{"id":59,"date":"2017-03-26T11:55:40","date_gmt":"2017-03-26T03:55:40","guid":{"rendered":"http:\/\/www.jsjs.org\/?p=59"},"modified":"2017-03-26T11:55:40","modified_gmt":"2017-03-26T03:55:40","slug":"20%e6%ad%a5%e6%89%93%e9%80%a0%e6%9c%80%e5%ae%89%e5%85%a8%e7%9a%84nginx-web%e6%9c%8d%e5%8a%a1%e5%99%a8","status":"publish","type":"post","link":"https:\/\/blog.jsjs.org\/?p=59","title":{"rendered":"20\u6b65\u6253\u9020\u6700\u5b89\u5168\u7684Nginx Web\u670d\u52a1\u5668"},"content":{"rendered":"<p>Nginx\u662f\u4e00\u4e2a\u8f7b\u91cf\u7ea7\u7684\uff0c\u9ad8\u6027\u80fd\u7684Web\u670d\u52a1\u5668\u4ee5\u53ca\u53cd\u5411\u4ee3\u7406\u548c\u90ae\u7bb1(IMAP\/POP3)\u4ee3\u7406\u670d\u52a1\u5668\u3002\u5b83\u8fd0\u884c\u5728UNIX,GNU \/linux,BSD \u5404\u79cd\u7248\u672c\uff0cMac OS X,Solaris\u548cWindows\u3002\u6839\u636e\u8c03\u67e5\u7edf\u8ba1\uff0c6%\u7684\u7f51\u7ad9\u4f7f\u7528Nginx Web\u670d\u52a1\u5668\u3002Nginx\u662f\u5c11\u6570\u80fd\u5904\u7406C10K\u95ee\u9898\u7684\u670d\u52a1\u5668\u4e4b\u4e00\u3002\u8ddf\u4f20\u7edf\u7684\u670d\u52a1\u5668\u4e0d\u540c\uff0cNginx\u4e0d\u4f9d\u8d56\u7ebf\u7a0b\u6765\u5904\u7406\u8bf7\u6c42\u3002\u76f8\u53cd\uff0c\u5b83\u4f7f\u7528\u4e86\u66f4\u591a\u7684\u53ef\u6269\u5c55\u7684\u4e8b \u4ef6\u9a71\u52a8\uff08\u5f02\u6b65\uff09\u67b6\u6784\u3002Nginx\u4e3a\u4e00\u4e9b\u9ad8\u6d41\u91cf\u7684\u7f51\u7ad9\u63d0\u4f9b\u52a8\u529b\uff0c\u6bd4\u5982WordPress,\u4eba\u4eba\u7f51\uff0c\u817e\u8baf\uff0c\u7f51\u6613\u7b49\u3002\u8fd9\u7bc7\u6587\u7ae0\u4e3b\u8981\u662f\u4ecb\u7ecd\u5982\u4f55\u63d0\u9ad8\u8fd0\u884c\u5728 Linux\u6216UNIX\u7cfb\u7edf\u7684Nginx Web\u670d\u52a1\u5668\u7684\u5b89\u5168\u6027\u3002<\/p>\n<p><strong>\u9ed8\u8ba4\u914d\u7f6e\u6587\u4ef6\u548cNginx\u7aef\u53e3<\/strong><\/p>\n<ul>\n<li>\/usr\/local\/nginx\/conf\/ \u2013 Nginx\u914d\u7f6e\u6587\u4ef6\u76ee\u5f55\uff0c\/usr\/local\/nginx\/conf\/nginx.conf\u662f\u4e3b\u914d\u7f6e\u6587\u4ef6<\/li>\n<li>\/usr\/local\/nginx\/html\/ \u2013 \u9ed8\u8ba4\u7f51\u7ad9\u6587\u4ef6\u4f4d\u7f6e<\/li>\n<li>\/usr\/local\/nginx\/logs\/ \u2013 \u9ed8\u8ba4\u65e5\u5fd7\u6587\u4ef6\u4f4d\u7f6e<\/li>\n<li>Nginx HTTP\u9ed8\u8ba4\u7aef\u53e3 : TCP 80<\/li>\n<li>Nginx HTTPS\u9ed8\u8ba4\u7aef\u53e3: TCP 443<\/li>\n<\/ul>\n<p>\u4f60\u53ef\u4ee5\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u6765\u6d4b\u8bd5Nginx\u914d\u7f6e\u6587\u4ef6\u51c6\u786e\u6027\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/usr\/local\/nginx\/sbin\/nginx -t<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u5c06\u4f1a\u8f93\u51fa\u3002<br \/>\nthe configuration file \/usr\/local\/nginx\/conf\/nginx.conf syntax is ok<br \/>\nconfiguration file \/usr\/local\/nginx\/conf\/nginx.conf test is successful<br \/>\n\u6267\u884c\u4ee5\u4e0b\u547d\u4ee4\u6765\u91cd\u65b0\u52a0\u8f7d\u914d\u7f6e\u6587\u4ef6\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/usr\/local\/nginx\/sbin\/nginx -s reload<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u6267\u884c\u4ee5\u4e0b\u547d\u4ee4\u6765\u505c\u6b62\u670d\u52a1\u5668\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/usr\/local\/nginx\/sbin\/nginx -s stop<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u4e00\u3001\u914d\u7f6eSELinux<\/h3>\n<p>\u5b89\u5168\u589e\u5f3a\u578bLinux\uff08SELinux\uff09\u7684\u662f\u4e00\u4e2aLinux\u5185\u6838\u7684\u529f\u80fd\uff0c\u5b83\u63d0\u4f9b\u652f\u6301\u8bbf\u95ee\u63a7\u5236\u7684\u5b89\u5168\u653f\u7b56\u4fdd\u62a4\u673a\u5236\u3002\u5b83\u53ef\u4ee5\u5927\u90e8\u5206\u7684\u653b\u51fb\u3002\u4e0b\u9762\u6211\u4eec\u6765\u770b\u5982\u4f55\u542f\u52a8\u57fa\u4e8ecentos\/RHEL\u7cfb\u7edf\u7684SELinux\u3002<br \/>\n<strong>\u5b89\u88c5SELinux<\/strong><\/p>\n<div>\n<blockquote>\n<ol>\n<li>rpm -qa | grep selinux<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>libselinux-1.23.10-2<br \/>\nselinux-policy-targeted-1.23.16-6<br \/>\n\u5982\u679c\u6ca1\u6709\u8fd4\u56de\u4efb\u4f55\u7ed3\u679c\uff0c\u4ee3\u8868\u6ca1\u6709\u5b89\u88c5 SELinux\uff0c\u5982\u679c\u8fd4\u56de\u4e86\u7c7b\u4f3c\u4e0a\u9762\u7684\u7ed3\u679c\uff0c\u5219\u8bf4\u660e\u7cfb\u7edf\u5b89\u88c5\u4e86 SELinux\u3002<br \/>\n<strong>\u5e03\u4ec0\u503c\u9501\u5b9a<\/strong><br \/>\n\u8fd0\u884c\u547d\u4ee4getsebool -a\u6765\u9501\u5b9a\u7cfb\u7edf\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>getsebool -a | less<\/li>\n<li>getsebool -a | grep off<\/li>\n<li>getsebool -a | grep o<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u4e8c\u3001\u901a\u8fc7\u5206\u533a\u6302\u8f7d\u5141\u8bb8\u6700\u5c11\u7279\u6743<\/h3>\n<p>\u670d\u52a1\u5668\u4e0a\u7684\u7f51\u9875\/html\/php\u6587\u4ef6\u5355\u72ec\u5206\u533a\u3002\u4f8b\u5982\uff0c\u65b0\u5efa\u4e00\u4e2a\u5206\u533a\/dev\/sda5(\u7b2c\u4e00\u903b\u8f91\u5206\u533a)\uff0c\u5e76\u4e14\u6302\u8f7d\u5728\/nginx\u3002\u786e\u4fdd \/nginx\u662f\u4ee5noexec, nodev and nosetuid\u7684\u6743\u9650\u6302\u8f7d\u3002\u4ee5\u4e0b\u662f\u6211\u7684\/etc\/fstab\u7684\u6302\u8f7d\/nginx\u7684\u4fe1\u606f\uff1a<br \/>\nLABEL=\/nginx \/nginx ext3 defaults,nosuid,noexec,nodev 1 2<br \/>\n\u6ce8\u610f\uff1a\u4f60\u9700\u8981\u4f7f\u7528fdisk\u548cmkfs.ext3\u547d\u4ee4\u521b\u5efa\u4e00\u4e2a\u65b0\u5206\u533a\u3002<\/p>\n<h3>\u4e09\u3001\u914d\u7f6e\/etc\/sysctl.conf\u5f3a\u5316Linux\u5b89\u5168<\/h3>\n<p>\u4f60\u53ef\u4ee5\u901a\u8fc7\u7f16\u8f91\/etc\/sysctl.conf\u6765\u63a7\u5236\u548c\u914d\u7f6eLinux\u5185\u6838\u3001\u7f51\u7edc\u8bbe\u7f6e\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li># Avoid a smurf attack<\/li>\n<li>net.ipv4.icmp_echo_ignore_broadcasts = 1<\/li>\n<li># Turn