedandbreakfastupperhutt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bedandbreakfastupperhutt.co.nz.key" | |
certificate-file: "/etc/ssl/bedandbreakfastupperhutt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.tranquilityhomestay.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.tranquilityhomestay.co.nz.key" | |
certificate-file: "/etc/ssl/www.tranquilityhomestay.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
tranquilityhomestay.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/tranquilityhomestay.co.nz.key" | |
certificate-file: "/etc/ssl/tranquilityhomestay.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.tranquilityhomestay.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.tranquilityhomestay.com.key" | |
certificate-file: "/etc/ssl/www.tranquilityhomestay.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
tranquilityhomestay.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/tranquilityhomestay.com.key" | |
certificate-file: "/etc/ssl/tranquilityhomestay.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.tranquilityhomestay.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.tranquilityhomestay.nz.key" | |
certificate-file: "/etc/ssl/www.tranquilityhomestay.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
tranquilityhomestay.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/tranquilityhomestay.nz.key" | |
certificate-file: "/etc/ssl/tranquilityhomestay.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.modernmusic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.modernmusic.co.nz.key" | |
certificate-file: "/etc/ssl/www.modernmusic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
modernmusic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/modernmusic.co.nz.key" | |
certificate-file: "/etc/ssl/modernmusic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
pianolessonsauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/pianolessonsauckland.co.nz.key" | |
certificate-file: "/etc/ssl/pianolessonsauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
guitarlessonsauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/guitarlessonsauckland.co.nz.key" | |
certificate-file: "/etc/ssl/guitarlessonsauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
modernmusic.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/modernmusic.nz.key" | |
certificate-file: "/etc/ssl/modernmusic.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.modernmusic.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.modernmusic.nz.key" | |
certificate-file: "/etc/ssl/www.modernmusic.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
guitarlessonsauckland.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/guitarlessonsauckland.nz.key" | |
certificate-file: "/etc/ssl/guitarlessonsauckland.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.guitarlessonsauckland.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.guitarlessonsauckland.nz.key" | |
certificate-file: "/etc/ssl/www.guitarlessonsauckland.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
pianolessonsauckland.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/pianolessonsauckland.nz.key" | |
certificate-file: "/etc/ssl/pianolessonsauckland.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.pianolessonsauckland.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.pianolessonsauckland.nz.key" | |
certificate-file: "/etc/ssl/www.pianolessonsauckland.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.guitarlessonsauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.guitarlessonsauckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.guitarlessonsauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.pianolessonsauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.pianolessonsauckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.pianolessonsauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
scanningsolutions.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/scanningsolutions.co.nz.key" | |
certificate-file: "/etc/ssl/scanningsolutions.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.scanningsolutions.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.scanningsolutions.co.nz.key" | |
certificate-file: "/etc/ssl/www.scanningsolutions.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mobilehand.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mobilehand.co.nz.key" | |
certificate-file: "/etc/ssl/www.mobilehand.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mobilehand.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mobilehand.co.nz.key" | |
certificate-file: "/etc/ssl/mobilehand.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
carvalet.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/carvalet.co.nz.key" | |
certificate-file: "/etc/ssl/carvalet.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.carvalet.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.carvalet.co.nz.key" | |
certificate-file: "/etc/ssl/www.carvalet.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.matangioaks.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.matangioaks.co.nz.key" | |
certificate-file: "/etc/ssl/www.matangioaks.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
matangioaks.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/matangioaks.co.nz.key" | |
certificate-file: "/etc/ssl/matangioaks.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.theskinspa.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.theskinspa.co.nz.key" | |
certificate-file: "/etc/ssl/www.theskinspa.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
theskinspa.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/theskinspa.co.nz.key" | |
certificate-file: "/etc/ssl/theskinspa.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.skinspa.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.skinspa.co.nz.key" | |
certificate-file: "/etc/ssl/www.skinspa.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
skinspa.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/skinspa.co.nz.key" | |
certificate-file: "/etc/ssl/skinspa.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.westlandworkgear.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.westlandworkgear.co.nz.key" | |
certificate-file: "/etc/ssl/www.westlandworkgear.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
westlandworkgear.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/westlandworkgear.co.nz.key" | |
certificate-file: "/etc/ssl/westlandworkgear.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kidrepublic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kidrepublic.co.nz.key" | |
certificate-file: "/etc/ssl/kidrepublic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kidrepublic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kidrepublic.co.nz.key" | |
certificate-file: "/etc/ssl/www.kidrepublic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
salonshield.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/salonshield.com.key" | |
certificate-file: "/etc/ssl/salonshield.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
salons.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/salons.co.nz.key" | |
certificate-file: "/etc/ssl/salons.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
salonsgroup.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/salonsgroup.com.key" | |
certificate-file: "/etc/ssl/salonsgroup.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.salonshield.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.salonshield.com.key" | |
certificate-file: "/etc/ssl/www.salonshield.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.salons.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.salons.co.nz.key" | |
certificate-file: "/etc/ssl/www.salons.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.salonsgroup.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.salonsgroup.com.key" | |
certificate-file: "/etc/ssl/www.salonsgroup.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.graedonjoinery.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.graedonjoinery.co.nz.key" | |
certificate-file: "/etc/ssl/www.graedonjoinery.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
graedonjoinery.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/graedonjoinery.co.nz.key" | |
certificate-file: "/etc/ssl/graedonjoinery.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
go30nails.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/go30nails.com.key" | |
certificate-file: "/etc/ssl/go30nails.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.go30nails.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.go30nails.com.key" | |
certificate-file: "/etc/ssl/www.go30nails.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
auroraclothing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/auroraclothing.co.nz.key" | |
certificate-file: "/etc/ssl/auroraclothing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.auroraclothing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.auroraclothing.co.nz.key" | |
certificate-file: "/etc/ssl/www.auroraclothing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cloke.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cloke.co.nz.key" | |
certificate-file: "/etc/ssl/www.cloke.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cloke.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cloke.co.nz.key" | |
certificate-file: "/etc/ssl/cloke.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cloke.auroraclothing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cloke.auroraclothing.co.nz.key" | |
certificate-file: "/etc/ssl/cloke.auroraclothing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
