-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Advanced nginx configuration: Extra security & performance tuning. #1625
Comments
I'm still trying to write up a configuration for sites that are more dynamic (authenticated content) that I'm happy with. I have something, and it works well, but only if you know extremely well what you're doing, so I don't feel it's safe enough for general use. Pretty much all of the stuff above can be incorporated (preferably commented out) in the standard |
This should also be integrated as a sub-page of https://learn.getgrav.org/security/server-side. |
yah please consider a PR to add it to learn docs. I think it might make more sense under the existing nginx page. https://learn.getgrav.org/webservers-hosting/local/nginx |
Ok. I've updated the original post to add caching for authenticated content and disabling cache for admin users and the admin panel. I will look into incorporating it into Learn and/or the default nginx.conf. |
Thank you @Eihrister for sharing this information. 👍 |
Thank you again @Eihrister for this great guide. I sat down this morning with my first real live Grav Site and the following config and it's working like an absolute charm.
This setup gives me a page score as below Now once my site is finished and there will not be any regular CSS changes adding the following to the server block
Then will give you a page score like this. |
Is anyone aware of progress on the precompression pull request (#1621)? |
Everyone using this wonders why their server is a teapot all the time. |
Advanced configuration for nginx
There are some small changes you can make to make your website faster, and a little more secure.
Security enhancements
The original configuration will keep you safe, but it is always good to see what else can be done.
Giving less information to attackers
By default, the
nginx.conf
will return "403 Forbidden" errors for system files that are not supposed to be accessed directly. However, there's a good alternative, like so:What happens here is the following:
@index
location.@index
location will reroute requests to the/index.php
as usual.error_page 418
, any 418 will be handled by the@index
location./index.php
will pick up the route it is given, determine if there's a matching route,and if not, simply return a 404 by itself.
Normally, we route all non-existing files to Grav. However, returning any status code from nginx itself, will give a different kind of error than if it had been routed through Grav. That gives the attacker the information that those files are special and actually exist. More than that, that you explicitly don't want them to try and read those. They will try harder.
This is better, because if you reroute it to Grav, Grav will handle it like any other non-existing file.
No direct access to other .php-files
In the example
nginx.conf
, all requests to files ending in.php
are sent to the PHP-handler. This is not necessary, as Grav only uses the /index.php to route requests. Every other location is handled internally.Some vulnerabilities in CMS's are targeted specifically at plug-ins, themes or other third-party libraries. There is no reason to keep direct access to them open (unless you run Grav combined with other pieces of software in the same webroot!).
So, alternatively, only route
/index.php
to the PHP-handler, and block the rest! Like so:With this, any
.php
-file that is not/index.php
, will be rerouted to and be handled by/index.php
.Performance
nginx is a very capable webserver, but it is also very capable of doing advanced caching.
Do not check for the existence of directories
Many, many examples use this line:
Few people actually realise that it does, which is:
@index
(/index.php
).But, in reality, you only really use
$uri/
(step 2) if you really are linking to a directory that will have its ownindex.php
orindex.html
. Considering you're using Grav, you will only go to/
, and that already goes to/index.php
in step 3.If you're not going to use it, don't keep it around, and you will take out an extra filesystem
stat()
:Caching filesystem metadata of files
The open file cache caches metadata about files. If they exist or not, what file permissions they have, if they are readable or not.. This can help a little on local filesystems, especially that are not on SSD. It shines more in environments with network storage (like NFS).
Keep in mind that this goes outside of the
server{}
-block, directly into thehttp{}
-context:In this example, we told nginx to:
Precompressing resources
In the example nginx.conf, we enable GZip-compression. While excellent, it also means that the output is compressed on a per-request basis. This in turn means that with every request, it adds extra CPU-cycles and latency (you have to wait or the compression to be done).
There is an alternative in nginx, which is
gzip_static
.gzip_static
will make nginx look for the same file, but with a.gz
extension. So if I havemain.css
, it will try and see if there is already amain.css.gz
present, and send that instead.To enable this, use:
By using a nested location
/assets
, you will not incur extra filesystemstat()
s for the rest of Grav.If enabled, the
/assets
location will contain pipelined/minified assets.!! nginx does not automatically compress the files for you. You will have to do this yourself.
To compress the files (on UNIX-based systems), you can do the following:
Note that these are automatically deleted when you clear your (asset) cache, and you will have to redo it after new resource files are created. There is an outstanding Pull Request to allow automatic precompression of assets upon creation of these files.
Enable FastCGI caching.
** DO NOT USE THIS KIND OF CACHING IF YOU HAVE DYNAMIC PAGE CONTENT **
The following example is safe to use with authentication, and the Admin interface. It is also safe for dynamic page content, but your dynamic content will not be dynamic anymore (as it is aggressively statically cached).
nginx has caching for FastCGI. In the example below, we will leverage this. Note that if anything on the site sets a cookie or similar dynamic content headers, the cache is invalid and will not be used at all.
First, we are going to need to make a
map{}
in the mainhttp{}
-context (so outside/before theserver{}
-block) to convert our optional session cookie into a unique identifier for the cache (so users with different sessions do not share the same cached resource, all of them will have a unique copy, but cached for their own session):If you renamed your site session name (setting
session.name
) in your Grav config, update its name in the example above! The regular expression will combine the unique identifier in the cookie name with the session id in the cookie into a new variable$sessionkey
, which we can later use in thefastcgi_cache_key
setting. Next, define a cache zone in the same context right under it:fastcgi_cache_path /path/to/cache/on/disk levels=1:2 keys_zone=fastcgi:10m max_size=200m inactive=60m use_temp_path=off;
You should change the path of where the cache is stored on disk, but what it does is:
fastcgi_temp_path
.Next, you can use this cache zone in your configuration:
Now, what is happening here, is the following:
Cache-Control
,Expires
andSet-Cookie
headers (since we're in control here).Please note, once again, that this will not (and should not) work if you're using the Admin panel, or use any other sessions on your site. It is not recommended to use this caching with any authenticated content, for security reasons.
If you wish to test if your cache is working, you can add a simple header (remove on production):
You can view the header with cURL (or any other tool):
Again, you might want to disable the header after confirming it works.
If you feel the need to purge your cache entirely:
The cache is automatically updated and pruned in the background, so you shouldn't need to do so.
More fine-grained control over (not) caching
If you use the admin interface, you might want to disable caching globally once the admin cookie has been set. Note that an admin cookie is set when you go to the /admin URL, and that anyone can go there by default. You don't need to login to disable caching.
You can use the following example as a basis. Put the
map{}
s outside yourserver{}
and thefastcgi_*
-directives with the rest of the caching directives:The text was updated successfully, but these errors were encountered: