How to Hide Nginx Server Version in Linux?


Nginx is a popular open-source web server that is used by many companies and websites to serve their content efficiently. The Nginx server version refers to the version of the software currently being used.

By default, Nginx displays the server version number in its response headers, which can be viewed by anyone with access to a web browser or other network analysis tools. While this information may seem harmless, it can actually pose significant risks to your website's security.

Understanding the Risks Associated with Revealing Nginx Server Version

Exploitation by Hackers

One of the primary risks associated with revealing your Nginx server version is that it makes your website an easier target for hackers. By knowing which version of Nginx you are using, a hacker can research known vulnerabilities and exploits that may work on your specific server. This information can then be used to launch attacks that could potentially compromise your website's security and put sensitive information at risk.

Increased Risk of Cyber Attacks

In addition to making your website an easier target for hackers, revealing your Nginx server version also increases the risk of cyber attacks in general. By advertising the exact software you are running, you make it easy for attackers to plan targeted attacks against known vulnerabilities or weaknesses in that specific software. This can lead to a higher likelihood of successful attacks and more severe consequences if those attacks are successful.

Legal and Compliance Issues

Depending on the industry you operate in, there may be legal or compliance issues associated with exposing your Nginx server version. For example, if you operate in a regulated industry such as healthcare or finance, you may be required by law to take certain steps to protect sensitive data from unauthorized access.

Failing to adequately secure your webserver could result in costly fines or legal action. Additionally, failing to comply with certain regulations could damage your reputation and harm customer trust in your organization.

Methods to Hide Nginx Server Version in Linux

Editing the Configuration File

One of the ways to hide Nginx server version is by editing the configuration file. The configuration file is used to configure and control Nginx's behavior.

It holds all the necessary information that Nginx requires for its operation such as server names, IP addresses, virtual hosts, and SSL certificates. To edit the configuration file, you need to open it using a text editor.

The default location of this file is /etc/nginx/nginx.conf. Once you have opened it, search for the line that contains server_tokens and change its value from on to off.

This line is responsible for displaying server version information on error pages and response headers. After making changes to the configuration file, save it and exit your text editor.

Then verify your changes by running sudo nginx -t command in your terminal. If no errors are shown up then restart nginx service by using sudo systemctl restart nginx command.

Using a Third-Party Module

Another way to hide Nginx server version is through third-party modules specifically designed for this purpose. One such module is called 'headers-more' which allows removal or modification of HTTP response headers sent by Nginx. The first step in using this module involves downloading it from trusted sources such as GitHub or official Nginx website and installing it on your system.

Once installed, add a new directive called more_set_headers in your configuration file followed by "Server:" header with an empty string value i.e., more_set_headers 'Server: '; This directive replaces any existing Server header with an empty one which effectively masks the server version being used. After adding this directive save changes made in configuration file and restart nginx service by using sudo systemctl restart nginx command.

Using a third-party module ensures that you don’t screw up the core functionality of the web server. Keep in mind that, while it's a viable option, it's essential to choose modules from trusted sources to avoid any potential security risks.

Additional Security Measures to Protect Your WebserverDisabling Directory Listing

Directory listing is a vulnerability that allows attackers to browse through directories and files on your web server. If directory listing is enabled, it means that anyone can access any file on your web server simply by typing in the URL. This can be dangerous as sensitive files like configuration files or password databases can be accessed by malicious actors.

Therefore, it's essential to disable directory listing to prevent unauthorized access. To disable directory listing in Nginx, you need to add the following line of code in your configuration file −

autoindex off; 

This will prevent anyone from accessing the contents of a directory without a specific file name. However, if you want to enable directory listings for specific directories, you'll need to add the following line instead −

autoindex on;  

Enabling HTTPS Encryption

HTTPS encryption is an essential part of securing your web server. Encryption ensures that data sent between clients and servers cannot be intercepted by hackers or cybercriminals. When users visit your website over HTTP, their connection is unencrypted and vulnerable to eavesdropping or snooping.

To enable HTTPS encryption in Nginx, you need an SSL/TLS certificate issued by a trusted certificate authority (CA). Once you have a valid certificate installed on your server, follow these steps −

  • Edit the Nginx configuration file and add the following lines −

listen 443 ssl; 
ssl_certificate /path/to/certificate.crt; 
ssl_certificate_key /path/to/private.key; 
  • Restart Nginx −

sudo service nginx restart

By enabling HTTPS encryption on your website, you're ensuring that all data exchanged between your web server and users' browsers is secure and private.

Limiting Access

Limiting access to your web server can help prevent unauthorized access and reduce the risk of cyber attacks. There are several ways to limit access, including −

  • Using IP Whitelisting: This involves allowing only certain IP addresses or ranges to access your website. You can block all other IPs by adding the following line to your Nginx configuration file −

deny all; 
  • Password-Protecting Directories: Password protection requires users to enter a username and password before accessing specific directories on your web server. To password-protect a directory, you need to create an .htpasswd file and add the following code in your configuration file −

auth_basic "Restricted Content"; 
auth_basic_user_file /path/to/.htpasswd; 

By limiting access to your web server, you're reducing the risk of cyber attacks and ensuring that only authorized users have access to sensitive information.


In this article, we have discussed the importance of hiding Nginx server version in Linux to prevent potential cyber attacks and stay compliant with legal regulations. We have also explored different methods to hide Nginx server version, such as editing the configuration file and using a third-party module. Additionally, we have highlighted additional security measures to protect your webserver.

Hiding Nginx server version can significantly reduce the risk of cyber attacks by making it difficult for hackers to identify vulnerabilities in your system. Revealing server version information may provide essential clues that could help attackers exploit known vulnerabilities in the system.

By hiding this information, you can make it harder for attackers to understand how your webserver operates, giving you a greater chance of keeping your system secure. Furthermore, complying with legal regulations is crucial for businesses that handle sensitive data such as personal or payment information.

Updated on: 07-Jun-2023

1K+ Views

Kickstart Your Career

Get certified by completing the course

Get Started