minor presentational fixes
This commit is contained in:
parent
f0b3fd25ce
commit
654f1aa49c
|
@ -2,7 +2,7 @@
|
|||
# | Default behavior for unknown hosts |
|
||||
# ----------------------------------------------------------------------
|
||||
#
|
||||
# Drop requests for unknown hosts
|
||||
# Drop requests for unknown hosts.
|
||||
#
|
||||
# If no default server is defined, Nginx will use the first found server.
|
||||
# To prevent host header attacks, or other potential problems when an unknown
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
# | Default behavior for unknown hosts |
|
||||
# ----------------------------------------------------------------------
|
||||
#
|
||||
# Drop requests for unknown hosts
|
||||
# Drop requests for unknown hosts.
|
||||
#
|
||||
# If no default server is defined, Nginx will use the first found server.
|
||||
# To prevent host header attacks, or other potential problems when an unknown
|
||||
|
|
|
@ -5,7 +5,7 @@
|
|||
# Mitigate the risk of cross-site scripting and other content-injection
|
||||
# attacks.
|
||||
#
|
||||
# This can be done by setting a `Content Security Policy` which whitelists
|
||||
# This can be done by setting a Content Security Policy which permits
|
||||
# trusted sources of content for your website.
|
||||
#
|
||||
# There is no policy that fits all websites, you will have to modify the
|
||||
|
|
|
@ -8,9 +8,9 @@
|
|||
# web browsers.
|
||||
#
|
||||
# The filter is usually enabled by default, but in some cases, it may be
|
||||
# disabled by the user. However, in Internet Explorer, for example, it can be
|
||||
# re-enabled just by sending the `X-XSS-Protection` header with the value
|
||||
# of `1`.
|
||||
# disabled by the user. However, in Internet Explorer, for example, it can
|
||||
# be re-enabled just by sending the `X-XSS-Protection` header with the
|
||||
# value of `1`.
|
||||
#
|
||||
# (2) Prevent web browsers from rendering the web page if a potential reflected
|
||||
# (a.k.a non-persistent) XSS attack is detected by the filter.
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
# users of IE 8 and below on WinXP can see your main site without SSL errors.
|
||||
#
|
||||
# (1) Certificate and key files location
|
||||
# The certificate file can contain intermediate certificate.
|
||||
# The certificate file can contain an intermediate certificate.
|
||||
#
|
||||
# https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_certificate
|
||||
#
|
||||
|
@ -17,7 +17,7 @@
|
|||
#
|
||||
# https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_trusted_certificate
|
||||
#
|
||||
# (3) CA certificate file location for client certificate authentication
|
||||
# (3) CA certificate file location for client certificate authentication.
|
||||
#
|
||||
# https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_client_certificate
|
||||
|
||||
|
|
|
@ -8,7 +8,7 @@
|
|||
# (!) To make this part relevant, you need to generate encoded files by your
|
||||
# own. Enabling this part will not auto-generate brotlied files.
|
||||
#
|
||||
# Note that some clients (eg. browsers) require a secure connection to request
|
||||
# Note that some clients (e.g. browsers) require a secure connection to request
|
||||
# brotli-compressed resources.
|
||||
# https://www.chromestatus.com/feature/5420797577396224
|
||||
#
|
||||
|
|
Loading…
Reference in New Issue