You have opened up port TCP443 on your firewall if you have one enabled, I hope? (It's an obvious one, but I've missed this before myself.)
If you have installed the nginx
package from the Ubuntu repositories, you will have two directories.
/etc/nginx/sites-enabled
and /etc/nginx/sites-available
.
In the main nginx configuration, /etc/nginx/nginx.conf
, you have the following line:
include /etc/nginx/sites-enabled/*.conf;
So basically to list all available virtualhosts, you can run the following command:
ls /etc/nginx/sites-available
To activate one of them, run the following command:
ln -s /etc/nginx/sites-available/www.example.org.conf /etc/nginx/sites-enabled/
The scripts that comes with Apache is basically just simple shell wrappers that does something similar as above.
After linking the files, remember to run sudo service nginx reload
/ service nginx reload
Best Answer
You should look into the viability of just losing that particular option. As the name suggest it's insecure!
Nginx currently (since 0.8.23) does not do TLS renegotiation at all, anyway.
Also, while I realize you seem to be in a position where compatibility with broken clients seems to be more important than security (unfair argument: why are you using TLS, if you're going to poke holes in it?), I suggest checking your site with Qualys SSL Labs's SSL Server Test.