Skip to content

Instantly share code, notes, and snippets.

@omartrigui
Last active June 16, 2017 10:17
Show Gist options
  • Save omartrigui/956e15360f691543de1abe7e30f788b7 to your computer and use it in GitHub Desktop.
Save omartrigui/956e15360f691543de1abe7e30f788b7 to your computer and use it in GitHub Desktop.
My preferred Nginx configuraiton - #Hardened #Security ( A+ ssllabs )
upstream sample {
server 127.0.0.1:8080 fail_timeout=0;
}
server {
listen 80;
server_name my-domain.com;
location / {
return 301 https://$host$request_uri;
}
location '/.well-known/acme-challenge' {
default_type "text/plain";
root /var/www/letsencrypt;
allow all;
}
}
# Let's encrypt init & req
# sudo git clone https://github.com/letsencrypt/letsencrypt /opt/letsencrypt --depth=1
# /opt/letsencrypt/letsencrypt-auto certonly --rsa-key-size 4096 --webroot --webroot-path /var/www/letsencrypt/ -d my-domain
# Cert renew cron
# 31 2 * */2 1 /opt/letsencrypt/letsencrypt-auto certonly --rsa-key-size 4096 --webroot --webroot-path /var/www/letsencrypt/ -d my-domain.com --non-interactive --force-renewal;
# To generate a ticket & DH key
# sudo mkdir -p /etc/nginx/ssl
# sudo openssl rand 48 -out /etc/nginx/ssl/ticket.key
# sudo openssl dhparam -out /etc/nginx/ssl/dhparam4.pem 4096
server {
listen 443 ssl;
server_name my-domain.com;
ssl_certificate /etc/letsencrypt/live/my-domain.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/my-domain.com/privkey.pem;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_ecdh_curve secp384r1;
ssl_dhparam /etc/nginx/ssl/dhparam4.pem;
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK';
ssl_session_cache shared:SSL:100m;
ssl_session_timeout 24h;
ssl_session_tickets on;
ssl_session_ticket_key /etc/nginx/ssl/ticket.key;
ssl_stapling on;
ssl_stapling_verify on;
add_header Strict-Transport-Security max-age=15768000;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-Content-Type-Options "nosniff" always;
add_header X-Xss-Protection "1";
resolver 8.8.8.8 8.8.4.4 208.67.222.222 208.67.220.220 216.146.35.35 216.146.36.36 valid=300s;
resolver_timeout 3s;
location / {
proxy_set_header Host $host:$server_port;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header X-NginX-Proxy true;
proxy_buffering off;
proxy_pass http://sample;
}
gzip on;
gzip_disable "msie6";
gzip_comp_level 7;
gzip_vary on;
gzip_types text/plain text/css application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript application/javascript;
gzip_min_length 1100;
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment