Home  >  Article  >  Operation and Maintenance  >  Nginx reverse proxy protects against Bot attacks

Nginx reverse proxy protects against Bot attacks

王林
王林Original
2023-06-10 19:48:081375browse

With the development of Internet technology, preventing Web attacks has become an important issue in website security. As an automated attack tool, Bot has become one of the main forms of web attacks. In particular, Nginx, which serves through reverse proxy, has been widely used because of its efficiency, stability, flexibility and customization. This article will provide some effective preventive measures against Bot attacks under Nginx reverse proxy.

1. Turn on Access Log

Nginx provides the Access Log function, which can record the HTTP protocol, source IP, request time, response status code and other information of each request. By turning on Access Log, Bot attacks can be more easily detected.

Add the following content in the Nginx configuration file:

http {
    log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '
                      '$status $body_bytes_sent "$http_referer" '
                      '"$http_user_agent" "$http_x_forwarded_for"';

    access_log  /var/log/nginx/access.log  main;
    ……
}

2. Add restricted IP

Add the method of restricting IP in the Nginx configuration file to effectively prevent specific Regional IP attacks. For example, adding the following can prevent attacks from mainland China:

http {
    deny   61.135.0.0/16;
    deny   118.25.0.0/16;
    ……
}

3. Use the GeoIP module

Nginx's GeoIP module can match the access source IP with its geographical location. Simply install the GeoIP module and GeoIP library and use GeoIP variables to detect IP origin regions. For example:

http {
    geoip_country /usr/share/GeoIP/GeoIP.dat;
    geoip_city    /usr/share/GeoIP/GeoIPCity.dat;

    server {
        location / {
            if ($geoip_country_code = CN) {
                return 403;
            }

            if ($geoip_city_name ~* "moscow") {
                return 403;
            }
        }
    }
}

4. Add HTTP Referer verification

HTTP Referer can be used to verify the source of the request. Just add the following content to the Nginx configuration file:

http {
      server {
            if ($http_referer ~* (blacklist1|blacklist2|blacklist3)) {
                    return 403;
            }
      }
}

5. Use Nginx to prevent CC attacks

Nginx provides some functions to prevent CC attacks. Just set it in the Nginx configuration file:

http {
      limit_req_zone $binary_remote_addr zone=one:10m rate=1r/s;

      server {
            location / {
                  limit_req zone=one burst=5;
                  ……
            }
      }
}

6. Enable SSL certificate

By enabling the SSL certificate, you can prevent data theft and man-in-the-middle attacks at the HTTP protocol level. At the same time, the HTTP Strict Transport Security (HSTS) mechanism can be enabled to prevent HTTP requests from being forcibly converted into HTTP requests, thereby enabling all access to be accessed via HTTPS in the future.

http {
      server {
            listen 443 ssl;

            ssl_certificate /path/to/cert;
            ssl_certificate_key /path/to/key;

            add_header Strict-Transport-Security "max-age=315360000; includeSubDomains; preload;";
      }
}

Summary

The security of Nginx reverse proxy server directly affects the security of the entire Web application system. For Bot attacks, by turning on Access Log, adding restricted IPs, using the GeoIP module, adding HTTP Referer verification, using Nginx to prevent CC attacks and enabling SSL certificates, etc., you can help the Nginx reverse proxy server avoid fake requests and malicious attacks, and protect Web application system security.

The above is the detailed content of Nginx reverse proxy protects against Bot attacks. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn