用nginx正向代理https网站
2025-06-24 12:12:23 | 来源:人民网

目录
- 1. 缘起
- 2. 部署nginx
- 3. 测试
- 3.1 http测试
- 3.2 https测试
- 4 给centos设置代理访问外网
1. 缘起
最近碰到了一个麻烦事情,就是公司的centos测试服务器放在内网环境,而且不能直接上外网,导致无法通过yum安装软件,非常捉急。
幸好,内网还是有可以可以访问外网的机器,所以就想到应该可以利用nginx搭建一个代理服务器,然后centos通过这个nginx来访问外网。当然,如果只是代理http还是很简单的,而要代理https还是需要稍费周折,因为nginx本身不能部署被代理的网站的证书,不能部署成https终结点来,因此与被代理客户端之间不能用ssl协议通讯,因此需要通过http协议中的CONNECT请求打通和外网的连接,然后客户端到nginx走明文,nginx到外网走https协议。这里需要用到ngx_http_proxy_connect_module模块来实现CONNECT的代理功能。
2. 部署nginx
- 步骤1: 从nginx官网下载nginx源码包。
- 步骤2: 因为nginx原生是不支持CONNECT请求的,需要安装一个扩展插件,即ngx_http_proxy_connect_module,从github下载ngx_http_proxy_connect_module,另外还要下载一个nginx内核补丁。
- 步骤3: 解压nginx源码包,进入nginx源码目录,创建modules目录(mkdir modules)。
- 步骤4: 将ngx_http_proxy_connect_module源码目录放到modules目录中。
- 步骤5: 将nginx内核补丁放到nginx源码目录,姑且名字叫p1.patch
- 步骤6: 在nginx源码目录,执行以下命令给nginx内核打上补丁:
patch -p 1 < p1.patch
- 步骤7:编译nginx,这里假设nginx安装到/opt/nginx目录中(在编译前确认pcre、zlib、openssl的库是否已经正常安装),编译命令如下:
./configure --prefix=/opt/nginx --with-http_ssl_module -add-module=./modules/ngx_http_proxy_connect_modulemake & make install
- 步骤8:配置nginx
配置文件如下:
#user nobody;worker_processes 1;#error_log logs/error.log;#error_log logs/error.log notice;#error_log logs/error.log info;#pid logs/nginx.pid;events { worker_connections 1024;}http { include mime.types; default_type application/octet-stream; #log_format main '$remote_addr - $remote_user [$time_local] "$request" ' # '$status $body_bytes_sent "$http_referer" ' # '"$http_user_agent" "$http_x_forwarded_for"'; #access_log logs/access.log main; sendfile on; keepalive_timeout 65; server { # 代理端口 listen 8080; server_name localhost; # 解析被代理网站域名的dns服务器,根据实际情况自行配置 resolver 114.114.114.114; # 开启proxy connect功能 proxy_connect; # 设置允许代理的目标端口为443,即https的默认端口 proxy_connect_allow 443 80; location / { # 正向代理配置,根据请求地址自动解析出目标网站地址并进行代理 proxy_pass $scheme://$host$request_uri; # 发送到被代理网站的请求需要添加host头 proxy_set_header Host $http_host; proxy_buffers 256 4k; proxy_max_temp_file_size 0; proxy_connect_timeout 30; } }}
以上配置完成后,通过nginx的8080端口,既可以代理普通http的请求,也可以代理https的请求。
- 步骤9:启动nginx
执行/opt/nginx/sbin/nginx,启动nginx
3. 测试
3.1 http测试
curl "http://www.baidu.com/" -x 127.0.0.1:8080 -v
响应内容:
* Trying 127.0.0.1:8080...* Connected to (nil) (127.0.0.1) port 8080 (#0)> GET http://www.baidu.com/ HTTP/1.1> Host: www.baidu.com> User-Agent: curl/7.81.0> Accept: */*> Proxy-Connection: Keep-Alive> * Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Server: nginx/1.24.0< Date: Fri, 23 Feb 2024 09:08:01 GMT< Content-Type: text/html< Content-Length: 2381< Connection: keep-alive< Accept-Ranges: bytes< Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform< Etag: "588604eb-94d"< Last-Modified: Mon, 23 Jan 2017 13:28:11 GMT< Pragma: no-cache< Set-Cookie: BDORZ=27315; max-age=86400; domain=.baidu.com; path=/< 百度一下,你就知道
通过以上的输出可以看到http代理是没有通过CONNECT请求进行连接的,响应正常。
3.2 https测试
curl "https://www.baidu.com/" -x 127.0.0.1:8080 -v
