Skip to content

Instantly share code, notes, and snippets.

@karl-gustav
Created April 24, 2019 11:05
Show Gist options
  • Select an option

  • Save karl-gustav/7ec4daa4dd96a3be32b46c86a93b5757 to your computer and use it in GitHub Desktop.

Select an option

Save karl-gustav/7ec4daa4dd96a3be32b46c86a93b5757 to your computer and use it in GitHub Desktop.
/etc/nginx/sites-available/lillesveiven.space
# Based on https://gist.github.com/nrollr/9a39bb636a820fb97eec2ed85e473d38:
# =========================================================================
# UPDATED 17 February 2019
# Redirect all HTTP traffic to HTTPS
server {
listen 80;
listen [::]:80;
server_name lillesveiven.space;
return 301 https://lillesveiven.space$request_uri;
}
# SSL configuration
server {
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name lillesveiven.space;
ssl_certificate /etc/letsencrypt/live/lillesveiven.space/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/lillesveiven.space/privkey.pem; # managed by Certbot
# Improve HTTPS performance with session resumption
ssl_session_cache shared:SSL:10m;
ssl_session_timeout 10m;
# Enable server-side protection against BEAST attacks
ssl_protocols TLSv1.2;
ssl_prefer_server_ciphers on;
ssl_ciphers "ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384";
# RFC-7919 recommended: https://wiki.mozilla.org/Security/Server_Side_TLS#ffdhe4096
ssl_dhparam /etc/ssl/ffdhe4096.pem;
ssl_ecdh_curve secp521r1:secp384r1;
# Aditional Security Headers
# ref: https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
# ref: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
add_header X-Frame-Options DENY always;
# ref: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
add_header X-Content-Type-Options nosniff always;
# ref: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection
add_header X-Xss-Protection "1; mode=block" always;
# Enable OCSP stapling
# ref. http://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox
ssl_stapling on;
ssl_stapling_verify on;
ssl_trusted_certificate /etc/letsencrypt/live/lillesveiven.space/fullchain.pem;
resolver 1.1.1.1 1.0.0.1 [2606:4700:4700::1111] [2606:4700:4700::1001] valid=300s; # Cloudflare
resolver_timeout 5s;
# Required for LE certificate enrollment using certbot
location '/.well-known/acme-challenge' {
default_type "text/plain";
root /var/www/html;
}
location / {
root /var/www/html;
}
location /owncloud {
proxy_pass http://localhost:8080/owncloud;
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment