nginx的优化加固
东拚西凑了一些有用的东东,可以贴在nginx配置文件中,功能比较杂,防盗链、防注入等等
[*] location = /robots.txt { access_log off; log_not_found off; }
[*] location = /favicon.ico { access_log off; log_not_found off; }
[*] location ~ /\. { access_log off; log_not_found off; deny all; }
[*] location ~ ~$ { access_log off; log_not_found off; deny all; }
[*] location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$ { expires 30d; }
[*] location ~ .*\.(js|css)?$ {expires12h; }
[*]
[*]
[*] location ~* \.(gif|jpg|png|swf|flv)$
[*] if ($host !=’*.yourdomain.com’) {
[*] return 403;
[*] }
[*]
[*]
[*] ## Block SQL injections
[*] set $block_sql_injections 0;
[*] if ($query_string ~ "union.*select.*\(") {
[*] set $block_sql_injections 1;
[*] }
[*] if ($query_string ~ "union.*all.*select.*") {
[*] set $block_sql_injections 1;
[*] }
[*] if ($query_string ~ "concat.*\(") {
[*] set $block_sql_injections 1;
[*] }
[*] if ($block_sql_injections = 1) {
[*] return 403;
[*] }
[*]
[*] ## Block file injections
[*] set $block_file_injections 0;
[*] if ($query_string ~ "=http://") {
[*] set $block_file_injections 1;
[*] }
[*] if ($query_string ~ "=(\.\.//?)+") {
[*] set $block_file_injections 1;
[*] }
[*] if ($query_string ~ "=/(//?)+") {
[*] set $block_file_injections 1;
[*] }
[*] if ($block_file_injections = 1) {
[*] return 403;
[*] }
[*]
[*] ## Block common exploits
[*] set $block_common_exploits 0;
[*] if ($query_string ~ "(|%3E)") {
[*] set $block_common_exploits 1;
[*] }
[*] if ($query_string ~ "GLOBALS(=|\[|\%{0,2})") {
[*] set $block_common_exploits 1;
[*] }
[*] if ($query_string ~ "_REQUEST(=|\[|\%{0,2})") {
[*] set $block_common_exploits 1;
[*] }
[*] if ($query_string ~ "proc/self/environ") {
[*] set $block_common_exploits 1;
[*] }
[*] if ($query_string ~ "mosConfig_{1,21}(=|\%3D)") {
[*] set $block_common_exploits 1;
[*] }
[*] if ($query_string ~ "base64_(en|de)code\(.*\)") {
[*] set $block_common_exploits 1;
[*] }
[*] if ($block_common_exploits = 1) {
[*] return 403;
[*] }
[*]
[*] ## Block spam
[*] set $block_spam 0;
[*] if ($query_string ~ "\b(ultram|unicauca|valium|viagra|vicodin|xanax|ypxaieo)\b") {
[*] set $block_spam 1;
[*] }
[*] if ($query_string ~ "\b(erections|hoodia|huronriveracres|impotence|levitra|libido)\b") {
[*] set $block_spam 1;
[*] }
[*] if ($query_string ~ "\b(ambien|blue\spill|cialis|cocaine|ejaculation|erectile)\b") {
[*] set $block_spam 1;
[*] }
[*] if ($query_string ~ "\b(lipitor|phentermin|proac|sandyauer|tramadol|troyhamby)\b") {
[*] set $block_spam 1;
[*] }
[*] if ($block_spam = 1) {
[*] return 403;
[*] }
[*]
[*] ## Block user agents
[*] set $block_user_agents 0;
[*]
[*] # Don't disable wget if you need it to run cron jobs!
[*] #if ($http_user_agent ~ "Wget") {
[*] # set $block_user_agents 1;
[*] #}
[*]
[*] # Disable Akeeba Remote Control 2.5 and earlier
[*] if ($http_user_agent ~ "Indy Library") {
[*] set $block_user_agents 1;
[*] }
[*]
[*] # Common bandwidth hoggers and hacking tools.
[*] if ($http_user_agent ~ "libwww-perl") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "GetRight") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "GetWeb!") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "Go!Zilla") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "Download Demon") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "Go-Ahead-Got-It") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "TurnitinBot") {
[*] set $block_user_agents 1;
[*] }
[*] if ($http_user_agent ~ "GrabNet") {
[*] set $block_user_agents 1;
[*] }
[*]
[*] if ($block_user_agents = 1) {
[*] return 403;
[*] }
使用方法
1、按照rpm的标准安装的路径,假设配置文件为/etc/nginx/nginx.conf 和/etc/nginx/conf.d/default.conf ,将上述内容保存为 /etc/nginx/nginx-extra.conf
2、在server 栏中加入,“ include nginx-extra.conf ” ,也就是如下格式:
[*]server {
[*][...]
[*]
[*]include nginx-extra.conf
[*]}
注:有大段代码摘自howtoforge
页:
[1]