Skip to content

Instantly share code, notes, and snippets.

@mattparlane
Created July 15, 2016 01:58
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save mattparlane/6d1c40017849da2cdc398422681fcf94 to your computer and use it in GitHub Desktop.
Save mattparlane/6d1c40017849da2cdc398422681fcf94 to your computer and use it in GitHub Desktop.
h2o.conf
This file has been truncated, but you can view the full file.
---
hosts:
walnutblock.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/walnutblock.co.nz.key"
certificate-file: "/etc/ssl/walnutblock.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.walnutblock.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.walnutblock.co.nz.key"
certificate-file: "/etc/ssl/www.walnutblock.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
easystrip.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/easystrip.co.nz.key"
certificate-file: "/etc/ssl/easystrip.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.easystrip.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.easystrip.co.nz.key"
certificate-file: "/etc/ssl/www.easystrip.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cavendishgrounds.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cavendishgrounds.com.key"
certificate-file: "/etc/ssl/www.cavendishgrounds.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
criminallawyer-auckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/criminallawyer-auckland.co.nz.key"
certificate-file: "/etc/ssl/criminallawyer-auckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.karltrotter.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.karltrotter.co.nz.key"
certificate-file: "/etc/ssl/www.karltrotter.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
karltrotter.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/karltrotter.co.nz.key"
certificate-file: "/etc/ssl/karltrotter.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.criminallawyer-auckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.criminallawyer-auckland.co.nz.key"
certificate-file: "/etc/ssl/www.criminallawyer-auckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
m.karltrotter.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/m.karltrotter.co.nz.key"
certificate-file: "/etc/ssl/m.karltrotter.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.barndale.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.barndale.co.nz.key"
certificate-file: "/etc/ssl/www.barndale.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
barndale.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/barndale.co.nz.key"
certificate-file: "/etc/ssl/barndale.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.catterynorthshore.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.catterynorthshore.co.nz.key"
certificate-file: "/etc/ssl/www.catterynorthshore.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
catterynorthshore.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/catterynorthshore.co.nz.key"
certificate-file: "/etc/ssl/catterynorthshore.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.barndale.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.barndale.nz.key"
certificate-file: "/etc/ssl/www.barndale.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
barndale.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/barndale.nz.key"
certificate-file: "/etc/ssl/barndale.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
capitalfire.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/capitalfire.co.nz.key"
certificate-file: "/etc/ssl/capitalfire.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
commercialfireprotection.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/commercialfireprotection.co.nz.key"
certificate-file: "/etc/ssl/commercialfireprotection.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.capitalfire.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.capitalfire.co.nz.key"
certificate-file: "/etc/ssl/www.capitalfire.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.commercialfireprotection.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.commercialfireprotection.co.nz.key"
certificate-file: "/etc/ssl/www.commercialfireprotection.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
capitalfireextinguishers.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/capitalfireextinguishers.nz.key"
certificate-file: "/etc/ssl/capitalfireextinguishers.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
capitalfireprotection.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/capitalfireprotection.nz.key"
certificate-file: "/etc/ssl/capitalfireprotection.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.capitalfireprotection.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.capitalfireprotection.nz.key"
certificate-file: "/etc/ssl/www.capitalfireprotection.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.capitalfireextinguishers.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.capitalfireextinguishers.nz.key"
certificate-file: "/etc/ssl/www.capitalfireextinguishers.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
commercialfireprotection.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/commercialfireprotection.nz.key"
certificate-file: "/etc/ssl/commercialfireprotection.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.commercialfireprotection.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.commercialfireprotection.nz.key"
certificate-file: "/etc/ssl/www.commercialfireprotection.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
generalfireprotection.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/generalfireprotection.nz.key"
certificate-file: "/etc/ssl/generalfireprotection.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
firewatchwellington.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/firewatchwellington.nz.key"
certificate-file: "/etc/ssl/firewatchwellington.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.generalfireprotection.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.generalfireprotection.nz.key"
certificate-file: "/etc/ssl/www.generalfireprotection.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
generalfire.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/generalfire.nz.key"
certificate-file: "/etc/ssl/generalfire.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.firewatchwgtn.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.firewatchwgtn.nz.key"
certificate-file: "/etc/ssl/www.firewatchwgtn.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.firewatchwellington2014.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.firewatchwellington2014.nz.key"
certificate-file: "/etc/ssl/www.firewatchwellington2014.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
firewatchwellington2014.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/firewatchwellington2014.nz.key"
certificate-file: "/etc/ssl/firewatchwellington2014.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
firewatchwgtn.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/firewatchwgtn.nz.key"
certificate-file: "/etc/ssl/firewatchwgtn.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.firewatchwellington.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.firewatchwellington.nz.key"
certificate-file: "/etc/ssl/www.firewatchwellington.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.generalfire.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.generalfire.nz.key"
certificate-file: "/etc/ssl/www.generalfire.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
firewatchwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/firewatchwellington.co.nz.key"
certificate-file: "/etc/ssl/firewatchwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.firewatchwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.firewatchwellington.co.nz.key"
certificate-file: "/etc/ssl/www.firewatchwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
walnutblockwines.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/walnutblockwines.co.nz.key"
certificate-file: "/etc/ssl/walnutblockwines.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.walnutblockwines.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.walnutblockwines.co.nz.key"
certificate-file: "/etc/ssl/www.walnutblockwines.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
watkinsplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/watkinsplumbing.co.nz.key"
certificate-file: "/etc/ssl/watkinsplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.watkinsplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.watkinsplumbing.co.nz.key"
certificate-file: "/etc/ssl/www.watkinsplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
martinboroughwinetours.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/martinboroughwinetours.co.nz.key"
certificate-file: "/etc/ssl/martinboroughwinetours.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.martinboroughwinetours.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.martinboroughwinetours.co.nz.key"
certificate-file: "/etc/ssl/www.martinboroughwinetours.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.temporaryfences.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.temporaryfences.co.nz.key"
certificate-file: "/etc/ssl/www.temporaryfences.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
temporaryfences.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/temporaryfences.co.nz.key"
certificate-file: "/etc/ssl/temporaryfences.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
furnitureupholstery.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/furnitureupholstery.co.nz.key"
certificate-file: "/etc/ssl/furnitureupholstery.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
suitedoctors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/suitedoctors.co.nz.key"
certificate-file: "/etc/ssl/suitedoctors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.furnitureupholstery.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.furnitureupholstery.co.nz.key"
certificate-file: "/etc/ssl/www.furnitureupholstery.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.suitedoctors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.suitedoctors.co.nz.key"
certificate-file: "/etc/ssl/www.suitedoctors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.racklink.com.au:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.racklink.com.au.key"
certificate-file: "/etc/ssl/www.racklink.com.au.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
racklink.com.au:
listen:
port: 443
ssl:
key-file: "/etc/ssl/racklink.com.au.key"
certificate-file: "/etc/ssl/racklink.com.au.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.easyswim.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.easyswim.co.nz.key"
certificate-file: "/etc/ssl/www.easyswim.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
easyswim.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/easyswim.co.nz.key"
certificate-file: "/etc/ssl/easyswim.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
manorhouse.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/manorhouse.co.nz.key"
certificate-file: "/etc/ssl/manorhouse.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.manorhouse.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.manorhouse.co.nz.key"
certificate-file: "/etc/ssl/www.manorhouse.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
a1portablecabins.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/a1portablecabins.co.nz.key"
certificate-file: "/etc/ssl/a1portablecabins.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.a1portablecabins.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.a1portablecabins.co.nz.key"
certificate-file: "/etc/ssl/www.a1portablecabins.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.aboutkids.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.aboutkids.co.nz.key"
certificate-file: "/etc/ssl/www.aboutkids.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.inhomechildcare.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.inhomechildcare.co.nz.key"
