2.5.1 Ensure server_tokens directive is set to 'off'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The 'server_tokens' directive is responsible for displaying the NGINX version number and operating system version on error pages and in the 'Server' HTTP response header field. This information should not be displayed.

Rationale:

Attackers can conduct reconnaissance on a website using these response headers, then target attacks for specific known vulnerabilities associated with the underlying technologies. Hiding the version will slow down and deter some potential attackers.

Solution

To disable the 'server_tokens' directive, set it to 'off' inside a server block in your nginx.conf:

server {
...
server_tokens off;
...
}

See Also

https://workbench.cisecurity.org/files/2275