282 lines
7.8 KiB
Nginx Configuration File
282 lines
7.8 KiB
Nginx Configuration File
## $HOSTNAME
|
|
|
|
# Redirect all HTTP to HTTPS *except* the ACME challenges (Let's Encrypt TLS certificate
|
|
# domain validation challenges) path, which must be served over HTTP per the ACME spec
|
|
# (due to some Apache vulnerability).
|
|
server {
|
|
listen 80;
|
|
listen [::]:80;
|
|
|
|
server_name $HOSTNAME;
|
|
root /tmp/invalid-path-nothing-here;
|
|
|
|
# Improve privacy: Hide version an OS information on
|
|
# error pages and in the "Server" HTTP-Header.
|
|
server_tokens off;
|
|
|
|
location / {
|
|
# Redirect using the 'return' directive and the built-in
|
|
# variable '$request_uri' to avoid any capturing, matching
|
|
# or evaluation of regular expressions.
|
|
return 301 https://$HOSTNAME$request_uri;
|
|
}
|
|
|
|
location /.well-known/acme-challenge/ {
|
|
# This path must be served over HTTP for ACME domain validation.
|
|
# We map this to a special path where our TLS cert provisioning
|
|
# tool knows to store challenge response files.
|
|
alias $STORAGE_ROOT/ssl/lets_encrypt/acme_challenges/;
|
|
}
|
|
|
|
## Block SQL injections
|
|
set $block_sql_injections 0;
|
|
if ($query_string ~ "union.*select.*\(") {
|
|
set $block_sql_injections 1;
|
|
}
|
|
if ($query_string ~ "union.*all.*select.*") {
|
|
set $block_sql_injections 1;
|
|
}
|
|
if ($query_string ~ "concat.*\(") {
|
|
set $block_sql_injections 1;
|
|
}
|
|
if ($block_sql_injections = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block file injections
|
|
set $block_file_injections 0;
|
|
if ($query_string ~ "[a-zA-Z0-9_]=http://") {
|
|
set $block_file_injections 1;
|
|
}
|
|
if ($query_string ~ "[a-zA-Z0-9_]=(\.\.//?)+") {
|
|
set $block_file_injections 1;
|
|
}
|
|
if ($query_string ~ "[a-zA-Z0-9_]=/([a-z0-9_.]//?)+") {
|
|
set $block_file_injections 1;
|
|
}
|
|
if ($block_file_injections = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block common exploits
|
|
set $block_common_exploits 0;
|
|
if ($query_string ~ "(<|%3C).*script.*(>|%3E)") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "GLOBALS(=|\[|\%[0-9A-Z]{0,2})") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "_REQUEST(=|\[|\%[0-9A-Z]{0,2})") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "proc/self/environ") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "mosConfig_[a-zA-Z_]{1,21}(=|\%3D)") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "base64_(en|de)code\(.*\)") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($block_common_exploits = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block spam
|
|
set $block_spam 0;
|
|
if ($query_string ~ "\b(ultram|unicauca|valium|viagra|vicodin|xanax|ypxaieo)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($query_string ~ "\b(erections|hoodia|huronriveracres|impotence|levitra|libido)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($query_string ~ "\b(ambien|blue\spill|cialis|cocaine|ejaculation|erectile)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($query_string ~ "\b(lipitor|phentermin|pro[sz]ac|sandyauer|tramadol|troyhamby)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($block_spam = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block user agents
|
|
set $block_user_agents 0;
|
|
|
|
# Don't disable wget if you need it to run cron jobs!
|
|
#if ($http_user_agent ~ "Wget") {
|
|
# set $block_user_agents 1;
|
|
#}
|
|
|
|
# Disable Akeeba Remote Control 2.5 and earlier
|
|
if ($http_user_agent ~ "Indy Library") {
|
|
set $block_user_agents 1;
|
|
}
|
|
|
|
# Common bandwidth hoggers and hacking tools.
|
|
if ($http_user_agent ~ "libwww-perl") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "GetRight") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "GetWeb!") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "Go!Zilla") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "Download Demon") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "Go-Ahead-Got-It") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "TurnitinBot") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "GrabNet") {
|
|
set $block_user_agents 1;
|
|
}
|
|
|
|
if ($block_user_agents = 1) {
|
|
return 403;
