Skip to content

Instantly share code, notes, and snippets.

@eskadah
Forked from nrollr/nginx.conf
Created January 13, 2018 12:37
Show Gist options
  • Save eskadah/d47a1ce178e2ee8145a6b1d726945d0b to your computer and use it in GitHub Desktop.
Save eskadah/d47a1ce178e2ee8145a6b1d726945d0b to your computer and use it in GitHub Desktop.

Revisions

  1. @nrollr nrollr revised this gist Oct 19, 2016. 1 changed file with 2 additions and 2 deletions.
    4 changes: 2 additions & 2 deletions nginx.conf
    Original file line number Diff line number Diff line change
    @@ -45,9 +45,9 @@ server {
    # Required for LE certificate enrollment using certbot
    location '/.well-known/acme-challenge' {
    default_type "text/plain";
    root /var/www;
    root /var/www/html;
    }
    location / {
    root /var/www;
    root /var/www/html;
    }
    }
  2. @nrollr nrollr revised this gist Oct 19, 2016. 1 changed file with 34 additions and 33 deletions.
    67 changes: 34 additions & 33 deletions nginx.conf
    Original file line number Diff line number Diff line change
    @@ -4,49 +4,50 @@
    add_header X-Content-Type-Options nosniff;

    # Redirect all HTTP traffic to HTTPS
    server {
    listen 80;
    server_name www.domain.com domain.com;
    return 301 https://$host$request_uri;
    }
    server {
    listen 80;
    server_name www.domain.com domain.com;
    return 301 https://$host$request_uri;
    }

    # SSL configuration
    server {
    listen 443 ssl default deferred;
    server_name www.domain.com domain.com;
    ssl_certificate /etc/letsencrypt/live/www.domain.com/fullchain.pem;
    server {
    listen 443 ssl default deferred;
    server_name www.domain.com domain.com;
    ssl_certificate /etc/letsencrypt/live/www.domain.com/fullchain.pem;
    ssl_certificate_key /etc/letsencrypt/live/www.domain.com/privkey.pem;

    # Improve HTTPS performance with session resumption
    ssl_session_cache shared:SSL:10m;
    ssl_session_timeout 5m;
    # Improve HTTPS performance with session resumption
    ssl_session_cache shared:SSL:10m;
    ssl_session_timeout 5m;

    # Enable server-side protection against BEAST attacks
    ssl_prefer_server_ciphers on;
    # Enable server-side protection against BEAST attacks
    ssl_prefer_server_ciphers on;
    ssl_ciphers ECDH+AESGCM:ECDH+AES256:ECDH+AES128:DH+3DES:!ADH:!AECDH:!MD5;

    # Disable SSLv3
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
    # Disable SSLv3
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

    # Diffie-Hellman parameter for DHE ciphersuites
    # $ sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
    # $ sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
    ssl_dhparam /etc/ssl/certs/dhparam.pem;

    # Enable HSTS (https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security)
    add_header Strict-Transport-Security "max-age=63072000; includeSubdomains";
    # Enable HSTS (https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security)
    add_header Strict-Transport-Security "max-age=63072000; includeSubdomains";

    # Enable OCSP stapling (http://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox)
    ssl_stapling on;
    ssl_stapling_verify on;
    ssl_trusted_certificate /etc/letsencrypt/live/www.domain.com/fullchain.pem;
    resolver 8.8.8.8 8.8.4.4 valid=300s;
    resolver_timeout 5s;
    # Enable OCSP stapling (http://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox)
    ssl_stapling on;
    ssl_stapling_verify on;
    ssl_trusted_certificate /etc/letsencrypt/live/www.domain.com/fullchain.pem;
    resolver 8.8.8.8 8.8.4.4 valid=300s;
    resolver_timeout 5s;

    # Required for LE certificate enrollment using certbot
    location '/.well-known/acme-challenge' {
    default_type "text/plain";
    root /var/www;
    }
    location / {
    root /var/www;
    }
    # Required for LE certificate enrollment using certbot
    location '/.well-known/acme-challenge' {
    default_type "text/plain";
    root /var/www;
    }
    location / {
    root /var/www;
    }
    }
  3. @nrollr nrollr created this gist Oct 15, 2016.
    52 changes: 52 additions & 0 deletions nginx.conf
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,52 @@
    # Advanced config for NGINX
    server_tokens off;
    add_header X-XSS-Protection "1; mode=block";
    add_header X-Content-Type-Options nosniff;

    # Redirect all HTTP traffic to HTTPS
    server {
    listen 80;
    server_name www.domain.com domain.com;
    return 301 https://$host$request_uri;
    }

    # SSL configuration
    server {
    listen 443 ssl default deferred;
    server_name www.domain.com domain.com;
    ssl_certificate /etc/letsencrypt/live/www.domain.com/fullchain.pem;
    ssl_certificate_key /etc/letsencrypt/live/www.domain.com/privkey.pem;

    # Improve HTTPS performance with session resumption
    ssl_session_cache shared:SSL:10m;
    ssl_session_timeout 5m;

    # Enable server-side protection against BEAST attacks
    ssl_prefer_server_ciphers on;

    # Disable SSLv3
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

    # Diffie-Hellman parameter for DHE ciphersuites
    # $ sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 4096
    ssl_dhparam /etc/ssl/certs/dhparam.pem;

    # Enable HSTS (https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security)
    add_header Strict-Transport-Security "max-age=63072000; includeSubdomains";

    # Enable OCSP stapling (http://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox)
    ssl_stapling on;
    ssl_stapling_verify on;
    ssl_trusted_certificate /etc/letsencrypt/live/www.domain.com/fullchain.pem;
    resolver 8.8.8.8 8.8.4.4 valid=300s;
    resolver_timeout 5s;

    # Required for LE certificate enrollment using certbot
    location '/.well-known/acme-challenge' {
    default_type "text/plain";
    root /var/www;
    }
    location / {
    root /var/www;
    }
    }