on protection for bad icmp error messages<\/li>\n<li>net.ipv4.icmp_ignore_bogus_error_responses = 1<\/li>\n<li># Turn on syncookies for SYN flood attack protection<\/li>\n<li>net.ipv4.tcp_syncookies = 1<\/li>\n<li># Turn on and log spoofed, source routed, and redirect packets<\/li>\n<li>net.ipv4.conf.all.log_martians = 1<\/li>\n<li>net.ipv4.conf.default.log_martians = 1<\/li>\n<li># No source routed packets here<\/li>\n<li>net.ipv4.conf.all.accept_source_route = 0<\/li>\n<li>net.ipv4.conf.default.accept_source_route = 0<\/li>\n<li># Turn on reverse path filtering<\/li>\n<li>net.ipv4.conf.all.rp_filter = 1<\/li>\n<li>net.ipv4.conf.default.rp_filter = 1<\/li>\n<li># Make sure no one can alter the routing tables<\/li>\n<li>net.ipv4.conf.all.accept_redirects = 0<\/li>\n<li>net.ipv4.conf.default.accept_redirects = 0<\/li>\n<li>net.ipv4.conf.all.secure_redirects = 0<\/li>\n<li>net.ipv4.conf.default.secure_redirects = 0<\/li>\n<li># Don\u2019t act as a router<\/li>\n<li>net.ipv4.ip_forward = 0<\/li>\n<li>net.ipv4.conf.all.send_redirects = 0<\/li>\n<li>net.ipv4.conf.default.send_redirects = 0<\/li>\n<li># Turn on execshild<\/li>\n<li>kernel.exec-shield = 1<\/li>\n<li>kernel.randomize_va_space = 1<\/li>\n<li># Tuen IPv6<\/li>\n<li>net.ipv6.conf.default.router_solicitations = 0<\/li>\n<li>net.ipv6.conf.default.accept_ra_rtr_pref = 0<\/li>\n<li>net.ipv6.conf.default.accept_ra_pinfo = 0<\/li>\n<li>net.ipv6.conf.default.accept_ra_defrtr = 0<\/li>\n<li>net.ipv6.conf.default.autoconf = 0<\/li>\n<li>net.ipv6.conf.default.dad_transmits = 0<\/li>\n<li>net.ipv6.conf.default.max_addresses = 1<\/li>\n<li># Optimization for port usefor LBs<\/li>\n<li># Increase system file descriptor limit<\/li>\n<li>fs.file-max = 65535<\/li>\n<li># Allow for more PIDs (to reduce rollover problems); may break some programs 32768<\/li>\n<li>kernel.pid_max = 65536<\/li>\n<li># Increase system IP port limits<\/li>\n<li>net.ipv4.ip_local_port_range = 2000 65000<\/li>\n<li># Increase TCP max buffer size setable using setsockopt()<\/li>\n<li>net.ipv4.tcp_rmem = 4096 87380 8388608<\/li>\n<li>net.ipv4.tcp_wmem = 4096 87380 8388608<\/li>\n<li># Increase Linux auto tuning TCP buffer limits<\/li>\n<li># min, default, and max number of bytes to use<\/li>\n<li># set max to at least 4MB, or higher if you use very high BDP paths<\/li>\n<li># Tcp Windows etc<\/li>\n<li>net.core.rmem_max = 8388608<\/li>\n<li>net.core.wmem_max = 8388608<\/li>\n<li>net.core.netdev_max_backlog = 5000<\/li>\n<li>net.ipv4.tcp_window_scaling = 1<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u56db\u3001\u5220\u9664\u6240\u6709\u4e0d\u9700\u8981\u7684Nginx\u6a21\u5757<\/h3>\n<p>\u4f60\u9700\u8981\u76f4\u63a5\u901a\u8fc7\u7f16\u8bd1Nginx\u6e90\u4ee3\u7801\u4f7f\u6a21\u5757\u6570\u91cf\u6700\u5c11\u5316\u3002\u901a\u8fc7\u9650\u5236\u53ea\u5141\u8bb8web\u670d\u52a1\u5668\u8bbf\u95ee\u6a21\u5757\u628a\u98ce\u9669\u964d\u5230\u6700\u4f4e\u3002\u4f60\u53ef\u4ee5\u53ea\u914d\u7f6e\u5b89\u88c5nginx\u4f60\u6240\u9700\u8981\u7684\u6a21\u5757\u3002\u4f8b\u5982\uff0c\u7981\u7528SSL\u548cautoindex\u6a21\u5757\u4f60\u53ef\u4ee5\u6267\u884c\u4ee5\u4e0b\u547d\u4ee4\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>.\/configure \u2013without-http_autoindex_module \u2013without-http_ssi_module<\/li>\n<li>make<\/li>\n<li>make install<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u901a\u8fc7\u4ee5\u4e0b\u547d\u4ee4\u6765\u67e5\u770b\u5f53\u7f16\u8bd1nginx\u670d\u52a1\u5668\u65f6\u54ea\u4e2a\u6a21\u5757\u80fd\u5f00\u6237\u6216\u5173\u95ed\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>.\/configure \u2013help | less<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u7981\u7528\u4f60\u7528\u4e0d\u5230\u7684nginx\u6a21\u5757\u3002<br \/>\n\uff08\u53ef\u9009\u9879\uff09\u66f4\u6539nginx\u7248\u672c\u540d\u79f0\u3002<br \/>\n\u7f16\u8f91\u6587\u4ef6\/http\/ngx_http_header_filter_module.c\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>vi +48 src\/http\/ngx_http_header_filter_module.c<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u627e\u5230\u884c\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>static char ngx_http_server_string[] = \u201cServer: nginx\u201d CRLF;<\/li>\n<li>static char ngx_http_server_full_string[] = \u201cServer: \u201d NGINX_VER CRLF;<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u6309\u7167\u4ee5\u4e0b\u884c\u4fee\u6539\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>static char ngx_http_server_string[] = \u201cServer: Ninja Web Server\u201d CRLF;<\/li>\n<li>static char ngx_http_server_full_string[] = \u201cServer: Ninja Web Server\u201d CRLF;<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u4fdd\u5b58\u5e76\u5173\u95ed\u6587\u4ef6\u3002\u73b0\u5728\u4f60\u53ef\u4ee5\u7f16\u8f91\u670d\u52a1\u5668\u4e86\u3002\u589e\u52a0\u4ee5\u4e0b\u4ee3\u7801\u5230nginx.conf\u6587\u4ef6\u6765\u5173\u95ednginx\u7248\u672c\u53f7\u7684\u663e\u793a\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>server_tokens off<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u4e94\u3001\u4f7f\u7528mod_security(\u53ea\u9002\u5408\u540e\u7aefApache\u670d\u52a1\u5668)<\/h3>\n<p>mod_security\u4e3aApache\u63d0\u4f9b\u4e00\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7ea7\u7684\u9632\u706b\u5899\u3002\u4e3a\u540e\u7aefApache Web\u670d\u52a1\u5668\u5b89\u88c5mod_security\uff0c\u8fd9\u4f1a\u963b\u6b62\u5f88\u591a\u6ce8\u5165\u5f0f\u653b\u51fb\u3002<\/p>\n<h3>\u516d\u3001\u5b89\u88c5SELinux\u7b56\u7565\u4ee5\u5f3a\u5316Nginx Web\u670d\u52a1\u5668<\/h3>\n<p>\u9ed8\u8ba4\u7684SELinux\u4e0d\u4f1a\u4fdd\u62a4Nginx Web\u670d\u52a1\u5668\uff0c\u4f46\u662f\u4f60\u53ef\u4ee5\u5b89\u88c5\u548c\u7f16\u8bd1\u4fdd\u62a4\u8f6f\u4ef6\u3002<br \/>\n1\u3001\u5b89\u88c5\u7f16\u8bd1SELinux\u6240\u9700\u73af\u5883\u652f\u6301<\/p>\n<div>\n<blockquote>\n<ol>\n<li>yum -y install selinux-policy-targeted selinux-policy-devel<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>2\u3001\u4e0b\u8f7dSELinux\u7b56\u7565\u4ee5\u5f3a\u5316Nginx Web\u670d\u52a1\u5668\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>cd \/opt<\/li>\n<li>wget \u2018http:\/\/downloads.sourceforge.net\/project\/selinuxnginx\/se-ngix_1_0_10.tar.gz?use_mirror=nchc\u2019<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>3\u3001\u89e3\u538b\u6587\u4ef6<\/p>\n<div>\n<blockquote>\n<ol>\n<li>tar -zxvf se-ngix_1_0_10.tar.gz<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>4\u3001\u7f16\u8bd1\u6587\u4ef6<\/p>\n<div>\n<blockquote>\n<ol>\n<li>cd se-ngix_1_0_10\/nginx<\/li>\n<li>make<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u5c06\u4f1a\u8f93\u51fa\u5982\u4e0b\uff1a<br \/>\nCompiling targeted nginx module<br \/>\n\/usr\/bin\/checkmodule: loading policy configuration from tmp\/nginx.tmp<br \/>\n\/usr\/bin\/checkmodule: policy configuration loaded<br \/>\n\/usr\/bin\/checkmodule: writing binary representation (version 6) to tmp\/nginx.mod<br \/>\nCreating targeted nginx.pp policy package<\/p>\n<div>\n<blockquote>\n<ol>\n<li>rm tmp\/nginx.mod.fc tmp\/nginx.mod<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>5\u3001\u5b89\u88c5\u751f\u6210\u7684nginx.pp SELinux\u6a21\u5757\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/usr\/sbin\/semodule -i nginx.pp<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u4e03\u3001\u57fa\u4e8eIptables\u9632\u706b\u5899\u7684\u9650\u5236<\/h3>\n<p>\u4e0b\u9762\u7684\u9632\u706b\u5899\u811a\u672c\u963b\u6b62\u4efb\u4f55\u9664\u4e86\u5141\u8bb8\uff1a<\/p>\n<ul>\n<li>\u6765\u81eaHTTP(TCP\u7aef\u53e380)\u7684\u8bf7\u6c42<\/li>\n<li>\u6765\u81eaICMP ping\u7684\u8bf7\u6c42<\/li>\n<li>ntp(\u7aef\u53e3123)\u7684\u8bf7\u6c42\u8f93\u51fa<\/li>\n<li>smtp(TCP\u7aef\u53e325)\u7684\u8bf7\u6c42\u8f93\u51fa<\/li>\n<\/ul>\n<div>\n<blockquote>\n<ol>\n<li>#!\/bin\/bash<\/li>\n<li>IPT=\u201d\/sbin\/iptables\u201d<\/li>\n<li>#### IPS ######<\/li>\n<li># Get server public ip<\/li>\n<li>SERVER_IP=$(ifconfig eth0 | grep \u2018inet addr:\u2019 | awk -F\u2019inet addr:\u2019 \u2018{ print $2}\u2019 | awk \u2018{ print $1}\u2019)<\/li>\n<li>LB1_IP=\u201d204.54.1.1\u2033<\/li>\n<li>LB2_IP=\u201d204.54.1.2\u2033<\/li>\n<li># Do some smart logic so that we can use damm script on LB2 too<\/li>\n<li>OTHER_LB=\u201d&#8221;<\/li>\n<li>SERVER_IP=\u201d&#8221;<\/li>\n<li>[[ &#8220;$SERVER_IP&#8221; == &#8220;$LB1_IP&#8221; ]] &amp;&amp; OTHER_LB=\u201d$LB2_IP\u201d || OTHER_LB=\u201d$LB1_IP\u201d<\/li>\n<li>[[ &#8220;$OTHER_LB&#8221; == &#8220;$LB2_IP&#8221; ]] &amp;&amp; OPP_LB=\u201d$LB1_IP\u201d || OPP_LB=\u201d$LB2_IP\u201d<\/li>\n<li>### IPs ###<\/li>\n<li>PUB_SSH_ONLY=\u201d122.xx.yy.zz\/29\u2033<\/li>\n<li>#### FILES #####<\/li>\n<li>BLOCKED_IP_TDB=\/root\/.fw\/blocked.ip.txt<\/li>\n<li>SPOOFIP=\u201d127.0.0.0\/8 192.168.0.0\/16 172.16.0.0\/12 10.0.0.0\/8 169.254.0.0\/16 0.0.0.0\/8 240.0.0.0\/4 255.255.255.255\/32 168.254.0.0\/16 224.0.0.0\/4 240.0.0.0\/5 248.0.0.0\/5 192.0.2.0\/24\u2033<\/li>\n<li>BADIPS=$( [[ -f ${BLOCKED_IP_TDB} ]] &amp;&amp; egrep -v \u201c^#|^$\u201d ${BLOCKED_IP_TDB})<\/li>\n<li>### Interfaces ###<\/li>\n<li>PUB_IF=\u201deth0\u2033\u00a0 \u00a0# public interface<\/li>\n<li>LO_IF=\u201dlo\u201d\u00a0 \u00a0 \u00a0 # loopback<\/li>\n<li>VPN_IF=\u201deth1\u2033\u00a0 \u00a0# vpn \/ private net<\/li>\n<li>### start firewall ###<\/li>\n<li>echo \u201cSetting LB1 $(hostname) Firewall\u2026\u201d<\/li>\n<li># DROP and close everything<\/li>\n<li>$IPT -P INPUT DROP<\/li>\n<li>$IPT -P OUTPUT DROP<\/li>\n<li>$IPT -P FORWARD DROP<\/li>\n<li># Unlimited lo access<\/li>\n<li>$IPT -A INPUT -i ${LO_IF} -j ACCEPT<\/li>\n<li>$IPT -A OUTPUT -o ${LO_IF} -j ACCEPT<\/li>\n<li># Unlimited vpn \/ pnet access<\/li>\n<li>$IPT -A INPUT -i ${VPN_IF} -j ACCEPT<\/li>\n<li>$IPT -A OUTPUT -o ${VPN_IF} -j ACCEPT<\/li>\n<li># Drop sync<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -p tcp ! \u2013syn -m state \u2013state NEW -j DROP<\/li>\n<li># Drop Fragments<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -f -j DROP<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags ALL FIN,URG,PSH -j DROP<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags ALL ALL -j DROP<\/li>\n<li># Drop NULL packets<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags ALL NONE -m limit \u2013limit 5\/m \u2013limit-burst 7 -j LOG \u2013log-prefix \u201d NULL Packets \u201c<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags ALL NONE -j DROP<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags SYN,RST SYN,RST -j DROP<\/li>\n<li># Drop XMAS<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags SYN,FIN SYN,FIN -m limit \u2013limit 5\/m \u2013limit-burst 7 -j LOG \u2013log-prefix \u201d XMAS Packets \u201c<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags SYN,FIN SYN,FIN -j DROP<\/li>\n<li># Drop FIN packet scans<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags FIN,ACK FIN -m limit \u2013limit 5\/m \u2013limit-burst 7 -j LOG \u2013log-prefix \u201d Fin Packets Scan \u201c<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags FIN,ACK FIN -j DROP<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -p tcp \u2013tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP<\/li>\n<li># Log and get rid of broadcast \/ multicast and invalid<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -m pkttype \u2013pkt-type broadcast -j LOG \u2013log-prefix \u201d Broadcast \u201c<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -m pkttype \u2013pkt-type broadcast -j DROP<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -m pkttype \u2013pkt-type multicast -j LOG \u2013log-prefix \u201d Multicast \u201c<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -m pkttype \u2013pkt-type multicast -j DROP<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -m state \u2013state INVALID -j LOG \u2013log-prefix \u201d Invalid \u201c<\/li>\n<li>$IPT\u00a0 -A INPUT -i ${PUB_IF} -m state \u2013state INVALID -j DROP<\/li>\n<li># Log and block spoofed ips<\/li>\n<li>$IPT -N spooflist<\/li>\n<li>for ipblock in $SPOOFIP<\/li>\n<li>do<\/li>\n<li>$IPT -A spooflist -i ${PUB_IF} -s $ipblock -j LOG \u2013log-prefix \u201d SPOOF List Block \u201c<\/li>\n<li>$IPT -A spooflist -i ${PUB_IF} -s $ipblock -j DROP<\/li>\n<li>done<\/li>\n<li>$IPT -I INPUT -j spooflist<\/li>\n<li>$IPT -I OUTPUT -j spooflist<\/li>\n<li>$IPT -I FORWARD -j spooflist<\/li>\n<li># Allow ssh only from selected public ips<\/li>\n<li>for ip in ${PUB_SSH_ONLY}<\/li>\n<li>do<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -s ${ip} -p tcp -d ${SERVER_IP} \u2013destination-port 22 -j ACCEPT<\/li>\n<li>$IPT -A OUTPUT -o ${PUB_IF} -d ${ip} -p tcp -s ${SERVER_IP} \u2013sport 22 -j ACCEPT<\/li>\n<li>done<\/li>\n<li># allow incoming ICMP ping pong stuff<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -p icmp \u2013icmp-type 8 -s 0\/0 -m state \u2013state NEW,ESTABLISHED,RELATED -m limit \u2013limit 30\/sec\u00a0 -j ACCEPT<\/li>\n<li>$IPT -A OUTPUT -o ${PUB_IF} -p icmp \u2013icmp-type 0 -d 0\/0 -m state \u2013state ESTABLISHED,RELATED -j ACCEPT<\/li>\n<li># allow incoming HTTP port 80<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -p tcp -s 0\/0 \u2013sport 1024:65535 \u2013dport 80 -m state \u2013state NEW,ESTABLISHED -j ACCEPT<\/li>\n<li>$IPT -A OUTPUT -o ${PUB_IF} -p tcp \u2013sport 80 -d 0\/0 \u2013dport 1024:65535 -m state \u2013state ESTABLISHED -j ACCEPT<\/li>\n<li># allow outgoing ntp<\/li>\n<li>$IPT -A OUTPUT -o ${PUB_IF} -p udp \u2013dport 123 -m state \u2013state NEW,ESTABLISHED -j ACCEPT<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -p udp \u2013sport 123 -m state \u2013state ESTABLISHED -j ACCEPT<\/li>\n<li># allow outgoing smtp<\/li>\n<li>$IPT -A OUTPUT -o ${PUB_IF} -p tcp \u2013dport 25 -m state \u2013state NEW,ESTABLISHED -j ACCEPT<\/li>\n<li>$IPT -A INPUT -i ${PUB_IF} -p tcp \u2013sport 25 -m state \u2013state ESTABLISHED -j ACCEPT<\/li>\n<li>### add your other rules here ####<\/li>\n<li>#######################<\/li>\n<li># drop and log everything else<\/li>\n<li>$IPT -A INPUT -m limit \u2013limit 5\/m \u2013limit-burst 7 -j LOG \u2013log-prefix \u201d DEFAULT DROP \u201c<\/li>\n<li>$IPT -A INPUT -j DROP<\/li>\n<li>exit 0<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u516b\u3001\u63a7\u5236\u7f13\u51b2\u533a\u6ea2\u51fa\u653b\u51fb<\/h3>\n<p>\u7f16\u8f91nginx.conf\uff0c\u4e3a\u6240\u6709\u5ba2\u6237\u7aef\u8bbe\u7f6e\u7f13\u51b2\u533a\u7684\u5927\u5c0f\u9650\u5236\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>vi \/usr\/local\/nginx\/conf\/nginx.conf<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u7f16\u8f91\u548c\u8bbe\u7f6e\u6240\u6709\u5ba2\u6237\u7aef\u7f13\u51b2\u533a\u7684\u5927\u5c0f\u9650\u5236\u5982\u4e0b\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>## Start: Size Limits &amp; Buffer Overflows ##<\/li>\n<li>client_body_buffer_size\u00a0 1K;<\/li>\n<li>client_header_buffer_size 1k;<\/li>\n<li>client_max_body_size 1k;<\/li>\n<li>large_client_header_buffers 2 1k;<\/li>\n<li>## END: Size Limits &amp; Buffer Overflows ##<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u89e3\u91ca\uff1a<br \/>\n1\u3001client_body_buffer_size 1k-\uff08\u9ed8\u8ba48k\u621616k\uff09\u8fd9\u4e2a\u6307\u4ee4\u53ef\u4ee5\u6307\u5b9a\u8fde\u63a5\u8bf7\u6c42\u5b9e\u4f53\u7684\u7f13\u51b2\u533a\u5927\u5c0f\u3002\u5982\u679c\u8fde\u63a5\u8bf7\u6c42\u8d85\u8fc7\u7f13\u5b58\u533a\u6307\u5b9a\u7684\u503c\uff0c\u90a3\u4e48\u8fd9\u4e9b\u8bf7\u6c42\u5b9e\u4f53\u7684\u6574\u4f53\u6216\u90e8\u5206\u5c06\u5c1d\u8bd5\u5199\u5165\u4e00\u4e2a\u4e34\u65f6\u6587\u4ef6\u3002<br \/>\n2\u3001client_header_buffer_size 1k-\u6307\u4ee4\u6307\u5b9a\u5ba2\u6237\u7aef\u8bf7\u6c42\u5934\u90e8\u7684\u7f13\u51b2\u533a\u5927\u5c0f\u3002\u7edd\u5927\u591a\u6570\u60c5\u51b5\u4e0b\u4e00\u4e2a\u8bf7\u6c42\u5934\u4e0d\u4f1a\u5927\u4e8e1k\uff0c\u4e0d\u8fc7\u5982\u679c\u6709\u6765\u81ea\u4e8ewap\u5ba2\u6237\u7aef\u7684\u8f83\u5927\u7684cookie\u5b83\u53ef\u80fd\u4f1a\u5927\u4e8e 1k\uff0cNginx\u5c06\u5206\u914d\u7ed9\u5b83\u4e00\u4e2a\u66f4\u5927\u7684\u7f13\u51b2\u533a\uff0c\u8fd9\u4e2a\u503c\u53ef\u4ee5\u5728large_client_header_buffers\u91cc\u9762\u8bbe\u7f6e\u3002<br \/>\n3\u3001client_max_body_size 1k-\u6307\u4ee4\u6307\u5b9a\u5141\u8bb8\u5ba2\u6237\u7aef\u8fde\u63a5\u7684\u6700\u5927\u8bf7\u6c42\u5b9e\u4f53\u5927\u5c0f\uff0c\u5b83\u51fa\u73b0\u5728\u8bf7\u6c42\u5934\u90e8\u7684Content-Length\u5b57\u6bb5\u3002<br \/>\n\u5982\u679c\u8bf7\u6c42\u5927\u4e8e\u6307\u5b9a\u7684\u503c\uff0c\u5ba2\u6237\u7aef\u5c06\u6536\u5230\u4e00\u4e2a\u201dRequest Entity Too Large\u201d (413)\u9519\u8bef\u3002\u8bb0\u4f4f\uff0c\u6d4f\u89c8\u5668\u5e76\u4e0d\u77e5\u9053\u600e\u6837\u663e\u793a\u8fd9\u4e2a\u9519\u8bef\u3002<br \/>\n4\u3001large_client_header_buffers-\u6307\u5b9a\u5ba2\u6237\u7aef\u4e00\u4e9b\u6bd4\u8f83\u5927\u7684\u8bf7\u6c42\u5934\u4f7f\u7528\u7684\u7f13\u51b2\u533a\u6570\u91cf\u548c\u5927\u5c0f\u3002\u8bf7\u6c42\u5b57\u6bb5\u4e0d\u80fd\u5927\u4e8e\u4e00\u4e2a\u7f13\u51b2\u533a\u5927\u5c0f\uff0c\u5982\u679c\u5ba2\u6237\u7aef\u53d1\u9001\u4e00\u4e2a\u6bd4\u8f83\u5927\u7684\u5934\uff0cnginx\u5c06\u8fd4\u56de\u201dRequest URI too large\u201d (414)<br \/>\n\u540c\u6837\uff0c\u8bf7\u6c42\u7684\u5934\u90e8\u6700\u957f\u5b57\u6bb5\u4e0d\u80fd\u5927\u4e8e\u4e00\u4e2a\u7f13\u51b2\u533a\uff0c\u5426\u5219\u670d\u52a1\u5668\u5c06\u8fd4\u56de\u201dBad request\u201d (400)\u3002\u7f13\u51b2\u533a\u53ea\u5728\u9700\u6c42\u65f6\u5206\u5f00\u3002\u9ed8\u8ba4\u4e00\u4e2a\u7f13\u51b2\u533a\u5927\u5c0f\u4e3a\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u5206\u9875\u6587\u4ef6\u5927\u5c0f\uff0c\u901a\u5e38\u662f4k\u62168k\uff0c\u5982\u679c\u4e00\u4e2a\u8fde\u63a5\u8bf7\u6c42\u6700\u7ec8\u5c06\u72b6\u6001\u8f6c\u6362\u4e3akeep- alive\uff0c\u5b83\u6240\u5360\u7528\u7684\u7f13\u51b2\u533a\u5c06\u88ab\u91ca\u653e\u3002<br \/>\n\u4f60\u8fd8\u9700\u8981\u63a7\u5236\u8d85\u65f6\u6765\u63d0\u9ad8\u670d\u52a1\u5668\u6027\u80fd\u5e76\u4e0e\u5ba2\u6237\u7aef\u65ad\u5f00\u8fde\u63a5\u3002\u6309\u7167\u5982\u4e0b\u7f16\u8f91\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>## Start: Timeouts ##<\/li>\n<li>client_body_timeout\u00a0 \u00a010;<\/li>\n<li>client_header_timeout 10;<\/li>\n<li>keepalive_timeout\u00a0 \u00a0 \u00a05 5;<\/li>\n<li>send_timeout\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 10;<\/li>\n<li>## End: Timeouts ##<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>1\u3001client_body_timeout 10;-\u6307\u4ee4\u6307\u5b9a\u8bfb\u53d6\u8bf7\u6c42\u5b9e\u4f53\u7684\u8d85\u65f6\u65f6\u95f4\u3002\u8fd9\u91cc\u7684\u8d85\u65f6\u662f\u6307\u4e00\u4e2a\u8bf7\u6c42\u5b9e\u4f53\u6ca1\u6709\u8fdb\u5165\u8bfb\u53d6\u6b65\u9aa4\uff0c\u5982\u679c\u8fde\u63a5\u8d85\u8fc7\u8fd9\u4e2a\u65f6\u95f4\u800c\u5ba2\u6237\u7aef\u6ca1\u6709\u4efb\u4f55\u54cd\u5e94\uff0cNginx\u5c06\u8fd4\u56de\u4e00\u4e2a\u201dRequest time out\u201d (408)\u9519\u8bef\u3002<br \/>\n2\u3001client_header_timeout 10;-\u6307\u4ee4\u6307\u5b9a\u8bfb\u53d6\u5ba2\u6237\u7aef\u8bf7\u6c42\u5934\u6807\u9898\u7684\u8d85\u65f6\u65f6\u95f4\u3002\u8fd9\u91cc\u7684\u8d85\u65f6\u662f\u6307\u4e00\u4e2a\u8bf7\u6c42\u5934\u6ca1\u6709\u8fdb\u5165\u8bfb\u53d6\u6b65\u9aa4\uff0c\u5982\u679c\u8fde\u63a5\u8d85\u8fc7\u8fd9\u4e2a\u65f6\u95f4\u800c\u5ba2\u6237\u7aef\u6ca1\u6709\u4efb\u4f55\u54cd\u5e94\uff0cNginx\u5c06\u8fd4\u56de\u4e00\u4e2a\u201dRequest time out\u201d (408)\u9519\u8bef\u3002<br \/>\n3\u3001keepalive_timeout 5 5; \u2013 \u53c2\u6570\u7684\u7b2c\u4e00\u4e2a\u503c\u6307\u5b9a\u4e86\u5ba2\u6237\u7aef\u4e0e\u670d\u52a1\u5668\u957f\u8fde\u63a5\u7684\u8d85\u65f6\u65f6\u95f4\uff0c\u8d85\u8fc7\u8fd9\u4e2a\u65f6\u95f4\uff0c\u670d\u52a1\u5668\u5c06\u5173\u95ed\u8fde\u63a5\u3002\u53c2\u6570\u7684\u7b2c\u4e8c\u4e2a\u503c\uff08\u53ef\u9009\uff09\u6307\u5b9a\u4e86\u5e94\u7b54\u5934\u4e2dKeep-Alive: timeout=time\u7684time\u503c\uff0c\u8fd9\u4e2a\u503c\u53ef\u4ee5\u4f7f\u4e00\u4e9b\u6d4f\u89c8\u5668\u77e5\u9053\u4ec0\u4e48\u65f6\u5019\u5173\u95ed\u8fde\u63a5\uff0c\u4ee5\u4fbf\u670d\u52a1\u5668\u4e0d\u7528\u91cd\u590d\u5173\u95ed\uff0c\u5982\u679c\u4e0d\u6307\u5b9a\u8fd9\u4e2a\u53c2\u6570\uff0cnginx\u4e0d\u4f1a\u5728\u5e94 \u7b54\u5934\u4e2d\u53d1\u9001Keep-Alive\u4fe1\u606f\u3002\uff08\u4f46\u8fd9\u5e76\u4e0d\u662f\u6307\u600e\u6837\u5c06\u4e00\u4e2a\u8fde\u63a5\u201cKeep-Alive\u201d\uff09\u53c2\u6570\u7684\u8fd9\u4e24\u4e2a\u503c\u53ef\u4ee5\u4e0d\u76f8\u540c\u3002<br \/>\n4\u3001send_timeout 10; \u6307\u4ee4\u6307\u5b9a\u4e86\u53d1\u9001\u7ed9\u5ba2\u6237\u7aef\u5e94\u7b54\u540e\u7684\u8d85\u65f6\u65f6\u95f4\uff0cTimeout\u662f\u6307\u6ca1\u6709\u8fdb\u5165\u5b8c\u6574established\u72b6\u6001\uff0c\u53ea\u5b8c\u6210\u4e86\u4e24\u6b21\u63e1\u624b\uff0c\u5982\u679c\u8d85\u8fc7\u8fd9\u4e2a\u65f6\u95f4\u5ba2\u6237\u7aef\u6ca1\u6709\u4efb\u4f55\u54cd\u5e94\uff0cnginx\u5c06\u5173\u95ed\u8fde\u63a5\u3002<\/p>\n<h3>\u4e5d\u3001\u63a7\u5236\u5e76\u53d1\u8fde\u63a5<\/h3>\n<p>\u4f60\u53ef\u4ee5\u4f7f\u7528NginxHttpLimitZone\u6a21\u5757\u6765\u9650\u5236\u6307\u5b9a\u7684\u4f1a\u8bdd\u6216\u8005\u4e00\u4e2aIP\u5730\u5740\u7684\u7279\u6b8a\u60c5\u51b5\u4e0b\u7684\u5e76\u53d1\u8fde\u63a5\u3002\u7f16\u8f91nginx.conf:<\/p>\n<div>\n<blockquote>\n<ol>\n<li>### Directive describes the zone, in which the session states are stored i.e. store in slimits. ###<\/li>\n<li>### 1m can handle 32000 sessions with 32 bytes\/session, set to 5m x 32000 session ###<\/li>\n<li>limit_zone slimits $binary_remote_addr 5m;<\/li>\n<li>### Control maximum number of simultaneous connections for one session i.e. ###<\/li>\n<li>### restricts the amount of connections from a single ip address ###<\/li>\n<li>limit_conn slimits 5;<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u4e0a\u9762\u8868\u793a\u9650\u5236\u6bcf\u4e2a\u8fdc\u7a0bIP\u5730\u5740\u7684\u5ba2\u6237\u7aef\u540c\u65f6\u6253\u5f00\u8fde\u63a5\u4e0d\u80fd\u8d85\u8fc75\u4e2a\u3002<\/p>\n<h3>\u5341\u3001\u53ea\u5141\u8bb8\u6211\u4eec\u7684\u57df\u540d\u7684\u8bbf\u95ee<\/h3>\n<p>\u5982\u679c\u673a\u5668\u4eba\u53ea\u662f\u968f\u673a\u626b\u63cf\u670d\u52a1\u5668\u7684\u6240\u6709\u57df\u540d\uff0c\u90a3\u62d2\u7edd\u8fd9\u4e2a\u8bf7\u6c42\u3002\u4f60\u5fc5\u987b\u5141\u8bb8\u914d\u7f6e\u7684\u865a\u62df\u57df\u6216\u53cd\u5411\u4ee3\u7406\u8bf7\u6c42\u3002\u4f60\u4e0d\u5fc5\u4f7f\u7528IP\u5730\u5740\u6765\u62d2\u7edd\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>## Only requests to our Host are allowed i.e. nixcraft.in, images.nixcraft.in and www.nixcraft.in<\/li>\n<li>if ($host !