* Trying 127.0.0.1:8080...* Connected to (nil) (127.0.0.1) port 8080 (#0)* allocate connect buffer!* Establish HTTP proxy tunnel to www.baidu.com:443> CONNECT www.baidu.com:443 HTTP/1.1> Host: www.baidu.com:443> User-Agent: curl/7.81.0> Proxy-Connection: Keep-Alive> < HTTP/1.1 200 Connection Established< Proxy-agent: nginx< * Proxy replied 200 to CONNECT request* CONNECT phase completed!* ALPN, offering h2* ALPN, offering http/1.1* CAfile: /etc/ssl/certs/ca-certificates.crt* CApath: /etc/ssl/certs* TLSv1.0 (OUT), TLS header, Certificate Status (22):* TLSv1.3 (OUT), TLS handshake, Client hello (1):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.3 (IN), TLS handshake, Server hello (2):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Certificate (11):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Server key exchange (12):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Server finished (14):* TLSv1.2 (OUT), TLS header, Certificate Status (22):* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):* TLSv1.2 (OUT), TLS header, Finished (20):* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):* TLSv1.2 (OUT), TLS header, Certificate Status (22):* TLSv1.2 (OUT), TLS handshake, Finished (20):* TLSv1.2 (IN), TLS header, Finished (20):* TLSv1.2 (IN), TLS header, Certificate Status (22):* TLSv1.2 (IN), TLS handshake, Finished (20):* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256* ALPN, server accepted to use http/1.1* Server certificate:* subject: C=CN; ST=beijing; L=beijing; O=Beijing Baidu Netcom Science Technology Co., Ltd; CN=baidu.com* start date: Jul 6 01:51:06 2023 GMT* expire date: Aug 6 01:51:05 2024 GMT* subjectAltName: host "www.baidu.com" matched cert's "*.baidu.com"* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign RSA OV SSL CA 2018* SSL certificate verify ok.* TLSv1.2 (OUT), TLS header, Supplemental data (23):> GET / HTTP/1.1> Host: www.baidu.com> User-Agent: curl/7.81.0> Accept: */*> * TLSv1.2 (IN), TLS header, Supplemental data (23):* Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Accept-Ranges: bytes< Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform< Connection: keep-alive< Content-Length: 2443< Content-Type: text/html< Date: Fri, 23 Feb 2024 09:11:25 GMT< Etag: "58860410-98b"< Last-Modified: Mon, 23 Jan 2017 13:24:32 GMT< Pragma: no-cache< Server: bfe/1.0.8.18< Set-Cookie: BDORZ=27315; max-age=86400; domain=.baidu.com; path=/< * TLSv1.2 (IN), TLS header, Supplemental data (23):* TLSv1.2 (IN), TLS header, Supplemental data (23): 百度一下,你就知道
通过以上的输出可以看到https代理是通过CONNECT请求进行连接的,中间有发生ssl的握手过程,也已经正常进行了响应。
4 给centos设置代理访问外网
给centos服务器设置两个http_proxy和https_proxy环境变量,假设nginx服务器的ip为192.168.0.1,那么在命令行执行以下两条命令,即:
export http_proxy="http://192.168.0.1:8080"export https_proxy="https://192.168.0.1:8080"
然后就可以顺畅地进行yum了。当然,如果可以的话,就将以上两条命令配置到bash.rc中,这样子免得每次登录都需要敲命令。
(责编:人民网)
分享让更多人看到