lovelysmile.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/lovelysmile.co.nz.key" | |
certificate-file: "/etc/ssl/lovelysmile.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
teethwhitening-auckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/teethwhitening-auckland.co.nz.key" | |
certificate-file: "/etc/ssl/teethwhitening-auckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.teethwhitening-auckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.teethwhitening-auckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.teethwhitening-auckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
athometeethwhitening.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/athometeethwhitening.co.nz.key" | |
certificate-file: "/etc/ssl/athometeethwhitening.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.lovelysmile.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.lovelysmile.co.nz.key" | |
certificate-file: "/etc/ssl/www.lovelysmile.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bestteethwhiteningauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bestteethwhiteningauckland.co.nz.key" | |
certificate-file: "/etc/ssl/bestteethwhiteningauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
teethbleachingauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/teethbleachingauckland.co.nz.key" | |
certificate-file: "/etc/ssl/teethbleachingauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
teethbleachingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/teethbleachingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/teethbleachingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
teethwhitening-wellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/teethwhitening-wellington.co.nz.key" | |
certificate-file: "/etc/ssl/teethwhitening-wellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.athometeethwhitening.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.athometeethwhitening.co.nz.key" | |
certificate-file: "/etc/ssl/www.athometeethwhitening.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bestteethwhiteningauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bestteethwhiteningauckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.bestteethwhiteningauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.teethbleachingauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.teethbleachingauckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.teethbleachingauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.teethbleachingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.teethbleachingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.teethbleachingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.teethwhitening-wellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.teethwhitening-wellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.teethwhitening-wellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.lovelysmiles.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.lovelysmiles.co.nz.key" | |
certificate-file: "/etc/ssl/www.lovelysmiles.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
lovelysmiles.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/lovelysmiles.co.nz.key" | |
certificate-file: "/etc/ssl/lovelysmiles.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
precisionplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/precisionplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/precisionplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.precisionplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.precisionplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/www.precisionplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
duffylandscapes.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/duffylandscapes.co.nz.key" | |
certificate-file: "/etc/ssl/duffylandscapes.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.duffylandscapes.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.duffylandscapes.co.nz.key" | |
certificate-file: "/etc/ssl/www.duffylandscapes.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.croweconstruction.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.croweconstruction.co.nz.key" | |
certificate-file: "/etc/ssl/www.croweconstruction.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
croweconstruction.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/croweconstruction.co.nz.key" | |
certificate-file: "/etc/ssl/croweconstruction.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.ccal.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.ccal.co.nz.key" | |
certificate-file: "/etc/ssl/www.ccal.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
ccal.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/ccal.co.nz.key" | |
certificate-file: "/etc/ssl/ccal.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.allmacksconcrete.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.allmacksconcrete.co.nz.key" | |
certificate-file: "/etc/ssl/www.allmacksconcrete.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
allmacksconcrete.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/allmacksconcrete.co.nz.key" | |
certificate-file: "/etc/ssl/allmacksconcrete.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.hogansprayandpump.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.hogansprayandpump.co.nz.key" | |
certificate-file: "/etc/ssl/www.hogansprayandpump.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
hogansprayandpump.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/hogansprayandpump.co.nz.key" | |
certificate-file: "/etc/ssl/hogansprayandpump.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.hogansp.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.hogansp.nz.key" | |
certificate-file: "/etc/ssl/www.hogansp.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
hogansp.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/hogansp.nz.key" | |
certificate-file: "/etc/ssl/hogansp.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kapiticoastshuttles.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kapiticoastshuttles.co.nz.key" | |
certificate-file: "/etc/ssl/www.kapiticoastshuttles.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kapiticoastshuttles.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kapiticoastshuttles.co.nz.key" | |
certificate-file: "/etc/ssl/kapiticoastshuttles.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
offthepage.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/offthepage.co.nz.key" | |
certificate-file: "/etc/ssl/offthepage.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.offthepage.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.offthepage.co.nz.key" | |
certificate-file: "/etc/ssl/www.offthepage.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.janssenpainters.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.janssenpainters.co.nz.key" | |
certificate-file: "/etc/ssl/www.janssenpainters.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
janssenpainters.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/janssenpainters.co.nz.key" | |
certificate-file: "/etc/ssl/janssenpainters.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bruntwoodnurseries.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bruntwoodnurseries.co.nz.key" | |
certificate-file: "/etc/ssl/www.bruntwoodnurseries.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bruntwoodnurseries.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bruntwoodnurseries.co.nz.key" | |
certificate-file: "/etc/ssl/bruntwoodnurseries.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.affordableelectrical.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.affordableelectrical.co.nz.key" | |
certificate-file: "/etc/ssl/www.affordableelectrical.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
affordableelectrical.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/affordableelectrical.co.nz.key" | |
certificate-file: "/etc/ssl/affordableelectrical.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cranfordmowers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cranfordmowers.co.nz.key" | |
certificate-file: "/etc/ssl/cranfordmowers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cranfordmowers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cranfordmowers.co.nz.key" | |
certificate-file: "/etc/ssl/www.cranfordmowers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.allkeysandsecurity.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.allkeysandsecurity.co.nz.key" | |
certificate-file: "/etc/ssl/www.allkeysandsecurity.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
allkeysandsecurity.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/allkeysandsecurity.co.nz.key" | |
certificate-file: "/etc/ssl/allkeysandsecurity.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.allkeys.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.allkeys.co.nz.key" | |
certificate-file: "/etc/ssl/www.allkeys.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
allkeys.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/allkeys.co.nz.key" | |
certificate-file: "/etc/ssl/allkeys.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.dunedinurgentdoctors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.dunedinurgentdoctors.co.nz.key" | |
certificate-file: "/etc/ssl/www.dunedinurgentdoctors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
dunedinurgentdoctors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/dunedinurgentdoctors.co.nz.key" | |
certificate-file: "/etc/ssl/dunedinurgentdoctors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
dunedinurgentdoctors.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/dunedinurgentdoctors.com.key" | |
