1、檢測到 RC4 密碼套件、檢測到 SHA-1 密碼套件
在nginx的nginx.conf 文件中加入:
ssl_ciphers ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:!NULL:!aNULL:!MD5:!ADH:!RC4:!DH:!DHE:!SHA-1;
ssl_prefer_server_ciphers on;
2、支持不推薦使用的 SSL 版本
將nginx.conf中的“ssl_protocols SSLv2 SSLv3 TLSv1;”改為“ssl_protocols TLSv1.2;”?
3、“Content-Security-Policy”頭缺失或不安全
在nginx的nginx.conf 文件中加入:
add_header Content-Security-Policy "default-src 'self' localhost:8080 'unsafe-inline' 'unsafe-eval' blob: data: ;";
4、“X-Content-Type-Options”頭缺失或不安全
在nginx的nginx.conf 文件中加入:add_header X-Content-Type-Options nosniff;
5、“X-XSS-Protection”頭缺失或不安全
在nginx的nginx.conf 文件中加入:add_header X-XSS-Protection 1;和 add_header X-Xss-Protection: mod=block;
6、HTTP Strict-Transport-Security 頭缺失或不安全
在nginx的nginx.conf 文件中加入:add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
7、發(fā)現(xiàn)可高速緩存的 SSL 頁面
?在nginx的nginx.conf 文件中加入:add_header Cache-Control no-cache;
8、檢測到隱藏目錄(對(duì)禁止的資源發(fā)布“404 - Not Found”響應(yīng)狀態(tài)代碼,或者將其完全除去)
在nginx的nginx.conf 文件中加入:error_page 403 =404 /404.html;文章來源:http://www.zghlxwxcb.cn/news/detail-618701.html
示例:文章來源地址http://www.zghlxwxcb.cn/news/detail-618701.html
Server{
listen 443 ssl;
add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
add_header X-Content-Type-Options: nosniff;
add_header Content-Security-Policy "default-src 'self' 127.0.0.1:443 'unsafe-inline' 'unsafe-eval' blob: data: ;";
add_header X-XSS-Protection 1;
add_header X-Xss-Protection: mod=block;
ssl_ciphers"ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4";
ssl_prefer_server_ciphers on;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_prefer_server_ciphers?? on;
}
到了這里,關(guān)于nginx 漏洞修復(fù)的文章就介紹完了。如果您還想了解更多內(nèi)容,請?jiān)谟疑辖撬阉鱐OY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!