注意事项
前面我们生成的根证书是ca.crt,在双向认证时,我使用的是ca.pem,所以需要更改一下证书的类型。
只需将1.4的生成ca.crt的命令改为ca.pem即可
4 修改根证书生成命令
4.1.1 生成ca秘钥,得到ca.key【命令与1.2完全一致】
openssl genrsa -out ca.key 4096
4.1.2 生成ca证书签发请求,得到ca.csr【命令与1.3完全一致】
openssl req -new -sha256 -out ca.csr -key ca.key -config ca.conf
4.1.3 生成ca根证书,得到ca.pem的命令:
openssl x509 -req -days 3650 -in ca.csr -signkey ca.key -out ca.pem
4.2 修改服务端证书生成命令
4.2.1 生成秘钥,得到server.key【命令与2.2完全一致】
openssl genrsa -out server.key 2048
4.2.2 生成证书签发请求,得到server.csr【命令与2.3完全一致】
openssl req -new -sha256 -out server.csr -key server.key -config server.conf
4.2.3 用CA证书生成服务端证书,得到server.pem
openssl x509 -req -days 3650 -CA ca.pem -CAkey ca.key -CAcreateserial -in server.csr -out server.pem -extensions req_ext -extfile server.conf
4.3 在证书存放文件夹下,新建client.conf,写入内容如下:
[ req ]
default_bits = 2048
distinguished_name = req_distinguished_name
req_extensions = req_ext
[ req_distinguished_name ]
countryName = Country Name (2 letter code)
countryName_default = CN
stateOrProvinceName = State or Province Name (full name)
stateOrProvinceName_default = BeiJing
localityName = Locality Name (eg, city)
localityName_default = BeiJing
organizationName = Organization Name (eg, company)
organizationName_default = ChaoYang
commonName = Common Name (e.g. server FQDN or YOUR name)
commonName_max = 64
commonName_default = ChaoYang
[ req_ext ]
subjectAltName = @alt_names
[alt_names]
DNS.1 = localhost
DNS.2 = ChaoYang.info
DNS.3 = www.ChaoYang.info
IP = 127.0.0.1
4.4 生成秘钥,得到client.key
openssl ecparam -genkey -name secp384r1 -out client.key
4.5 生成证书签发请求,得到client.csr
openssl req -new -sha256 -out client.csr -key client.key -config client.conf
4.6 用CA证书生成客户端证书,得到client.pem
openssl x509 -req -days 3650 -CA ca.pem -CAkey ca.key -CAcreateserial -in client.csr -out client.pem -extensions req_ext -extfile client.conf
server
package main
import (
"crypto/tls"
"crypto/x509"
"fmt"
"golang.org/x/net/context"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/grpclog"
"net"
"os"
"rpc-demo/pb/pb"
)
const (
Address = "127.0.0.1:50052"
)
type HelloService struct {
pb.HelloServer
}
func (h *HelloService) SayHello(ctx context.Context, in *pb.HelloRequest) (*pb.HelloResponse, error) {
resp := new(pb.HelloResponse)
resp.Message = fmt.Sprintf("Hello %s.", in.Name)
return resp, nil
}
func main() {
listen, err := net.Listen("tcp", Address)
if err != nil {
grpclog.Fatalf("Failed to listen: %v", err)
}
cert, _ := tls.LoadX509KeyPair("../cert/server.pem", "../cert/server.key")
certPool := x509.NewCertPool()
ca, _ := os.ReadFile("../cert/ca.pem")
certPool.AppendCertsFromPEM(ca)
creds := credentials.NewTLS(&tls.Config{
Certificates: []tls.Certificate{cert},
ClientAuth: tls.RequireAndVerifyClientCert,
ClientCAs: certPool,
})
s := grpc.NewServer(grpc.Creds(creds))
pb.RegisterHelloServer(s, &HelloService{})
fmt.Println("Listen on " + Address)
err = s.Serve(listen)
if err != nil {
fmt.Println(err)
}
}
client
package main
import (
"crypto/tls"
"crypto/x509"
"fmt"
"golang.org/x/net/context"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials"
"google.golang.org/grpc/grpclog"
"os"
pb "rpc-demo/pb/pb"
)
const (
Address = "127.0.0.1:50052"
)
func main() {
cert, _ := tls.LoadX509KeyPair("../cert/client.pem", "../cert/client.key")
certPool := x509.NewCertPool()
ca, _ := os.ReadFile("../cert/ca.pem")
certPool.AppendCertsFromPEM(ca)
creds := credentials.NewTLS(&tls.Config{
Certificates: []tls.Certificate{cert},
ServerName: "ximu.info",
RootCAs: certPool,
})
conn, err := grpc.Dial(Address, grpc.WithTransportCredentials(creds))
if err != nil {
grpclog.Fatalln(err)
}
defer conn.Close()
c := pb.NewHelloClient(conn)
req := &pb.HelloRequest{Name: "gRPC"}
res, err := c.SayHello(context.Background(), req)
if err != nil {
grpclog.Fatalln(err)
}
fmt.Println(res.Message)
}
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· DeepSeek 开源周回顾「GitHub 热点速览」
· 物流快递公司核心技术能力-地址解析分单基础技术分享
· .NET 10首个预览版发布:重大改进与新特性概览!
· AI与.NET技术实操系列(二):开始使用ML.NET
· 单线程的Redis速度为什么快?