certificate-file: "/etc/ssl/dunedinurgentdoctors.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.pandbautoelec.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.pandbautoelec.co.nz.key" | |
certificate-file: "/etc/ssl/www.pandbautoelec.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
pandbautoelec.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/pandbautoelec.co.nz.key" | |
certificate-file: "/etc/ssl/pandbautoelec.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.autoelectricalhamilton.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.autoelectricalhamilton.co.nz.key" | |
certificate-file: "/etc/ssl/www.autoelectricalhamilton.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
autoelectricalhamilton.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/autoelectricalhamilton.co.nz.key" | |
certificate-file: "/etc/ssl/autoelectricalhamilton.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.pandb.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.pandb.co.nz.key" | |
certificate-file: "/etc/ssl/www.pandb.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
pandb.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/pandb.co.nz.key" | |
certificate-file: "/etc/ssl/pandb.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
pandbgroup.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/pandbgroup.co.nz.key" | |
certificate-file: "/etc/ssl/pandbgroup.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.pandbgroup.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.pandbgroup.co.nz.key" | |
certificate-file: "/etc/ssl/www.pandbgroup.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
locksmithskapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/locksmithskapiti.co.nz.key" | |
certificate-file: "/etc/ssl/locksmithskapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.locksmithskapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.locksmithskapiti.co.nz.key" | |
certificate-file: "/etc/ssl/www.locksmithskapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
armstronglandscape.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/armstronglandscape.co.nz.key" | |
certificate-file: "/etc/ssl/armstronglandscape.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.armstronglandscape.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.armstronglandscape.co.nz.key" | |
certificate-file: "/etc/ssl/www.armstronglandscape.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
caiimichelle.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/caiimichelle.co.nz.key" | |
certificate-file: "/etc/ssl/caiimichelle.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.caiimichelle.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.caiimichelle.co.nz.key" | |
certificate-file: "/etc/ssl/www.caiimichelle.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
managemyrental.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/managemyrental.nz.key" | |
certificate-file: "/etc/ssl/managemyrental.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.managemyrental.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.managemyrental.co.nz.key" | |
certificate-file: "/etc/ssl/www.managemyrental.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
managemyrental.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/managemyrental.co.nz.key" | |
certificate-file: "/etc/ssl/managemyrental.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.managemyrental.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.managemyrental.nz.key" | |
certificate-file: "/etc/ssl/www.managemyrental.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
waterdeliverywaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/waterdeliverywaikato.co.nz.key" | |
certificate-file: "/etc/ssl/waterdeliverywaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.waikatowater.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.waikatowater.co.nz.key" | |
certificate-file: "/etc/ssl/www.waikatowater.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.waterdeliverywaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.waterdeliverywaikato.co.nz.key" | |
certificate-file: "/etc/ssl/www.waterdeliverywaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
waikatowater.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/waikatowater.co.nz.key" | |
certificate-file: "/etc/ssl/waikatowater.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.skotixdesign.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.skotixdesign.co.nz.key" | |
certificate-file: "/etc/ssl/www.skotixdesign.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
skotixdesign.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/skotixdesign.co.nz.key" | |
certificate-file: "/etc/ssl/skotixdesign.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.helenjonesphotography.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.helenjonesphotography.co.nz.key" | |
certificate-file: "/etc/ssl/www.helenjonesphotography.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
helenjonesphotography.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/helenjonesphotography.co.nz.key" | |
certificate-file: "/etc/ssl/helenjonesphotography.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.epulse.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.epulse.co.nz.key" | |
certificate-file: "/etc/ssl/www.epulse.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
epulse.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/epulse.co.nz.key" | |
certificate-file: "/etc/ssl/epulse.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cellfield.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cellfield.co.nz.key" | |
certificate-file: "/etc/ssl/www.cellfield.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cellfield.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cellfield.co.nz.key" | |
certificate-file: "/etc/ssl/cellfield.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cstservices.net.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cstservices.net.nz.key" | |
certificate-file: "/etc/ssl/www.cstservices.net.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cstservices.net.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cstservices.net.nz.key" | |
certificate-file: "/etc/ssl/cstservices.net.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cambridgeseptictankservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cambridgeseptictankservices.co.nz.key" | |
certificate-file: "/etc/ssl/www.cambridgeseptictankservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cambridgeseptictankservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cambridgeseptictankservices.co.nz.key" | |
certificate-file: "/etc/ssl/cambridgeseptictankservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
m.skinspa.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/m.skinspa.co.nz.key" | |
certificate-file: "/etc/ssl/m.skinspa.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
quinlanquality.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/quinlanquality.co.nz.key" | |
certificate-file: "/etc/ssl/quinlanquality.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.quinlanquality.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.quinlanquality.co.nz.key" | |
certificate-file: "/etc/ssl/www.quinlanquality.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.penndesign.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.penndesign.co.nz.key" | |
certificate-file: "/etc/ssl/www.penndesign.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
penndesign.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/penndesign.co.nz.key" | |
certificate-file: "/etc/ssl/penndesign.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.centralplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.centralplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/www.centralplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
centralplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/centralplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/centralplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.aplusservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.aplusservices.co.nz.key" | |
certificate-file: "/etc/ssl/www.aplusservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
aplusservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/aplusservices.co.nz.key" | |
certificate-file: "/etc/ssl/aplusservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.completeglass.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.completeglass.co.nz.key" | |
certificate-file: "/etc/ssl/www.completeglass.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
completeglass.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/completeglass.co.nz.key" | |
certificate-file: "/etc/ssl/completeglass.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wholesaleplantstauranga.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wholesaleplantstauranga.co.nz.key" | |
certificate-file: "/etc/ssl/www.wholesaleplantstauranga.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wholesaleplantstauranga.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wholesaleplantstauranga.co.nz.key" | |
certificate-file: "/etc/ssl/wholesaleplantstauranga.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
beechwoodplants.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/beechwoodplants.co.nz.key" | |
certificate-file: "/etc/ssl/beechwoodplants.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.beechwoodplants.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.beechwoodplants.co.nz.key" | |
certificate-file: "/etc/ssl/www.beechwoodplants.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mcguirepropertymanagement.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mcguirepropertymanagement.co.nz.key" | |
