Automate as much as possible
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
		
							
								
								
									
										10
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								README.md
									
									
									
									
									
								
							@@ -6,12 +6,10 @@ These are my NGINX configurations. They are written for Fedora CoreOS's NGINX bu
 | 
			
		||||
 | 
			
		||||
1. Install `nginx`, `nginx-mod-stream`, and `policycoreutils-python-utils` on Fedora. Makesure `rsync` is available on the OS.
 | 
			
		||||
2. Comment out the default server block in `/etc/nginx/nginx.conf`.
 | 
			
		||||
3. Copy all configuration files in `/etc/nginx` except the ones named `/etc/nginx/conf.d/sites_.*` to the corresponding location onto the server.
 | 
			
		||||
4. Run `setup.sh`
 | 
			
		||||
5. Make a dummy vhost listening on port `80` with the server_name you want.
 | 
			
		||||
6. Generate certificates with the example in the certbot directory.
 | 
			
		||||
7. Copy `/etc/nginx/conf.d/sites_default.conf` to `/etc/nginx/conf.d` for https redirection.
 | 
			
		||||
8. Make your actual vhost config based on the `sites_.*` samples in `/etc/nginx/conf.d/sites_default.conf`.
 | 
			
		||||
3. Run `setup.sh`
 | 
			
		||||
4. Make a dummy vhost listening on port `80` with the server_name you want.
 | 
			
		||||
5. Generate certificates with the example in the certbot directory.
 | 
			
		||||
6. Make your actual vhost config based on the `sites_.*` samples in `/etc/nginx/conf.d`.
 | 
			
		||||
 | 
			
		||||
## Notes
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										44
									
								
								setup.sh
									
									
									
									
									
								
							
							
						
						
									
										44
									
								
								setup.sh
									
									
									
									
									
								
							@@ -14,6 +14,13 @@
 | 
			
		||||
# License for the specific language governing permissions and limitations under
 | 
			
		||||
# the License.
 | 
			
		||||
 | 
			
		||||
output(){
 | 
			
		||||
    echo -e '\e[36m'"$1"'\e[0m';
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
unpriv(){
 | 
			
		||||
    sudo -u nobody "$@"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Allow reverse proxy
 | 
			
		||||
sudo setsebool -P httpd_can_network_connect 1
 | 
			
		||||
@@ -30,7 +37,7 @@ sudo firewall-cmd --reload
 | 
			
		||||
# Add 99-nonlocal-bind.conf
 | 
			
		||||
# This fixes a long standing bug where network-online.target is reached before IPv6 is obtained, which breaks IPv6 pinning.
 | 
			
		||||
# Also, if you are using floating IPs for NGINX stream like I do, you need it anyways
 | 
			
		||||
curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/sysctl.d/99-nonlocal-bind.conf | sudo tee /etc/sysctl.d/99-nonlocal-bind.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/sysctl.d/99-nonlocal-bind.conf | sudo tee /etc/sysctl.d/99-nonlocal-bind.conf
 | 
			
		||||
 | 
			
		||||
# Setup webroot for NGINX
 | 
			
		||||
sudo mkdir /srv/nginx
 | 
			
		||||
@@ -41,11 +48,11 @@ sudo mkdir -p /srv/nginx/.well-known/acme-challenge
 | 
			
		||||
 | 
			
		||||
# NGINX hardening
 | 
			
		||||
sudo mkdir -p /etc/systemd/system/nginx.service.d
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx.service.d/local.conf | sudo tee /etc/systemd/system/nginx.service.d/override.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx.service.d/local.conf | sudo tee /etc/systemd/system/nginx.service.d/override.conf
 | 
			
		||||
sudo systemctl daemon-reload
 | 
			
		||||
 | 
			
		||||
# Setup certbot-ocsp-fetcher
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/certbot-ocsp-fetcher | sudo tee /usr/local/bin/certbot-ocsp-fetcher
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/certbot-ocsp-fetcher | sudo tee /usr/local/bin/certbot-ocsp-fetcher
 | 
			
		||||
## Explicitly using /var/usrlocal/bin here because SELinux does not follow symlinks
 | 
			
		||||
sudo semanage fcontext -a -t bin_t /var/usrlocal/bin/certbot-ocsp-fetcher
 | 
			
		||||
sudo restorecon -Rv /var/usrlocal/bin/certbot-ocsp-fetcher
 | 
			
		||||
@@ -53,33 +60,46 @@ sudo mkdir /var/cache/certbot-ocsp-fetcher/
 | 
			
		||||
sudo semanage fcontext -a -t httpd_config_t "/var/cache/certbot-ocsp-fetcher(/.*)?"
 | 
			
		||||
 | 
			
		||||
# Setup nginx-create-session-ticket-keys
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/nginx-create-session-ticket-keys | sudo tee /usr/local/bin/nginx-create-session-ticket-keys
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/nginx-create-session-ticket-keys | sudo tee /usr/local/bin/nginx-create-session-ticket-keys
 | 
			
		||||
## Explicitly using /var/usrlocal/bin here because SELinux does not follow symlinks
 | 
			
