环境准备:CA环境:192.168.42.132,服务端(NGINX服务器):192.168.42.134,客户端(产生client的证书文件,p12文件,导入到浏览器中):192.168.42.128html
1.单向认证nginx
客户端使用服务端返回的信息验证服务器的合法性,包括:算法
验证经过后,将继续进行通讯,不然,终止通讯浏览器
单向认证的过程:安全
1、在CA端:服务器
#生成CA私钥
openssl genrsa -out private/ca.test.private.key 1024session
#生成根证书申请,域名为ca.admin
openssl req -new -key private/ca.test.private.key -out private/ca.test.request.csr并发
#生成根证书
openssl x509 -req -days 3655 -in private/ca.test.request.csr -signkey private/ca.test.private.key -out private/ca.test.sign.crt加密
#生成证书吊销列表
openssl ca -gencrl -out private/ca.test.revocation.crt -crldays 7spa
2、在Server端:
#生成服务端的私钥
openssl genrsa -out server/server.key 1024
#生成服务器证书申请
openssl req -new -key server/server.key -out server/server.csr
#将SERVER端生成证书请求发往CA端作签名
openssl ca -in server/server.csr -cert private/ca.test.sign.crt -keyfile private/ca.test.private.key -out server/server.crt
在Nginx作相关的配置:
# HTTPS server # server { listen 443 ssl; #server_name a.server; ssl_certificate /home/lianggaohua/ca/server/server.crt; #服务端证书文件 ssl_certificate_key /home/lianggaohua/ca/server/server.key; #服务端私钥 #ssl_client_certificate /home/lianggaohua/ca/server/ca.test.sign.crt; #CA用于认证客户端证书 #ssl_verify_client off; #须要验证客户端证书的时候须要将参数修改成on ssl_session_cache shared:SSL:1m; ssl_session_timeout 5m; ssl_ciphers HIGH:!aNULL:!MD5; ssl_prefer_server_ciphers on; location / { root html; index index.html index.htm; } location /ngx_status { stub_status on; access_log off; } }
在浏览器,须要导入CA的证书。这样服务端返回服务端证书和公钥的时候,客户端经过导入的CA证书便可经过认证。
2.双向认证
客户端使用服务端返回的信息验证服务器的合法性,包括:
验证经过后,将继续进行通讯,不然,终止通讯
3、在客户端生产证书请求,并发送给CA作签名
#生成带密码的客户端私钥,密码000000
openssl genrsa -des3 -out client.key 2048
#生成证书请求,域名须要与服务器端一致
openssl req -new -key client.key -out client.csr
#交给CA作签名
openssl ca -days 1800 -in client/client.csr -cert private/ca.test.sign.crt -keyfile private/ca.test.private.key -out client/client.crt
#利用返回的公钥和客户端证书合成p12文件
openssl pkcs12 -export clcerts -in client.crt -inkey client.key -out client.p12
将p12文件导入到浏览器,便可实现双向认证的过程。
在nginx中配不一样的端口,实现不一样的认证方式访问不一样的页面:
server { listen 443 ssl; #server_name b.client; ssl_certificate /home/lianggaohua/ca/server/server.crt; ssl_certificate_key /home/lianggaohua/ca/server/server.key; ssl_client_certificate /home/lianggaohua/ca/server/ca.test.sign.crt; ssl_verify_client on; ssl_session_cache shared:SSL:1m; ssl_session_timeout 5m; ssl_ciphers HIGH:!aNULL:!MD5; ssl_prefer_server_ciphers on; location / { root html1; index index.html index.htm; } location /ngx_status { stub_status on; access_log off; } } server { listen 8443 ssl; #server_name b.client; ssl_certificate /home/lianggaohua/ca/server/server.crt; ssl_certificate_key /home/lianggaohua/ca/server/server.key; ssl_verify_client off; ssl_session_cache shared:SSL:1m; ssl_session_timeout 5m; ssl_ciphers HIGH:!aNULL:!MD5; ssl_prefer_server_ciphers on; location / { root html; index index.html index.htm; } location /ngx_status { stub_status on; access_log off; } }