certificate-file: "/etc/ssl/mcguirepropertymanagement.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
vickimcguire.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/vickimcguire.co.nz.key" | |
certificate-file: "/etc/ssl/vickimcguire.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mcguirepropertymanagement.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mcguirepropertymanagement.co.nz.key" | |
certificate-file: "/etc/ssl/www.mcguirepropertymanagement.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.vickimcguire.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.vickimcguire.co.nz.key" | |
certificate-file: "/etc/ssl/www.vickimcguire.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mcguirepm.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mcguirepm.co.nz.key" | |
certificate-file: "/etc/ssl/www.mcguirepm.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mcguirepm.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mcguirepm.co.nz.key" | |
certificate-file: "/etc/ssl/mcguirepm.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.gr8smile.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.gr8smile.co.nz.key" | |
certificate-file: "/etc/ssl/www.gr8smile.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
gr8smile.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/gr8smile.co.nz.key" | |
certificate-file: "/etc/ssl/gr8smile.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.elt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.elt.co.nz.key" | |
certificate-file: "/etc/ssl/www.elt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
elt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/elt.co.nz.key" | |
certificate-file: "/etc/ssl/elt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
elt.kiwi: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/elt.kiwi.key" | |
certificate-file: "/etc/ssl/elt.kiwi.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.elt.kiwi: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.elt.kiwi.key" | |
certificate-file: "/etc/ssl/www.elt.kiwi.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.simplyyouneek.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.simplyyouneek.co.nz.key" | |
certificate-file: "/etc/ssl/www.simplyyouneek.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
simplyyouneek.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/simplyyouneek.co.nz.key" | |
certificate-file: "/etc/ssl/simplyyouneek.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.takapunacontractors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.takapunacontractors.co.nz.key" | |
certificate-file: "/etc/ssl/www.takapunacontractors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
takapunacontractors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/takapunacontractors.co.nz.key" | |
certificate-file: "/etc/ssl/takapunacontractors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kamenicottage.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kamenicottage.nz.key" | |
certificate-file: "/etc/ssl/www.kamenicottage.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kamenicottage.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kamenicottage.nz.key" | |
certificate-file: "/etc/ssl/kamenicottage.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kamenicottage.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kamenicottage.co.nz.key" | |
certificate-file: "/etc/ssl/www.kamenicottage.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kamenicottage.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kamenicottage.co.nz.key" | |
certificate-file: "/etc/ssl/kamenicottage.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.gentlepc.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.gentlepc.co.nz.key" | |
certificate-file: "/etc/ssl/www.gentlepc.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
gentlepc.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/gentlepc.co.nz.key" | |
certificate-file: "/etc/ssl/gentlepc.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.concretecuttingwaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.concretecuttingwaikato.co.nz.key" | |
certificate-file: "/etc/ssl/www.concretecuttingwaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
concretecuttingwaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/concretecuttingwaikato.co.nz.key" | |
certificate-file: "/etc/ssl/concretecuttingwaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.ideaarchitecture.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.ideaarchitecture.co.nz.key" | |
certificate-file: "/etc/ssl/www.ideaarchitecture.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
ideaarchitecture.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/ideaarchitecture.co.nz.key" | |
certificate-file: "/etc/ssl/ideaarchitecture.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kenwilsonmeats.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kenwilsonmeats.co.nz.key" | |
certificate-file: "/etc/ssl/www.kenwilsonmeats.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kenwilsonmeats.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kenwilsonmeats.com.key" | |
certificate-file: "/etc/ssl/www.kenwilsonmeats.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kenwilsonmeats.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kenwilsonmeats.nz.key" | |
certificate-file: "/etc/ssl/kenwilsonmeats.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kenwilsonmeats.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kenwilsonmeats.com.key" | |
certificate-file: "/etc/ssl/kenwilsonmeats.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kenwilsonmeats.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kenwilsonmeats.nz.key" | |
certificate-file: "/etc/ssl/www.kenwilsonmeats.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kam.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kam.co.nz.key" | |
certificate-file: "/etc/ssl/www.kam.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kam.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kam.co.nz.key" | |
certificate-file: "/etc/ssl/kam.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kamtransport.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kamtransport.co.nz.key" | |
certificate-file: "/etc/ssl/kamtransport.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kamtransport.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kamtransport.co.nz.key" | |
certificate-file: "/etc/ssl/www.kamtransport.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kamtransport.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kamtransport.nz.key" | |
certificate-file: "/etc/ssl/kamtransport.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kamtransport.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kamtransport.nz.key" | |
certificate-file: "/etc/ssl/www.kamtransport.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kam.net.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kam.net.nz.key" | |
certificate-file: "/etc/ssl/kam.net.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kam.net.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kam.net.nz.key" | |
certificate-file: "/etc/ssl/www.kam.net.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
brucesgaragedoorservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/brucesgaragedoorservices.co.nz.key" | |
certificate-file: "/etc/ssl/brucesgaragedoorservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.brucesgaragedoorservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.brucesgaragedoorservices.co.nz.key" | |
certificate-file: "/etc/ssl/www.brucesgaragedoorservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
kevinsgaragedoorservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/kevinsgaragedoorservices.co.nz.key" | |
certificate-file: "/etc/ssl/kevinsgaragedoorservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kevinsgaragedoorservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kevinsgaragedoorservices.co.nz.key" | |
certificate-file: "/etc/ssl/www.kevinsgaragedoorservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.patsgas.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.patsgas.co.nz.key" | |
certificate-file: "/etc/ssl/www.patsgas.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
patsgas.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/patsgas.co.nz.key" | |
certificate-file: "/etc/ssl/patsgas.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.newimagehomes.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.newimagehomes.co.nz.key" | |
certificate-file: "/etc/ssl/www.newimagehomes.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
newimagehomes.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/newimagehomes.co.nz.key" | |
certificate-file: "/etc/ssl/newimagehomes.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.nzpestcontrol.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.nzpestcontrol.nz.key" | |
certificate-file: "/etc/ssl/www.nzpestcontrol.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
nzpestcontrol.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/nzpestcontrol.co.nz.key" | |
certificate-file: "/etc/ssl/nzpestcontrol.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
nzpestcontrol.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/nzpestcontrol.nz.key" | |
certificate-file: "/etc/ssl/nzpestcontrol.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.nzpestcontrol.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.nzpestcontrol.co.nz.key" | |
certificate-file: "/etc/ssl/www.nzpestcontrol.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