certificate-file: "/etc/ssl/www.inhomechildcare.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
inhomechildcare.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/inhomechildcare.co.nz.key"
certificate-file: "/etc/ssl/inhomechildcare.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
aboutkids.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/aboutkids.co.nz.key"
certificate-file: "/etc/ssl/aboutkids.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
candoelectrical.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/candoelectrical.co.nz.key"
certificate-file: "/etc/ssl/candoelectrical.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.candoelectrical.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.candoelectrical.co.nz.key"
certificate-file: "/etc/ssl/www.candoelectrical.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kler.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kler.co.nz.key"
certificate-file: "/etc/ssl/kler.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kler.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kler.co.nz.key"
certificate-file: "/etc/ssl/www.kler.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kler.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kler.nz.key"
certificate-file: "/etc/ssl/www.kler.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kler.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kler.nz.key"
certificate-file: "/etc/ssl/kler.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
ohaugravels.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/ohaugravels.co.nz.key"
certificate-file: "/etc/ssl/ohaugravels.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.ohaugravels.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.ohaugravels.co.nz.key"
certificate-file: "/etc/ssl/www.ohaugravels.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
ohauwines.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/ohauwines.co.nz.key"
certificate-file: "/etc/ssl/ohauwines.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.ohauwines.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.ohauwines.co.nz.key"
certificate-file: "/etc/ssl/www.ohauwines.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wovenstone.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wovenstone.co.nz.key"
certificate-file: "/etc/ssl/wovenstone.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wovenstone.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wovenstone.co.nz.key"
certificate-file: "/etc/ssl/www.wovenstone.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.earlychildcareupperhutt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.earlychildcareupperhutt.co.nz.key"
certificate-file: "/etc/ssl/www.earlychildcareupperhutt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
earlychildcareupperhutt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/earlychildcareupperhutt.co.nz.key"
certificate-file: "/etc/ssl/earlychildcareupperhutt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.helensville-drainage.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.helensville-drainage.co.nz.key"
certificate-file: "/etc/ssl/www.helensville-drainage.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
helensville-drainage.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/helensville-drainage.co.nz.key"
certificate-file: "/etc/ssl/helensville-drainage.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kapitihearing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kapitihearing.co.nz.key"
certificate-file: "/etc/ssl/www.kapitihearing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
thestreet.org.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/thestreet.org.nz.key"
certificate-file: "/etc/ssl/thestreet.org.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.thestreet.org.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.thestreet.org.nz.key"
certificate-file: "/etc/ssl/www.thestreet.org.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.earlychildcarelevin.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.earlychildcarelevin.co.nz.key"
certificate-file: "/etc/ssl/www.earlychildcarelevin.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
earlychildcarelevin.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/earlychildcarelevin.co.nz.key"
certificate-file: "/etc/ssl/earlychildcarelevin.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.earlychildcarekapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.earlychildcarekapiti.co.nz.key"
certificate-file: "/etc/ssl/www.earlychildcarekapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
earlychildcarekapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/earlychildcarekapiti.co.nz.key"
certificate-file: "/etc/ssl/earlychildcarekapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wiseowl.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wiseowl.co.nz.key"
certificate-file: "/etc/ssl/www.wiseowl.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wiseowl.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wiseowl.co.nz.key"
certificate-file: "/etc/ssl/wiseowl.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.summerlea.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.summerlea.co.nz.key"
certificate-file: "/etc/ssl/www.summerlea.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
summerlea.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/summerlea.co.nz.key"
certificate-file: "/etc/ssl/summerlea.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.zebrano.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.zebrano.co.nz.key"
certificate-file: "/etc/ssl/www.zebrano.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
zebrano.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/zebrano.co.nz.key"
certificate-file: "/etc/ssl/zebrano.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.zebrano.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.zebrano.nz.key"
certificate-file: "/etc/ssl/www.zebrano.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
zebrano.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/zebrano.nz.key"
certificate-file: "/etc/ssl/zebrano.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.foxtonpreschoolandnursery.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.foxtonpreschoolandnursery.co.nz.key"
certificate-file: "/etc/ssl/www.foxtonpreschoolandnursery.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
foxtonpreschoolandnursery.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/foxtonpreschoolandnursery.co.nz.key"
certificate-file: "/etc/ssl/foxtonpreschoolandnursery.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.priscillakay.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.priscillakay.co.nz.key"
certificate-file: "/etc/ssl/www.priscillakay.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.priscillakay.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.priscillakay.com.key"
certificate-file: "/etc/ssl/www.priscillakay.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
lilys.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/lilys.co.nz.key"
certificate-file: "/etc/ssl/lilys.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.lilys.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.lilys.co.nz.key"
certificate-file: "/etc/ssl/www.lilys.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
walnutblockcottages.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/walnutblockcottages.co.nz.key"
certificate-file: "/etc/ssl/walnutblockcottages.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.walnutblockcottages.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.walnutblockcottages.co.nz.key"
certificate-file: "/etc/ssl/www.walnutblockcottages.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bedandbreakfastupperhutt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bedandbreakfastupperhutt.co.nz.key"
certificate-file: "/etc/ssl/www.bedandbreakfastupperhutt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bedandbreakfastupperhutt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bedandbreakfastupperhutt.co.nz.key"
certificate-file: "/etc/ssl/bedandbreakfastupperhutt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.tranquilityhomestay.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.tranquilityhomestay.co.nz.key"
certificate-file: "/etc/ssl/www.tranquilityhomestay.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
tranquilityhomestay.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/tranquilityhomestay.co.nz.key"
certificate-file: "/etc/ssl/tranquilityhomestay.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.tranquilityhomestay.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.tranquilityhomestay.com.key"
certificate-file: "/etc/ssl/www.tranquilityhomestay.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
tranquilityhomestay.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/tranquilityhomestay.com.key"
certificate-file: "/etc/ssl/tranquilityhomestay.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.tranquilityhomestay.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.tranquilityhomestay.nz.key"
certificate-file: "/etc/ssl/www.tranquilityhomestay.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
tranquilityhomestay.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/tranquilityhomestay.nz.key"
certificate-file: "/etc/ssl/tranquilityhomestay.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.modernmusic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.modernmusic.co.nz.key"
certificate-file: "/etc/ssl/www.modernmusic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
modernmusic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/modernmusic.co.nz.key"
certificate-file: "/etc/ssl/modernmusic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
pianolessonsauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/pianolessonsauckland.co.nz.key"
certificate-file: "/etc/ssl/pianolessonsauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
guitarlessonsauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/guitarlessonsauckland.co.nz.key"
certificate-file: "/etc/ssl/guitarlessonsauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
modernmusic.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/modernmusic.nz.key"
certificate-file: "/etc/ssl/modernmusic.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.modernmusic.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.modernmusic.nz.key"
certificate-file: "/etc/ssl/www.modernmusic.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
guitarlessonsauckland.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/guitarlessonsauckland.nz.key"
certificate-file: "/etc/ssl/guitarlessonsauckland.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.guitarlessonsauckland.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.guitarlessonsauckland.nz.key"
certificate-file: "/etc/ssl/www.guitarlessonsauckland.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
pianolessonsauckland.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/pianolessonsauckland.nz.key"
certificate-file: "/etc/ssl/pianolessonsauckland.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.pianolessonsauckland.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.pianolessonsauckland.nz.key"
certificate-file: "/etc/ssl/www.pianolessonsauckland.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.guitarlessonsauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.guitarlessonsauckland.co.nz.key"
certificate-file: "/etc/ssl/www.guitarlessonsauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.pianolessonsauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.pianolessonsauckland.co.nz.key"
certificate-file: "/etc/ssl/www.pianolessonsauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
scanningsolutions.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/scanningsolutions.co.nz.key"
certificate-file: "/etc/ssl/scanningsolutions.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.scanningsolutions.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.scanningsolutions.co.nz.key"
