Last active
May 12, 2022 02:13
-
-
Save jhass/1355430 to your computer and use it in GitHub Desktop.
Nginx Diaspora reverse proxy. - This is not a complete Nginx configuration! It only shows the relevant parts for integrating Diaspora.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This is not a complete Nginx configuration! It only shows the relevant parts for integrating Diaspora. | |
# [...] | |
http { | |
# Your standard server configuration goes here | |
# [...] | |
gzip_static on; | |
# [...] | |
# This vhost just redirects to HTTPS | |
server { | |
# If your host is not IPv6 ready use listen 80; here. | |
# Add ipv6only=off to your listen directive that has default_server. | |
# Or this one if this is your only vhost. Do not add it to both! | |
listen [::]:80; | |
server_name diaspora.example.org www.diaspora.example.org; | |
location / { | |
return 301 https://$server_name$request_uri; | |
} | |
} | |
# Redirect https://www.diaspora.example.org to https://diaspora.example.org | |
server { | |
listen [::]:443 ssl http2; # Same rules as for listen [::]:80 apply. | |
server_name www.diaspora.example.org; | |
location / { | |
return 301 https://diaspora.example.org$request_uri; | |
} | |
# SSL setup | |
# This file should also include any necessary intermediate certificates. | |
# For example for StartSSL that would be https://www.startssl.com/certs/class1/sha2/pem/sub.class1.server.sha2.ca.pem | |
# For Let's Encrypt use /etc/letsencrypt/live/diaspora.example.org/fullchain.pem | |
# and /etc/letsencrypt/diaspora.example.org/privkey.pem | |
ssl_certificate /path/to/certificate.crt; | |
ssl_certificate_key /path/to/private_key.key; | |
# Taken from https://wiki.mozilla.org/Security/Server_Side_TLS | |
# You might want to make these global | |
# generate with openssl dhparam 2048 > /path/to/dhparam.pem | |
ssl_dhparam /path/to/dhparam.pem; | |
ssl_protocols TLSv1.2 TLSv1.3; | |
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; | |
ssl_prefer_server_ciphers off; | |
ssl_session_timeout 1d; | |
ssl_session_tickets off; | |
ssl_session_cache shared:SSL:50m; | |
} | |
# Actual proxy | |
server { | |
listen [::]:443 ssl http2; # Same rules as for listen [::]:80 apply. | |
server_name diaspora.example.org; | |
root /path/to/diaspora/public; | |
# Configure maximum picture size | |
# Note that Diaspora has a client side check set at 4M | |
client_max_body_size 5M; | |
client_body_buffer_size 256K; | |
# SSL setup | |
# This file should also include any necessary intermediate certificates. | |
# For example for StartSSL that would be https://www.startssl.com/certs/class1/sha2/pem/sub.class1.server.sha2.ca.pem | |
# For Let's Encrypt use /etc/letsencrypt/live/diaspora.example.org/fullchain.pem | |
# and /etc/letsencrypt/diaspora.example.org/privkey.pem | |
ssl_certificate /path/to/certificate.crt; | |
ssl_certificate_key /path/to/private_key.key; | |
# Taken from https://wiki.mozilla.org/Security/Server_Side_TLS | |
# You might want to make these global | |
# generate with openssl dhparam 2048 > /path/to/dhparam.pem | |
ssl_dhparam /path/to/dhparam.pem; | |
ssl_protocols TLSv1.2 TLSv1.3; | |
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; | |
ssl_prefer_server_ciphers off; | |
ssl_session_timeout 1d; | |
ssl_session_tickets off; | |
ssl_session_cache shared:SSL:50m; | |
# Proxy if requested file not found | |
try_files $uri @diaspora; | |
location /assets/ { | |
expires max; | |
add_header Cache-Control public; | |
} | |
# Camo support | |
#location /camo/ { | |
# proxy_redirect off; | |
# proxy_pass http://camo/; | |
# break; | |
#} | |
location @diaspora { | |
proxy_set_header X-Real-IP $remote_addr; | |
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; | |
proxy_set_header X-Forwarded-Proto https; | |
proxy_set_header Host $http_host; | |
proxy_redirect off; | |
proxy_pass http://diaspora_server; | |
} | |
} | |
# Proxy destination | |
# Add as many server directives as you want | |
# Also takes a socket, like unix:/path/to/some/socket.sock | |
upstream diaspora_server { | |
server unix:/path/to/diaspora/tmp/diaspora.sock; | |
} | |
# Camo support | |
#upstream camo { | |
# server 127.0.0.1:8081; | |
#} | |
} | |
# [...] |
Typo on line 116?
The bracket completes the block started on line 61
My two cents for 2021 (I am using nginx 1.19.7). Change:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128:AES256:AES:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK';
to:
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers 'TLS-CHACHA20-POLY1305-SHA256:TLS-AES-256-GCM-SHA384:TLS-AES-128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4';
And also add to any listen ssl;
blocks http2 like this: listen [::]:443 ssl http2;
Do you have config for LiteSpeed?
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Typo on line 116?