作为IT工程师,以下是为Nginx配置HTTP协议安全性的详细建议:
location / {
limit_except GET POST HEAD {
deny all;
}
}
server {
listen 80;
server_name example.com;
return 301 https://$host$request_uri;
}
server {
listen 443 ssl;
server_name example.com;
ssl_certificate /path/to/cert.pem;
ssl_certificate_key /path/to/key.pem;
# 其他SSL配置...
}
add_header X-Frame-Options "SAMEORIGIN";
add_header X-XSS-Protection "1; mode=block";
add_header X-Content-Type-Options "nosniff";
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdn.example.com;";
add_header Referrer-Policy "strict-origin-when-cross-origin";
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";
server_tokens off;
more_clear_headers Server;
types {
text/html html htm shtml;
text/css css;
# 其他MIME类型...
}
client_body_buffer_size 16k;
client_header_buffer_size 1k;
client_max_body_size 1m;
large_client_header_buffers 4 8k;
add_header X-Frame-Options "DENY";
# 或
add_header X-Frame-Options "SAMEORIGIN";
add_header X-Content-Type-Options "nosniff";
proxy_cookie_path / "/; HTTPOnly; Secure; SameSite=Strict";
if ($request_method !~ ^(GET|HEAD|POST)$ ) {
return 405;
}
location ~* \.(php|pl|py|jsp|asp|sh|cgi)$ {
deny all;
return 403;
}
location ~ /\. {
deny all;
return 403;
}
ssl_protocols TLSv1.2 TLSv1.3;
ssl_prefer_server_ciphers on;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256';
ssl_ecdh_curve secp384r1;
ssl_session_cache shared:SSL:10m;
ssl_session_tickets off;
ssl_stapling on;
ssl_stapling_verify on;
http {
# 确保只接受明确的Host头
server {
listen 80 default_server;
server_name _;
return 444;
}
# 禁用分块传输编码
chunked_transfer_encoding off;
}
limit_conn_zone $binary_remote_addr zone=addr:10m;
limit_req_zone $binary_remote_addr zone=one:10m rate=10r/s;
server {
location / {
limit_conn addr 10;
limit_req zone=one burst=20 nodelay;
}
}
log_format security '$remote_addr - $remote_user [$time_local] '
'"$request" $status $body_bytes_sent '
'"$http_referer" "$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/security.log security;
实施这些设置后,建议使用以下工具验证配置: - Qualys SSL Labs (测试SSL/TLS配置) - SecurityHeaders.io (检查HTTP安全头) - OWASP ZAP (全面安全扫描) - Nginx Amplify (监控和安全分析)
记得在修改配置后测试并重新加载Nginx:
nginx -t && nginx -s reload