~ ^(nixcraft.in|www.nixcraft.in|images.nixcraft.in)$ ) {<\/li>\n<li>return 444;<\/li>\n<li>}<\/li>\n<li>##<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u5341\u4e00\u3001\u9650\u5236\u53ef\u7528\u7684\u8bf7\u6c42\u65b9\u6cd5<\/h3>\n<p>GET\u548cPOST\u662f\u4e92\u8054\u7f51\u4e0a\u6700\u5e38\u7528\u7684\u65b9\u6cd5\u3002 Web\u670d\u52a1\u5668\u7684\u65b9\u6cd5\u88ab\u5b9a\u4e49\u5728RFC 2616\u3002\u5982\u679cWeb\u670d\u52a1\u5668\u4e0d\u8981\u6c42\u542f\u7528\u6240\u6709\u53ef\u7528\u7684\u65b9\u6cd5\uff0c\u5b83\u4eec\u5e94\u8be5\u88ab\u7981\u7528\u3002\u4e0b\u9762\u7684\u6307\u4ee4\u5c06\u8fc7\u6ee4\u53ea\u5141\u8bb8GET\uff0cHEAD\u548cPOST\u65b9\u6cd5\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>## Only allow these request methods ##<\/li>\n<li>if ($request_method !~ ^(GET|HEAD|POST)$ ) {<\/li>\n<li>return 444;<\/li>\n<li>}<\/li>\n<li>## Do not accept DELETE, SEARCH and other methods ##<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u66f4\u591a\u5173\u4e8eHTTP\u65b9\u6cd5\u7684\u4ecb\u7ecd<\/p>\n<ul>\n<li>GET\u65b9\u6cd5\u662f\u7528\u6765\u8bf7\u6c42\uff0c\u5982\u6587\u4ef6<a href=\"http:\/\/www.moqifei.com\/index.php\" target=\"_blank\" rel=\"noopener\">http:\/\/www.moqifei.com\/index.php<\/a>\u3002<\/li>\n<li>HEAD\u65b9\u6cd5\u662f\u4e00\u6837\u7684\uff0c\u9664\u975e\u8be5\u670d\u52a1\u5668\u7684GET\u8bf7\u6c42\u65e0\u6cd5\u8fd4\u56de\u6d88\u606f\u4f53\u3002<\/li>\n<li>POST\u65b9\u6cd5\u53ef\u80fd\u6d89\u53ca\u5230\u5f88\u591a\u4e1c\u897f\uff0c\u5982\u50a8\u5b58\u6216\u66f4\u65b0\u6570\u636e\uff0c\u6216\u8ba2\u8d2d\u4ea7\u54c1\uff0c\u6216\u901a\u8fc7\u63d0\u4ea4\u8868\u5355\u53d1\u9001\u7535\u5b50\u90ae\u4ef6\u3002\u8fd9\u901a\u5e38\u662f\u4f7f\u7528\u670d\u52a1\u5668\u7aef\u5904\u7406\uff0c\u5982PHP\uff0cPerl\u548cPython\u7b49\u811a\u672c\u3002\u5982\u679c\u4f60\u8981\u4e0a\u4f20\u7684\u6587\u4ef6\u548c\u5728\u670d\u52a1\u5668\u5904\u7406\u6570\u636e\uff0c\u4f60\u5fc5\u987b\u4f7f\u7528\u8fd9\u4e2a\u65b9\u6cd5\u3002<\/li>\n<\/ul>\n<h3>\u5341\u4e8c\u3001\u5982\u4f55\u62d2\u7edd\u4e00\u4e9bUser-Agents\uff1f<\/h3>\n<p>\u4f60\u53ef\u4ee5\u5f88\u5bb9\u6613\u5730\u963b\u6b62User-Agents,\u5982\u626b\u63cf\u5668\uff0c\u673a\u5668\u4eba\u4ee5\u53ca\u6ee5\u7528\u4f60\u670d\u52a1\u5668\u7684\u5783\u573e\u90ae\u4ef6\u53d1\u9001\u8005\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>## Block download agents ##<\/li>\n<li>if ($http_user_agent ~* LWP::Simple|BBBike|wget) {<\/li>\n<li>return 403;<\/li>\n<li>}<\/li>\n<li>##<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u963b\u6b62Soso\u548c\u6709\u9053\u7684\u673a\u5668\u4eba\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>## Block some robots ##<\/li>\n<li>if ($http_user_agent ~* Sosospider|YodaoBot) {<\/li>\n<li>return 403;<\/li>\n<li>}<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u5341\u4e09\u3001\u5982\u4f55\u9632\u6b62\u56fe\u7247\u76d7\u94fe<\/h3>\n<p>\u56fe\u7247\u6216HTML\u76d7\u94fe\u7684\u610f\u601d\u662f\u6709\u4eba\u76f4\u63a5\u7528\u4f60\u7f51\u7ad9\u7684\u56fe\u7247\u5730\u5740\u6765\u663e\u793a\u5728\u4ed6\u7684\u7f51\u7ad9\u4e0a\u3002\u6700\u7ec8\u7684\u7ed3\u679c\uff0c\u4f60\u9700\u8981\u652f\u4ed8\u989d\u5916\u7684\u5bbd\u5e26\u8d39\u7528\u3002\u8fd9\u901a\u5e38\u662f\u5728\u8bba\u575b\u548c\u535a\u5ba2\u3002\u6211\u5f3a\u70c8\u5efa\u8bae\u60a8\u5c01\u9501\uff0c\u5e76\u963b\u6b62\u76d7\u94fe\u884c\u4e3a\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li># Stop deep linking or hot linking<\/li>\n<li>location \/images\/ {<\/li>\n<li>valid_referers none blocked www.example.com example.com;<\/li>\n<li>if ($invalid_referer) {<\/li>\n<li>return\u00a0 \u00a0403;<\/li>\n<li>}<\/li>\n<li>}<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u4f8b\u5982\uff1a\u91cd\u5b9a\u5411\u5e76\u663e\u793a\u6307\u5b9a\u56fe\u7247<\/p>\n<div>\n<blockquote>\n<ol>\n<li>valid_referers blocked www.example.com example.com;<\/li>\n<li>if ($invalid_referer) {<\/li>\n<li>rewrite ^\/images\/uploads.*\\.(gif|jpg|jpeg|png)$ http:\/\/www.examples.com\/banned.jpg last<\/li>\n<li>}<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u5341\u56db\u3001\u76ee\u5f55\u9650\u5236<\/h3>\n<p>\u4f60\u53ef\u4ee5\u5bf9\u6307\u5b9a\u7684\u76ee\u5f55\u8bbe\u7f6e\u8bbf\u95ee\u6743\u9650\u3002\u6240\u6709\u7684\u7f51\u7ad9\u76ee\u5f55\u5e94\u8be5\u4e00\u4e00\u7684\u914d\u7f6e\uff0c\u53ea\u5141\u8bb8\u5fc5\u987b\u7684\u76ee\u5f55\u8bbf\u95ee\u6743\u9650\u3002<br \/>\n<strong>\u901a\u8fc7IP\u5730\u5740\u9650\u5236\u8bbf\u95ee<\/strong><br \/>\n\u4f60\u53ef\u4ee5\u901a\u8fc7IP\u5730\u5740\u6765\u9650\u5236\u8bbf\u95ee\u76ee\u5f55\/admin\/:<\/p>\n<div>\n<blockquote>\n<ol>\n<li>location \/docs\/ {<\/li>\n<li>## block one workstation<\/li>\n<li>deny\u00a0 \u00a0 192.168.1.1;<\/li>\n<li>## allow anyone in 192.168.1.0\/24<\/li>\n<li>allow\u00a0 \u00a0192.168.1.0\/24;<\/li>\n<li>## drop rest of the world<\/li>\n<li>deny\u00a0 \u00a0 all;<\/li>\n<li>}<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p><strong>\u901a\u8fc7\u5bc6\u7801\u4fdd\u62a4\u76ee\u5f55<\/strong><br \/>\n\u9996\u5148\u521b\u5efa\u5bc6\u7801\u6587\u4ef6\u5e76\u589e\u52a0\u201cuser\u201d\u7528\u6237\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>mkdir \/usr\/local\/nginx\/conf\/.htpasswd\/<\/li>\n<li>htpasswd -c \/usr\/local\/nginx\/conf\/.htpasswd\/passwd user<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u7f16\u8f91nginx.conf,\u52a0\u5165\u9700\u8981\u4fdd\u62a4\u7684\u76ee\u5f55\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>### Password Protect \/personal-images\/ and \/delta\/ directories ###<\/li>\n<li>location ~ \/(personal-images\/.