Hi Teo.

On 2023-10-18 (Mi.) 20:38, Teo Tyrov wrote:
# HG changeset patch
# User Theodoros Tyrovouzis <teoty...@gmail.com <mailto:teoty...@gmail.com>>
# Date 1697653906 -10800
#      Wed Oct 18 21:31:46 2023 +0300
# Node ID 112e223511c087fac000065c7eb99dd88e66b174
# Parent  cdda286c0f1b4b10f30d4eb6a63fefb9b8708ecc
Add "server_identification" http option that hides server information disclosure in responses

In its responses, nginx by default sends a "Server" header which contains "nginx" and the nginx version. Most production systems would want this information hidden, as it is technical information disclosure (https://portswigger.net/web-security/information-disclosure). nginx does provide the option "server_tokens off;" which hides the version, but in order to get rid of the header, nginx needs to be compiled with the headers_more module, for the option "more_clear_headers". This patch provides an http option for hiding that information, which also hides the server information from the default error responses.

An alternative would be to add a new option to server_tokens, e.g. "incognito".

What's wrong with this directive?
http://nginx.org/en/docs/http/ngx_http_core_module.html#server_tokens

[snipp]

Regards
Alex
_______________________________________________
nginx-devel mailing list
nginx-devel@nginx.org
https://mailman.nginx.org/mailman/listinfo/nginx-devel

Reply via email to