certificate-file: "/etc/ssl/www.scanningsolutions.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mobilehand.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mobilehand.co.nz.key"
certificate-file: "/etc/ssl/www.mobilehand.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mobilehand.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mobilehand.co.nz.key"
certificate-file: "/etc/ssl/mobilehand.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
carvalet.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/carvalet.co.nz.key"
certificate-file: "/etc/ssl/carvalet.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.carvalet.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.carvalet.co.nz.key"
certificate-file: "/etc/ssl/www.carvalet.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.matangioaks.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.matangioaks.co.nz.key"
certificate-file: "/etc/ssl/www.matangioaks.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
matangioaks.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/matangioaks.co.nz.key"
certificate-file: "/etc/ssl/matangioaks.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.theskinspa.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.theskinspa.co.nz.key"
certificate-file: "/etc/ssl/www.theskinspa.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
theskinspa.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/theskinspa.co.nz.key"
certificate-file: "/etc/ssl/theskinspa.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.skinspa.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.skinspa.co.nz.key"
certificate-file: "/etc/ssl/www.skinspa.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
skinspa.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/skinspa.co.nz.key"
certificate-file: "/etc/ssl/skinspa.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.westlandworkgear.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.westlandworkgear.co.nz.key"
certificate-file: "/etc/ssl/www.westlandworkgear.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
westlandworkgear.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/westlandworkgear.co.nz.key"
certificate-file: "/etc/ssl/westlandworkgear.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kidrepublic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kidrepublic.co.nz.key"
certificate-file: "/etc/ssl/kidrepublic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kidrepublic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kidrepublic.co.nz.key"
certificate-file: "/etc/ssl/www.kidrepublic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
salonshield.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/salonshield.com.key"
certificate-file: "/etc/ssl/salonshield.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
salons.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/salons.co.nz.key"
certificate-file: "/etc/ssl/salons.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
salonsgroup.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/salonsgroup.com.key"
certificate-file: "/etc/ssl/salonsgroup.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.salonshield.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.salonshield.com.key"
certificate-file: "/etc/ssl/www.salonshield.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.salons.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.salons.co.nz.key"
certificate-file: "/etc/ssl/www.salons.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.salonsgroup.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.salonsgroup.com.key"
certificate-file: "/etc/ssl/www.salonsgroup.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.graedonjoinery.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.graedonjoinery.co.nz.key"
certificate-file: "/etc/ssl/www.graedonjoinery.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
graedonjoinery.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/graedonjoinery.co.nz.key"
certificate-file: "/etc/ssl/graedonjoinery.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
go30nails.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/go30nails.com.key"
certificate-file: "/etc/ssl/go30nails.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.go30nails.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.go30nails.com.key"
certificate-file: "/etc/ssl/www.go30nails.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
auroraclothing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/auroraclothing.co.nz.key"
certificate-file: "/etc/ssl/auroraclothing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.auroraclothing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.auroraclothing.co.nz.key"
certificate-file: "/etc/ssl/www.auroraclothing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cloke.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cloke.co.nz.key"
certificate-file: "/etc/ssl/www.cloke.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cloke.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cloke.co.nz.key"
certificate-file: "/etc/ssl/cloke.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cloke.auroraclothing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cloke.auroraclothing.co.nz.key"
certificate-file: "/etc/ssl/cloke.auroraclothing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
lovelysmile.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/lovelysmile.co.nz.key"
certificate-file: "/etc/ssl/lovelysmile.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
teethwhitening-auckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/teethwhitening-auckland.co.nz.key"
certificate-file: "/etc/ssl/teethwhitening-auckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.teethwhitening-auckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.teethwhitening-auckland.co.nz.key"
certificate-file: "/etc/ssl/www.teethwhitening-auckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
athometeethwhitening.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/athometeethwhitening.co.nz.key"
certificate-file: "/etc/ssl/athometeethwhitening.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.lovelysmile.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.lovelysmile.co.nz.key"
certificate-file: "/etc/ssl/www.lovelysmile.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bestteethwhiteningauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bestteethwhiteningauckland.co.nz.key"
certificate-file: "/etc/ssl/bestteethwhiteningauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
teethbleachingauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/teethbleachingauckland.co.nz.key"
certificate-file: "/etc/ssl/teethbleachingauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
teethbleachingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/teethbleachingwellington.co.nz.key"
certificate-file: "/etc/ssl/teethbleachingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
teethwhitening-wellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/teethwhitening-wellington.co.nz.key"
certificate-file: "/etc/ssl/teethwhitening-wellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.athometeethwhitening.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.athometeethwhitening.co.nz.key"
certificate-file: "/etc/ssl/www.athometeethwhitening.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bestteethwhiteningauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bestteethwhiteningauckland.co.nz.key"
certificate-file: "/etc/ssl/www.bestteethwhiteningauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.teethbleachingauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.teethbleachingauckland.co.nz.key"
certificate-file: "/etc/ssl/www.teethbleachingauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.teethbleachingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.teethbleachingwellington.co.nz.key"
certificate-file: "/etc/ssl/www.teethbleachingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.teethwhitening-wellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.teethwhitening-wellington.co.nz.key"
certificate-file: "/etc/ssl/www.teethwhitening-wellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.lovelysmiles.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.lovelysmiles.co.nz.key"
certificate-file: "/etc/ssl/www.lovelysmiles.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
lovelysmiles.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/lovelysmiles.co.nz.key"
certificate-file: "/etc/ssl/lovelysmiles.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
precisionplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/precisionplumbing.co.nz.key"
certificate-file: "/etc/ssl/precisionplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.precisionplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.precisionplumbing.co.nz.key"
certificate-file: "/etc/ssl/www.precisionplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
duffylandscapes.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/duffylandscapes.co.nz.key"
certificate-file: "/etc/ssl/duffylandscapes.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.duffylandscapes.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.duffylandscapes.co.nz.key"
certificate-file: "/etc/ssl/www.duffylandscapes.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.croweconstruction.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.croweconstruction.co.nz.key"
certificate-file: "/etc/ssl/www.croweconstruction.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
croweconstruction.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/croweconstruction.co.nz.key"
certificate-file: "/etc/ssl/croweconstruction.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.ccal.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.ccal.co.nz.key"
certificate-file: "/etc/ssl/www.ccal.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
ccal.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/ccal.co.nz.key"
certificate-file: "/etc/ssl/ccal.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.allmacksconcrete.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.allmacksconcrete.co.nz.key"
certificate-file: "/etc/ssl/www.allmacksconcrete.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
allmacksconcrete.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/allmacksconcrete.co.nz.key"
certificate-file: "/etc/ssl/allmacksconcrete.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.hogansprayandpump.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.hogansprayandpump.co.nz.key"
certificate-file: "/etc/ssl/www.hogansprayandpump.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
hogansprayandpump.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/hogansprayandpump.co.nz.key"
certificate-file: "/etc/ssl/hogansprayandpump.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.hogansp.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.hogansp.nz.key"
certificate-file: "/etc/ssl/www.hogansp.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
hogansp.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/hogansp.nz.key"
certificate-file: "/etc/ssl/hogansp.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kapiticoastshuttles.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kapiticoastshuttles.co.nz.key"
certificate-file: "/etc/ssl/www.kapiticoastshuttles.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kapiticoastshuttles.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kapiticoastshuttles.co.nz.key"
certificate-file: "/etc/ssl/kapiticoastshuttles.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
offthepage.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/offthepage.co.nz.key"
certificate-file: "/etc/ssl/offthepage.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.offthepage.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.offthepage.co.nz.key"
