# 禁用server tokens
server_tokens off;
# 限制HTTP方法
if ($request_method !~ ^(GET|HEAD|POST)$ ) {
return 405;
}
# 隐藏Nginx版本号
more_clear_headers Server;
# IP访问限制
location /admin {
allow 192.168.1.0/24;
deny all;
}
# 速率限制
limit_req_zone $binary_remote_addr zone=one:10m rate=10r/s;
server {
limit_req zone=one burst=5;
}
# 防止SQL注入
set $block_sql_injections 0;
if ($query_string ~ "union.*select.*\(") {
set $block_sql_injections 1;
}
if ($block_sql_injections = 1) {
return 403;
}
# 防止XSS
add_header X-XSS-Protection "1; mode=block";
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384...';
ssl_prefer_server_ciphers on;
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 10m;
# 禁止访问隐藏文件
location ~ /\. {
deny all;
}
# 限制特定文件类型访问
location ~* \.(txt|log|conf)$ {
deny all;
}
# 内容安全策略(CSP)
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://trusted.cdn.com;";
# HTTP严格传输安全(HSTS)
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
# 增强日志记录
log_format security '$remote_addr - $remote_user [$time_local] '
'"$request" $status $body_bytes_sent '
'"$http_referer" "$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/security.log security;
通过以上措施,可以显著提高Nginx服务器的安全性,抵御大多数常见攻击。