cockroachcontrolpalmerstonnorth.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/cockroachcontrolpalmerstonnorth.co.nz.key" | |
certificate-file: "/etc/ssl/cockroachcontrolpalmerstonnorth.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.cockroachcontrolpalmerstonnorth.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.cockroachcontrolpalmerstonnorth.co.nz.key" | |
certificate-file: "/etc/ssl/www.cockroachcontrolpalmerstonnorth.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.rodentcontrolpalmerstonnorth.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.rodentcontrolpalmerstonnorth.co.nz.key" | |
certificate-file: "/etc/ssl/www.rodentcontrolpalmerstonnorth.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
rodentcontrolpalmerstonnorth.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/rodentcontrolpalmerstonnorth.co.nz.key" | |
certificate-file: "/etc/ssl/rodentcontrolpalmerstonnorth.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
m.nzpestcontrol.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/m.nzpestcontrol.co.nz.key" | |
certificate-file: "/etc/ssl/m.nzpestcontrol.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bugbustersmanawatu.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bugbustersmanawatu.co.nz.key" | |
certificate-file: "/etc/ssl/www.bugbustersmanawatu.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bugbustersmanawatu.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bugbustersmanawatu.co.nz.key" | |
certificate-file: "/etc/ssl/bugbustersmanawatu.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bugsawaymanawatu.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bugsawaymanawatu.co.nz.key" | |
certificate-file: "/etc/ssl/www.bugsawaymanawatu.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bugsawaymanawatu.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bugsawaymanawatu.co.nz.key" | |
certificate-file: "/etc/ssl/bugsawaymanawatu.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
technoinsulation.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/technoinsulation.com.key" | |
certificate-file: "/etc/ssl/technoinsulation.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.technoinsulation.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.technoinsulation.com.key" | |
certificate-file: "/etc/ssl/www.technoinsulation.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.goldshealthandfitness.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.goldshealthandfitness.co.nz.key" | |
certificate-file: "/etc/ssl/www.goldshealthandfitness.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
golds.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/golds.co.nz.key" | |
certificate-file: "/etc/ssl/golds.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.golds.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.golds.co.nz.key" | |
certificate-file: "/etc/ssl/www.golds.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
goldshealthandfitness.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/goldshealthandfitness.co.nz.key" | |
certificate-file: "/etc/ssl/goldshealthandfitness.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
nztempfences.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/nztempfences.co.nz.key" | |
certificate-file: "/etc/ssl/nztempfences.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.nztempfences.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.nztempfences.co.nz.key" | |
certificate-file: "/etc/ssl/www.nztempfences.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.carpetcleanerwaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.carpetcleanerwaikato.co.nz.key" | |
certificate-file: "/etc/ssl/www.carpetcleanerwaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
carpetcleanerwaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/carpetcleanerwaikato.co.nz.key" | |
certificate-file: "/etc/ssl/carpetcleanerwaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.masterglaziers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.masterglaziers.co.nz.key" | |
certificate-file: "/etc/ssl/www.masterglaziers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
masterglaziers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/masterglaziers.co.nz.key" | |
certificate-file: "/etc/ssl/masterglaziers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.darrylpinny.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.darrylpinny.co.nz.key" | |
certificate-file: "/etc/ssl/www.darrylpinny.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
darrylpinny.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/darrylpinny.co.nz.key" | |
certificate-file: "/etc/ssl/darrylpinny.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mortgageandinsurance.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mortgageandinsurance.co.nz.key" | |
certificate-file: "/etc/ssl/www.mortgageandinsurance.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mortgageandinsurance.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mortgageandinsurance.co.nz.key" | |
certificate-file: "/etc/ssl/mortgageandinsurance.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
accordplastics.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/accordplastics.co.nz.key" | |
certificate-file: "/etc/ssl/accordplastics.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.accordplastics.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.accordplastics.co.nz.key" | |
certificate-file: "/etc/ssl/www.accordplastics.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.decoprecasters.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.decoprecasters.co.nz.key" | |
certificate-file: "/etc/ssl/www.decoprecasters.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
decoprecasters.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/decoprecasters.co.nz.key" | |
certificate-file: "/etc/ssl/decoprecasters.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
sherlockcontractors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/sherlockcontractors.co.nz.key" | |
certificate-file: "/etc/ssl/sherlockcontractors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.sherlockcontractors.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.sherlockcontractors.co.nz.key" | |
certificate-file: "/etc/ssl/www.sherlockcontractors.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.taxlinkhamilton.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.taxlinkhamilton.co.nz.key" | |
certificate-file: "/etc/ssl/www.taxlinkhamilton.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
taxlinkhamilton.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/taxlinkhamilton.co.nz.key" | |
certificate-file: "/etc/ssl/taxlinkhamilton.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.thebookkeeper.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.thebookkeeper.co.nz.key" | |
certificate-file: "/etc/ssl/www.thebookkeeper.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
thebookkeeper.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/thebookkeeper.co.nz.key" | |
certificate-file: "/etc/ssl/thebookkeeper.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
thebookkeeper.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/thebookkeeper.nz.key" | |
certificate-file: "/etc/ssl/thebookkeeper.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.thebookkeeper.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.thebookkeeper.nz.key" | |
certificate-file: "/etc/ssl/www.thebookkeeper.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
upnatomelectrical.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/upnatomelectrical.co.nz.key" | |
certificate-file: "/etc/ssl/upnatomelectrical.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.upnatomelectrical.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.upnatomelectrical.co.nz.key" | |
certificate-file: "/etc/ssl/www.upnatomelectrical.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
stevewrightbuilders.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/stevewrightbuilders.co.nz.key" | |
certificate-file: "/etc/ssl/stevewrightbuilders.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.stevewrightbuilders.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.stevewrightbuilders.co.nz.key" | |
certificate-file: "/etc/ssl/www.stevewrightbuilders.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
plumbing-wellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/plumbing-wellington.co.nz.key" | |
certificate-file: "/etc/ssl/plumbing-wellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.plumbing-wellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.plumbing-wellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.plumbing-wellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.parkclarke.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.parkclarke.co.nz.key" | |
certificate-file: "/etc/ssl/www.parkclarke.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
parkclarke.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/parkclarke.co.nz.key" | |
certificate-file: "/etc/ssl/parkclarke.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.idealdecorators.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.idealdecorators.nz.key" | |
certificate-file: "/etc/ssl/www.idealdecorators.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
idealdecorators.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/idealdecorators.nz.key" | |
certificate-file: "/etc/ssl/idealdecorators.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bighugz.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bighugz.co.nz.key" | |
certificate-file: "/etc/ssl/www.bighugz.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bighugz.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bighugz.com.key" | |
certificate-file: "/etc/ssl/www.bighugz.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bighugz.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bighugz.com.key" | |
certificate-file: "/etc/ssl/bighugz.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bighugz.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bighugz.co.nz.key" | |
certificate-file: "/etc/ssl/bighugz.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.aadrainagewellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.aadrainagewellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.aadrainagewellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
aadrainagewellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/aadrainagewellington.co.nz.key" | |
certificate-file: "/etc/ssl/aadrainagewellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.drainunblockerwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.drainunblockerwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.drainunblockerwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
drainunblockerwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/drainunblockerwellington.co.nz.key" | |
certificate-file: "/etc/ssl/drainunblockerwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.popehomes.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.popehomes.co.nz.key" | |
certificate-file: "/etc/ssl/www.popehomes.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
popehomes.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/popehomes.co.nz.key" | |
certificate-file: "/etc/ssl/popehomes.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
pje.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/pje.co.nz.key" | |
certificate-file: "/etc/ssl/pje.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.pje.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.pje.co.nz.key" | |
certificate-file: "/etc/ssl/www.pje.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bayplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bayplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/www.bayplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bayplumbing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bayplumbing.co.nz.key" | |
certificate-file: "/etc/ssl/bayplumbing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bayplumbingsolutions.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bayplumbingsolutions.co.nz.key" | |
certificate-file: "/etc/ssl/www.bayplumbingsolutions.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bayplumbingsolutions.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bayplumbingsolutions.co.nz.key" | |
certificate-file: "/etc/ssl/bayplumbingsolutions.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.emergencyplumbertauranga.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.emergencyplumbertauranga.co.nz.key" | |
certificate-file: "/etc/ssl/www.emergencyplumbertauranga.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
emergencyplumbertauranga.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/emergencyplumbertauranga.co.nz.key" | |
certificate-file: "/etc/ssl/emergencyplumbertauranga.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
m.bayplumbingsolutions.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/m.bayplumbingsolutions.co.nz.key" | |
certificate-file: "/etc/ssl/m.bayplumbingsolutions.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mulchman.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mulchman.co.nz.key" | |
certificate-file: "/etc/ssl/mulchman.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mulchman.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mulchman.co.nz.key" | |
certificate-file: "/etc/ssl/www.mulchman.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mikecreedybuilding.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mikecreedybuilding.co.nz.key" | |
certificate-file: "/etc/ssl/mikecreedybuilding.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mikecreedybuilding.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mikecreedybuilding.co.nz.key" | |
certificate-file: "/etc/ssl/www.mikecreedybuilding.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
creedybuilding.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/creedybuilding.co.nz.key" | |
certificate-file: "/etc/ssl/creedybuilding.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.creedybuilding.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.creedybuilding.co.nz.key" | |
certificate-file: "/etc/ssl/www.creedybuilding.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wassong.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wassong.co.nz.key" | |
certificate-file: "/etc/ssl/wassong.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wassong.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wassong.co.nz.key" | |
certificate-file: "/etc/ssl/www.wassong.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bkshamiltonmotel.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bkshamiltonmotel.co.nz.key" | |
certificate-file: "/etc/ssl/bkshamiltonmotel.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bkshamiltonmotel.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bkshamiltonmotel.co.nz.key" | |
certificate-file: "/etc/ssl/www.bkshamiltonmotel.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.paperquip.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.paperquip.co.nz.key" | |
certificate-file: "/etc/ssl/www.paperquip.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
paperquip.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/paperquip.co.nz.key" | |
certificate-file: "/etc/ssl/paperquip.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mbsecurity.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mbsecurity.co.nz.key" | |
certificate-file: "/etc/ssl/mbsecurity.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mbsecurity.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mbsecurity.co.nz.key" | |
certificate-file: "/etc/ssl/www.mbsecurity.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.mbsecurity.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.mbsecurity.nz.key" | |
certificate-file: "/etc/ssl/www.mbsecurity.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
mbsecurity.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/mbsecurity.nz.key" | |
certificate-file: "/etc/ssl/mbsecurity.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.thai-happy.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.thai-happy.nz.key" | |
certificate-file: "/etc/ssl/www.thai-happy.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.ptestingservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.ptestingservices.co.nz.key" | |
certificate-file: "/etc/ssl/www.ptestingservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
ptestingservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/ptestingservices.co.nz.key" | |
certificate-file: "/etc/ssl/ptestingservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wastewatertransport.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wastewatertransport.co.nz.key" | |
certificate-file: "/etc/ssl/wastewatertransport.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wastewatertransport.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wastewatertransport.co.nz.key" | |
certificate-file: "/etc/ssl/www.wastewatertransport.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wwt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wwt.co.nz.key" | |
certificate-file: "/etc/ssl/www.wwt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wwt.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wwt.co.nz.key" | |
certificate-file: "/etc/ssl/wwt.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
nellsnaturalhealthclinic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/nellsnaturalhealthclinic.co.nz.key" | |
certificate-file: "/etc/ssl/nellsnaturalhealthclinic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.nellsnaturalhealthclinic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.nellsnaturalhealthclinic.co.nz.key" | |
certificate-file: "/etc/ssl/www.nellsnaturalhealthclinic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.shadyattia.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.shadyattia.co.nz.key" | |
certificate-file: "/etc/ssl/www.shadyattia.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.shadyattia.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.shadyattia.com.key" | |
certificate-file: "/etc/ssl/www.shadyattia.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
shadyattia.com: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/shadyattia.com.key" | |
certificate-file: "/etc/ssl/shadyattia.com.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
shadyattia.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/shadyattia.co.nz.key" | |
certificate-file: "/etc/ssl/shadyattia.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
tcm.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/tcm.co.nz.key" | |
certificate-file: "/etc/ssl/tcm.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.tcm.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.tcm.co.nz.key" | |
certificate-file: "/etc/ssl/www.tcm.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.teaguescleaning.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.teaguescleaning.co.nz.key" | |
certificate-file: "/etc/ssl/www.teaguescleaning.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
teaguescleaning.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/teaguescleaning.co.nz.key" | |
certificate-file: "/etc/ssl/teaguescleaning.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.taxlinkbop.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.taxlinkbop.co.nz.key" | |