certificate-file: "/etc/ssl/www.offthepage.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.janssenpainters.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.janssenpainters.co.nz.key"
certificate-file: "/etc/ssl/www.janssenpainters.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
janssenpainters.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/janssenpainters.co.nz.key"
certificate-file: "/etc/ssl/janssenpainters.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bruntwoodnurseries.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bruntwoodnurseries.co.nz.key"
certificate-file: "/etc/ssl/www.bruntwoodnurseries.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bruntwoodnurseries.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bruntwoodnurseries.co.nz.key"
certificate-file: "/etc/ssl/bruntwoodnurseries.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.affordableelectrical.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.affordableelectrical.co.nz.key"
certificate-file: "/etc/ssl/www.affordableelectrical.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
affordableelectrical.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/affordableelectrical.co.nz.key"
certificate-file: "/etc/ssl/affordableelectrical.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cranfordmowers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cranfordmowers.co.nz.key"
certificate-file: "/etc/ssl/cranfordmowers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cranfordmowers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cranfordmowers.co.nz.key"
certificate-file: "/etc/ssl/www.cranfordmowers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.allkeysandsecurity.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.allkeysandsecurity.co.nz.key"
certificate-file: "/etc/ssl/www.allkeysandsecurity.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
allkeysandsecurity.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/allkeysandsecurity.co.nz.key"
certificate-file: "/etc/ssl/allkeysandsecurity.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.allkeys.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.allkeys.co.nz.key"
certificate-file: "/etc/ssl/www.allkeys.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
allkeys.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/allkeys.co.nz.key"
certificate-file: "/etc/ssl/allkeys.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.dunedinurgentdoctors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.dunedinurgentdoctors.co.nz.key"
certificate-file: "/etc/ssl/www.dunedinurgentdoctors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
dunedinurgentdoctors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/dunedinurgentdoctors.co.nz.key"
certificate-file: "/etc/ssl/dunedinurgentdoctors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
dunedinurgentdoctors.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/dunedinurgentdoctors.com.key"
certificate-file: "/etc/ssl/dunedinurgentdoctors.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.pandbautoelec.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.pandbautoelec.co.nz.key"
certificate-file: "/etc/ssl/www.pandbautoelec.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
pandbautoelec.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/pandbautoelec.co.nz.key"
certificate-file: "/etc/ssl/pandbautoelec.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.autoelectricalhamilton.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.autoelectricalhamilton.co.nz.key"
certificate-file: "/etc/ssl/www.autoelectricalhamilton.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
autoelectricalhamilton.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/autoelectricalhamilton.co.nz.key"
certificate-file: "/etc/ssl/autoelectricalhamilton.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.pandb.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.pandb.co.nz.key"
certificate-file: "/etc/ssl/www.pandb.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
pandb.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/pandb.co.nz.key"
certificate-file: "/etc/ssl/pandb.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
pandbgroup.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/pandbgroup.co.nz.key"
certificate-file: "/etc/ssl/pandbgroup.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.pandbgroup.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.pandbgroup.co.nz.key"
certificate-file: "/etc/ssl/www.pandbgroup.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
locksmithskapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/locksmithskapiti.co.nz.key"
certificate-file: "/etc/ssl/locksmithskapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.locksmithskapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.locksmithskapiti.co.nz.key"
certificate-file: "/etc/ssl/www.locksmithskapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
armstronglandscape.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/armstronglandscape.co.nz.key"
certificate-file: "/etc/ssl/armstronglandscape.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.armstronglandscape.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.armstronglandscape.co.nz.key"
certificate-file: "/etc/ssl/www.armstronglandscape.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
caiimichelle.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/caiimichelle.co.nz.key"
certificate-file: "/etc/ssl/caiimichelle.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.caiimichelle.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.caiimichelle.co.nz.key"
certificate-file: "/etc/ssl/www.caiimichelle.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
managemyrental.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/managemyrental.nz.key"
certificate-file: "/etc/ssl/managemyrental.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.managemyrental.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.managemyrental.co.nz.key"
certificate-file: "/etc/ssl/www.managemyrental.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
managemyrental.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/managemyrental.co.nz.key"
certificate-file: "/etc/ssl/managemyrental.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.managemyrental.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.managemyrental.nz.key"
certificate-file: "/etc/ssl/www.managemyrental.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
waterdeliverywaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/waterdeliverywaikato.co.nz.key"
certificate-file: "/etc/ssl/waterdeliverywaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.waikatowater.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.waikatowater.co.nz.key"
certificate-file: "/etc/ssl/www.waikatowater.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.waterdeliverywaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.waterdeliverywaikato.co.nz.key"
certificate-file: "/etc/ssl/www.waterdeliverywaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
waikatowater.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/waikatowater.co.nz.key"
certificate-file: "/etc/ssl/waikatowater.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.skotixdesign.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.skotixdesign.co.nz.key"
certificate-file: "/etc/ssl/www.skotixdesign.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
skotixdesign.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/skotixdesign.co.nz.key"
certificate-file: "/etc/ssl/skotixdesign.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.helenjonesphotography.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.helenjonesphotography.co.nz.key"
certificate-file: "/etc/ssl/www.helenjonesphotography.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
helenjonesphotography.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/helenjonesphotography.co.nz.key"
certificate-file: "/etc/ssl/helenjonesphotography.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.epulse.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.epulse.co.nz.key"
certificate-file: "/etc/ssl/www.epulse.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
epulse.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/epulse.co.nz.key"
certificate-file: "/etc/ssl/epulse.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cellfield.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cellfield.co.nz.key"
certificate-file: "/etc/ssl/www.cellfield.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cellfield.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cellfield.co.nz.key"
certificate-file: "/etc/ssl/cellfield.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cstservices.net.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cstservices.net.nz.key"
certificate-file: "/etc/ssl/www.cstservices.net.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cstservices.net.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cstservices.net.nz.key"
certificate-file: "/etc/ssl/cstservices.net.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cambridgeseptictankservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cambridgeseptictankservices.co.nz.key"
certificate-file: "/etc/ssl/www.cambridgeseptictankservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cambridgeseptictankservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cambridgeseptictankservices.co.nz.key"
certificate-file: "/etc/ssl/cambridgeseptictankservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
m.skinspa.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/m.skinspa.co.nz.key"
certificate-file: "/etc/ssl/m.skinspa.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
quinlanquality.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/quinlanquality.co.nz.key"
certificate-file: "/etc/ssl/quinlanquality.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.quinlanquality.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.quinlanquality.co.nz.key"
certificate-file: "/etc/ssl/www.quinlanquality.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.penndesign.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.penndesign.co.nz.key"
certificate-file: "/etc/ssl/www.penndesign.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
penndesign.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/penndesign.co.nz.key"
certificate-file: "/etc/ssl/penndesign.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.centralplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.centralplumbing.co.nz.key"
certificate-file: "/etc/ssl/www.centralplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
centralplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/centralplumbing.co.nz.key"
certificate-file: "/etc/ssl/centralplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.aplusservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.aplusservices.co.nz.key"
certificate-file: "/etc/ssl/www.aplusservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
aplusservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/aplusservices.co.nz.key"
certificate-file: "/etc/ssl/aplusservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.completeglass.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.completeglass.co.nz.key"
certificate-file: "/etc/ssl/www.completeglass.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
completeglass.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/completeglass.co.nz.key"
certificate-file: "/etc/ssl/completeglass.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wholesaleplantstauranga.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wholesaleplantstauranga.co.nz.key"
certificate-file: "/etc/ssl/www.wholesaleplantstauranga.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wholesaleplantstauranga.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wholesaleplantstauranga.co.nz.key"
certificate-file: "/etc/ssl/wholesaleplantstauranga.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
beechwoodplants.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/beechwoodplants.co.nz.key"
