Skip to content

Instantly share code, notes, and snippets.

@NikoRoberts
Forked from mikhailov/installation.sh
Last active August 29, 2015 13:56
Show Gist options
  • Save NikoRoberts/9288089 to your computer and use it in GitHub Desktop.
Save NikoRoberts/9288089 to your computer and use it in GitHub Desktop.
$ cd /usr/src
$ wget http://nginx.org/download/nginx-1.5.10.tar.gz
$ tar xzvf ./nginx-1.5.10.tar.gz && rm -f ./nginx-1.5.10.tar.gz
$ wget ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.34.tar.gz
$ tar xzvf pcre-8.34.tar.gz && rm -f ./pcre-8.34.tar.gz
$ wget http://www.openssl.org/source/openssl-1.0.1l.tar.gz
$ tar xzvf openssl-1.0.1l.tar.gz && rm -f openssl-1.0.1l.tar.gz
$ \curl -sSL https://get.rvm.io | bash
$ rvm install 2.0.0
$ gem install passenger -v=4.0.37 --no-ri --no-rdoc
$ passenger-install-nginx-module --with-http_spdy_module --nginx-source-dir=/usr/src/nginx-1.5.10 --extra-configure-flags="--with-pcre=/usr/src/pcre-8.34 --with-openssl-opt=no-krb5 --with-openssl=/usr/src/openssl-1.0.1l --with-http_gzip_static_module --with-http_stub_status_module --without-mail_pop3_module --without-mail_smtp_module --without-mail_imap_module"
user app;
worker_processes 2;
worker_priority -5;
error_log /home/app/logs/nginx.error.log crit;
events {
use epoll;
worker_connections 1024;
}
http {
client_max_body_size 25m;
client_body_buffer_size 128k;
client_body_temp_path /tmp/client_body_temp;
passenger_root /home/app/.rvm/gems/ruby-2.0.0-p451/gems/passenger-4.0.37;
passenger_ruby /home/app/.rvm/gems/ruby-2.0.0-p451/wrappers/ruby;
passenger_pool_idle_time 0;
passenger_max_pool_size 15;
passenger_pre_start http://127.0.0.1/;
include mime.types;
default_type application/octet-stream;
server_tokens off;
sendfile on;
keepalive_timeout 70;
gzip on;
gzip_http_version 1.1;
gzip_disable "msie6";
gzip_vary on;
gzip_min_length 1100;
gzip_buffers 64 8k;
gzip_comp_level 3;
gzip_proxied any;
gzip_types text/plain text/css application/x-javascript text/xml application/xml;
ssl_certificate /opt/nginx/ssl_certs/cert.crt;
ssl_certificate_key /opt/nginx/ssl_certs/server.key;
ssl_session_timeout 15m;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers RC4:HIGH:!aNULL:!MD5;
ssl_prefer_server_ciphers on;
ssl_session_cache shared:SSL:10m;
add_header Strict-Transport-Security "max-age=16070400; includeSubdomains";
add_header X-Frame-Options DENY;
limit_req_zone $binary_remote_addr zone=one:10m rate=10r/s;
include /opt/nginx/conf/nginx_host.conf;
}
server {
listen 80;
server_name *.host.com;
rewrite ^(.*) https://$host$1 permanent;
location ~ \.(php|html)$ {
deny all;
}
access_log /dev/null;
error_log /dev/null;
}
# HTTPS server
server {
ssl on;
listen 443 default ssl spdy;
server_name *.host.com;
root /home/app/public_html/host_production/current/public;
try_files $uri /system/maintenance.html @passenger;
location @passenger {
passenger_enabled on;
passenger_min_instances 5;
rails_env production;
passenger_set_cgi_param HTTP_X_FORWARDED_PROTO https;
limit_req zone=one burst=5;
}
error_page 500 502 504 /500.html;
error_page 503 @503;
location = /50x.html {
root html;
}
location = /404.html {
root html;
}
location @503 {
error_page 405 = /system/maintenance.html;
if (-f $document_root/system/maintenance.html) {
rewrite ^(.*)$ /system/maintenance.html break;
}
rewrite ^(.*)$ /503.html break;
}
if ($request_method !~ ^(GET|HEAD|PUT|POST|DELETE|OPTIONS)$ ){
return 405;
}
if (-f $document_root/system/maintenance.html) {
return 503;
}
location ~ ^/(assets|images|javascripts|stylesheets|swfs|system)/ {
gzip_static on;
expires max;
add_header Cache-Control public;
add_header Last-Modified "";
add_header ETag "";
break;
}
location = /favicon.ico {
expires max;
add_header Cache-Control public;
}
location ~ \.(php|html)$ {
return 405;
}
access_log /dev/null;
error_log /dev/null;
}
@NikoRoberts
Copy link
Author

This was originally copied from: https://gist.github.com/mikhailov/711913

The use of the RC4 cipher is the counter for the BEAST attack, but as the use of RC4 cipher is considered a higher risk than the BEAST attack I have removed it.

More info on this read:
https://www.ssllabs.com/downloads/SSL_TLS_Deployment_Best_Practices_1.3.pdf

These settings above should get you a Qualys A+ rating (unless your SSL certs aren't put together correctly or other non-nginx factors)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment