HTTPS证书
HTTPS证书基本介绍
为什么需要使用HTTPS,因为HTTP不安全。当我们使用http网站时,经常会遇到包遭到劫持和篡改,如果采用https协议,那么数据在传输过程中是加密的,所以黑客无法窃取或者篡改数据报告信息。https主要解决了什么问题,避免网站传输时信息泄露,避免网站传输时内容不被劫持和篡改。
HTTPS证书购买选择
保护1 个域名www
保护5 个域名www images cdn test m
通配符域名 *.test.com
HTTPS注意事项
Https 不支持续费,证书到期需重新申请新并进行替换.
Https 如果是通配符域名,二级域名和三级域名需要分别购买,如test.m.oldboy.com
Https 显示绿色, 说明整个网站的URL 都是https 的。
Https 显示黄色, 因为网站代码中包含http的不安全连接。
Https 显示红色, 要么证书是假的,要么证书过期
Nginx单台实现HTTPS
1.准备环境
#nginx 必须有ssl 模块
[root@web01 ~]# nginx -V
--with-http_ssl_module
#创建存放ssl 证书的路径
[root@web01 ~]# cd /etc/nginx/ssl_key
[root@web01 /etc/nginx/ssl_key]#
[root@web01 ~]# yum -y install openssl
2.使用openssl命令充当CA权威机构创建证书,生产不使用此方式生成证书,因为不会被互联网认可
[root@web01 ~]# openssl genrsa -idea -out server.key 2048
Generating RSA private key, 2048 bit long modulus
.+++
..........................................................................................................................+++
e is 65537 (0x10001)
Enter pass phrase for server.key:1234546
Verifying - Enter pass phrase for server.key:123456
[root@web01 ~]#
3.生成自签证书,同时去掉私钥的密码
[root@web01 ~]# openssl req -days 36500 -x509 -sha256 -nodes -newkey rsa:2048 -keyout server.key -out server.crt
Generating a 2048 bit RSA private key
...........................................+++
....................+++
writing new private key to 'server.key'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:CN
State or Province Name (full name) []:SZ
Locality Name (eg, city) [Default City]:SZ
Organization Name (eg, company) [Default Company Ltd]:eg
Organizational Unit Name (eg, section) []:SA
Common Name (eg, your name or your server's hostname) []:test
Email Address []:
[root@web01 ~]#
# req -->用于创建新的证书
# new -->表示创建的是新证书
# x509 -->表示定义证书的格式为标准格式
# key -->表示调用的私钥文件信息
# out -->表示输出证书文件信息
# days -->表示证书的有效期
4.证书申请完成后需要了解Nginx如何配置Https
#是否开始ssl 支持
Syntax: ssl on | off;
Default: ssl off;
Context: http, server
#ssl crt 文件存放位置
Syntax: ssl_certificate file;
Default: —
Context: http, server
#ssl key 文件存放位置
Syntax: ssl_certificate_key file;
Default: —
Context: http, server
5.配置Nginx配置Https实例
[root@web01 ~]# mkdir /etc/nginx/ssl_key
[root@web01 ~]# mv server.* /etc/nginx/ssl_key/
[root@web01 ~]# vim /etc/nginx/conf.d/www.conf
server {
listen 443 ssl;
server_name www.test.com;
ssl_certificate ssl_key/server.crt;
ssl_certificate_key ssl_key/server.key;
location / {
root /usr/share/nginx/html;
index index.html index.htm;
}
}
[root@web01 ~]# systemctl restart nginx
[root@web01 ~]# echo "https_test" >/usr/share/nginx/html/index.html
6.浏览器输入https://www.test.com访问,由于该证书非第三方权威机构颁发,而是我们自己签发的,所以浏览器会警告
7.以上配置如果用户忘记在浏览器地址栏输入https://那么将不会跳转至https,建议配置将用户访问http请求强制跳转https
[root@web01 ~]# vim /etc/nginx/conf.d/www.conf
server {
listen 80;
server_name www.test.com;
rewrite ^(.*) https://www.test.com/$1 permanent;
}
server {
listen 443 ssl;
server_name www.test.com;
ssl_certificate ssl_key/server.crt;
ssl_certificate_key ssl_key/server.key;
location / {
root /usr/share/nginx/html;
index index.html index.htm;
}
}
Nginx集群实现HTTPS实践
实战Nginx负载均衡+ Nginx WEB配置HTTPS安全
1.环境准备
主机名 | 外网IP(NAT) | 内网IP(LAN) | 角色 |
---|---|---|---|
LB01 | 为eth0:10.0.0.5 | eth1的:172.16.1.5 | nginx的代理 |
web01 | 为eth0:10.0.0.7 | eth1的:172.16.1.7 | nginx的-web01 |
web02 | 为eth0:10.0.0.8 | eth1的:172.16.1.8 | nginx的-web02 |
web03 | 为eth0:10.0.0.9 | eth1的:172.16.1.9 | nginx的-web03 |
2.配置后端三台web配置相同
[root@web01 ~]# vim /etc/nginx/conf.d/www.conf
server {
listen 80;
server_name www.test.com;
location / {
root /usr/share/nginx/html;
index index.html index.htm;
}
}
#web01
[root@web01 ~]# echo "172.16.1.7 https_test" >/usr/share/nginx/html/index.html
#web02
[root@web02 ~]# echo "172.16.1.8 https_test" >/usr/share/nginx/html/index.html
#web03
[root@web03 ~]# echo "172.16.1.9 https_test" >/usr/share/nginx/html/index.html
3.在代理服务器生成证书(我这里就使用上面web01生成的证书)
[root@web01 ~]# rsync -azvP /etc/nginx/ssl_key 172.16.1.5:/etc/nginx/
4.Nginx负载均衡配置文件如下
[root@lb01 nginx]# vim fastcgi_proxy
proxy_set_header Host $http_host;
proxy_set_header Host $http_host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_connect_timeout 30;
proxy_send_timeout 60;
proxy_read_timeout 60;
proxy_buffering on;
proxy_buffer_size 32k;
proxy_buffers 4 128k;
[root@lb01 nginx]# vim /etc/nginx/conf.d/lb01.conf
upstream web {
server 10.0.1.7:80;
server 10.0.1.8:80;
server 10.0.1.9:80;
}
include fastcgi_proxy;
server {
listen 80;
server_name www.test.com;
rewrite ^(.*) https://www.test.com/$1 permanent;
}
server {
listen 443 ssl;
server_name www.test.com;
ssl_certificate ssl_key/server.crt;
ssl_certificate_key ssl_key/server.key;
location / {
proxy_pass http://web;
}
}
5.进行访问测试
有些动态的网站要支持HTTPS还需要在nginx的配置文件里添加PHP-FastCGI的解析的参数
location ~ \.php$ {
...
fastcgi_param HTTPS on;
...
}