certificate-file: "/etc/ssl/beechwoodplants.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.beechwoodplants.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.beechwoodplants.co.nz.key"
certificate-file: "/etc/ssl/www.beechwoodplants.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mcguirepropertymanagement.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mcguirepropertymanagement.co.nz.key"
certificate-file: "/etc/ssl/mcguirepropertymanagement.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
vickimcguire.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/vickimcguire.co.nz.key"
certificate-file: "/etc/ssl/vickimcguire.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mcguirepropertymanagement.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mcguirepropertymanagement.co.nz.key"
certificate-file: "/etc/ssl/www.mcguirepropertymanagement.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.vickimcguire.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.vickimcguire.co.nz.key"
certificate-file: "/etc/ssl/www.vickimcguire.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mcguirepm.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mcguirepm.co.nz.key"
certificate-file: "/etc/ssl/www.mcguirepm.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mcguirepm.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mcguirepm.co.nz.key"
certificate-file: "/etc/ssl/mcguirepm.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.gr8smile.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.gr8smile.co.nz.key"
certificate-file: "/etc/ssl/www.gr8smile.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
gr8smile.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/gr8smile.co.nz.key"
certificate-file: "/etc/ssl/gr8smile.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.elt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.elt.co.nz.key"
certificate-file: "/etc/ssl/www.elt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
elt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/elt.co.nz.key"
certificate-file: "/etc/ssl/elt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
elt.kiwi:
listen:
port: 443
ssl:
key-file: "/etc/ssl/elt.kiwi.key"
certificate-file: "/etc/ssl/elt.kiwi.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.elt.kiwi:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.elt.kiwi.key"
certificate-file: "/etc/ssl/www.elt.kiwi.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.simplyyouneek.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.simplyyouneek.co.nz.key"
certificate-file: "/etc/ssl/www.simplyyouneek.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
simplyyouneek.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/simplyyouneek.co.nz.key"
certificate-file: "/etc/ssl/simplyyouneek.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.takapunacontractors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.takapunacontractors.co.nz.key"
certificate-file: "/etc/ssl/www.takapunacontractors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
takapunacontractors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/takapunacontractors.co.nz.key"
certificate-file: "/etc/ssl/takapunacontractors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kamenicottage.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kamenicottage.nz.key"
certificate-file: "/etc/ssl/www.kamenicottage.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kamenicottage.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kamenicottage.nz.key"
certificate-file: "/etc/ssl/kamenicottage.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kamenicottage.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kamenicottage.co.nz.key"
certificate-file: "/etc/ssl/www.kamenicottage.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kamenicottage.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kamenicottage.co.nz.key"
certificate-file: "/etc/ssl/kamenicottage.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.gentlepc.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.gentlepc.co.nz.key"
certificate-file: "/etc/ssl/www.gentlepc.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
gentlepc.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/gentlepc.co.nz.key"
certificate-file: "/etc/ssl/gentlepc.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.concretecuttingwaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.concretecuttingwaikato.co.nz.key"
certificate-file: "/etc/ssl/www.concretecuttingwaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
concretecuttingwaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/concretecuttingwaikato.co.nz.key"
certificate-file: "/etc/ssl/concretecuttingwaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.ideaarchitecture.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.ideaarchitecture.co.nz.key"
certificate-file: "/etc/ssl/www.ideaarchitecture.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
ideaarchitecture.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/ideaarchitecture.co.nz.key"
certificate-file: "/etc/ssl/ideaarchitecture.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kenwilsonmeats.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kenwilsonmeats.co.nz.key"
certificate-file: "/etc/ssl/www.kenwilsonmeats.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kenwilsonmeats.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kenwilsonmeats.com.key"
certificate-file: "/etc/ssl/www.kenwilsonmeats.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kenwilsonmeats.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kenwilsonmeats.nz.key"
certificate-file: "/etc/ssl/kenwilsonmeats.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kenwilsonmeats.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kenwilsonmeats.com.key"
certificate-file: "/etc/ssl/kenwilsonmeats.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kenwilsonmeats.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kenwilsonmeats.nz.key"
certificate-file: "/etc/ssl/www.kenwilsonmeats.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kam.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kam.co.nz.key"
certificate-file: "/etc/ssl/www.kam.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kam.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kam.co.nz.key"
certificate-file: "/etc/ssl/kam.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kamtransport.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kamtransport.co.nz.key"
certificate-file: "/etc/ssl/kamtransport.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kamtransport.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kamtransport.co.nz.key"
certificate-file: "/etc/ssl/www.kamtransport.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kamtransport.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kamtransport.nz.key"
certificate-file: "/etc/ssl/kamtransport.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kamtransport.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kamtransport.nz.key"
certificate-file: "/etc/ssl/www.kamtransport.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kam.net.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kam.net.nz.key"
certificate-file: "/etc/ssl/kam.net.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kam.net.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kam.net.nz.key"
certificate-file: "/etc/ssl/www.kam.net.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
brucesgaragedoorservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/brucesgaragedoorservices.co.nz.key"
certificate-file: "/etc/ssl/brucesgaragedoorservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.brucesgaragedoorservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.brucesgaragedoorservices.co.nz.key"
certificate-file: "/etc/ssl/www.brucesgaragedoorservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
kevinsgaragedoorservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/kevinsgaragedoorservices.co.nz.key"
certificate-file: "/etc/ssl/kevinsgaragedoorservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kevinsgaragedoorservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kevinsgaragedoorservices.co.nz.key"
certificate-file: "/etc/ssl/www.kevinsgaragedoorservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.patsgas.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.patsgas.co.nz.key"
certificate-file: "/etc/ssl/www.patsgas.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
patsgas.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/patsgas.co.nz.key"
certificate-file: "/etc/ssl/patsgas.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.newimagehomes.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.newimagehomes.co.nz.key"
certificate-file: "/etc/ssl/www.newimagehomes.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
newimagehomes.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/newimagehomes.co.nz.key"
certificate-file: "/etc/ssl/newimagehomes.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.nzpestcontrol.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.nzpestcontrol.nz.key"
certificate-file: "/etc/ssl/www.nzpestcontrol.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
nzpestcontrol.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/nzpestcontrol.co.nz.key"
certificate-file: "/etc/ssl/nzpestcontrol.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
nzpestcontrol.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/nzpestcontrol.nz.key"
certificate-file: "/etc/ssl/nzpestcontrol.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.nzpestcontrol.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.nzpestcontrol.co.nz.key"
certificate-file: "/etc/ssl/www.nzpestcontrol.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
cockroachcontrolpalmerstonnorth.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/cockroachcontrolpalmerstonnorth.co.nz.key"
certificate-file: "/etc/ssl/cockroachcontrolpalmerstonnorth.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.cockroachcontrolpalmerstonnorth.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.cockroachcontrolpalmerstonnorth.co.nz.key"
certificate-file: "/etc/ssl/www.cockroachcontrolpalmerstonnorth.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.rodentcontrolpalmerstonnorth.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.rodentcontrolpalmerstonnorth.co.nz.key"
certificate-file: "/etc/ssl/www.rodentcontrolpalmerstonnorth.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
rodentcontrolpalmerstonnorth.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/rodentcontrolpalmerstonnorth.co.nz.key"
certificate-file: "/etc/ssl/rodentcontrolpalmerstonnorth.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
m.nzpestcontrol.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/m.nzpestcontrol.co.nz.key"
certificate-file: "/etc/ssl/m.nzpestcontrol.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bugbustersmanawatu.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bugbustersmanawatu.co.nz.key"
certificate-file: "/etc/ssl/www.bugbustersmanawatu.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bugbustersmanawatu.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bugbustersmanawatu.co.nz.key"
certificate-file: "/etc/ssl/bugbustersmanawatu.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bugsawaymanawatu.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bugsawaymanawatu.co.nz.key"
certificate-file: "/etc/ssl/www.bugsawaymanawatu.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bugsawaymanawatu.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bugsawaymanawatu.co.nz.key"
certificate-file: "/etc/ssl/bugsawaymanawatu.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
technoinsulation.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/technoinsulation.com.key"
certificate-file: "/etc/ssl/technoinsulation.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.technoinsulation.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.technoinsulation.com.key"
