用nginx正向代理https网站
人民网>>社会·法治

用nginx正向代理https网站

2025-06-24 12:12:23 | 来源:人民网
小字号

目录

  • 1. 缘起
  • 2. 部署nginx
  • 3. 测试
  • 3.1 http测试
  • 3.2 https测试
  • 4 给centos设置代理访问外网

1. 缘起

  最近碰到了一个麻烦事情,就是公司的centos测试服务器放在内网环境,而且不能直接上外网,导致无法通过yum安装软件,非常捉急。
  幸好,内网还是有可以可以访问外网的机器,所以就想到应该可以利用nginx搭建一个代理服务器,然后centos通过这个nginx来访问外网。当然,如果只是代理http还是很简单的,而要代理https还是需要稍费周折,因为nginx本身不能部署被代理的网站的证书,不能部署成https终结点来,因此与被代理客户端之间不能用ssl协议通讯,因此需要通过http协议中的CONNECT请求打通和外网的连接,然后客户端到nginx走明文,nginx到外网走https协议。这里需要用到ngx_http_proxy_connect_module模块来实现CONNECT的代理功能。

2. 部署nginx

  • 步骤1:   从nginx官网下载nginx源码包。
  • 步骤2:   因为nginx原生是不支持CONNECT请求的,需要安装一个扩展插件,即ngx_http_proxy_connect_module,从github下载ngx_http_proxy_connect_module,另外还要下载一个nginx内核补丁。
  • 步骤3: 解压nginx源码包,进入nginx源码目录,创建modules目录(mkdir modules)。
  • 步骤4: 将ngx_http_proxy_connect_module源码目录放到modules目录中。
  • 步骤5: 将nginx内核补丁放到nginx源码目录,姑且名字叫p1.patch
  • 步骤6: 在nginx源码目录,执行以下命令给nginx内核打上补丁:
patch -p 1 < p1.patch
  • 步骤7:编译nginx,这里假设nginx安装到/opt/nginx目录中(在编译前确认pcre、zlib、openssl的库是否已经正常安装),编译命令如下:
./configure --prefix=/opt/nginx --with-http_ssl_module -add-module=./modules/ngx_http_proxy_connect_modulemake & make install
  • 步骤8:配置nginx
       配置文件如下:
#user  nobody;worker_processes  1;#error_log  logs/error.log;#error_log  logs/error.log  notice;#error_log  logs/error.log  info;#pid        logs/nginx.pid;events {     worker_connections  1024;}http {     include       mime.types;    default_type  application/octet-stream;    #log_format  main  '$remote_addr - $remote_user [$time_local] "$request" '    #                  '$status $body_bytes_sent "$http_referer" '    #                  '"$http_user_agent" "$http_x_forwarded_for"';    #access_log  logs/access.log  main;    sendfile        on;    keepalive_timeout  65;  server {         # 代理端口		listen 8080;        server_name  localhost;                # 解析被代理网站域名的dns服务器,根据实际情况自行配置        resolver  114.114.114.114;                # 开启proxy connect功能        proxy_connect;                # 设置允许代理的目标端口为443,即https的默认端口        proxy_connect_allow 443 80;        location / {                      # 正向代理配置,根据请求地址自动解析出目标网站地址并进行代理            proxy_pass $scheme://$host$request_uri;                        # 发送到被代理网站的请求需要添加host头            proxy_set_header Host $http_host;        			proxy_buffers 256 4k;             proxy_max_temp_file_size 0;            proxy_connect_timeout 30;         }    }}

   以上配置完成后,通过nginx的8080端口,既可以代理普通http的请求,也可以代理https的请求。

  • 步骤9:启动nginx
      执行/opt/nginx/sbin/nginx,启动nginx

3. 测试

3.1 http测试

curl "http://www.baidu.com/" -x 127.0.0.1:8080 -v

响应内容:

