Web Server (with Nginx)

WARNING: This page currently uses a single (sub)domain across all services. But this is not necessarily secure, and I will revert to using separate sites.

A web server allows us to securely host web applications over the internet, or on the local LAN.

We can use Nginx to serve other applications that we have set up using TLS encryption over the local network and/or over the internet on our domain. In addition, we can set up basic username/password authentication for any web services without authentication (e.g. System Monitoring (Netdata)).

(Alternatives might include: Apache, Lighttpd, or Caddy.)

Install

Changes to Nginx config can be checked with sudo nginx -T

  • [ ] TODO: Ciphers suitable for RPi
pacmatic -S --needed nginx-mainline
openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048 creates=/etc/ssl/certs/dhparam.pem
mkdir /etc/nginx/sites-available
mkdir /etc/nginx/sites-enabled

We generate fresh Diffie-Hellman parameters. This is an important security step, though it takes a while.

Normally we would suggest 4096-bit, but the Raspberry Pi is a little underpowered :) It takes fooorrrreevverrr just to generate the 2048-bit file.

Configuration

Edit /etc/nginx/nginx.conf

worker_processes  1;  

events {
    worker_connections  1024;
}

http {
    include       mime.types;
    default_type  application/octet-stream;

    sendfile        on;
    tcp_nopush      on;
    tcp_nodelay     on;

    keepalive_timeout  65;

    include /etc/nginx/conf.d/*.conf;
    include /etc/nginx/sites-enabled/*.conf;
}

This allows us to configure each application as its own component.

For example /etc/nginx/sites-available/http.conf:

server {
    listen [::]:80 ipv6only=off;

    # Nginx stats server
    location = /nginx_status {
        stub_status on;
        allow 127.0.0.1;
        deny all;
    }

    # Redirect all other HTTP -> HTTPS
    location / {
        return 301 https://$host$request_uri;
    }
}

Enabled with:

cd /etc/nginx/sites-enabled
ln -s ../sites-available/http.conf

We have configured access on the LAN 192.168.1.1/24, which may need to be altered for your subnet. If you have IPv6 addresses, you will need to figure out the subnet for it, e.g. allow fdaa:bbcc:ddee:0::/48;. You can list your ip addresses with ip addr list. (For IPv6 you could use fd00::/8 which is all of the private (LAN) addresses/subnets/networks. All. Of. Them.)

listen [::]:443 ssl http2 ipv6only=off;
allow 192.168.1.0/24;
allow fdaa:bbcc:ddee:0::/48;
deny all;

We will add a couple of useful configuration helpers inside /etc/nginx/conf.d/

# tls.conf
# Configure TLS security (requires setting parameters in server blocks to activate)

# USAGE:
# You must generate a dhparam.pem file.
# You must set ssl_certificate, ssl_certificate_key, and ssl_trusted_certificate.
# You must NOT use add_header inside your server {} block at all.

# 1MB = 4000 sessions
ssl_session_cache shared:SSL:1M;
ssl_session_timeout 1d;
ssl_session_tickets off;  # Session Tickets are a privacy leak

# Secure SSL config - https://mozilla.github.io/server-side-tls/ssl-config-generator/
ssl_protocols TLSv1.2 TLSv1.3;
ssl_dhparam /etc/ssl/certs/dhparam.pem;  # Must generate this manually
ssl_ciphers ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256;
ssl_prefer_server_ciphers on;

# SSL OSCP Stapling (not applicable to self-signed certs)
# ssl_stapling on;
# ssl_stapling_verify on;
# resolver 8.8.8.8 8.8.4.4;  # Non-blocking resolver

# Force SSL to this domain (+subdomains) for 6 months (+ preload list)
add_header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload" always;
# security_headers.conf
# Ensure HTTP headers that are important for security are set.
# We set some defaults which can be overridden by the upstream server.

# USAGE:
# You must use proxy_hide_header/uwsgi_hide_header to hide the upstream
#   headers for all headers that we list below.
# You must NOT use add_header inside your server {} block at all.

map $upstream_http_referrer_policy $referrer_policy {
    default $upstream_http_referrer_policy;
    '' "strict-origin-when-cross-origin";
}

map $upstream_http_x_content_type_options $x_content_type_options {
    default $upstream_http_x_content_type_options;
    '' "nosniff";
}

map $upstream_http_x_frame_options $x_frame_options {
    default $upstream_http_x_frame_options;
    '' "DENY";
}

map $upstream_http_x_xss_protection $x_xss_protection {
    default $upstream_http_x_xss_protection;
    '' "1; mode=block";
}

add_header Referrer-Policy $referrer_policy always;
add_header X-Content-Type-Options $x_content_type_options always;
add_header X-Frame-Options $x_frame_options always;
add_header X-XSS-Protection $x_xss_protection always;

Passwords

We will set up a username/passwords for services that don't manage it themselves. We will create the admin username/password

sudo mkdir /etc/nginx/auth
sudo chown root:http /etc/nginx/auth
sudo chmod 0750 /etc/nginx/auth

echo "admin:"(openssl passwd -apr1) | sudo tee --append /etc/nginx/auth/admin > /dev/null
sudo chown root:http /etc/nginx/auth/admin
sudo chmod 0640 /etc/nginx/auth/admin

LAN-specific Configuration

LAN applications will be served at piserver.local. TLS encryption will be done with self-signed certificate which must be installed on your devices.

openssl req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout /etc/ssl/private/nginx-selfsigned.key -out /etc/ssl/certs/nginx-selfsigned.crt -subj /CN=piserver.local -addext subjectAltName=DNS:piserver.local,DNS:*.piserver.local,IP:192.168.1.5

We create a /etc/nginx/conf.d/self-signed-cert.conf

ssl_certificate /etc/ssl/certs/nginx-selfsigned.crt;
ssl_certificate_key /etc/ssl/private/nginx-selfsigned.key;

Install the crt on your devices...

  • [ ] Appendix this - Linux:
scp piserver.local:/etc/ssl/certs/nginx-selfsigned.crt ~
sudo chown root:root nginx-selfsigned.crt
sudo chmod 644 nginx-selfsigned.crt
sudo mv nginx-selfsigned.crt /usr/share/ca-certificates/trust-source/anchors/piserver-selfsigned.crt

# Arch Linux
sudo trust extract-compat

# Ubuntu
sudo update-ca-certificates

Internet-specific Configuration

WWW applications will be served at <DOMAIN>. TLS encryption will be done using Letsencrypt which provides free certificates.

Backup

    /etc/tmpfiles.d/ \
    /etc/nginx/nginx.conf \
    /etc/nginx/auth/ \
    /etc/nginx/conf.d/ \
    /etc/nginx/sites-available/ \
    /etc/nginx/sites-enabled/ \
    /etc/ssl/private/nginx-selfsigned.key \
    /etc/ssl/certs/nginx-selfsigned.crt \

Restore

Reinstall Nginx section - dhparam, certifications.

Gzip files for each application again.

Applications

Netdata

We configured Netdata to listen on localhost:19999 but it would be useful for it to be accessible over the LAN on piserver.local/netdata. It does not have any authentication built-in, so we will set up HTTP basic authentication via Nginx.

We configure netdata to listen on a secure Unix socket only accessible to Nginx via the http group by modifying /etc/netdata/netdata.conf

[web]
    bind to = unix:/run/netdata-http/netdata.sock

Modify the systemd service to allow Nginx to read the file and also for netdata to write to the file, sudoedit /etc/tmpfiles.d/netdata.conf

# Type  Path                    Mode UID     GID     Age     Argument
d       /run/netdata-http       0750 netdata http    -       -

These temporary files are normally created on boot, but we will manually refresh with sudo systemd-tmpfiles --create

[Service]
# Netdata could take a second to create the socket
ExecStartPost=/usr/bin/sleep 1
ExecStartPost=/usr/bin/chmod 0660 /run/netdata-http/netdata.sock
ExecStartPost=/usr/bin/chown :http /run/netdata-http/netdata.sock

We previously configured an admin username/password, which we will re-use here.

We configure /etc/nginx/locations-available/netdata.conf

# netdata.conf

location /netdata/api/ {
    auth_basic "netdata";
    auth_basic_user_file auth/admin;

    proxy_pass http://unix:///run/netdata-http/netdata.sock:/api/;
    proxy_http_version 1.1;

    proxy_set_header Host $host;
    proxy_set_header X-Real-IP $remote_addr;
    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
    proxy_set_header X-Forwarded-Host $server_name;
    proxy_set_header X-Forwarded-Proto $scheme;
    proxy_set_header X-Forwarded-Port $server_port;
    # Correct handling of fallbacks for security headers
    proxy_hide_header Referrer-Policy;
    proxy_hide_header X-Content-Type-Options;
    proxy_hide_header X-Frame-Options;
    proxy_hide_header X-XSS-Protection;
}

location /netdata/ {
    auth_basic "netdata";
    auth_basic_user_file "auth/admin";

    alias /usr/share/netdata/web/;
    disable_symlinks if_not_owner;  # Extra-security
    gzip_static on;

    access_log off;
    open_file_cache         max=100;
    open_file_cache_errors  on;
}

The trailing : separates the path of the unix socket. The trailing slash in proxy_pass effectively removes our /netdata/ sub-path from the URL that we send to netdata.

Start and optimise:

sudo ln -s /etc/nginx/locations-available/netdata.conf /etc/nginx/locations-enabled-lan/
sudo systemctl reload nginx
cd /usr/share/netdata/web
sudo find -L . -type f ! -iname "*.gz" ! -iname "*.png" ! -iname "*.jpg" ! -iname "*.jpeg" ! -iname "*.gif" ! -iname "*.webp" ! -iname "*.heif" -exec gzip --best -kf "{}" \;

Transmission

We configured Transmission to run a web socket to /run/transmission.sock

# transmission.conf

location ~ ^/transmission/web/(style|images|javascript)/ {
    root /usr/share/;
    disable_symlinks if_not_owner;  # Extra-security
    gzip_static on;

    access_log off;
    open_file_cache         max=100;
    open_file_cache_errors  on;
}

location ~* ^/transmission/?$ {
    return 301 https://$server_name/transmission/web/;
}

location ~ ^/transmission/ {
    proxy_pass http:///unix:/run/transmission.sock;
    proxy_redirect http://127.0.0.1:9091 https://piserver.local;
    proxy_read_timeout 60;
    proxy_http_version 1.1;

    proxy_set_header Host $host;
    proxy_set_header X-Real-IP $remote_addr;
    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
    proxy_set_header X-Forwarded-Host $server_name;
    proxy_set_header X-Forwarded-Proto $scheme;
    proxy_set_header X-Forwarded-Port $server_port;
    # Correct handling of fallbacks for HTTP headers
    proxy_hide_header Referrer-Policy;
    proxy_hide_header X-Content-Type-Options;
    proxy_hide_header X-Frame-Options;
    proxy_hide_header X-XSS-Protection;
}

Start & Optimise:

ln -s /etc/nginx/locations-available/transmission.conf /etc/nginx/locations-enabled-lan/
sudo find -L . -type f ! -iname "*.gz" ! -iname "*.png" ! -iname "*.jpg" ! -iname "*.jpeg" ! -iname "*.gif" ! -iname "*.webp" ! -iname "*.heif" -exec gzip --best -kf "{}" \;

results matching ""

    No results matching ""