client_header_buffer_size	4k;
client_body_buffer_size		16k;
large_client_header_buffers	8 8k;
client_max_body_size		2m;

# don't send the nginx version number in error pages and Server header
server_tokens off;

# config to don't allow the browser to render the page inside an frame or iframe
# and avoid clickjacking http://en.wikipedia.org/wiki/Clickjacking
# if you need to allow [i]frames, you can use SAMEORIGIN or even set an uri with ALLOW-FROM uri
# https://developer.mozilla.org/en-US/docs/HTTP/X-Frame-Options
add_header X-Frame-Options SAMEORIGIN;

# when serving user-supplied content, include a X-Content-Type-Options: nosniff header along with the Content-Type: header,
# to disable content-type sniffing on some browsers.
# https://www.owasp.org/index.php/List_of_useful_HTTP_headers
# currently suppoorted in IE > 8 http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx
# http://msdn.microsoft.com/en-us/library/ie/gg622941(v=vs.85).aspx
# 'soon' on Firefox https://bugzilla.mozilla.org/show_bug.cgi?id=471020
add_header X-Content-Type-Options nosniff;

# This header enables the Cross-site scripting (XSS) filter built into most recent web browsers.
# It's usually enabled by default anyway, so the role of this header is to re-enable the filter for 
# this particular website if it was disabled by the user.
# https://www.owasp.org/index.php/List_of_useful_HTTP_headers
add_header X-XSS-Protection "1; mode=block";

# redirect all http traffic to https
server {
  listen 80 default_server;
  listen [::]:80 default_server ipv6only=on;
  server_name us2.wongsyrone.xyz;
  return 301 https://$host$request_uri;
}

server {
  listen 443 ssl http2;
  listen [::]:443 ssl http2 ipv6only=on;
  
  server_name us2.wongsyrone.xyz;
  
  ssl_certificate		  /etc/v2ray/v2ray.crt;
  ssl_certificate_key     /etc/v2ray/v2ray.key;
  ssl_trusted_certificate /etc/v2ray/v2ray.crt;

  # enable session resumption to improve https performance
  # http://vincent.bernat.im/en/blog/2011-ssl-session-reuse-rfc5077.html
  # enable tickets due to golang tls impl
  ssl_session_cache shared:SSL:50m;
  ssl_session_timeout 1d;
  ssl_session_tickets on;

  # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
  ssl_dhparam /etc/nginx/dhparam.pem;

  ssl_prefer_server_ciphers on;
  ssl_protocols TLSv1.2;
  # ciphers chosen for modern compatibility
  # https://wiki.mozilla.org/Security/Server_Side_TLS
  ssl_ciphers 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256';

  # enable ocsp stapling (mechanism by which a site can convey certificate revocation information to visitors in a privacy-preserving, scalable manner)
  # http://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
  resolver 8.8.8.8 8.8.4.4;
  ssl_stapling on;
  ssl_stapling_verify on;

  # config to enable HSTS(HTTP Strict Transport Security) https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security
  # to avoid ssl stripping https://en.wikipedia.org/wiki/SSL_stripping#SSL_stripping
  # also https://hstspreload.org/
  add_header Strict-Transport-Security "max-age=31536000; includeSubdomains; preload";

  # ... the rest of your configuration
  
  	# to custom error page to hide v2ray
  	proxy_intercept_errors on;

	# keep in sync with not v2ray redirect to suppress url path scans
	error_page 400 404 https://www.baidu.com/search/error.html;
	
	location / {
		# not v2ray, redirect to baidu
		proxy_pass							https://www.baidu.com;
		proxy_redirect						off;
		# remove original HSTS header
		proxy_hide_header Strict-Transport-Security;
		proxy_set_header  Host				"www.baidu.com";
		proxy_set_header  Referer			"https://www.baidu.com";
		proxy_set_header  X-Real-IP			$remote_addr;
		proxy_set_header  X-Forwarded-For	$proxy_add_x_forwarded_for;
		proxy_set_header  X-Forwarded-Proto	https;
	}
	
	location = /myray/ {
		proxy_pass							http://127.0.0.1:10001;
		proxy_redirect						off;
		proxy_http_version					1.1;
		proxy_set_header  Host				$http_host;
		proxy_set_header  Upgrade			$http_upgrade;
		proxy_set_header  Connection		"Upgrade";
        	# websocket 1006 close issue
        	proxy_read_timeout 90s;
	}
	
  	location ~ /\.ht {
		deny all;
	}
}