certificate-file: "/etc/ssl/www.technoinsulation.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.goldshealthandfitness.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.goldshealthandfitness.co.nz.key"
certificate-file: "/etc/ssl/www.goldshealthandfitness.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
golds.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/golds.co.nz.key"
certificate-file: "/etc/ssl/golds.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.golds.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.golds.co.nz.key"
certificate-file: "/etc/ssl/www.golds.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
goldshealthandfitness.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/goldshealthandfitness.co.nz.key"
certificate-file: "/etc/ssl/goldshealthandfitness.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
nztempfences.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/nztempfences.co.nz.key"
certificate-file: "/etc/ssl/nztempfences.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.nztempfences.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.nztempfences.co.nz.key"
certificate-file: "/etc/ssl/www.nztempfences.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.carpetcleanerwaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.carpetcleanerwaikato.co.nz.key"
certificate-file: "/etc/ssl/www.carpetcleanerwaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
carpetcleanerwaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/carpetcleanerwaikato.co.nz.key"
certificate-file: "/etc/ssl/carpetcleanerwaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.masterglaziers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.masterglaziers.co.nz.key"
certificate-file: "/etc/ssl/www.masterglaziers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
masterglaziers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/masterglaziers.co.nz.key"
certificate-file: "/etc/ssl/masterglaziers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.darrylpinny.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.darrylpinny.co.nz.key"
certificate-file: "/etc/ssl/www.darrylpinny.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
darrylpinny.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/darrylpinny.co.nz.key"
certificate-file: "/etc/ssl/darrylpinny.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mortgageandinsurance.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mortgageandinsurance.co.nz.key"
certificate-file: "/etc/ssl/www.mortgageandinsurance.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mortgageandinsurance.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mortgageandinsurance.co.nz.key"
certificate-file: "/etc/ssl/mortgageandinsurance.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
accordplastics.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/accordplastics.co.nz.key"
certificate-file: "/etc/ssl/accordplastics.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.accordplastics.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.accordplastics.co.nz.key"
certificate-file: "/etc/ssl/www.accordplastics.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.decoprecasters.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.decoprecasters.co.nz.key"
certificate-file: "/etc/ssl/www.decoprecasters.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
decoprecasters.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/decoprecasters.co.nz.key"
certificate-file: "/etc/ssl/decoprecasters.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
sherlockcontractors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/sherlockcontractors.co.nz.key"
certificate-file: "/etc/ssl/sherlockcontractors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.sherlockcontractors.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.sherlockcontractors.co.nz.key"
certificate-file: "/etc/ssl/www.sherlockcontractors.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.taxlinkhamilton.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.taxlinkhamilton.co.nz.key"
certificate-file: "/etc/ssl/www.taxlinkhamilton.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
taxlinkhamilton.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/taxlinkhamilton.co.nz.key"
certificate-file: "/etc/ssl/taxlinkhamilton.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.thebookkeeper.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.thebookkeeper.co.nz.key"
certificate-file: "/etc/ssl/www.thebookkeeper.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
thebookkeeper.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/thebookkeeper.co.nz.key"
certificate-file: "/etc/ssl/thebookkeeper.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
thebookkeeper.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/thebookkeeper.nz.key"
certificate-file: "/etc/ssl/thebookkeeper.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.thebookkeeper.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.thebookkeeper.nz.key"
certificate-file: "/etc/ssl/www.thebookkeeper.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
upnatomelectrical.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/upnatomelectrical.co.nz.key"
certificate-file: "/etc/ssl/upnatomelectrical.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.upnatomelectrical.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.upnatomelectrical.co.nz.key"
certificate-file: "/etc/ssl/www.upnatomelectrical.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
stevewrightbuilders.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/stevewrightbuilders.co.nz.key"
certificate-file: "/etc/ssl/stevewrightbuilders.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.stevewrightbuilders.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.stevewrightbuilders.co.nz.key"
certificate-file: "/etc/ssl/www.stevewrightbuilders.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
plumbing-wellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/plumbing-wellington.co.nz.key"
certificate-file: "/etc/ssl/plumbing-wellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.plumbing-wellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.plumbing-wellington.co.nz.key"
certificate-file: "/etc/ssl/www.plumbing-wellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.parkclarke.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.parkclarke.co.nz.key"
certificate-file: "/etc/ssl/www.parkclarke.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
parkclarke.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/parkclarke.co.nz.key"
certificate-file: "/etc/ssl/parkclarke.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.idealdecorators.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.idealdecorators.nz.key"
certificate-file: "/etc/ssl/www.idealdecorators.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
idealdecorators.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/idealdecorators.nz.key"
certificate-file: "/etc/ssl/idealdecorators.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bighugz.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bighugz.co.nz.key"
certificate-file: "/etc/ssl/www.bighugz.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bighugz.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bighugz.com.key"
certificate-file: "/etc/ssl/www.bighugz.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bighugz.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bighugz.com.key"
certificate-file: "/etc/ssl/bighugz.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bighugz.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bighugz.co.nz.key"
certificate-file: "/etc/ssl/bighugz.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.aadrainagewellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.aadrainagewellington.co.nz.key"
certificate-file: "/etc/ssl/www.aadrainagewellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
aadrainagewellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/aadrainagewellington.co.nz.key"
certificate-file: "/etc/ssl/aadrainagewellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.drainunblockerwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.drainunblockerwellington.co.nz.key"
certificate-file: "/etc/ssl/www.drainunblockerwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
drainunblockerwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/drainunblockerwellington.co.nz.key"
certificate-file: "/etc/ssl/drainunblockerwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.popehomes.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.popehomes.co.nz.key"
certificate-file: "/etc/ssl/www.popehomes.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
popehomes.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/popehomes.co.nz.key"
certificate-file: "/etc/ssl/popehomes.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
pje.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/pje.co.nz.key"
certificate-file: "/etc/ssl/pje.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.pje.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.pje.co.nz.key"
certificate-file: "/etc/ssl/www.pje.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bayplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bayplumbing.co.nz.key"
certificate-file: "/etc/ssl/www.bayplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bayplumbing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bayplumbing.co.nz.key"
certificate-file: "/etc/ssl/bayplumbing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bayplumbingsolutions.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bayplumbingsolutions.co.nz.key"
certificate-file: "/etc/ssl/www.bayplumbingsolutions.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bayplumbingsolutions.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bayplumbingsolutions.co.nz.key"
certificate-file: "/etc/ssl/bayplumbingsolutions.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.emergencyplumbertauranga.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.emergencyplumbertauranga.co.nz.key"
certificate-file: "/etc/ssl/www.emergencyplumbertauranga.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
emergencyplumbertauranga.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/emergencyplumbertauranga.co.nz.key"
certificate-file: "/etc/ssl/emergencyplumbertauranga.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
m.bayplumbingsolutions.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/m.bayplumbingsolutions.co.nz.key"
certificate-file: "/etc/ssl/m.bayplumbingsolutions.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mulchman.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mulchman.co.nz.key"
certificate-file: "/etc/ssl/mulchman.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mulchman.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mulchman.co.nz.key"
certificate-file: "/etc/ssl/www.mulchman.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mikecreedybuilding.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mikecreedybuilding.co.nz.key"
certificate-file: "/etc/ssl/mikecreedybuilding.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mikecreedybuilding.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mikecreedybuilding.co.nz.key"
certificate-file: "/etc/ssl/www.mikecreedybuilding.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
creedybuilding.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/creedybuilding.co.nz.key"
certificate-file: "/etc/ssl/creedybuilding.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.creedybuilding.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.creedybuilding.co.nz.key"
certificate-file: "/etc/ssl/www.creedybuilding.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wassong.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wassong.co.nz.key"
certificate-file: "/etc/ssl/wassong.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wassong.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wassong.co.nz.key"
