原文地址:带入gRPC:基于 CA 的 TLS 证书认证
项目地址:https://github.com/EDDYCJY/go...html
在上一章节中,咱们提出了一个问题。就是如何保证证书的可靠性和有效性?你如何肯定你 Server、Client 的证书是对的呢?git
为了保证证书的可靠性和有效性,在这里可引入 CA 颁发的根证书的概念。其遵照 X.509 标准github
根证书(root certificate)是属于根证书颁发机构(CA)的公钥证书。咱们能够经过验证 CA 的签名从而信任 CA ,任何人均可以获得 CA 的证书(含公钥),用以验证它所签发的证书(客户端、服务端)golang
它包含的文件以下:segmentfault
openssl genrsa -out ca.key 2048
openssl req -new -x509 -days 7200 -key ca.key -out ca.pem
Country Name (2 letter code) []: State or Province Name (full name) []: Locality Name (eg, city) []: Organization Name (eg, company) []: Organizational Unit Name (eg, section) []: Common Name (eg, fully qualified host name) []:go-grpc-example Email Address []:
openssl req -new -key server.key -out server.csr
Country Name (2 letter code) []: State or Province Name (full name) []: Locality Name (eg, city) []: Organization Name (eg, company) []: Organizational Unit Name (eg, section) []: Common Name (eg, fully qualified host name) []:go-grpc-example Email Address []: Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []:
CSR 是 Cerificate Signing Request 的英文缩写,为证书请求文件。主要做用是 CA 会利用 CSR 文件进行签名使得攻击者没法假装或篡改原有证书安全
openssl x509 -req -sha256 -CA ca.pem -CAkey ca.key -CAcreateserial -days 3650 -in server.csr -out server.pem
openssl ecparam -genkey -name secp384r1 -out client.key
openssl req -new -key client.key -out client.csr
openssl x509 -req -sha256 -CA ca.pem -CAkey ca.key -CAcreateserial -days 3650 -in client.csr -out client.pem
至此咱们生成了一堆文件,请按照如下目录结构存放:服务器
$ tree conf conf ├── ca.key ├── ca.pem ├── ca.srl ├── client │ ├── client.csr │ ├── client.key │ └── client.pem └── server ├── server.csr ├── server.key └── server.pem
另外有一些文件是不该该出如今仓库内,应当保密或删除的。但为了真实演示因此保留着(敲黑板)tcp
接下来将正式开始针对 gRPC 进行编码,改造上一章节的代码。目标是基于 CA 进行 TLS 认证 🤫分布式
package main import ( "context" "log" "net" "crypto/tls" "crypto/x509" "io/ioutil" "google.golang.org/grpc" "google.golang.org/grpc/credentials" pb "github.com/EDDYCJY/go-grpc-example/proto" ) ... const PORT = "9001" func main() { cert, err := tls.LoadX509KeyPair("../../conf/server/server.pem", "../../conf/server/server.key") if err != nil { log.Fatalf("tls.LoadX509KeyPair err: %v", err) } certPool := x509.NewCertPool() ca, err := ioutil.ReadFile("../../conf/ca.pem") if err != nil { log.Fatalf("ioutil.ReadFile err: %v", err) } if ok := certPool.AppendCertsFromPEM(ca); !ok { log.Fatalf("certPool.AppendCertsFromPEM err") } c := credentials.NewTLS(&tls.Config{ Certificates: []tls.Certificate{cert}, ClientAuth: tls.RequireAndVerifyClientCert, ClientCAs: certPool, }) server := grpc.NewServer(grpc.Creds(c)) pb.RegisterSearchServiceServer(server, &SearchService{}) lis, err := net.Listen("tcp", ":"+PORT) if err != nil { log.Fatalf("net.Listen err: %v", err) } server.Serve(lis) }
func LoadX509KeyPair(certFile, keyFile string) (Certificate, error) { certPEMBlock, err := ioutil.ReadFile(certFile) if err != nil { return Certificate{}, err } keyPEMBlock, err := ioutil.ReadFile(keyFile) if err != nil { return Certificate{}, err } return X509KeyPair(certPEMBlock, keyPEMBlock) }
在 Server,共使用了三个 Config 配置项:ui
(1)Certificates:设置证书链,容许包含一个或多个
(2)ClientAuth:要求必须校验客户端的证书。能够根据实际状况选用如下参数:
const ( NoClientCert ClientAuthType = iota RequestClientCert RequireAnyClientCert VerifyClientCertIfGiven RequireAndVerifyClientCert )
(3)ClientCAs:设置根证书的集合,校验方式使用 ClientAuth 中设定的模式
package main import ( "context" "crypto/tls" "crypto/x509" "io/ioutil" "log" "google.golang.org/grpc" "google.golang.org/grpc/credentials" pb "github.com/EDDYCJY/go-grpc-example/proto" ) const PORT = "9001" func main() { cert, err := tls.LoadX509KeyPair("../../conf/client/client.pem", "../../conf/client/client.key") if err != nil { log.Fatalf("tls.LoadX509KeyPair err: %v", err) } certPool := x509.NewCertPool() ca, err := ioutil.ReadFile("../../conf/ca.pem") if err != nil { log.Fatalf("ioutil.ReadFile err: %v", err) } if ok := certPool.AppendCertsFromPEM(ca); !ok { log.Fatalf("certPool.AppendCertsFromPEM err") } c := credentials.NewTLS(&tls.Config{ Certificates: []tls.Certificate{cert}, ServerName: "go-grpc-example", RootCAs: certPool, }) conn, err := grpc.Dial(":"+PORT, grpc.WithTransportCredentials(c)) if err != nil { log.Fatalf("grpc.Dial err: %v", err) } defer conn.Close() client := pb.NewSearchServiceClient(conn) resp, err := client.Search(context.Background(), &pb.SearchRequest{ Request: "gRPC", }) if err != nil { log.Fatalf("client.Search err: %v", err) } log.Printf("resp: %s", resp.GetResponse()) }
在 Client 中绝大部分与 Server 一致,不一样点的地方是,在 Client 请求 Server 端时,Client 端会使用根证书和 ServerName 去对 Server 端进行校验
简单流程大体以下:
固然了,在设置了 tls.RequireAndVerifyClientCert
模式的状况下,Server 也会使用 CA 认证的根证书对 Client 端的证书进行可靠性、有效性等校验。也就是两边都会进行校验,极大的保证了安全性 👍
从新启动 server.go 和执行 client.go,查看响应结果是否正常
在本章节,咱们使用 CA 颁发的根证书对客户端、服务端的证书进行了签发。进一步的提升了二者的通信安全
这回是真的大功告成了!