server_tokens off;
if ($request_method !~ ^(GET|HEAD|POST)$ ) {
return 405;
}
autoindex off;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305';
ssl_prefer_server_ciphers on;
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";
ssl_stapling on;
ssl_stapling_verify on;
resolver 8.8.8.8 8.8.4.4 valid=300s;
resolver_timeout 5s;
location /admin {
allow 192.168.1.0/24;
deny all;
}
limit_req_zone $binary_remote_addr zone=one:10m rate=10r/s;
server {
location / {
limit_req zone=one burst=20;
}
}
add_header X-Frame-Options "SAMEORIGIN";
add_header X-Content-Type-Options "nosniff";
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdn.example.com;";
add_header Referrer-Policy "strict-origin-when-cross-origin";
chown -R root:nginx /etc/nginx/
chmod -R 750 /etc/nginx/
chmod 640 /etc/nginx/conf.d/*.conf
chown -R nginx:nginx /var/log/nginx/
chmod -R 740 /var/log/nginx/
log_format security '$remote_addr - $remote_user [$time_local] '
'"$request" $status $body_bytes_sent '
'"$http_referer" "$http_user_agent" '
'$request_time $upstream_response_time $pipe';
# 监控错误日志中的异常
tail -f /var/log/nginx/error.log | grep -E 'error|crit|alert|emerg'
load_module modules/ngx_http_modsecurity_module.so;
http {
modsecurity on;
modsecurity_rules_file /etc/nginx/modsec/main.conf;
}
#!/bin/bash
# 检查Nginx配置文件语法
nginx -t
# 检查过期SSL证书
openssl x509 -enddate -noout -in /etc/nginx/ssl/cert.pem
# 检查开放端口
netstat -tulnp | grep nginx
# 设置自动安全更新
apt-get install -y unattended-upgrades
dpkg-reconfigure -plow unattended-upgrades
# 紧急关闭特定站点
mv /etc/nginx/conf.d/vulnerable-site.conf /etc/nginx/conf.d/vulnerable-site.conf.disabled
nginx -s reload
# 紧急限制连接数
iptables -A INPUT -p tcp --dport 80 -m connlimit --connlimit-above 50 -j DROP
通过以上措施的综合实施,可以显著提高Nginx Web服务器的安全性,有效防御各类网络攻击。