certificate-file: "/etc/ssl/www.taxlinkbop.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
taxlinkbop.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/taxlinkbop.co.nz.key" | |
certificate-file: "/etc/ssl/taxlinkbop.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
littleflowershop.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/littleflowershop.co.nz.key" | |
certificate-file: "/etc/ssl/littleflowershop.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.littleflowershop.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.littleflowershop.co.nz.key" | |
certificate-file: "/etc/ssl/www.littleflowershop.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.sharemarketing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.sharemarketing.co.nz.key" | |
certificate-file: "/etc/ssl/www.sharemarketing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
sharemarketing.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/sharemarketing.co.nz.key" | |
certificate-file: "/etc/ssl/sharemarketing.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.deconcleaning.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.deconcleaning.co.nz.key" | |
certificate-file: "/etc/ssl/www.deconcleaning.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
deconcleaning.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/deconcleaning.co.nz.key" | |
certificate-file: "/etc/ssl/deconcleaning.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.gseengineering.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.gseengineering.co.nz.key" | |
certificate-file: "/etc/ssl/www.gseengineering.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
gseengineering.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/gseengineering.co.nz.key" | |
certificate-file: "/etc/ssl/gseengineering.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.gse.org.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.gse.org.nz.key" | |
certificate-file: "/etc/ssl/www.gse.org.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
gse.org.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/gse.org.nz.key" | |
certificate-file: "/etc/ssl/gse.org.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
leadbuilders.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/leadbuilders.co.nz.key" | |
certificate-file: "/etc/ssl/leadbuilders.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.leadbuilders.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.leadbuilders.co.nz.key" | |
certificate-file: "/etc/ssl/www.leadbuilders.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.sudzlaundrydunedin.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.sudzlaundrydunedin.co.nz.key" | |
certificate-file: "/etc/ssl/www.sudzlaundrydunedin.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
loganbrown.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/loganbrown.co.nz.key" | |
certificate-file: "/etc/ssl/loganbrown.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.loganbrown.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.loganbrown.co.nz.key" | |
certificate-file: "/etc/ssl/www.loganbrown.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.kiwicad.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.kiwicad.co.nz.key" | |
certificate-file: "/etc/ssl/www.kiwicad.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
copsefordflowers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/copsefordflowers.co.nz.key" | |
certificate-file: "/etc/ssl/copsefordflowers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.copsefordflowers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.copsefordflowers.co.nz.key" | |
certificate-file: "/etc/ssl/www.copsefordflowers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
coastlandsflorist.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/coastlandsflorist.co.nz.key" | |
certificate-file: "/etc/ssl/coastlandsflorist.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
copsefordflowers.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/copsefordflowers.nz.key" | |
certificate-file: "/etc/ssl/copsefordflowers.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.copsefordflowers.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.copsefordflowers.nz.key" | |
certificate-file: "/etc/ssl/www.copsefordflowers.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.coastlandsflowers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.coastlandsflowers.co.nz.key" | |
certificate-file: "/etc/ssl/www.coastlandsflowers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
coastlandsflowers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/coastlandsflowers.co.nz.key" | |
certificate-file: "/etc/ssl/coastlandsflowers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.coastlandsflowers.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.coastlandsflowers.nz.key" | |
certificate-file: "/etc/ssl/www.coastlandsflowers.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.coastlandsflorist.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.coastlandsflorist.co.nz.key" | |
certificate-file: "/etc/ssl/www.coastlandsflorist.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
coastlandsflowers.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/coastlandsflowers.nz.key" | |
certificate-file: "/etc/ssl/coastlandsflowers.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.coastlandsflorist.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.coastlandsflorist.nz.key" | |
certificate-file: "/etc/ssl/www.coastlandsflorist.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
coastlandsflorist.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/coastlandsflorist.nz.key" | |
certificate-file: "/etc/ssl/coastlandsflorist.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
garagedoorswellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/garagedoorswellington.co.nz.key" | |
certificate-file: "/etc/ssl/garagedoorswellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
fredchapman.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/fredchapman.co.nz.key" | |
certificate-file: "/etc/ssl/fredchapman.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.garagedoorswellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.garagedoorswellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.garagedoorswellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.fredchapman.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.fredchapman.co.nz.key" | |
certificate-file: "/etc/ssl/www.fredchapman.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.carpetcleanerpalmerstonnorth.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.carpetcleanerpalmerstonnorth.co.nz.key" | |
certificate-file: "/etc/ssl/www.carpetcleanerpalmerstonnorth.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
carpetcleanerpalmerstonnorth.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/carpetcleanerpalmerstonnorth.co.nz.key" | |
certificate-file: "/etc/ssl/carpetcleanerpalmerstonnorth.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.actionservices.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.actionservices.co.nz.key" | |
certificate-file: "/etc/ssl/www.actionservices.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.wellingtonpestcontrol.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.wellingtonpestcontrol.co.nz.key" | |
certificate-file: "/etc/ssl/www.wellingtonpestcontrol.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.roofcleaningwelllington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.roofcleaningwelllington.co.nz.key" | |
certificate-file: "/etc/ssl/www.roofcleaningwelllington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.borertreatmentwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.borertreatmentwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.borertreatmentwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
roofcleaningwelllington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/roofcleaningwelllington.co.nz.key" | |
certificate-file: "/etc/ssl/roofcleaningwelllington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
borertreatmentwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/borertreatmentwellington.co.nz.key" | |
certificate-file: "/etc/ssl/borertreatmentwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.housewashingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.housewashingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.housewashingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
propertymaintenancewellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/propertymaintenancewellington.co.nz.key" | |
certificate-file: "/etc/ssl/propertymaintenancewellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
wellingtonpestcontrol.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/wellingtonpestcontrol.co.nz.key" | |
certificate-file: "/etc/ssl/wellingtonpestcontrol.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
housewashingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/housewashingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/housewashingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.propertymaintenancewellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.propertymaintenancewellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.propertymaintenancewellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webgenius.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webgenius.co.nz.key" | |
certificate-file: "/etc/ssl/webgenius.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webgenius.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webgenius.co.nz.key" | |
