Note | |
---|---|
This feature is only available in the Professional release |
Warning | |
---|---|
This feature is only available on servers running the NginX web server. If your server is using Apache or IIS the button to launch this feature will not be shown. If the server type cannot be detected you will see this feature but you should consult with your host whether it will have any effect and how to use it.. |
One of the most important aspects of managing a web site hosted on an NginX server is being able to fine-tune your site configuration file. This file is responsible for many web server level tweaks, such as enabling the use of search engine friendly (SEF) URLs, blocking access to system files which should not be accessible from the web, redirecting between pages based on custom criteria and even optimising the performance of your site. On the downside, learning how to tweak all those settings is akin to learning a foreign language. The
tool of Admin Tools is designed to help you create the part of such a file used for security and performance optimisation with a user-friendly interface.Tip | |
---|---|
If you ever want to revert to a "safe default", just set all of the options on this page to "Off" and click on "Save and create nginx.conf". This will create a very basic nginx.conf file. |
One very important aspect of NginX is that, unlike Apache, the site configuration file is not magically loaded on every request. When using this feature you will have to do two things:
Make sure NginX can load the nginx.conf
file. Admin Tools writes the (partial) NginX
configuration file nginx.conf
in the root of
your site. By default, NginX won't even know this file is there! You
need to include it in your site's definition file by adding a
directive like this:
include /home/myuser/www/nginx.conf;
The exact path to the file is shown in Admin Tools' NginX Configuration Maker page itself. You only need to do this ONCE.
If your host doesn't allow you to do that they might be giving you a way to add custom NginX configuration variables. In this case use the Preview button in the NginX Configuration Maker page to get the raw NginX configuration commands and give them to your host for inclusion in the NginX configuration.
If you have a choice between these two methods of providing the custom NginX configuration to your server please use the second one. It's harder to manage but it's far more secure. The first method of having your NginX server include a configuration file off the web root is not a good idea as far as security is concerned: a sly attacker could modify that file to their benefit and just wait for the NginX server to restart. Ideally, that first method should only be used on a private test server which is not accessible from the Internet and only for debugging and development purposes.
If your host doesn't allow you to provide custom NginX configuration, sorry, you're out of luck: you will not be able to use this feature of Admin Tools.
Reload or restart your NginX server. Remember that modifying the NginX configuration has NO EFFECT until you reload or restart the NginX server. This is part of what makes NginX so incredibly fast.
FInally, do note that the NginX configuration maker makes the assumption that you've configured PHP to run through FastCGI using the exact method described in NginX's documentation. If you're using a different method to enable PHP on your NginX server the generated configuration may not work on your server or even cause problems accessing your web site.
The top part of the NginX configuration maker page contains the standard toolbar buttons you'd expect:
The NginX Configuration Maker's toolbar
nginx.conf
file. If you already had a
nginx.conf
file on your site, it will be
renamed to nginx.admintools
before the new file
is written to disk.
nginx.conf
file. This
should be used when you have not decided on some options yet, or if
you want to preview the generated nginx.conf
file before writing it to disk.
Reset NginX Maker options will reset all options on the page to the default settings you'd see when first installing Admin Tools. Please note that this is NOT the same as turning off every option! The default settings have several features turned on. Use this button only when you feel you've messed up so bad you don't even know where to begin fixing things.
nginx.conf
file will look
like without writing it to disk. This dialog shows the saved
configuration. If you have modified any settings they will not be
reflected in there until you click either of the save
buttons.
This feature comes in handy in a different way as well. It's
generally a bad idea having your server configuration in the public
web root of your site (the nginx.conf
file).
Instead, you can copy the generated code from the preview and insert
it to your server's configuration. The exact way to do that and
whether it needs some manual editing is host- and server-specific.
If unsure, ask your host. NginX is a developer-friendly web server,
not an end-user-friendly server. Make sure you understand what
you're doing.
The
button takes you back to the Control Panel page.Below the toolbar there are several panes with different options, described below. Before you do that, please read the following paragraphs.
Depending on your web server settings, some of these options may
be incompatible with your site. In this case you will get a blank page
or an Internal Server Error 500 error page when trying to access any
part of your site. If this happens, you have to remove the contents of
nginx.conf
file from your site's root directory
using an FTP application or the File Manager feature of your hosting
control panel OR remove all custom configuration from your NginX site
configuration file (depending on which method you chose). Then you MUST
reload or restart NginX for the changes to take effect.
We strongly suggest that you begin by setting all options to No and then enable them one by one, creating a new configuration (and reloading your NginX server) after you have enabled each one of them. If you bump into a blank or error page you will know that the last option you tried is incompatible with your host. Unfortunately, there is no other way than trial and error to deduce which options may be incompatible with your server.
Basic security
When disabled, your web server might list the files and subdirectories of any directory on your site if there is no index.html file inside it. This can pose a security risk, so you should always enable this option to avoid this from happening.
Many attackers try to exploit vulnerable extensions on your site by tricking them into including malicious code hosted on the attacker's server. Enabling this option will protect your server against this kind of attacks. This works by preventing any URL which references an http:// or https:// URL in the query string. Sometimes these are legitimate requests. For example, some gallery components use them. In this case you are recommended to use the RFIShield (Remote File Inclusion protection) in the Web Application Firewall and turn this NginX Configuration Maker option OFF.
