如何代理http_x_ssl_client_s_dn标题?

sup*_*igo 6 proxy nginx

我想通过nginx代理请求标头'HTTP_X_SSL_CLIENT_S_DN'.

这是我们的服务器网络结构.

[front server:443] <---> [nginx proxy:8004] <---> [application server:8008]
(client cert auth)
Run Code Online (Sandbox Code Playgroud)

当我尝试两台服务器([前端服务器]和[应用服务器])时,它运行正常.标题"HTTP_X_SSL_CLIENT_S_DN"已传递给应用程序服务器.

然后添加服务器[nginx proxy],标题'HTTP_X_SSL_CLIENT_S_DN'未传递给应用程序服务器.

我的nginx配置如下.

server {
    listen   8004;
    index index.html;

    location / {
        proxy_pass_header Server;
        proxy_pass_header X-Scheme;
        proxy_set_header Host $http_host;
        proxy_set_header X-Real-IP $remote_addr;
        proxy_pass http://app-server/;

# TODO: to proxy 'HTTP_X_SSL_CLIENT_S_DN'
# failed settings
#        proxy_pass_request_headers on; # not worked (default: on)
#        proxy_pass_header X-SSL-Client-S-DN; # none
#        proxy_pass_header X_SSL_CLIENT_S_DN; # none
#        proxy_pass_header HTTP_X_SSL_CLIENT_S_DN; # none
#        proxy_pass_header HTTP-X-SSL-CLIENT-S-DN; # none
#        proxy_set_header X-SSL-Client-S-DN $ssl_client_s_dn; # none
#        proxy_set_header X_SSL_Client_S_DN $x_ssl_client_s_dn; # none
#        proxy_set_header X-SSL-Client-S-DN $http_ssl_client_s_dn; # none
#        proxy_set_header X-SSL-Client-S-DN $http_x_ssl_client_s_dn; # none
    }
}

upstream app-server {
    server 127.0.0.1:8008;
}
Run Code Online (Sandbox Code Playgroud)

任何帮助申请.

Jon*_* M. 6

首先,请确保已配置nginx.conf来验证客户端证书!我有完全相同的问题你描述.

server {
  # ...
  ssl_client_certificate /srv/ssl/self.crt;
  ssl_verify_depth     1;
  ssl_verify_client    on;
  # ...
  location @app { # I'm using nginx+unicorn, don't blindly copy this!  :)
    # ...
    proxy_set_header X-SSL-Client-Serial $ssl_client_serial;
    proxy_set_header X-SSL-Client-Verify $ssl_client_verify;
    proxy_set_header X-SSL-Client-S-DN   $ssl_client_s_dn;
    # ...
}
Run Code Online (Sandbox Code Playgroud)

要对此进行测试,您需要一个单独的客户端密钥和使用根授权证书签名的证书.客户端凭据以"me"开头,我的根权限凭据在以下命令中以"self"开头.

  1. 为客户端生成私钥.

    openssl genrsa -out me.key 1024
    
    Run Code Online (Sandbox Code Playgroud)
  2. 请求自我CA签名.

    openssl req -new -key me.key -out me.csr
    
    Run Code Online (Sandbox Code Playgroud)
  3. 使用自CA对请求进行签名以创建证书.

    openssl x509 -req -days 365 -in me.csr -CA self.crt -CAkey self.key -set_serial 01 -out me.crt
    
    Run Code Online (Sandbox Code Playgroud)
  4. 试试你的新钥匙.

    curl -v -s -k --key me.key --cert me.crt https://fort-awesome-o
    
    Run Code Online (Sandbox Code Playgroud)
  5. 额外信用:生成可导入浏览器的证书.

    openssl pkcs12 -export -in me.crt -inkey me.key -certfile self.crt -out me.p12
    
    Run Code Online (Sandbox Code Playgroud)

我有一个简单的Sinatra Web应用程序转储HTTP环境,我看到以下内容:

"HTTP_X_SSL_CLIENT_SERIAL"=>"01","HTTP_X_SSL_CLIENT_VERIFY"=>"SUCCESS","HTTP_X_SSL_CLIENT_S_DN"=>"/ C = US/ST = Maryland/L = Annapolis/O = Fort Kickass/CN = Jonathan Morton/emailAddress = jon @ jonmorton.com"


eli*_*lim 2

我在 nginx 上遇到了同样的问题,因为代理X_REQUESTED_WITH从请求中删除了该字段。默认情况下,nginx 将带有下划线的标头标记为无效并忽略无效标头。

您可以使用 nginx 指令来允许标头中使用下划线underscores_in_headers on;,或者不忽略标头中的无效标头ignore_invalid_headers off;

在我的具体案例中,我使用 python requests 作为客户端,django 作为服务器,nginx 作为代理,并解决了我重命名X_REQUESTED_WITHX-REQUESTED-WITH. 'HTTP_'(在使标头在 中可用之前,Django 会自动添加到 x-标头名称的开头request.META.

import requests
headers = {'X-REQUESTED-WITH':'XMLHttpRequest'}
r = requests.post(url, data=payload, headers=headers)
Run Code Online (Sandbox Code Playgroud)