certificate-file: "/etc/ssl/www.webgenius.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingotago.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingotago.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingotago.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webdesignkapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webdesignkapiti.co.nz.key" | |
certificate-file: "/etc/ssl/webdesignkapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingtauranga.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingtauranga.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingtauranga.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingkapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingkapiti.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingkapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingnorthland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingnorthland.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingnorthland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingnorthland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingnorthland.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingnorthland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingwaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingwaikato.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingwaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketinghamilton.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketinghamilton.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketinghamilton.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketinghamilton.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketinghamilton.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketinghamilton.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketinghawkesbay.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketinghawkesbay.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketinghawkesbay.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketerauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketerauckland.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketerauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingauckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketinghawkesbay.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketinghawkesbay.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketinghawkesbay.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingauckland.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingkapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingkapiti.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingkapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
websitemarketingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/websitemarketingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/websitemarketingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingbayofplenty.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingbayofplenty.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingbayofplenty.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingnorthshore.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingnorthshore.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingnorthshore.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingwaikato.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingwaikato.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingwaikato.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketerauckland.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketerauckland.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketerauckland.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingnorthshore.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingnorthshore.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingnorthshore.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webdesignwellington.net.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webdesignwellington.net.nz.key" | |
certificate-file: "/etc/ssl/webdesignwellington.net.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webdesignwellington.net.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webdesignwellington.net.nz.key" | |
certificate-file: "/etc/ssl/www.webdesignwellington.net.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingtauranga.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingtauranga.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingtauranga.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webmarketingotago.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webmarketingotago.co.nz.key" | |
certificate-file: "/etc/ssl/www.webmarketingotago.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webdesignkapiti.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webdesignkapiti.co.nz.key" | |
certificate-file: "/etc/ssl/www.webdesignkapiti.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.websitemarketingwellington.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.websitemarketingwellington.co.nz.key" | |
certificate-file: "/etc/ssl/www.websitemarketingwellington.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webmarketingbayofplenty.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webmarketingbayofplenty.co.nz.key" | |
certificate-file: "/etc/ssl/webmarketingbayofplenty.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
webgenius.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/webgenius.nz.key" | |
certificate-file: "/etc/ssl/webgenius.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.webgenius.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.webgenius.nz.key" | |
certificate-file: "/etc/ssl/www.webgenius.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.debrascarpetcleaning.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.debrascarpetcleaning.co.nz.key" | |
certificate-file: "/etc/ssl/www.debrascarpetcleaning.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
debrascarpetcleaning.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/debrascarpetcleaning.co.nz.key" | |
certificate-file: "/etc/ssl/debrascarpetcleaning.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.bakertrees.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.bakertrees.co.nz.key" | |
certificate-file: "/etc/ssl/www.bakertrees.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
bakertrees.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/bakertrees.co.nz.key" | |
certificate-file: "/etc/ssl/bakertrees.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
littlefarm.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/littlefarm.co.nz.key" | |
certificate-file: "/etc/ssl/littlefarm.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.littlefarm.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.littlefarm.co.nz.key" | |
certificate-file: "/etc/ssl/www.littlefarm.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.masterbutchers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.masterbutchers.co.nz.key" | |
certificate-file: "/etc/ssl/www.masterbutchers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
masterbutchers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/masterbutchers.co.nz.key" | |
certificate-file: "/etc/ssl/masterbutchers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.prestonsmasterbutchers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.prestonsmasterbutchers.co.nz.key" | |
certificate-file: "/etc/ssl/www.prestonsmasterbutchers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
prestonsmasterbutchers.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/prestonsmasterbutchers.co.nz.key" | |
certificate-file: "/etc/ssl/prestonsmasterbutchers.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.rawlinsonlandscaping.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.rawlinsonlandscaping.co.nz.key" | |
certificate-file: "/etc/ssl/www.rawlinsonlandscaping.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
rawlinsonlandscaping.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/rawlinsonlandscaping.co.nz.key" | |
certificate-file: "/etc/ssl/rawlinsonlandscaping.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.specialisedconcrete.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.specialisedconcrete.co.nz.key" | |
certificate-file: "/etc/ssl/www.specialisedconcrete.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
specialisedconcrete.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/specialisedconcrete.co.nz.key" | |
certificate-file: "/etc/ssl/specialisedconcrete.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
www.shoeclinic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/www.shoeclinic.co.nz.key" | |
certificate-file: "/etc/ssl/www.shoeclinic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS | |
cipher-preference: server | |
dh-file: "/root/ssl/dhparam.pem" | |
ocsp-update-interval: 0 | |
paths: | |
"/h2o-status": | |
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n | |
\ if auth\n method, cred = *auth.split(' ')\n | |
\ if method.casecmp('basic') == 0\n user, | |
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg' | |
&& pass == '<redacted>'\n next [399, {}, []]\n end\n | |
\ end\n end\n next [401, {'Content-Type' | |
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization | |
Required']]\n end\n " | |
status: 'ON' | |
"/": | |
proxy.reverse.url: http://127.0.0.1:80/ | |
proxy.preserve-host: 'ON' | |
proxy.timeout.io: 3600000 | |
shoeclinic.co.nz: | |
listen: | |
port: 443 | |
ssl: | |
key-file: "/etc/ssl/shoeclinic.co.nz.key" | |
certificate-file: "/etc/ssl/shoeclinic.co.nz.crt" | |
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-EC |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment