Nginx SSL configuration

The Mozilla SSL configuration generator allows you to generate SSL configuration for Nginx, Apache, ... server.

Some HTTP security headers

  • X-Frame-Options
    tells the browser whether you want to allow your site to or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.

  • X-Content-Type-Options
    stops a browser from trying to MIME- sniff type and forces it to stick with the declared content-type..

  • X-XSS-Protection
    sets the configuration for the cross-site scripting built into most browsers.

  • Content-Security-Policy
    is an effective measure to protect your XSS attacks. More info about CSP.

  • Strict-Transport-Security
    is an excellent feature to support your site and strengthens your implementation of TLS by getting the User Agent to enforce the use HTTPS.


Check website security

Mozilla has released its Observatory meant to automatically check various security parameters. Mozilla also offers complete web security guidelines.

Example of NGinx configuration

server {
    listen 80 default_server;
    listen [::]:80 default_server;

    # Redirect all HTTP requests to HTTPS with a 301 Moved Permanently response.
    return 301 https://$host$request_uri;

server {
    listen 443 ssl http2;
    listen [::]:443 ssl http2;

    # certs sent to the client in SERVER HELLO are concatenated in ssl_certificate
    ssl_certificate /path/to/signed_cert_plus_intermediates;
    ssl_certificate_key /path/to/private_key;
    ssl_session_timeout 1d;
    ssl_session_cache shared:SSL:50m;
    ssl_session_tickets off;

    # Diffie-Hellman parameter for DHE ciphersuites, recommended 2048 bits
    ssl_dhparam /path/to/dhparam.pem;

    # modern configuration. tweak to your needs.
    ssl_protocols TLSv1.2;
    ssl_prefer_server_ciphers on;

    # HSTS (ngx_http_headers_module is required) (15768000 seconds = 6 months)
    add_header Strict-Transport-Security max-age=15768000;

    # OCSP Stapling ---
    # fetch OCSP records from URL in ssl_certificate and cache them
    ssl_stapling on;
    ssl_stapling_verify on;

    ## verify chain of trust of OCSP response using Root CA and Intermediate certs
    ssl_trusted_certificate /path/to/root_CA_cert_plus_intermediates;

    resolver <IP DNS resolver>;