search
HomeOperation and MaintenanceNginxNginx Web security attack and defense practice

Nginx Web security attack and defense practice

Jun 10, 2023 pm 12:11 PM
nginxweb securityOffensive and defensive combat

Nginx is a high-performance web server widely used in Internet and enterprise-level applications. In addition to providing excellent performance and reliability, Nginx also has some powerful security features. In this article, we will delve into Nginx's practical web security attack and defense, and introduce how to protect web applications from various attacks.

  1. Configuring SSL/TLS

SSL/TLS is an encrypted communication protocol essential for protecting web applications. By using SSL/TLS, you can encrypt all web communications, thereby protecting sensitive data from hackers theft and tampering. To enable SSL/TLS in Nginx, you need to install an SSL/TLS certificate, which needs to be signed by a trusted Certificate Authority (CA). The following is a simple Nginx configuration to enable SSL/TLS:

server {
    listen 443 ssl;
    server_name mywebsite.com;

    ssl_certificate /path/to/cert.crt;
    ssl_certificate_key /path/to/cert.key;

    location / {
        # Your web application logic...
    }
}

In the above configuration, the listen 443 ssl; directive tells Nginx to use the standard 443 port and enable SSL/TLS. The ssl_certificate and ssl_certificate_key directives specify the file path of the SSL/TLS certificate and private key.

  1. Configuring HTTP2

HTTP2 is a new network protocol that can provide faster web page loading speed and better performance than the traditional HTTP 1.1. When you use HTTP2, you can get multiple files or resources from the server at the same time, and they can use binary instead of text format, making communication faster. At the same time, HTTP2 also provides better security, such as server push, which can transfer multiple files to the client at once, thus reducing round-trip time. To enable HTTP2 in Nginx, you can use the following configuration:

server {
    listen 443 ssl http2;
    server_name mywebsite.com;

    ssl_certificate /path/to/cert.crt;
    ssl_certificate_key /path/to/cert.key;

    location / {
        # Your web application logic...
    }
}

In the above configuration, we added the http2 option to the in the listen directive ssl option to enable HTTP2.

  1. Prevent SQL Injection

SQL injection is a very popular attack method. Hackers can access the database by injecting malicious code, steal sensitive information or destroy data integrity. . In Nginx, you can prevent SQL injection attacks by using the following configuration:

location / {
    # Your web application logic...

    # Block SQL injection attacks
    if ($args ~ "(<|%3C).*script.*(>|%3E)" ) {
        return 403;
    }
}

In the above configuration, we have used a regular expression to check whether the script is included in the parameters of the request. If it is because of a script, a 403 error will be returned and the request will be rejected.

  1. Preventing Cross-site Request Forgery (CSRF)

Cross-site request forgery (CSRF) is a very common attack method that hackers can use to deceive users into doing things they don’t know perform malicious actions under certain circumstances. To prevent CSRF attacks, you can add the following code to your Nginx configuration:

location / {
    # Your web application logic...

    # Block CSRF attacks
    if ($http_referer !~ "^https?://mywebsite.com") {
        return 403;
    }
}

In the above configuration, we have used a regular expression to check if the Referer header of the request matches our Match your own website domain name. If there is no match, a 403 error will be returned and the request will be rejected.

  1. Preventing DDoS attacks

Distributed denial of service (DDoS) attacks are a very popular attack method. Hackers will use a large amount of computing resources to simulate a large number of networks. traffic, causing the target web server to crash. In Nginx, you can prevent DDoS attacks through the following configuration:

http {
    # Define blacklist zone
    geo $blacklist {
        default 0;
        # Add IP address to blacklist if over 100 connections per IP
        # in the last 10 seconds
        limit_conn_zone $binary_remote_addr zone=blacklist:10m;
        limit_conn blacklist 100;
    }
 
    server {
        listen 80 default_server;
        server_name mywebsite.com;

        # Add IP addresses to whitelist
        allow 192.168.1.1/24;
        deny all;

        # Block blacklisted IP addresses
        if ($blacklist = 1) {
            return 403;
        }

        location / {
            # Your web application logic...
        }
    }
}

In the above configuration, we used Nginx’s limit_conn_zone and limit_conn modules to limit each The number of simultaneous connections to an IP address. We have also added a whitelist that allows specific IP address ranges and only blocks access if the IP address is not in the whitelist and exceeds the connection limit.