These two files are left behind after any Joomla! installation or upgrade and can be directly accessed from the web. They are used by attackers to tell the Joomla! version you are using, so that they can tailor an attack targeting your specific Joomla! version. Enabling this option will "hide" those files when accessed from the web (a 404 Not Found page is returned), tricking attackers into believing that these files do not exist and making it slightly more difficult for them to deduce information about your site. This option also hides the web.config.txt file included in Joomla! 3 and later for use with the IIS server.
Turning on this option will protect you against clickjacking. It does so by preventing your site's pages to be loaded in a, Frame, IFrame or Object tag unless this comes from a page inside your own site. Please note that if your site relies on its pages being accessible through frames / iframes displayed on other sites (NOT on your site displaying content from other sites, that's irrelevant!) then you should not enable this option. If unsure, enable it.
When enabled, it will block any site access attempt if the remote program sends one of the user agent strings in the User agents to block, one per line option. This feature is designed to protect your site against common bandwidth-hogging download bots and otherwise legitimate tools which are more usually used for hacking sites than their benign intended functionality.
The user agent strings to block from accessing your site. You don't have to enter the whole UA string, just a part of it. The default setting includes several usual suspects.
You can type new entries by clicking at the end of the list, type the entry and press ENTER to accept it. Delete items using the X button next to each entry.
Do note that some server with mod_security or mod_evasive installed will throw an "Access forbidden" message if you try to save the configuration settings when this field contains the word "WGet". If you come across this issue it is not a bug with Admin Tools or Joomla!, it is a server-level protection feature kicking in. Just avoid including the word Wget and you should be out of harm's way.
The following is the default list of user agents to block. It is very thorough and seems to be reducing the number of attacks enormously. If you are upgrading from an earlier version you might want to try it out.
acapbot acoonbot acunetix ahrefs alexibot archiver asterias attackbot awario backdor base64_decode becomebot bin/bash binlar blackwidow blekkobot blex blowfish bolt 0 bot for jce bot mailto:[email protected] bullseye bunnys butterfly c99shell careerbot casper casper cazoodlebot checkpriv checkprivacy cheesebot cherrypick chinaclaw chinaclaw choppy clshttp clshttp cmsworld cmsworldmap comodo copernic copyrightcheck cosmos crescent custo datacha default browser 0 demon diavol diibot disco discobot disconnect dittospyder dotbot dotnetdotcom download demon dumbot ecatch econtext ecxi eirgrabber emailcollector emailsiphon emailwolf eolasbot eval eventures express webpictures extract extractorpro eyenetie feedfinder fhscan flaming flashget flicky foobot fuck g00g1e getright getweb! gigabot go!zilla go-ahead-got go-ahead-got-it gozilla grab grabnet grafula gt::www harvest heritrix hmview http::lite httrack httracks ia_archiver icarus6j id-search id-search.org idbot image stripper image sucker indy library interget internet ninja internetseer.com irlbot isc systems irc search 2.1 jakarta java jetbot jetcar jikespider joc web spider kmccrew larbin leechftp libweb libwww libwww-perl liebaofast linkscan linksmanager.com_bot linkwalker loader lwp-download lwp-trivial majestic mass downloader masscan maxthon$ mechanize mfc_tear_sample microsoft url control microsoft.url midown tool miner missigua locator mister pix mj12bot morfeus moveoverbot msfrontpage navroad nearsite net vampire netants netmechanic netspider netzip newt nicerspro nikto ninja nominet nutch octopus offline explorer offline navigator pagegrabber panscient.com papa foto pavuk pcbrowser pecl::http peoplepal petalbot phpcrawl phpshell planetwork pleasecrawl postrank proximic psbot purebot pycurl queryn queryseeker radian6 radiation realdownload reget remoteview rippers 0 rogerbot sbider scan scooter seamonkey$ seekerspid semalt siclab sindice sistrix sitebot sitecheck.internetseer.com sitecopier siteexplorer sitesnagger skygrid smartdownload snoopy sosospider spankbot spbot sqlmap stackrambler steeler stripper sucker superbot superhttp surfbot surftbot sux0r suzukacz suzuran takeout teleport teleport pro telesoft toata dragostea mea pentru diavola true_robots turingos turnit turnitinbot unserializ uri::fetch urllib vampire vikspider voideye web image collector web sucker webalta webauto webbandit webcollage webcopier webfetch webgo is webleacher webreaper websauger webshell website extractor website quester webstripper webvac webviewer webwhacker webzip wells search ii wep search wget widow winhttp woxbot www-mechanize wwwoffle xaldon xaldon webspider xxxyy yamanalab yioopbot youda zermelo zeus zmeu zune zyborg
Important | |
---|---|
Blocking by User-Agent string IS NOT A SECURITY FEATURE. Any web client – such as a browser, or a bot – can elect to send a misleading User-Agent string, or no User-Agent string. Since the contents of the User-Agent string are controlled by the remote part initiating the request you cannot trust them, which is why blocking by User-Agent cannot possibly be considered a security feature. |
Enabling this option will include a set of options recommended by Joomla! to protect against (obsolete) common exploits which no longer have any effect on Joomla! 2.5 and later. It's still a good idea to enable this option as a means to reduce the number of unnecessary requests to your site.
Enabling this option will allow your site to use SEF (a.k.a. "beautiful") URLs, with or without index.php in them. You are recommended to leave this option turned on unless you have a custom URL forwarding setup already in place.