本文为joshua317原创文章,转载请注明:转载自joshua317博客?nginx正向代理,支持https模块:ngx_http_proxy_connect_module - joshua317的博客
文档地址:https://github.com/chobits/ngx_http_proxy_connect_module#proxy_connect
文档内容
This module provides support for?the CONNECT method request. This method is mainly used to?tunnel SSL requests?through proxy servers.
server {
listen 3128;
# dns resolver used by forward proxying
resolver 8.8.8.8;
# forward proxy for CONNECT request
proxy_connect;
proxy_connect_allow 443 563;
proxy_connect_connect_timeout 10s;
proxy_connect_read_timeout 10s;
proxy_connect_send_timeout 10s;
# forward proxy for non-CONNECT request
location / {
proxy_pass http://$host;
proxy_set_header Host $host;
}
}
nginx
Copy
With above configuration, you can get any https website via HTTP CONNECT tunnel. A simple test with command?curl ?is as following:
$ curl https://github.com/ -v -x 127.0.0.1:3128
* Trying 127.0.0.1... -.
* Connected to 127.0.0.1 (127.0.0.1) port 3128 (#0) | curl creates TCP connection with nginx (with proxy_connect module).
* Establish HTTP proxy tunnel to github.com:443 -'
> CONNECT github.com:443 HTTP/1.1 -.
> Host: github.com:443 (1) | curl sends CONNECT request to create tunnel.
> User-Agent: curl/7.43.0 |
> Proxy-Connection: Keep-Alive -'
>
< HTTP/1.0 200 Connection Established .- nginx replies 200 that tunnel is established.
< Proxy-agent: nginx (2)| (The client is now being proxied to the remote host. Any data sent
< '- to nginx is now forwarded, unmodified, to the remote host)
* Proxy replied OK to CONNECT request
* TLS 1.2 connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 -.
* Server certificate: github.com |
* Server certificate: DigiCert SHA2 Extended Validation Server CA | curl sends "https://github.com" request via tunnel,
* Server certificate: DigiCert High Assurance EV Root CA | proxy_connect module will proxy data to remote host (github.com).
> GET / HTTP/1.1 |
> Host: github.com (3) |
> User-Agent: curl/7.43.0 |
> Accept: */* -'
>
< HTTP/1.1 200 OK .-
< Date: Fri, 11 Aug 2017 04:13:57 GMT |
< Content-Type: text/html; charset=utf-8 | Any data received from remote host will be sent to client
< Transfer-Encoding: chunked | by proxy_connect module.
< Server: GitHub.com (4)|
< Status: 200 OK |
< Cache-Control: no-cache |
< Vary: X-PJAX |
... |
... <other response headers & response body> ... |
... '-
The sequence diagram of above example is as following:
curl nginx (proxy_connect) github.com
| | |
(1) |-- CONNECT github.com:443 -->| |
| | |
| |----[ TCP connection ]--->|
| | |
(2) |<- HTTP/1.1 200 ---| |
| Connection Established | |
| | |
| |
========= CONNECT tunnel has been established. ===========
| |
| | |
| | |
| [ SSL stream ] | |
(3) |---[ GET / HTTP/1.1 ]----->| [ SSL stream ] |
| [ Host: github.com ] |---[ GET / HTTP/1.1 ]-->.
| | [ Host: github.com ] |
| | |
| | |
| | |
| | [ SSL stream ] |
| [ SSL stream ] |<--[ HTTP/1.1 200 OK ]---'
(4) |<--[ HTTP/1.1 200 OK ]------| [ < html page > ] |
| [ < html page > ] | |
| | |
You can configure your browser to use this nginx as PROXY server.
- Google Chrome HTTPS PROXY SETTING:?guide & config?for how to configure this module working under SSL layer.
We can do access control on CONNECT request using nginx auth basic module. See?this guide?for more details.
- Select right patch for building:
proxy_connect_<VERSION>.patch ?disables nginx REWRITE phase for CONNECT request by default, which means?if ,?set ,?rewrite_by_lua ?and other REWRITE phase directives cannot be used.proxy_connect_rewrite_<VERSION>.patch ?enables these REWRITE phase directives.
- Build nginx with this module from source:
$ wget http://nginx.org/download/nginx-1.9.2.tar.gz
$ tar -xzvf nginx-1.9.2.tar.gz
$ cd nginx-1.9.2/
$ patch -p1 < /path/to/ngx_http_proxy_connect_module/patch/proxy_connect.patch
$ ./configure --add-module=/path/to/ngx_http_proxy_connect_module
$ make && make install
Bash
Copy
- Starting from nginx 1.9.11, you can also compile this module as a dynamic module, by using the?
--add-dynamic-module=PATH ?option instead of?--add-module=PATH ?on the?./configure ?command line.
$ $ wget http://nginx.org/download/nginx-1.9.12.tar.gz
$ tar -xzvf nginx-1.9.12.tar.gz
$ cd nginx-1.9.12/
$ patch -p1 < /path/to/ngx_http_proxy_connect_module/patch/proxy_connect.patch
$ ./configure --add-dynamic-module=/path/to/ngx_http_proxy_connect_module
$ make && make install
Bash
Copy
- And then you can explicitly load the module in your nginx.conf via the?
load_module ?directive, for example,
load_module /path/to/modules/ngx_http_proxy_connect_module.so;
- ?Note that the ngx_http_proxy_connect_module.so file MUST be loaded by nginx binary that is compiled with the .so file at the same time.
- Build OpenResty with this module from source:
$ wget https://openresty.org/download/openresty-1.19.3.1.tar.gz
$ tar -zxvf openresty-1.19.3.1.tar.gz
$ cd openresty-1.19.3.1
$ ./configure --add-module=/path/to/ngx_http_proxy_connect_module
$ patch -d build/nginx-1.19.3/ -p 1 < /path/to/ngx_http_proxy_connect_module/patch/proxy_connect_rewrite_101504.patch
$ make && make install
Bash
Copy
- To run the whole test suite:
$ hg clone http://hg.nginx.org/nginx-tests/
$ export TEST_NGINX_BINARY=/path/to/nginx/binary
$ prove -v -I /path/to/nginx-tests/lib /path/to/ngx_http_proxy_connect_module/t/
Bash
Copy
This module logs its own error message beginning with?"proxy_connect:" ?string. Some typical error logs are shown as following:
- The proxy_connect module tries to establish tunnel connection with backend server, but the TCP connection timeout occurs.
2019/08/07 17:27:20 [error] 19257#0: *1 proxy_connect: upstream connect timed out (peer:216.58.200.4:443) while connecting to upstream, client: 127.0.0.1, server: , request: "CONNECT www.google.com:443 HTTP/1.1", host: "www.google.com:443"
Syntax:?proxy_connect Default:?none Context:?server
Enable "CONNECT" HTTP method support.
Syntax:?proxy_connect_allow?all | [port ...] | [port-range ...] Default:?443 563 Context:?server
This directive specifies a list of port numbers or ranges to which the proxy CONNECT method may connect. By default, only the default https port (443) and the default snews port (563) are enabled. Using this directive will override this default and allow connections to the listed ports only.
The value?all ?will allow all ports to proxy.
The value?port ?will allow specified port to proxy.
The value?port-range ?will allow specified range of port to proxy, for example:
proxy_connect_allow 1000-2000 3000-4000; # allow range of port from 1000 to 2000, from 3000 to 4000.
Syntax:?proxy_connect_connect_timeout?time Default:?none Context:?server
Defines a timeout for establishing a connection with a proxied server.
Syntax:?proxy_connect_read_timeout?time Default:?60s Context:?server
Defines a timeout for reading a response from the proxied server. The timeout is set only between two successive read operations, not for the transmission of the whole response. If the proxied server does not transmit anything within this time, the connection is closed.
Syntax:?proxy_connect_send_timeout?time Default:?60s Context:?server
Sets a timeout for transmitting a request to the proxied server. The timeout is set only between two successive write operations, not for the transmission of the whole request. If the proxied server does not receive anything within this time, the connection is closed.
Syntax:?proxy_connect_address?address | off Default:?none Context:?server
Specifiy an IP address of the proxied server. The address can contain variables. The special value off is equal to none, which uses the IP address resolved from host name of CONNECT request line.
