Skip to content

Commit

Permalink
chore: add copyright
Browse files Browse the repository at this point in the history
  • Loading branch information
EsadCetiner authored Dec 22, 2023
1 parent 4633c15 commit 2abaa64
Show file tree
Hide file tree
Showing 10 changed files with 80 additions and 0 deletions.
8 changes: 8 additions & 0 deletions nginx.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

user www-data;
worker_processes auto;
worker_cpu_affinity auto;
Expand Down
8 changes: 8 additions & 0 deletions snippets/0-rtt.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# 0-RTT with TLSv1.3 can significantly improve the performance of an initial TLS connection, especially if combined with HTTP3.
# This feature is disabled by default due to risks of replay attacks.
# See - https://blog.cloudflare.com/even-faster-connection-establishment-with-quic-0-rtt-resumption/
Expand Down
8 changes: 8 additions & 0 deletions snippets/brotli.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# Brotli compression can offer significantly better compression ratios with fewer CPU cycles, by default Nginx only supports gzip.
# Please make sure you have the brotli module installed and activated to use brotli https://github.com/google/ngx_brotli.
# It's strongly recomended to use Brotli compression for improved performance.
Expand Down
8 changes: 8 additions & 0 deletions snippets/chacha20-non-aes-ni.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# Some clients, in particular mobile clients may not support AES-NI, resulting in AES encryption/decryption being very slow.
# ChaCha20 is a popular alternative to AES, notably for it's improved performance over AES with clients that don't support AES-NI.
# Nginx can prioritize ChaCha20 for clients that doesn't support AES-NI, but only if your Nginx packages supports it.
Expand Down
8 changes: 8 additions & 0 deletions snippets/hide-nginx.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# Nginx by default advertises that you're using Nginx, this stops Nginx from revealing that your web server is Nginx.
# Some bare bones error pages are provided but feel free to replace them with your own pretty error pages.
# Please note that security through obscurity isn't a replacement for proper security controls.
Expand Down
8 changes: 8 additions & 0 deletions snippets/nextcloud_fix.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# When uploading large files to Nextcloud, you may encounter "CONNECTION CLOSED" errors, this is because Nginx by default only allows small file uploads and has a short timeout.
# Please make sure to only add this code snippet to Nextcloud since this may cause security issues.

Expand Down
8 changes: 8 additions & 0 deletions snippets/no-robots.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# If you wish a site to not be indexed by search engines then include this file inside your nginx server block.

# Add the code below in your server blocks to block page indexing.
Expand Down
8 changes: 8 additions & 0 deletions snippets/protect-sensitive-files.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# Prevent access of any sensitive files stored within webroot by blocking access well known sensitive files and file types.
# This snippet tries to be false positive free, but it may have poor coverage as a result. Ideally, you shouldn't place sensive files in webroot,
# but this snippet is good to have just in case you did so by mistake.
Expand Down
8 changes: 8 additions & 0 deletions snippets/security-headers.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# This has been moved to a code snippet since some web applications such as Nextcloud serving their own http headers, in those cases you shouldn't use this snippet since it overrides those headers.
# This code snippet tries to be compatable with most web application, but since all web applications are unique you may have to modify this code snippet to your own needs.

Expand Down
8 changes: 8 additions & 0 deletions snippets/ssl.conf
Original file line number Diff line number Diff line change
@@ -1,3 +1,11 @@
# ----------------------------------------------------------------------------------------------
# Secure Nginx Config
# Copyright (c) 2022-2023 Esad Cetiner
#
# This configuration template is distributed under GPLv2
# Please see the included LICENSE file for full details
# ----------------------------------------------------------------------------------------------

# These HTTP headers have been placed in a seperate file since they can cause issues when trying to register at https://hstspreload.org.
# In general, it's recomended to only serve these HTTP headers over port 443 (SSL Port).

Expand Down

0 comments on commit 2abaa64

Please sign in to comment.