From cec5c428f561e5e6b9c399431721276b71b18e8e Mon Sep 17 00:00:00 2001 From: Mike Tzou Date: Sat, 25 Jan 2020 11:20:01 +0800 Subject: [PATCH] Remove tampering of Host header (usually unnecessary) and minor cleanups --- ...'s-Encrypt-certificates-and-NGINX-SSL-reverse-proxy.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/Linux-WebUI-HTTPS-with-Let's-Encrypt-certificates-and-NGINX-SSL-reverse-proxy.md b/Linux-WebUI-HTTPS-with-Let's-Encrypt-certificates-and-NGINX-SSL-reverse-proxy.md index 68ab32a..c32dad1 100644 --- a/Linux-WebUI-HTTPS-with-Let's-Encrypt-certificates-and-NGINX-SSL-reverse-proxy.md +++ b/Linux-WebUI-HTTPS-with-Let's-Encrypt-certificates-and-NGINX-SSL-reverse-proxy.md @@ -133,7 +133,7 @@ server { # but only if using qBittorrent's HTTPS functionality. # For this use case, where qBittorrent itself is using HTTP, # set this flag by overriding it in the proxy configuration it itself: - # proxy_cookie_path / "/; Secure"; + #proxy_cookie_path / "/; Secure"; } # OPTIONAL: serve static HTML files at the root of the domain, like a simple homepage @@ -146,10 +146,10 @@ server { #location /other_webapp { # change the location and port to the location and port the application is actually listening on #proxy_pass http://localhost:8080/; - #proxy_set_header Host $host; - #proxy_set_header X-Real-IP $remote_addr; - #proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; #proxy_set_header X-Forwarded-Proto $scheme; + #proxy_set_header X-Forwarded-Host $http_host; + #proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + #proxy_set_header X-Real-IP $remote_addr; #} } ```