*|delta\/.*) {<\/li>\n<li>auth_basic\u00a0 \u201cRestricted\u201d;<\/li>\n<li>auth_basic_user_file\u00a0 \u00a0\/usr\/local\/nginx\/conf\/.htpasswd\/passwd;<\/li>\n<li>}<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u4e00\u65e6\u5bc6\u7801\u6587\u4ef6\u5df2\u7ecf\u751f\u6210\uff0c\u4f60\u4e5f\u53ef\u4ee5\u7528\u4ee5\u4e0b\u7684\u547d\u4ee4\u6765\u589e\u52a0\u5141\u8bb8\u8bbf\u95ee\u7684\u7528\u6237\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>htpasswd -s \/usr\/local\/nginx\/conf\/.htpasswd\/passwd userName<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u5341\u4e94\u3001Nginx SSL\u914d\u7f6e<\/h3>\n<p>HTTP\u662f\u4e00\u4e2a\u7eaf\u6587\u672c\u534f\u8bae\uff0c\u5b83\u662f\u5f00\u653e\u7684\u88ab\u52a8\u76d1\u6d4b\u3002\u4f60\u5e94\u8be5\u4f7f\u7528SSL\u6765\u52a0\u5bc6\u4f60\u7684\u7528\u6237\u5185\u5bb9\u3002<br \/>\n<strong>\u521b\u5efaSSL\u8bc1\u4e66<\/strong><br \/>\n\u6267\u884c\u4ee5\u4e0b\u547d\u4ee4\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>cd \/usr\/local\/nginx\/conf<\/li>\n<li>openssl genrsa -des3 -out server.key 1024<\/li>\n<li>openssl req -new -key server.key -out server.csr<\/li>\n<li>cp server.key server.key.org<\/li>\n<li>openssl rsa -in server.key.org -out server.key<\/li>\n<li>openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u7f16\u8f91nginx.conf\u5e76\u6309\u5982\u4e0b\u6765\u66f4\u65b0\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>server {<\/li>\n<li>server_name example.com;<\/li>\n<li>listen 443;<\/li>\n<li>ssl on;<\/li>\n<li>ssl_certificate \/usr\/local\/nginx\/conf\/server.crt;<\/li>\n<li>ssl_certificate_key \/usr\/local\/nginx\/conf\/server.key;<\/li>\n<li>access_log \/usr\/local\/nginx\/logs\/ssl.access.log;<\/li>\n<li>error_log \/usr\/local\/nginx\/logs\/ssl.error.log;<\/li>\n<li>}<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u91cd\u542fnginx:<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/usr\/local\/nginx\/sbin\/nginx -s reload<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u5341\u516d\u3001Nginx\u4e0ePHP\u5b89\u5168\u5efa\u8bae<\/h3>\n<p>PHP\u662f\u6d41\u884c\u7684\u670d\u52a1\u5668\u7aef\u811a\u672c\u8bed\u8a00\u4e4b\u4e00\u3002\u5982\u4e0b\u7f16\u8f91\/etc\/<a href=\"http:\/\/www.moqifei.com\/archives\/tag\/php\">php<\/a>.ini\u6587\u4ef6\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li># Disallow dangerous functions<\/li>\n<li>disable_functions = phpinfo, system, mail, exec<\/li>\n<li>## Try to limit resources\u00a0 ##<\/li>\n<li># Maximum execution time of each script, in seconds<\/li>\n<li>max_execution_time = 30<\/li>\n<li># Maximum amount of time each script may spend parsing request data<\/li>\n<li>max_input_time = 60<\/li>\n<li># Maximum amount of memory a script may consume (8MB)<\/li>\n<li>memory_limit = 8M<\/li>\n<li># Maximum size of POST data that PHP will accept.<\/li>\n<li>post_max_size = 8M<\/li>\n<li># Whether to allow HTTP file uploads.<\/li>\n<li>file_uploads = Off<\/li>\n<li># Maximum allowed size for uploaded files.<\/li>\n<li>upload_max_filesize = 2M<\/li>\n<li># Do not expose PHP error messages to external users<\/li>\n<li>display_errors = Off<\/li>\n<li># Turn on safe mode<\/li>\n<li>safe_mode = On<\/li>\n<li># Only allow access to executables in isolated directory<\/li>\n<li>safe_mode_exec_dir = php-required-executables-path<\/li>\n<li># Limit external access to PHP environment<\/li>\n<li>safe_mode_allowed_env_vars = PHP_<\/li>\n<li># Restrict PHP information leakage<\/li>\n<li>expose_php = Off<\/li>\n<li># Log all errors<\/li>\n<li>log_errors = On<\/li>\n<li># Do not register globals for input data<\/li>\n<li>register_globals = Off<\/li>\n<li># Minimize allowable PHP post size<\/li>\n<li>post_max_size = 1K<\/li>\n<li># Ensure PHP redirects appropriately<\/li>\n<li>cgi.force_redirect = 0<\/li>\n<li># Disallow uploading unless necessary<\/li>\n<li>file_uploads = Off<\/li>\n<li># Enable SQL safe mode<\/li>\n<li>sql.safe_mode = On<\/li>\n<li># Avoid Opening remote files<\/li>\n<li>allow_url_fopen = Off<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<h3>\u5341\u4e03\u3001\u5982\u679c\u53ef\u80fd\u8ba9Nginx\u8fd0\u884c\u5728\u4e00\u4e2achroot\u76d1\u72f1<\/h3>\n<p>\u628anginx\u653e\u5728\u4e00\u4e2achroot\u76d1\u72f1\u4ee5\u51cf\u5c0f\u6f5c\u5728\u7684\u975e\u6cd5\u8fdb\u5165\u5176\u5b83\u76ee\u5f55\u3002\u4f60\u53ef\u4ee5\u4f7f\u7528\u4f20\u7edf\u7684\u4e0enginx\u4e00\u8d77\u5b89\u88c5\u7684chroot\u3002\u5982\u679c\u53ef\u80fd\uff0c\u90a3\u4f7f\u7528FreeBSD jails\uff0cXen\uff0cOpenVZ\u865a\u62df\u5316\u7684\u5bb9\u5668\u6982\u5ff5\u3002<\/p>\n<h3>\u5341\u516b\u3001\u5728\u9632\u706b\u5899\u7ea7\u9650\u5236\u6bcf\u4e2aIP\u7684\u8fde\u63a5\u6570<\/h3>\n<p>\u7f51\u7edc\u670d\u52a1\u5668\u5fc5\u987b\u76d1\u89c6\u8fde\u63a5\u548c\u6bcf\u79d2\u8fde\u63a5\u9650\u5236\u3002PF\u548cIptales\u90fd\u80fd\u591f\u5728\u8fdb\u5165\u4f60\u7684nginx\u670d\u52a1\u5668\u4e4b\u524d\u963b\u6b62\u6700\u7ec8\u7528\u6237\u7684\u8bbf\u95ee\u3002<br \/>\nLinux Iptables:\u9650\u5236\u6bcf\u6b21Nginx\u8fde\u63a5\u6570<br \/>\n\u4e0b\u9762\u7684\u4f8b\u5b50\u4f1a\u963b\u6b62\u6765\u81ea\u4e00\u4e2aIP\u768460\u79d2\u949f\u5185\u8d85\u8fc715\u4e2a\u8fde\u63a5\u7aef\u53e380\u7684\u8fde\u63a5\u6570\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/sbin\/iptables -A INPUT -p tcp \u2013dport 80 -i eth0 -m state \u2013state NEW -m recent \u2013set<\/li>\n<li>\/sbin\/iptables -A INPUT -p tcp \u2013dport 80 -i eth0 -m state \u2013state NEW -m recent \u2013update \u2013seconds 60\u00a0 \u2013hitcount 15 -j DROP<\/li>\n<li>service iptables save<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u8bf7\u6839\u636e\u4f60\u7684\u5177\u4f53\u60c5\u51b5\u6765\u8bbe\u7f6e\u9650\u5236\u7684\u8fde\u63a5\u6570\u3002<\/p>\n<h3>\u5341\u4e5d\uff1a\u914d\u7f6e\u64cd\u4f5c\u7cfb\u7edf\u4fdd\u62a4Web\u670d\u52a1\u5668<\/h3>\n<p>\u50cf\u4ee5\u4e0a\u4ecb\u7ecd\u7684\u542f\u52a8SELinux.\u6b63\u786e\u8bbe\u7f6e\/nginx\u6587\u6863\u6839\u76ee\u5f55\u7684\u6743\u9650\u3002Nginx\u4ee5\u7528\u6237nginx\u8fd0\u884c\u3002\u4f46\u662f\u6839\u76ee\u5f55\uff08\/nginx\u6216\u8005\/usr \/local\/nginx\/html\uff09\u4e0d\u5e94\u8be5\u8bbe\u7f6e\u5c5e\u4e8e\u7528\u6237nginx\u6216\u5bf9\u7528\u6237nginx\u53ef\u5199\u3002\u627e\u51fa\u9519\u8bef\u6743\u9650\u7684\u6587\u4ef6\u53ef\u4ee5\u4f7f\u7528\u5982\u4e0b\u547d\u4ee4\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>find \/nginx -user nginx<\/li>\n<li>find \/usr\/local\/nginx\/html -user nginx<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u786e\u4fdd\u4f60\u66f4\u6240\u6709\u6743\u4e3aroot\u6216\u5176\u5b83\u7528\u6237\uff0c\u4e00\u4e2a\u5178\u578b\u7684\u6743\u9650\u8bbe\u7f6e \/usr\/local\/nginx\/html\/<\/p>\n<div>\n<blockquote>\n<ol>\n<li>ls -l \/usr\/local\/nginx\/html\/<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u793a\u4f8b\u8f93\u51fa\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>-rw-r\u2013r\u2013 1 root root 925 Jan\u00a0 3 00:50 error4xx.html<\/li>\n<li>-rw-r\u2013r\u2013 1 root root\u00a0 52 Jan\u00a0 3 10:00 error5xx.html<\/li>\n<li>-rw-r\u2013r\u2013 1 root root 134 Jan\u00a0 3 00:52 index.html<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u4f60\u5fc5\u987b\u5220\u9664\u7531vi\u6216\u5176\u5b83\u6587\u672c\u7f16\u8f91\u5668\u521b\u5efa\u7684\u5907\u4efd\u6587\u4ef6\uff1a<\/p>\n<div>\n<blockquote>\n<ol>\n<li>find \/nginx -name \u2018.?*\u2019 -not -name .ht* -or -name \u2018*~\u2019 -or -name \u2018*.bak*\u2019 -or -name \u2018*.old*\u2019<\/li>\n<li>find \/usr\/local\/nginx\/html\/ -name \u2018.?*\u2019 -not -name .ht* -or -name \u2018*~\u2019 -or -name \u2018*.bak*\u2019 -or -name \u2018*.old*\u2019<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u901a\u8fc7find\u547d\u4ee4\u7684-delete\u9009\u9879\u6765\u5220\u9664\u8fd9\u4e9b\u6587\u4ef6\u3002<\/p>\n<h3>\u4e8c\u5341\u3001\u9650\u5236Nginx\u8fde\u63a5\u4f20\u51fa<\/h3>\n<p>\u9ed1\u5ba2\u4f1a\u4f7f\u7528\u5de5\u5177\u5982wget\u4e0b\u8f7d\u4f60\u670d\u52a1\u5668\u672c\u5730\u7684\u6587\u4ef6\u3002\u4f7f\u7528Iptables\u4ecenginx\u7528\u6237\u6765\u963b\u6b62\u4f20\u51fa\u8fde\u63a5\u3002ipt_owner\u6a21\u5757\u8bd5\u56fe\u5339\u914d\u672c\u5730\u4ea7\u751f\u7684\u6570\u636e\u5305\u7684\u521b\u5efa\u8005\u3002\u4e0b\u9762\u7684\u4f8b\u5b50\u4e2d\u53ea\u5141\u8bb8user\u7528\u6237\u5728\u5916\u9762\u4f7f\u752880\u8fde\u63a5\u3002<\/p>\n<div>\n<blockquote>\n<ol>\n<li>\/sbin\/iptables -A OUTPUT -o eth0 -m owner \u2013uid-owner vivek -p tcp \u2013dport 80 -m state \u2013state NEW,ESTABLISHED\u00a0 -j ACCEPT<\/li>\n<\/ol>\n<\/blockquote>\n<\/div>\n<p>\u901a\u8fc7\u4ee5\u4e0a\u7684\u914d\u7f6e\uff0c\u4f60\u7684nginx\u670d\u52a1\u5668\u5df2\u7ecf\u975e\u5e38\u5b89\u5168\u4e86\u5e76\u53ef\u4ee5\u53d1\u5e03\u7f51\u9875\u3002\u53ef\u662f\uff0c\u4f60\u8fd8\u5e94\u8be5\u6839\u636e\u4f60\u7f51\u7ad9\u7a0b\u5e8f\u67e5\u627e\u66f4\u591a\u7684\u5b89\u5168\u8bbe\u7f6e\u8d44\u6599\u3002\u4f8b\u5982\uff0cwordpress\u6216\u8005\u7b2c\u4e09\u65b9\u7a0b\u5e8f\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nginx\u662f\u4e00\u4e2a\u8f7b\u91cf\u7ea7\u7684\uff0c\u9ad8\u6027\u80fd\u7684Web\u670d\u52a1\u5668\u4ee5\u53ca\u53cd\u5411\u4ee3\u7406\u548c\u90ae\u7bb1(IMAP\/POP3)\u4ee3\u7406\u670d\u52a1\u5668\u3002\u5b83\u8fd0\u884c\u5728UNIX,GNU \/linux,BSD \u5404\u79cd\u7248\u672c\uff0cMac OS X,Solaris\u548cWindows\u3002\u6839\u636e\u8c03\u67e5\u7edf\u8ba1\uff0c6%\u7684\u7f51\u7ad9\u4f7f\u7528Nginx Web\u670d\u52a1\u5668\u3002Nginx\u662f\u5c11\u6570\u80fd\u5904\u7406C10K\u95ee\u9898\u7684\u670d\u52a1\u5668\u4e4b\u4e00\u3002\u8ddf\u4f20\u7edf\u7684\u670d\u52a1\u5668\u4e0d\u540c\uff0cNginx\u4e0d\u4f9d\u8d56\u7ebf\u7a0b\u6765\u5904\u7406\u8bf7\u6c42\u3002\u76f8\u53cd\uff0c\u5b83\u4f7f\u7528\u4e86\u66f4\u591a\u7684\u53ef\u6269\u5c55\u7684\u4e8b \u4ef6\u9a71\u52a8\uff08\u5f02\u6b65\uff09\u67b6\u6784\u3002Nginx\u4e3a\u4e00\u4e9b\u9ad8\u6d41\u91cf\u7684\u7f51\u7ad9\u63d0\u4f9b\u52a8\u529b\uff0c\u6bd4\u5982WordPress,\u4eba\u4eba\u7f51\uff0c\u817e\u8baf\uff0c\u7f51\u6613\u7b49\u3002\u8fd9\u7bc7\u6587\u7ae0\u4e3b\u8981\u662f\u4ecb\u7ecd\u5982\u4f55\u63d0\u9ad8\u8fd0\u884c\u5728 Linux\u6216UNIX\u7cfb\u7edf\u7684Nginx Web\u670d\u52a1\u5668\u7684\u5b89\u5168\u6027\u3002 \u9ed8\u8ba4\u914d\u7f6e\u6587\u4ef6\u548cNginx\u7aef\u53e3 \/usr\/local\/nginx\/conf\/ \u2013 Nginx\u914d\u7f6e\u6587\u4ef6\u76ee\u5f55\uff0c\/usr\/local\/nginx\/conf\/nginx.conf\u662f\u4e3b\u914d\u7f6e\u6587\u4ef6 \/usr\/local\/nginx\/html\/ \u2013 \u9ed8\u8ba4\u7f51\u7ad9\u6587\u4ef6\u4f4d\u7f6e \/usr\/local\/nginx\/logs\/ \u2013 \u9ed8\u8ba4\u65e5\u5fd7\u6587\u4ef6\u4f4d\u7f6e Nginx [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-59","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=\/wp\/v2\/posts\/59","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=59"}],"version-history":[{"count":0,"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=\/wp\/v2\/posts\/59\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.jsjs.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}