certificate-file: "/etc/ssl/www.wassong.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bkshamiltonmotel.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bkshamiltonmotel.co.nz.key"
certificate-file: "/etc/ssl/bkshamiltonmotel.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bkshamiltonmotel.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bkshamiltonmotel.co.nz.key"
certificate-file: "/etc/ssl/www.bkshamiltonmotel.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.paperquip.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.paperquip.co.nz.key"
certificate-file: "/etc/ssl/www.paperquip.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
paperquip.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/paperquip.co.nz.key"
certificate-file: "/etc/ssl/paperquip.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mbsecurity.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mbsecurity.co.nz.key"
certificate-file: "/etc/ssl/mbsecurity.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mbsecurity.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mbsecurity.co.nz.key"
certificate-file: "/etc/ssl/www.mbsecurity.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.mbsecurity.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.mbsecurity.nz.key"
certificate-file: "/etc/ssl/www.mbsecurity.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
mbsecurity.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/mbsecurity.nz.key"
certificate-file: "/etc/ssl/mbsecurity.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.thai-happy.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.thai-happy.nz.key"
certificate-file: "/etc/ssl/www.thai-happy.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.ptestingservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.ptestingservices.co.nz.key"
certificate-file: "/etc/ssl/www.ptestingservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
ptestingservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/ptestingservices.co.nz.key"
certificate-file: "/etc/ssl/ptestingservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wastewatertransport.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wastewatertransport.co.nz.key"
certificate-file: "/etc/ssl/wastewatertransport.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wastewatertransport.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wastewatertransport.co.nz.key"
certificate-file: "/etc/ssl/www.wastewatertransport.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wwt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wwt.co.nz.key"
certificate-file: "/etc/ssl/www.wwt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wwt.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wwt.co.nz.key"
certificate-file: "/etc/ssl/wwt.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
nellsnaturalhealthclinic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/nellsnaturalhealthclinic.co.nz.key"
certificate-file: "/etc/ssl/nellsnaturalhealthclinic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.nellsnaturalhealthclinic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.nellsnaturalhealthclinic.co.nz.key"
certificate-file: "/etc/ssl/www.nellsnaturalhealthclinic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.shadyattia.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.shadyattia.co.nz.key"
certificate-file: "/etc/ssl/www.shadyattia.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.shadyattia.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.shadyattia.com.key"
certificate-file: "/etc/ssl/www.shadyattia.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
shadyattia.com:
listen:
port: 443
ssl:
key-file: "/etc/ssl/shadyattia.com.key"
certificate-file: "/etc/ssl/shadyattia.com.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
shadyattia.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/shadyattia.co.nz.key"
certificate-file: "/etc/ssl/shadyattia.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
tcm.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/tcm.co.nz.key"
certificate-file: "/etc/ssl/tcm.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.tcm.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.tcm.co.nz.key"
certificate-file: "/etc/ssl/www.tcm.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.teaguescleaning.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.teaguescleaning.co.nz.key"
certificate-file: "/etc/ssl/www.teaguescleaning.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
teaguescleaning.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/teaguescleaning.co.nz.key"
certificate-file: "/etc/ssl/teaguescleaning.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.taxlinkbop.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.taxlinkbop.co.nz.key"
certificate-file: "/etc/ssl/www.taxlinkbop.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
taxlinkbop.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/taxlinkbop.co.nz.key"
certificate-file: "/etc/ssl/taxlinkbop.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
littleflowershop.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/littleflowershop.co.nz.key"
certificate-file: "/etc/ssl/littleflowershop.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.littleflowershop.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.littleflowershop.co.nz.key"
certificate-file: "/etc/ssl/www.littleflowershop.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.sharemarketing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.sharemarketing.co.nz.key"
certificate-file: "/etc/ssl/www.sharemarketing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
sharemarketing.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/sharemarketing.co.nz.key"
certificate-file: "/etc/ssl/sharemarketing.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.deconcleaning.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.deconcleaning.co.nz.key"
certificate-file: "/etc/ssl/www.deconcleaning.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
deconcleaning.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/deconcleaning.co.nz.key"
certificate-file: "/etc/ssl/deconcleaning.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.gseengineering.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.gseengineering.co.nz.key"
certificate-file: "/etc/ssl/www.gseengineering.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
gseengineering.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/gseengineering.co.nz.key"
certificate-file: "/etc/ssl/gseengineering.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.gse.org.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.gse.org.nz.key"
certificate-file: "/etc/ssl/www.gse.org.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
gse.org.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/gse.org.nz.key"
certificate-file: "/etc/ssl/gse.org.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
leadbuilders.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/leadbuilders.co.nz.key"
certificate-file: "/etc/ssl/leadbuilders.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.leadbuilders.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.leadbuilders.co.nz.key"
certificate-file: "/etc/ssl/www.leadbuilders.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.sudzlaundrydunedin.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.sudzlaundrydunedin.co.nz.key"
certificate-file: "/etc/ssl/www.sudzlaundrydunedin.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
loganbrown.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/loganbrown.co.nz.key"
certificate-file: "/etc/ssl/loganbrown.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.loganbrown.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.loganbrown.co.nz.key"
certificate-file: "/etc/ssl/www.loganbrown.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.kiwicad.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.kiwicad.co.nz.key"
certificate-file: "/etc/ssl/www.kiwicad.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
copsefordflowers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/copsefordflowers.co.nz.key"
certificate-file: "/etc/ssl/copsefordflowers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.copsefordflowers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.copsefordflowers.co.nz.key"
certificate-file: "/etc/ssl/www.copsefordflowers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
coastlandsflorist.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/coastlandsflorist.co.nz.key"
certificate-file: "/etc/ssl/coastlandsflorist.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
copsefordflowers.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/copsefordflowers.nz.key"
certificate-file: "/etc/ssl/copsefordflowers.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.copsefordflowers.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.copsefordflowers.nz.key"
certificate-file: "/etc/ssl/www.copsefordflowers.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.coastlandsflowers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.coastlandsflowers.co.nz.key"
certificate-file: "/etc/ssl/www.coastlandsflowers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
coastlandsflowers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/coastlandsflowers.co.nz.key"
certificate-file: "/etc/ssl/coastlandsflowers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.coastlandsflowers.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.coastlandsflowers.nz.key"
certificate-file: "/etc/ssl/www.coastlandsflowers.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.coastlandsflorist.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.coastlandsflorist.co.nz.key"
certificate-file: "/etc/ssl/www.coastlandsflorist.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
coastlandsflowers.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/coastlandsflowers.nz.key"
certificate-file: "/etc/ssl/coastlandsflowers.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.coastlandsflorist.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.coastlandsflorist.nz.key"
certificate-file: "/etc/ssl/www.coastlandsflorist.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
coastlandsflorist.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/coastlandsflorist.nz.key"
certificate-file: "/etc/ssl/coastlandsflorist.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
garagedoorswellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/garagedoorswellington.co.nz.key"
certificate-file: "/etc/ssl/garagedoorswellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
fredchapman.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/fredchapman.co.nz.key"
certificate-file: "/etc/ssl/fredchapman.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.garagedoorswellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.garagedoorswellington.co.nz.key"
certificate-file: "/etc/ssl/www.garagedoorswellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.fredchapman.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.fredchapman.co.nz.key"
certificate-file: "/etc/ssl/www.fredchapman.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.carpetcleanerpalmerstonnorth.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.carpetcleanerpalmerstonnorth.co.nz.key"
certificate-file: "/etc/ssl/www.carpetcleanerpalmerstonnorth.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
carpetcleanerpalmerstonnorth.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/carpetcleanerpalmerstonnorth.co.nz.key"
certificate-file: "/etc/ssl/carpetcleanerpalmerstonnorth.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.actionservices.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.actionservices.co.nz.key"
certificate-file: "/etc/ssl/www.actionservices.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.wellingtonpestcontrol.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.wellingtonpestcontrol.co.nz.key"