		||||
sudo semanage fcontext -a -t bin_t /var/usrlocal/bin/nginx-create-session-ticket-keys
 | 
			
		||||
sudo restorecon /var/usrlocal/bin/nginx-create-session-ticket-keys
 | 
			
		||||
echo 'restorecon -Rv /etc/nginx/session-ticket-keys' | sudo tee -a /usr/local/bin/nginx-create-session-ticket-keys
 | 
			
		||||
 | 
			
		||||
# Setup nginx-rotate-session-ticket-keys
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/nginx-rotate-session-ticket-keys | sudo tee /usr/local/bin/nginx-rotate-session-ticket-keys
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/nginx-rotate-session-ticket-keys | sudo tee /usr/local/bin/nginx-rotate-session-ticket-keys
 | 
			
		||||
## Explicitly using /var/usrlocal/bin here because SELinux does not follow symlinks
 | 
			
		||||
sudo semanage fcontext -a -t bin_t /var/usrlocal/bin/nginx-rotate-session-ticket-keys
 | 
			
		||||
sudo restorecon -Rv /var/usrlocal/bin/nginx-rotate-session-ticket-keys
 | 
			
		||||
sudo sed -i '$i restorecon -Rv /etc/nginx/session-ticket-keys' /var/usrlocal/bin/nginx-rotate-session-ticket-keys
 | 
			
		||||
 | 
			
		||||
# Download the units
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/certbot-ocsp-fetcher.service | sudo tee /etc/systemd/system/certbot-ocsp-fetcher.service
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/certbot-ocsp-fetcher.timer | sudo tee /etc/systemd/system/certbot-ocsp-fetcher.timer
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx-create-session-ticket-keys.service | sudo tee /etc/systemd/system/nginx-create-session-ticket-keys.service
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx-rotate-session-ticket-keys.service | sudo tee /etc/systemd/system/nginx-rotate-session-ticket-keys.service
 | 
			
		||||
curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx-rotate-session-ticket-keys.timer | sudo tee /etc/systemd/system/nginx-rotate-session-ticket-keys.timer
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/certbot-ocsp-fetcher.service | sudo tee /etc/systemd/system/certbot-ocsp-fetcher.service
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/certbot-ocsp-fetcher.timer | sudo tee /etc/systemd/system/certbot-ocsp-fetcher.timer
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx-create-session-ticket-keys.service | sudo tee /etc/systemd/system/nginx-create-session-ticket-keys.service
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx-rotate-session-ticket-keys.service | sudo tee /etc/systemd/system/nginx-rotate-session-ticket-keys.service
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/GrapheneOS/infrastructure/main/systemd/system/nginx-rotate-session-ticket-keys.timer | sudo tee /etc/systemd/system/nginx-rotate-session-ticket-keys.timer
 | 
			
		||||
 | 
			
		||||
# Systemd Hardening
 | 
			
		||||
sudo mkdir -p /etc/systemd/system/nginx.service.d /etc/systemd/system/certbot-renew.service.d
 | 
			
		||||
curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/systemd/system/nginx.service.d/override.conf | sudo tee /etc/systemd/system/nginx.service.d/override.conf
 | 
			
		||||
curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/systemd/system/certbot-renew.service.d/override.conf | sudo tee /etc/systemd/system/certbot-renew.service.d/override.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/systemd/system/nginx.service.d/override.conf | sudo tee /etc/systemd/system/nginx.service.d/override.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/systemd/system/certbot-renew.service.d/override.conf | sudo tee /etc/systemd/system/certbot-renew.service.d/override.conf
 | 
			
		||||
sudo systemctl daemon-reload
 | 
			
		||||
 | 
			
		||||
# Enable the units
 | 
			
		||||
sudo systemctl enable certbot-ocsp-fetcher.timer
 | 
			
		||||
sudo systemctl enable --now nginx-create-session-ticket-keys.service
 | 
			
		||||
sudo systemctl enable --now nginx-rotate-session-ticket-keys.timer
 | 
			
		||||
 | 
			
		||||
# Download NGINX configs
 | 
			
		||||
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/conf.d/http2.conf | sudo tee /etc/nginx/conf.d/http2.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/conf.d/sites_default.conf | sudo tee /etc/nginx/conf.d/sites_default.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/conf.d/tls.conf | sudo tee /etc/nginx/conf.d/tls.conf
 | 
			
		||||
 | 
			
		||||
sudo mkdir -p /etc/nginx/snippets
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/tls.conf | sudo tee /etc/nginx/snippets/tls.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/proxy.conf | sudo tee /etc/nginx/snippets/proxy.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/quic.conf | sudo tee /etc/nginx/snippets/quic.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/security.conf | sudo tee /etc/nginx/snippets/security.conf
 | 
			
		||||
unpriv curl https://raw.githubusercontent.com/TommyTran732/NGINX-Configs/main/etc/nginx/snippets/universal_paths.conf | sudo tee /etc/nginx/snippets/universal_paths.conf
 | 
			
		||||
		Reference in New Issue
	
	Block a user