*   Trying 127.0.0.1:8080...* Connected to (nil) (127.0.0.1) port 8080 (#0)> GET http://www.baidu.com/ HTTP/1.1> Host: www.baidu.com> User-Agent: curl/7.81.0> Accept: */*> Proxy-Connection: Keep-Alive> * Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Server: nginx/1.24.0< Date: Fri, 23 Feb 2024 09:08:01 GMT< Content-Type: text/html< Content-Length: 2381< Connection: keep-alive< Accept-Ranges: bytes< Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform< Etag: "588604eb-94d"< Last-Modified: Mon, 23 Jan 2017 13:28:11 GMT< Pragma: no-cache< Set-Cookie: BDORZ=27315; max-age=86400; domain=.baidu.com; path=/<  百度一下,你就知道  

关于百度 About Baidu

©2017 Baidu 使用百度前必读  意见反馈 京ICP证030173号 

   通过以上的输出可以看到http代理是没有通过CONNECT请求进行连接的,响应正常。

3.2 https测试

curl "https://www.baidu.com/" -x 127.0.0.1:8080 -v
*   Trying 127.0.0.1:8080...* Connected to (nil) (127.0.0.1) port 8080 (#0)* allocate connect buffer!* Establish HTTP proxy tunnel to www.baidu.com:443> CONNECT www.baidu.com:443 HTTP/1.1> Host: www.baidu.com:443> User-Agent: curl/7.81.0> Proxy-Connection: Keep-Alive> < HTTP/1.1 200 Connection Established< Proxy-agent: nginx< * Proxy replied 200 to CONNECT request* CONNECT phase completed!* ALPN, offering h2* ALPN, offering http/1.1*  CAfile: /etc/ssl/certs/ca-certificates.crt*  CApath: /etc/ssl/certs* TLSv1.0 (OUT), TLS header, Certificate Status (22):* TLSv1.3 (OUT), TLS handshake, Client hello (1):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.3 (IN), TLS handshake, Server hello (2):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Certificate (11):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Server key exchange (12):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Server finished (14):* TLSv1.2 (OUT), TLS header, Certificate Status (22):* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):* TLSv1.2 (OUT), TLS header, Finished (20):* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):* TLSv1.2 (OUT), TLS header, Certificate Status (22):* TLSv1.2 (OUT), TLS handshake, Finished (20):* TLSv1.2 (IN), TLS header, Finished (20):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Finished (20):* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256* ALPN, server accepted to use http/1.1* Server certificate:*  subject: C=CN; ST=beijing; L=beijing; O=Beijing Baidu Netcom Science Technology Co., Ltd; CN=baidu.com*  start date: Jul  6 01:51:06 2023 GMT*  expire date: Aug  6 01:51:05 2024 GMT*  subjectAltName: host "www.baidu.com" matched cert's "*.baidu.com"*  issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign RSA OV SSL CA 2018*  SSL certificate verify ok.* TLSv1.2 (OUT), TLS header, Supplemental data (23):> GET / HTTP/1.1> Host: www.baidu.com> User-Agent: curl/7.81.0> Accept: */*> * TLSv1.2 (IN), TLS header, Supplemental data (23):* Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Accept-Ranges: bytes< Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform< Connection: keep-alive< Content-Length: 2443< Content-Type: text/html< Date: Fri, 23 Feb 2024 09:11:25 GMT< Etag: "58860410-98b"< Last-Modified: Mon, 23 Jan 2017 13:24:32 GMT< Pragma: no-cache< Server: bfe/1.0.8.18< Set-Cookie: BDORZ=27315; max-age=86400; domain=.baidu.com; path=/< * TLSv1.2 (IN), TLS header, Supplemental data (23):* TLSv1.2 (IN), TLS header, Supplemental data (23): 百度一下,你就知道  

关于百度 About Baidu

©2017 Baidu 使用百度前必读  意见反馈 京ICP证030173号 

  通过以上的输出可以看到https代理是通过CONNECT请求进行连接的,中间有发生ssl的握手过程,也已经正常进行了响应。

4 给centos设置代理访问外网

  给centos服务器设置两个http_proxy和https_proxy环境变量,假设nginx服务器的ip为192.168.0.1,那么在命令行执行以下两条命令,即:

export http_proxy="http://192.168.0.1:8080"export https_proxy="https://192.168.0.1:8080"

  然后就可以顺畅地进行yum了。当然,如果可以的话,就将以上两条命令配置到bash.rc中,这样子免得每次登录都需要敲命令。

(责编:人民网)

分享让更多人看到