How to improve nginx security
Nginx is one of the most popular web servers today. It serves 7% of the world's web traffic and is growing at an astonishing rate. It's an amazing server and I'd love to deploy it.
The following is a list of common security pitfalls and solutions that can help ensure that your Nginx deployment is secure.
1. Use "if" carefully in configuration files. It is part of the rewrite module and should not be used anywhere.
The "if" statement is a mandatory part of the override module evaluation directive. In other words, Nginx configuration is generally declarative. In some cases, due to user demand, they tried to use "if" inside some non-overridden directives, which resulted in the situation we are facing now. Works fine in most cases, but...see above.
It seems like the only correct solution is to completely disable "if" inside non-overridden directives. This will change a lot of the existing configuration, so it's not done yet.
2. Forward each ~ .php$ request to PHP. We published an introduction to potential security vulnerabilities in this popular command last week. Even if the file name is hello.php.jpeg, it will match the ~.php$ regular pattern and execute the file.
There are now two good ways to solve the above problems. I think it's important to ensure that you don't easily execute arbitrary code with mixed methods.
If the file is not found, use try_files and only (which should be noted in all dynamic execution situations) to transfer it to the FCGI process running PHP.
Confirm that cgi.fix_pathinfo is set to 0 (cgi.fix_pathinfo=0) in the php.ini file. This ensures that PHP checks the full name of the file (when it doesn't find .php at the end of the file it will ignore it)
Fixes issue with regular expressions matching incorrect files. The regex now considers any file containing ".php". Adding "if" after the site ensures that only the correct files will run. Set both /location ~ .php$ and location ~ ..*/.*.php$ to return 403;
3. Disable the autoindex module. This may have changed in the Nginx version you are using. If not, just add the autoindex off; statement in the location block of the configuration file.
4. Disable ssi (server side reference) on the server. This can be done by adding ssi off; in the location block.
5. Turn off server tags. If enabled (by default) all error pages will display the server version and information. Add the server_tokens off; statement to the Nginx configuration file to resolve this issue.
6. Set up custom caching in the configuration file to limit the possibility of buffer overflow attacks.
client_body_buffer_size 1K;
client_header_buffer_size 1k;
client_max_body_size 1k;
large_client_header_buffers 2 1k;
7. Set timeout low Prevent DOS attacks. All these declarations can be placed in the main configuration file.
client_body_timeout 10;
client_header_timeout 10;
keepalive_timeout 5 5;
send_timeout 10;
8. Limit the number of user connections to Prevent DOS attacks.
limit_zone slimits $binary_remote_addr 5m;
limit_conn slimits 5;
9. Try to avoid using HTTP authentication. HTTP authentication uses crypt by default, and its hash is not secure. If you want to use it, use MD5 (this is not a good choice but it is better than crypt in terms of load).
10. Stay up to date with the latest Nginx security updates.
The above is the detailed content of How to improve nginx security. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

You can query the Docker container name by following the steps: List all containers (docker ps). Filter the container list (using the grep command). Gets the container name (located in the "NAMES" column).

How to configure an Nginx domain name on a cloud server: Create an A record pointing to the public IP address of the cloud server. Add virtual host blocks in the Nginx configuration file, specifying the listening port, domain name, and website root directory. Restart Nginx to apply the changes. Access the domain name test configuration. Other notes: Install the SSL certificate to enable HTTPS, ensure that the firewall allows port 80 traffic, and wait for DNS resolution to take effect.

The methods that can query the Nginx version are: use the nginx -v command; view the version directive in the nginx.conf file; open the Nginx error page and view the page title.

How to configure Nginx in Windows? Install Nginx and create a virtual host configuration. Modify the main configuration file and include the virtual host configuration. Start or reload Nginx. Test the configuration and view the website. Selectively enable SSL and configure SSL certificates. Selectively set the firewall to allow port 80 and 443 traffic.

How to confirm whether Nginx is started: 1. Use the command line: systemctl status nginx (Linux/Unix), netstat -ano | findstr 80 (Windows); 2. Check whether port 80 is open; 3. Check the Nginx startup message in the system log; 4. Use third-party tools, such as Nagios, Zabbix, and Icinga.

Starting an Nginx server requires different steps according to different operating systems: Linux/Unix system: Install the Nginx package (for example, using apt-get or yum). Use systemctl to start an Nginx service (for example, sudo systemctl start nginx). Windows system: Download and install Windows binary files. Start Nginx using the nginx.exe executable (for example, nginx.exe -c conf\nginx.conf). No matter which operating system you use, you can access the server IP

Create a container in Docker: 1. Pull the image: docker pull [mirror name] 2. Create a container: docker run [Options] [mirror name] [Command] 3. Start the container: docker start [Container name]

Docker container startup steps: Pull the container image: Run "docker pull [mirror name]". Create a container: Use "docker create [options] [mirror name] [commands and parameters]". Start the container: Execute "docker start [Container name or ID]". Check container status: Verify that the container is running with "docker ps".
