File: /var/www/indoadvisory_new/web/webapp/nginx.conf
# Nginx Configuration for Indo Advisory
# VPS Deployment with Apache Integration
# Location: /etc/nginx/sites-available/indo-advisory
server {
listen 80;
server_name indoadvisory.com www.indoadvisory.com your-domain.com;
# Security Headers
add_header X-Frame-Options "SAMEORIGIN" always;
add_header X-XSS-Protection "1; mode=block" always;
add_header X-Content-Type-Options "nosniff" always;
add_header Referrer-Policy "no-referrer-when-downgrade" always;
add_header Content-Security-Policy "default-src 'self' http: https: data: blob: 'unsafe-inline'" always;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
# Hide Nginx version
server_tokens off;
# Request size limits
client_max_body_size 10M;
# Gzip Compression
gzip on;
gzip_vary on;
gzip_min_length 1024;
gzip_proxied expired no-cache no-store private must-revalidate auth;
gzip_types
text/plain
text/css
text/xml
text/javascript
application/json
application/javascript
application/xml+rss
application/atom+xml
image/svg+xml;
# Rate Limiting
limit_req_zone $binary_remote_addr zone=login:10m rate=5r/m;
limit_req_zone $binary_remote_addr zone=api:10m rate=100r/m;
limit_req_zone $binary_remote_addr zone=general:10m rate=200r/m;
# Static Files (served directly by Nginx for better performance)
location /static/ {
alias /var/www/indo-advisory/public/;
expires 7d;
add_header Cache-Control "public, no-transform";
# Security for static files
location ~* \.(js|css|png|jpg|jpeg|gif|ico|svg|woff|woff2|ttf|eot)$ {
expires 30d;
add_header Cache-Control "public, immutable";
}
}
# Uploads (with authentication check via Node.js)
location /uploads/ {
proxy_pass http://127.0.0.1:3000;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# Upload size limit
client_max_body_size 10M;
}
# API Routes (with rate limiting)
location /api/ {
limit_req zone=api burst=20 nodelay;
proxy_pass http://127.0.0.1:3000;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_cache_bypass $http_upgrade;
# Timeouts
proxy_connect_timeout 60s;
proxy_send_timeout 60s;
proxy_read_timeout 60s;
}
# Admin Routes (with stricter rate limiting)
location /admin {
limit_req zone=login burst=10 nodelay;
proxy_pass http://127.0.0.1:3000;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_cache_bypass $http_upgrade;
# Additional security for admin
deny 192.168.1.1; # Example: block specific IPs
# allow 192.168.1.0/24; # Example: allow only office network
# deny all;
}
# Authentication Routes (with rate limiting)
location /auth/ {
limit_req zone=login burst=5 nodelay;
proxy_pass http://127.0.0.1:3000;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
# Fail2ban integration
access_log /var/log/nginx/auth.log combined;
}
# Main Application
location / {
limit_req zone=general burst=50 nodelay;
proxy_pass http://127.0.0.1:3000;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection 'upgrade';
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_cache_bypass $http_upgrade;
# Timeouts
proxy_connect_timeout 60s;
proxy_send_timeout 60s;
proxy_read_timeout 60s;
}
# Block access to sensitive files
location ~ /\. {
deny all;
access_log off;
log_not_found off;
}
location ~ \.(env|config|sql|log)$ {
deny all;
access_log off;
log_not_found off;
}
# Block common exploit attempts
location ~ /(wp-admin|wp-content|wp-includes|phpmyadmin|admin|administrator) {
return 444; # Close connection without response
}
# Logging
access_log /var/log/nginx/indo-advisory.access.log combined;
error_log /var/log/nginx/indo-advisory.error.log warn;
}
# SSL Configuration (for HTTPS)
# Uncomment and configure after obtaining SSL certificate
# server {
# listen 443 ssl http2;
# server_name indoadvisory.com www.indoadvisory.com;
#
# # SSL Certificate (Let's Encrypt recommended)
# ssl_certificate /etc/letsencrypt/live/indoadvisory.com/fullchain.pem;
# ssl_certificate_key /etc/letsencrypt/live/indoadvisory.com/privkey.pem;
#
# # SSL Settings
# ssl_protocols TLSv1.2 TLSv1.3;
# ssl_ciphers ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384;
# ssl_prefer_server_ciphers off;
# ssl_session_cache shared:SSL:10m;
# ssl_session_timeout 10m;
#
# # HSTS
# add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
#
# # Include all location blocks from above...
# }
# Redirect HTTP to HTTPS (enable after SSL setup)
# server {
# listen 80;
# server_name indoadvisory.com www.indoadvisory.com;
# return 301 https://$server_name$request_uri;
# }