Summary

Nginx has many powerful web security features that you can use to protect your web applications from various attacks. In this article, we introduce the following important security measures:

  • Configure SSL/TLS certificate and encrypt communication data.
  • Configure HTTP2 protocol to improve web page loading speed and performance.
  • Prevent SQL injection and prevent attacks by detecting scripts in request parameters.
  • Prevent CSRF attacks by checking the Referer header in the request to reject illegal requests.
  • Prevent DDoS attacks, use the limit_conn_zone and limit_conn modules to limit the number of simultaneous connections per IP address, and use whitelists to allow access to specific IP addresses.

By using the security measures described above, you can protect the security of your web applications and protect them from various attacks.

The above is the detailed content of Nginx Web security attack and defense practice. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How to check nginx running statusHow to check nginx running statusApr 14, 2025 am 11:09 AM

You can check the running status of nginx through the following method: nginx -t: Check whether the configuration file syntax is correct. nginx -V: Displays nginx version and other compilation information. service nginx status: Check the running status of the nginx service (applicable to Linux systems). ps -ef | grep nginx: Find running nginx processes. netstat -nlp | grep nginx: View the port and address of nginx listening.

How to restart nginx commandHow to restart nginx commandApr 14, 2025 am 11:06 AM

Use the command line command "sudo service nginx restart" to restart the Nginx service. Alternative commands include: Systemd ("sudo systemctl restart nginx"), Upstart ("sudo service nginx restart"), and Red Hat System Services ("sudo rcctl restart nginx").

How to solve nginx302 errorHow to solve nginx302 errorApr 14, 2025 am 11:03 AM

How to resolve Nginx 302 error? Check the redirect rules in the server configuration. Disable redirect rules that result in errors. Check for redirect rules in the .htaccess file. Check DNS records and make sure the resolution is correct. Check that the SSL certificate is valid and installed correctly. Disable firewall or security rules, check server logs, or contact the host provider for support.

How to pseudostatic nginxHow to pseudostatic nginxApr 14, 2025 am 11:00 AM

Configuring pseudo-static in Nginx converts dynamic URLs into static URLs, thereby improving security, enhancing user experience and optimizing SEO. The specific steps include: 1. Enable the pseudostatic module; 2. Define pseudostatic rules, rewrite the dynamic URL to a static URL, and pass the dynamic part as a parameter; 3. Use code to process parameters in the processing script to display dynamic content. The benefits of pseudo-static configuration include: improved security, improved user experience, and enhanced SEO.

How to configure nginx to display domain nameHow to configure nginx to display domain nameApr 14, 2025 am 10:57 AM

Configuring display domain names in Nginx requires the following steps: Edit the configuration file (usually /etc/nginx/nginx.conf). Add a server block, specify your domain name and its alias (for example: server { listen 80; server_name example.com www.example.com; }). Specify the web root directory (for example: root /var/www/example.com;). Save the configuration file and reload Nginx (sudo nginx -t && sudo nginx -s reload). verify

How to check nginx statusHow to check nginx statusApr 14, 2025 am 10:54 AM

How to view Nginx status on Linux system: Use the Nginx status module: Install the module, enable the module, restart Nginx, access the /nginx_status URL to view information; use Curl: curl http://localhost/nginx_status to obtain Nginx status information; use third-party tool Nginxtop: Install Nginxtop and run relevant commands to view Nginx real-time information. Status information usually includes metrics such as the number of active connections, requests, processing time, memory, and CPU usage.

How to deploy nginx php projectHow to deploy nginx php projectApr 14, 2025 am 10:51 AM

Steps to deploy Nginx PHP project: Install Nginx, PHP, MySQL (optional). Create an Nginx configuration file that specifies the listening port, server name, project root directory, and PHP handler. Create a FastCGI script and configure PHP-FPM to handle PHP. Enable configuration files and create symbolic links. Restart Nginx. Install PHP-FPM and configure cgi.fix_pathinfo. Restart PHP-FPM. Install MySQL (optional), configure and set the user and password. Test the deployment, access the domain name and verify the PHP/MySQL functionality.

How to restart nginx commandHow to restart nginx commandApr 14, 2025 am 10:48 AM

Steps to restart Nginx: Find the PID of the nginx process (ps aux | grep nginx) Use PID to stop Nginx (kill -s QUIT <PID>) and start Nginx again (nginx)

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.