cd0c2fe3e2
Error-Page Headers (3.3.1.3.03 → OK): - Cache-Control no-store on ALL routes (API, auth, catch-all) Proactive Monitoring (3.2.1.04 → OK): - /api/cron/health-check: DB + Redis check with latency, ADMIN alerts on failure Security Scanning (3.2.2.7 → improved): - /api/cron/security-audit: package version check against minimum safe versions Server Hardening (3.3.1.4 → OK): - docs/nginx-hardening.conf: complete template (rate limits, SSL, headers) Database Security (3.3.3 → OK): - docs/security-architecture.md Section 12: DB auth, isolation, SSL/audit recommendations Compliance: 46 OK / 5 PARTIAL / 8 TODO / 4 N/A (was 42/9/8/4) Co-Authored-By: claude-flow <ruv@ruv.net>
118 lines
3.8 KiB
Plaintext
118 lines
3.8 KiB
Plaintext
# CapaKraken nginx Security Hardening
|
|
# Apply to the server block for capakraken.hartmut-noerenberg.com
|
|
#
|
|
# References:
|
|
# - EAPPS 3.3.1.3.04 (Server Header entfernen)
|
|
# - EAPPS 3.3.1.4.01 (Server Hardening)
|
|
# - EAPPS 3.2.2.3.08 (Company Firewall)
|
|
# - EAPPS 3.3.1.12.02 (API Rate Limiting — backup layer)
|
|
|
|
# ---------- General Hardening ----------
|
|
|
|
# Remove server version from response headers
|
|
server_tokens off;
|
|
|
|
# Remove X-Powered-By (backup — Next.js also strips this)
|
|
proxy_hide_header X-Powered-By;
|
|
|
|
# Security headers (backup — also set in Next.js next.config.ts)
|
|
add_header X-Frame-Options "DENY" always;
|
|
add_header X-Content-Type-Options "nosniff" always;
|
|
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
|
|
add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;
|
|
|
|
# ---------- Rate Limiting ----------
|
|
|
|
# Define rate limiting zones (place in http {} block)
|
|
# limit_req_zone $binary_remote_addr zone=api:10m rate=10r/s;
|
|
# limit_req_zone $binary_remote_addr zone=auth:10m rate=1r/s;
|
|
|
|
# Auth endpoints — strict rate limiting (1 req/s, burst 5)
|
|
location /api/auth/ {
|
|
limit_req zone=auth burst=5 nodelay;
|
|
proxy_pass http://127.0.0.1:3100;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
}
|
|
|
|
# API endpoints — moderate rate limiting (10 req/s, burst 20)
|
|
location /api/ {
|
|
limit_req zone=api burst=20 nodelay;
|
|
proxy_pass http://127.0.0.1:3100;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
}
|
|
|
|
# SSE endpoint — no rate limit, but long-lived connection
|
|
location /api/sse/ {
|
|
proxy_pass http://127.0.0.1:3100;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
proxy_http_version 1.1;
|
|
proxy_set_header Connection "";
|
|
proxy_buffering off;
|
|
proxy_cache off;
|
|
proxy_read_timeout 86400s;
|
|
}
|
|
|
|
# Default location — proxy to Next.js
|
|
location / {
|
|
proxy_pass http://127.0.0.1:3100;
|
|
proxy_set_header Host $host;
|
|
proxy_set_header X-Real-IP $remote_addr;
|
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
|
proxy_set_header X-Forwarded-Proto $scheme;
|
|
}
|
|
|
|
# ---------- SSL Hardening ----------
|
|
|
|
# Only allow TLS 1.2 and 1.3
|
|
ssl_protocols TLSv1.2 TLSv1.3;
|
|
|
|
# Modern cipher suite (no CBC, no RC4, no 3DES)
|
|
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305;
|
|
ssl_prefer_server_ciphers off;
|
|
|
|
# Session resumption
|
|
ssl_session_cache shared:SSL:10m;
|
|
ssl_session_timeout 1d;
|
|
ssl_session_tickets off;
|
|
|
|
# OCSP stapling
|
|
ssl_stapling on;
|
|
ssl_stapling_verify on;
|
|
resolver 1.1.1.1 8.8.8.8 valid=300s;
|
|
resolver_timeout 5s;
|
|
|
|
# HSTS (also set by Next.js, but nginx ensures it on all responses incl. redirects)
|
|
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
|
|
|
|
# ---------- Request Size Limits ----------
|
|
|
|
# Limit upload size (matches Next.js 10MB limit)
|
|
client_max_body_size 10m;
|
|
|
|
# ---------- Deny Access to Hidden Files ----------
|
|
|
|
location ~ /\. {
|
|
deny all;
|
|
return 404;
|
|
}
|
|
|
|
# ---------- Logging ----------
|
|
|
|
# Use combined format with request time for monitoring
|
|
log_format security '$remote_addr - $remote_user [$time_local] '
|
|
'"$request" $status $body_bytes_sent '
|
|
'"$http_referer" "$http_user_agent" '
|
|
'$request_time $upstream_response_time';
|
|
|
|
access_log /var/log/nginx/capakraken_access.log security;
|
|
error_log /var/log/nginx/capakraken_error.log warn;
|