certificate-file: "/etc/ssl/www.wellingtonpestcontrol.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.roofcleaningwelllington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.roofcleaningwelllington.co.nz.key"
certificate-file: "/etc/ssl/www.roofcleaningwelllington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.borertreatmentwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.borertreatmentwellington.co.nz.key"
certificate-file: "/etc/ssl/www.borertreatmentwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
roofcleaningwelllington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/roofcleaningwelllington.co.nz.key"
certificate-file: "/etc/ssl/roofcleaningwelllington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
borertreatmentwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/borertreatmentwellington.co.nz.key"
certificate-file: "/etc/ssl/borertreatmentwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.housewashingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.housewashingwellington.co.nz.key"
certificate-file: "/etc/ssl/www.housewashingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
propertymaintenancewellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/propertymaintenancewellington.co.nz.key"
certificate-file: "/etc/ssl/propertymaintenancewellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
wellingtonpestcontrol.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/wellingtonpestcontrol.co.nz.key"
certificate-file: "/etc/ssl/wellingtonpestcontrol.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
housewashingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/housewashingwellington.co.nz.key"
certificate-file: "/etc/ssl/housewashingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.propertymaintenancewellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.propertymaintenancewellington.co.nz.key"
certificate-file: "/etc/ssl/www.propertymaintenancewellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webgenius.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webgenius.co.nz.key"
certificate-file: "/etc/ssl/webgenius.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webgenius.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webgenius.co.nz.key"
certificate-file: "/etc/ssl/www.webgenius.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingotago.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingotago.co.nz.key"
certificate-file: "/etc/ssl/webmarketingotago.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webdesignkapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webdesignkapiti.co.nz.key"
certificate-file: "/etc/ssl/webdesignkapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingtauranga.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingtauranga.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingtauranga.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingkapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingkapiti.co.nz.key"
certificate-file: "/etc/ssl/webmarketingkapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingnorthland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingnorthland.co.nz.key"
certificate-file: "/etc/ssl/webmarketingnorthland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingnorthland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingnorthland.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingnorthland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingwaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingwaikato.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingwaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketinghamilton.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketinghamilton.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketinghamilton.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketinghamilton.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketinghamilton.co.nz.key"
certificate-file: "/etc/ssl/webmarketinghamilton.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketinghawkesbay.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketinghawkesbay.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketinghawkesbay.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingwellington.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketerauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketerauckland.co.nz.key"
certificate-file: "/etc/ssl/webmarketerauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingauckland.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketinghawkesbay.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketinghawkesbay.co.nz.key"
certificate-file: "/etc/ssl/webmarketinghawkesbay.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingauckland.co.nz.key"
certificate-file: "/etc/ssl/webmarketingauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingkapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingkapiti.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingkapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
websitemarketingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/websitemarketingwellington.co.nz.key"
certificate-file: "/etc/ssl/websitemarketingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingbayofplenty.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingbayofplenty.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingbayofplenty.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingnorthshore.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingnorthshore.co.nz.key"
certificate-file: "/etc/ssl/webmarketingnorthshore.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingwaikato.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingwaikato.co.nz.key"
certificate-file: "/etc/ssl/webmarketingwaikato.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketerauckland.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketerauckland.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketerauckland.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingnorthshore.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingnorthshore.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingnorthshore.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webdesignwellington.net.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webdesignwellington.net.nz.key"
certificate-file: "/etc/ssl/webdesignwellington.net.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webdesignwellington.net.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webdesignwellington.net.nz.key"
certificate-file: "/etc/ssl/www.webdesignwellington.net.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingtauranga.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingtauranga.co.nz.key"
certificate-file: "/etc/ssl/webmarketingtauranga.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webmarketingotago.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webmarketingotago.co.nz.key"
certificate-file: "/etc/ssl/www.webmarketingotago.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webdesignkapiti.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webdesignkapiti.co.nz.key"
certificate-file: "/etc/ssl/www.webdesignkapiti.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingwellington.co.nz.key"
certificate-file: "/etc/ssl/webmarketingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.websitemarketingwellington.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.websitemarketingwellington.co.nz.key"
certificate-file: "/etc/ssl/www.websitemarketingwellington.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webmarketingbayofplenty.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webmarketingbayofplenty.co.nz.key"
certificate-file: "/etc/ssl/webmarketingbayofplenty.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
webgenius.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/webgenius.nz.key"
certificate-file: "/etc/ssl/webgenius.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.webgenius.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.webgenius.nz.key"
certificate-file: "/etc/ssl/www.webgenius.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.debrascarpetcleaning.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.debrascarpetcleaning.co.nz.key"
certificate-file: "/etc/ssl/www.debrascarpetcleaning.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
debrascarpetcleaning.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/debrascarpetcleaning.co.nz.key"
certificate-file: "/etc/ssl/debrascarpetcleaning.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.bakertrees.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.bakertrees.co.nz.key"
certificate-file: "/etc/ssl/www.bakertrees.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
bakertrees.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/bakertrees.co.nz.key"
certificate-file: "/etc/ssl/bakertrees.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
littlefarm.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/littlefarm.co.nz.key"
certificate-file: "/etc/ssl/littlefarm.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.littlefarm.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.littlefarm.co.nz.key"
certificate-file: "/etc/ssl/www.littlefarm.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.masterbutchers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.masterbutchers.co.nz.key"
certificate-file: "/etc/ssl/www.masterbutchers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
masterbutchers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/masterbutchers.co.nz.key"
certificate-file: "/etc/ssl/masterbutchers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.prestonsmasterbutchers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.prestonsmasterbutchers.co.nz.key"
certificate-file: "/etc/ssl/www.prestonsmasterbutchers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
prestonsmasterbutchers.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/prestonsmasterbutchers.co.nz.key"
certificate-file: "/etc/ssl/prestonsmasterbutchers.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.rawlinsonlandscaping.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.rawlinsonlandscaping.co.nz.key"
certificate-file: "/etc/ssl/www.rawlinsonlandscaping.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
rawlinsonlandscaping.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/rawlinsonlandscaping.co.nz.key"
certificate-file: "/etc/ssl/rawlinsonlandscaping.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.specialisedconcrete.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.specialisedconcrete.co.nz.key"
certificate-file: "/etc/ssl/www.specialisedconcrete.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
specialisedconcrete.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/specialisedconcrete.co.nz.key"
certificate-file: "/etc/ssl/specialisedconcrete.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
www.shoeclinic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/www.shoeclinic.co.nz.key"
certificate-file: "/etc/ssl/www.shoeclinic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS
cipher-preference: server
dh-file: "/root/ssl/dhparam.pem"
ocsp-update-interval: 0
paths:
"/h2o-status":
mruby.handler: "\n Proc.new do |env|\n auth = env['HTTP_AUTHORIZATION']\n
\ if auth\n method, cred = *auth.split(' ')\n
\ if method.casecmp('basic') == 0\n user,
pass = cred.unpack('m')[0].split(':', 2)\n if user == 'wg'
&& pass == '<redacted>'\n next [399, {}, []]\n end\n
\ end\n end\n next [401, {'Content-Type'
=> 'text/plain', 'WWW-Authenticate' => 'Basic realm=\"status\"'}, ['Authorization
Required']]\n end\n "
status: 'ON'
"/":
proxy.reverse.url: http://127.0.0.1:80/
proxy.preserve-host: 'ON'
proxy.timeout.io: 3600000
shoeclinic.co.nz:
listen:
port: 443
ssl:
key-file: "/etc/ssl/shoeclinic.co.nz.key"
certificate-file: "/etc/ssl/shoeclinic.co.nz.crt"
cipher-suite: ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-EC
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment