diff --git a/hosts/cloud/default.nix b/hosts/cloud/default.nix index 78ebe7a..c848297 100644 --- a/hosts/cloud/default.nix +++ b/hosts/cloud/default.nix @@ -4,6 +4,7 @@ ./configuration.nix ./hardware-configuration.nix ./networking.nix + ./proxy ./secrets.nix ]; } diff --git a/hosts/cloud/proxy/default.nix b/hosts/cloud/proxy/default.nix new file mode 100644 index 0000000..6d58845 --- /dev/null +++ b/hosts/cloud/proxy/default.nix @@ -0,0 +1,58 @@ +{ config, ... }: +{ + imports = [ + ./proxy.nix + ]; + + networking.firewall.allowedTCPPorts = [ 80 443 ]; + + services.nginx = { + enable = true; + + recommendedGzipSettings = true; + recommendedOptimisation = true; + recommendedProxySettings = true; + recommendedTlsSettings = true; + + sslCiphers = "AES256+EECDH:AES256+EDH:!aNULL"; + + appendHttpConfig = '' + # Add HSTS header with preloading to HTTPS requests. + # Adding this header to HTTP requests is discouraged + map $scheme $hsts_header { + https "max-age=31536000; includeSubdomains; preload"; + } + add_header Strict-Transport-Security $hsts_header; + + # Enable CSP for your services. + add_header Content-Security-Policy "script-src 'self'; object-src 'none'; base-uri 'none';" always; + + # Minimize information leaked to other domains + add_header 'Referrer-Policy' 'origin-when-cross-origin'; + + # Disable embedding as a frame + add_header X-Frame-Options DENY; + + # Prevent injection of code in other mime types (XSS Attacks) + add_header X-Content-Type-Options nosniff; + ''; + # default vhost + virtualHosts."oxapentane.com" = { + forceSSL = true; + enableACME = true; + # default = true; + locations."/" = { + return = "200 '