|
|
}
|
|
}
|
|
|
|
# The secure HTTPS server.
|
|
server {
|
|
listen 443 ssl;
|
|
listen [::]:443 ssl;
|
|
|
|
server_name $HOSTNAME;
|
|
|
|
# Improve privacy: Hide version an OS information on
|
|
# error pages and in the "Server" HTTP-Header.
|
|
server_tokens off;
|
|
|
|
ssl_certificate $SSL_CERTIFICATE;
|
|
ssl_certificate_key $SSL_KEY;
|
|
|
|
# ADDITIONAL DIRECTIVES HERE
|
|
## Additional Exploit blocks added by Alon Ganon
|
|
# alon@ganon.me https://alonganon.info
|
|
# Recommended from here https://www.howtoforge.com/nginx-how-to-block-exploits-sql-injections-file-injections-spam-user-agents-etc
|
|
## Block SQL injections
|
|
set $block_sql_injections 0;
|
|
if ($query_string ~ "union.*select.*\(") {
|
|
set $block_sql_injections 1;
|
|
}
|
|
if ($query_string ~ "union.*all.*select.*") {
|
|
set $block_sql_injections 1;
|
|
}
|
|
if ($query_string ~ "concat.*\(") {
|
|
set $block_sql_injections 1;
|
|
}
|
|
if ($block_sql_injections = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block file injections
|
|
set $block_file_injections 0;
|
|
if ($query_string ~ "[a-zA-Z0-9_]=http://") {
|
|
set $block_file_injections 1;
|
|
}
|
|
if ($query_string ~ "[a-zA-Z0-9_]=(\.\.//?)+") {
|
|
set $block_file_injections 1;
|
|
}
|
|
if ($query_string ~ "[a-zA-Z0-9_]=/([a-z0-9_.]//?)+") {
|
|
set $block_file_injections 1;
|
|
}
|
|
if ($block_file_injections = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block common exploits
|
|
set $block_common_exploits 0;
|
|
if ($query_string ~ "(<|%3C).*script.*(>|%3E)") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "GLOBALS(=|\[|\%[0-9A-Z]{0,2})") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "_REQUEST(=|\[|\%[0-9A-Z]{0,2})") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "proc/self/environ") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "mosConfig_[a-zA-Z_]{1,21}(=|\%3D)") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($query_string ~ "base64_(en|de)code\(.*\)") {
|
|
set $block_common_exploits 1;
|
|
}
|
|
if ($block_common_exploits = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block spam
|
|
set $block_spam 0;
|
|
if ($query_string ~ "\b(ultram|unicauca|valium|viagra|vicodin|xanax|ypxaieo)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($query_string ~ "\b(erections|hoodia|huronriveracres|impotence|levitra|libido)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($query_string ~ "\b(ambien|blue\spill|cialis|cocaine|ejaculation|erectile)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($query_string ~ "\b(lipitor|phentermin|pro[sz]ac|sandyauer|tramadol|troyhamby)\b") {
|
|
set $block_spam 1;
|
|
}
|
|
if ($block_spam = 1) {
|
|
return 403;
|
|
}
|
|
|
|
## Block user agents
|
|
set $block_user_agents 0;
|
|
|
|
# Don't disable wget if you need it to run cron jobs!
|
|
#if ($http_user_agent ~ "Wget") {
|
|
# set $block_user_agents 1;
|
|
#}
|
|
|
|
# Disable Akeeba Remote Control 2.5 and earlier
|
|
if ($http_user_agent ~ "Indy Library") {
|
|
set $block_user_agents 1;
|
|
}
|
|
|
|
# Common bandwidth hoggers and hacking tools.
|
|
if ($http_user_agent ~ "libwww-perl") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "GetRight") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "GetWeb!") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "Go!Zilla") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "Download Demon") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "Go-Ahead-Got-It") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "TurnitinBot") {
|
|
set $block_user_agents 1;
|
|
}
|
|
if ($http_user_agent ~ "GrabNet") {
|
|
set $block_user_agents 1;
|
|
}
|
|
|
|
if ($block_user_agents = 1) {
|
|
return 403;
|
|
}
|
|
|
|
|
|
}
|