I’m using Varnish and I’m not quite sure if I should also remove the
server: nginx HTTP header. Why do someone needs to know that I’m using NGINX? Is it ok to remove this HTTP header from the response or is it needed somewhere? From a security perspective it’s probably better to do so?
RFC 7231 says about the Server header:
An origin server MAY generate a Server field in its responses.
MAY is interpreted as in RFC 2119:
- MAY This word, or the adjective “OPTIONAL”, mean that an item is
truly optional. One vendor may choose to include the item because a
particular marketplace requires it or because the vendor feels that
it enhances the product while another vendor may omit the same item.
An implementation which does not include a particular option MUST be
prepared to interoperate with another implementation which does
include the option, though perhaps with reduced functionality. In the
same vein an implementation which does include a particular option
MUST be prepared to interoperate with another implementation which
does not include the option (except, of course, for the feature the
It is therefore perfectly fine to restrict or remove the Server response header. Of course it’s a good idea to be aware of what you might be giving up by doing so. For that, go back to RFC 7231:
The “Server” header field contains information about the software
used by the origin server to handle the request, which is often used
by clients to help identify the scope of reported interoperability
problems, to work around or tailor requests to avoid particular
server limitations, and for analytics regarding server or operating
system use. An origin server MAY generate a Server field in its
Server = product *( RWS ( product / comment ) )
The Server field-value consists of one or more product identifiers,
each followed by zero or more comments (Section 3.2 of [RFC7230]),
which together identify the origin server software and its
significant subproducts. By convention, the product identifiers are
listed in decreasing order of their significance for identifying the
origin server software. Each product identifier consists of a name
and optional version, as defined in Section 5.5.3.
Server: CERN/3.0 libwww/2.17
An origin server SHOULD NOT generate a Server field containing
needlessly fine-grained detail and SHOULD limit the addition of
subproducts by third parties. Overly long and detailed Server field
values increase response latency and potentially reveal internal
implementation details that might make it (slightly) easier for
attackers to find and exploit known security holes.
Though in practice, attackers don’t really check the Server: header. They just try every security exploit they know of, whether your server gives any indication of being vulnerable or not. Removing the Server: header is a security by obscurity action, and an almost entirely ineffective one. But if it makes you feel better, or you’re being told to do it by your boss or an auditor, go for it. Just don’t expect it to result in any significant improvement to your security posture.
nmap can identify a web server with fairly good accuracy even when it’s configured to not send a
Server header at all, or when the header content is completely bogus. Try it yourself with
nmap -sV -P0 -p 80,443 <IP address>.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.