From 2fac34752f85550dcf7c6bba0a14bb4d68822e69 Mon Sep 17 00:00:00 2001 From: Stetsed <33891782+Stetsed@users.noreply.github.com> Date: Thu, 15 Jul 2021 16:00:16 +0000 Subject: [PATCH] Updated Webserver Reverse Proxy (markdown) --- Webserver-Reverse-Proxy.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/Webserver-Reverse-Proxy.md b/Webserver-Reverse-Proxy.md index 2501094..6405ae4 100644 --- a/Webserver-Reverse-Proxy.md +++ b/Webserver-Reverse-Proxy.md @@ -36,8 +36,6 @@ server { } ``` -For ease of use with NGINX use Certbot, which will manage certificates from Let's encrypt. And automatically renew them. - ### Apache Without SSL: ```apache @@ -76,4 +74,10 @@ Without SSL: subdomain.domain.com { reverse_proxy 127.0.0.1:3001 : } -``` \ No newline at end of file +``` + +### SSL + +It is recommended to use SSL(HTTPS) with your web-server to avoid MiTM attacks when on a public network. If using caddy these certificates will be auto-generated by caddy and will keep them updated. + +If your using Apache or NGINX, it is recommended to use CertBot to manage SSL for free, it uses Let's Encrypt to get it's certificates and keeps them renewed. You can also use your own Certificates and place them as shown above. If using cerbot use the "Without SSL" settings and then run certbot on it and it will automatically configure auto-HTTPS redirection. \ No newline at end of file