nginx安全加固配置

post by rocdk890 / 2012-12-12 14:39 Wednesday linux技术
  今天看到紫色葡萄blog上的nginx加固配置不错,就转到自己blog上来,代码如下:
       location = /robots.txt { access_log off; log_not_found off; }
       location = /favicon.ico { access_log off; log_not_found off; }
       location ~ /\. { access_log off; log_not_found off; deny all; }
       location ~ ~$ { access_log off; log_not_found off; deny all; }
       location ~ .*\.(gif|jpg|jpeg|png|bmp|swf)$ { expires 30d; }
       location ~ .*\.(js|css)?$ {  expires  12h; }
    
    
    location ~* \.(gif|jpg|png|swf|flv)$
    if ($host !=’*.yourdomain.com’) {
    return 403;
    }
    
       ## Block SQL injections
       set $block_sql_injections 0;
       if ($query_string ~ "union.*select.*\(") {
           set $block_sql_injections 1;
       }
       if ($query_string ~ "union.*all.*select.*") {
           set $block_sql_injections 1;
       }
       if ($query_string ~ "concat.*\(") {
           set $block_sql_injections 1;
       }
       if ($block_sql_injections = 1) {
           return 403;
       }
    
       ## Block file injections
       set $block_file_injections 0;
       if ($query_string ~ "[a-zA-Z0-9_]=http://") {
           set $block_file_injections 1;
       }
       if ($query_string ~ "[a-zA-Z0-9_]=(\.\.//?)+") {
           set $block_file_injections 1;
       }
       if ($query_string ~ "[a-zA-Z0-9_]=/([a-z0-9_.]//?)+") {
           set $block_file_injections 1;
       }
       if ($block_file_injections = 1) {
           return 403;
       }
    
       ## Block common exploits
       set $block_common_exploits 0;
       if ($query_string ~ "(<|%3C).*script.*(>|%3E)") {
           set $block_common_exploits 1;
       }
       if ($query_string ~ "GLOBALS(=|\[|\%[0-9A-Z]{0,2})") {
           set $block_common_exploits 1;
       }
       if ($query_string ~ "_REQUEST(=|\[|\%[0-9A-Z]{0,2})") {
           set $block_common_exploits 1;
       }
       if ($query_string ~ "proc/self/environ") {
           set $block_common_exploits 1;
       }
       if ($query_string ~ "mosConfig_[a-zA-Z_]{1,21}(=|\%3D)") {
           set $block_common_exploits 1;
       }
       if ($query_string ~ "base64_(en|de)code\(.*\)") {
           set $block_common_exploits 1;
       }
       if ($block_common_exploits = 1) {
           return 403;
       }
    
       ## Block spam
       set $block_spam 0;
       if ($query_string ~ "\b(ultram|unicauca|valium|viagra|vicodin|xanax|ypxaieo)\b") {
           set $block_spam 1;
       }
       if ($query_string ~ "\b(erections|hoodia|huronriveracres|impotence|levitra|libido)\b") {
           set $block_spam 1;
       }
       if ($query_string ~ "\b(ambien|blue\spill|cialis|cocaine|ejaculation|erectile)\b") {
           set $block_spam 1;
       }
       if ($query_string ~ "\b(lipitor|phentermin|pro[sz]ac|sandyauer|tramadol|troyhamby)\b") {
           set $block_spam 1;
       }
       if ($block_spam = 1) {
           return 403;
       }
    
       ## Block user agents
       set $block_user_agents 0;
    
       # Don't disable wget if you need it to run cron jobs!
       #if ($http_user_agent ~ "Wget") {
       #    set $block_user_agents 1;
       #}
    
       # Disable Akeeba Remote Control 2.5 and earlier
       if ($http_user_agent ~ "Indy Library") {
           set $block_user_agents 1;
       }
    
       # Common bandwidth hoggers and hacking tools.
       if ($http_user_agent ~ "libwww-perl") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "GetRight") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "GetWeb!") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "Go!Zilla") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "Download Demon") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "Go-Ahead-Got-It") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "TurnitinBot") {
           set $block_user_agents 1;
       }
       if ($http_user_agent ~ "GrabNet") {
           set $block_user_agents 1;
       }
    
       if ($block_user_agents = 1) {
           return 403;
       } 


以上代码我加了几个到我自己blog上使用,上面代码包括了防盗链、防注入、限制了user_agent的访问等.
具体用法:http://www.howtoforge.com/nginx-how-to-block-exploits-sql-injections-file-injections-spam-user-agents-etc
             http://purplegrape.blog.51cto.com/1330104/957731
夜空- 本站版权
1、本站所有主题由该文章作者发表,该文章作者与夜空享有文章相关版权
2、其他单位或个人使用、转载或引用本文时必须同时征得该文章作者和夜空的同意
3、本帖部分内容转载自其它媒体,但并不代表本站赞同其观点和对其真实性负责
4、如本帖侵犯到任何版权问题,请立即告知本站,本站将及时予与删除并致以最深的歉意
5、原文链接:blog.slogra.com/post-297.html

标签: nginx 安全 加固 user-agent agent 头信息 user

评论: