]> Nutra Git (v1) - nutratech/vps-root.git/commitdiff
track other stuff from guide
authorgamesguru <gamesguru@vps76.local>
Thu, 23 Jun 2022 06:46:11 +0000 (06:46 +0000)
committergamesguru <gamesguru@vps76.local>
Thu, 23 Jun 2022 06:46:11 +0000 (06:46 +0000)
etc/nginx/sites-available/default [new file with mode: 0644]
etc/nginx/snippets/ssl-params.conf [new file with mode: 0644]

diff --git a/etc/nginx/sites-available/default b/etc/nginx/sites-available/default
new file mode 100644 (file)
index 0000000..9117e37
--- /dev/null
@@ -0,0 +1,91 @@
+##
+# You should look at the following URL's in order to grasp a solid understanding
+# of Nginx configuration files in order to fully unleash the power of Nginx.
+# https://www.nginx.com/resources/wiki/start/
+# https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/
+# https://wiki.debian.org/Nginx/DirectoryStructure
+#
+# In most cases, administrators will remove this file from sites-enabled/ and
+# leave it as reference inside of sites-available where it will continue to be
+# updated by the nginx packaging team.
+#
+# This file will automatically load configuration files provided by other
+# applications, such as Drupal or Wordpress. These applications will be made
+# available underneath a path with that package name, such as /drupal8.
+#
+# Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples.
+##
+
+# Default server configuration
+#
+server {
+       listen 80 default_server;
+       listen [::]:80 default_server;
+
+       # SSL configuration
+       #
+       # listen 443 ssl default_server;
+       # listen [::]:443 ssl default_server;
+       #
+       # Note: You should disable gzip for SSL traffic.
+       # See: https://bugs.debian.org/773332
+       #
+       # Read up on ssl_ciphers to ensure a secure configuration.
+       # See: https://bugs.debian.org/765782
+       #
+       # Self signed certs generated by the ssl-cert package
+       # Don't use them in a production server!
+       #
+       # include snippets/snakeoil.conf;
+
+       root /var/www/html;
+
+       # Add index.php to the list if you are using PHP
+       index index.html index.htm index.nginx-debian.html;
+
+       server_name _;
+
+       location / {
+               # First attempt to serve request as file, then
+               # as directory, then fall back to displaying a 404.
+               try_files $uri $uri/ =404;
+       }
+
+       # pass PHP scripts to FastCGI server
+       #
+       #location ~ \.php$ {
+       #       include snippets/fastcgi-php.conf;
+       #
+       #       # With php-fpm (or other unix sockets):
+       #       fastcgi_pass unix:/var/run/php/php7.4-fpm.sock;
+       #       # With php-cgi (or other tcp sockets):
+       #       fastcgi_pass 127.0.0.1:9000;
+       #}
+
+       # deny access to .htaccess files, if Apache's document root
+       # concurs with nginx's one
+       #
+       #location ~ /\.ht {
+       #       deny all;
+       #}
+}
+
+
+# Virtual Host configuration for example.com
+#
+# You can move that to a different file under sites-available/ and symlink that
+# to sites-enabled/ to enable it.
+#
+#server {
+#      listen 80;
+#      listen [::]:80;
+#
+#      server_name example.com;
+#
+#      root /var/www/example.com;
+#      index index.html;
+#
+#      location / {
+#              try_files $uri $uri/ =404;
+#      }
+#}
diff --git a/etc/nginx/snippets/ssl-params.conf b/etc/nginx/snippets/ssl-params.conf
new file mode 100644 (file)
index 0000000..f121a0e
--- /dev/null
@@ -0,0 +1,22 @@
+# from https://cipherli.st/
+# and https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
+
+ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
+ssl_prefer_server_ciphers on;
+ssl_ciphers "EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH";
+ssl_ecdh_curve secp384r1;
+ssl_session_cache shared:SSL:10m;
+ssl_session_tickets off;
+ssl_stapling on;
+ssl_stapling_verify on;
+resolver 8.8.8.8 8.8.4.4 valid=300s;
+resolver_timeout 5s;
+# Disable preloading HSTS for now.  You can use the commented out header line that includes
+# the "preload" directive if you understand the implications.
+#add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
+add_header Strict-Transport-Security "max-age=63072000; includeSubdomains";
+add_header X-Frame-Options DENY;
+add_header X-Content-Type-Options nosniff;
+
+ssl_dhparam /etc/ssl/certs/dhparam.pem;
+