NOTE: If using?set $<nginx variable> ?and?proxy_connect_address $<nginx variable> ?together, you should use?proxy_connect_rewrite.patch ?instead, see?Install?for more details.
Syntax:?proxy_connect_bind?address [transparent] | off Default:?none Context:?server
Makes outgoing connections to a proxied server originate from the specified local IP address with an optional port. Parameter value can contain variables. The special value off is equal to none, which allows the system to auto-assign the local IP address and port.
The transparent parameter allows outgoing connections to a proxied server originate from a non-local IP address, for example, from a real IP address of a client:
proxy_connect_bind $remote_addr transparent;
In order for this parameter to work, it is usually necessary to run nginx worker processes with the?superuser?privileges. On Linux it is not required (1.13.8) as if the transparent parameter is specified, worker processes inherit the CAP_NET_RAW capability from the master process. It is also necessary to configure kernel routing table to intercept network traffic from the proxied server.
NOTE: If using?set $<nginx variable> ?and?proxy_connect_bind $<nginx variable> ?together, you should use?proxy_connect_rewrite.patch ?instead, see?Install?for more details.
Syntax:?proxy_connect_response?CONNECT response Default:?HTTP/1.1 200 Connection Established\r\nProxy-agent: nginx\r\n\r\n Context:?server
Set the response of CONNECT request.
Note that it is only used for CONNECT request, it cannot modify the data flow over CONNECT tunnel.
For example:
proxy_connect_response "HTTP/1.1 200 Connection Established\r\nProxy-agent: nginx\r\nX-Proxy-Connected-Addr: $connect_addr\r\n\r\n";
The?curl ?command test case with above config is as following:
$ curl https://github.com -sv -x localhost:3128
* Connected to localhost (127.0.0.1) port 3128 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to github.com:443
> CONNECT github.com:443 HTTP/1.1
> Host: github.com:443
> User-Agent: curl/7.64.1
> Proxy-Connection: Keep-Alive
>
< HTTP/1.1 200 Connection Established --.
< Proxy-agent: nginx | custom CONNECT response
< X-Proxy-Connected-Addr: 13.229.188.59:443 --'
...
host name from CONNECT request line.
port from CONNECT request line.
IP address and port of the remote host, e.g. "192.168.1.5:12345". IP address is resolved from host name of CONNECT request line.
Get or set timeout of?proxy_connect_connect_timeout?directive.
For example:
# Set default value
proxy_connect_connect_timeout 10s;
proxy_connect_read_timeout 10s;
proxy_connect_send_timeout 10s;
# Overlap default value
if ($host = "test.com") {
set $proxy_connect_connect_timeout "10ms";
set $proxy_connect_read_timeout "10ms";
set $proxy_connect_send_timeout "10ms";
}
nginx
Copy
Get or set a timeout of?proxy_connect_read_timeout?directive.
Get or set a timeout of?proxy_connect_send_timeout?directive.
Keeps time spent on name resolving; the time is kept in seconds with millisecond resolution.
- Value of "" means this module does not work on this request.
- Value of "-" means name resolving failed.
Keeps time spent on establishing a connection with the upstream server; the time is kept in seconds with millisecond resolution.
- Value of "" means this module does not work on this request.
- Value of "-" means name resolving or connecting failed.
Get or set the response of CONNECT request. The default response of CONNECT request is "HTTP/1.1 200 Connection Established\r\nProxy-agent: nginx\r\n\r\n".
Note that it is only used for CONNECT request, it cannot modify the data flow over CONNECT tunnel.
For example:
# modify default Proxy-agent header
set $proxy_connect_response "HTTP/1.1 200\r\nProxy-agent: nginx/1.19\r\n\r\n";
nginx
Copy
The variable value does not support nginx variables. You can use lua-nginx-module to construct string that contains nginx variable. For example:
# The CONNECT response may be "HTTP/1.1 200\r\nProxy-agent: nginx/1.19.6\r\n\r\n"
rewrite_by_lua '
ngx.var.proxy_connect_response =
string.format("HTTP/1.1 200\\r\\nProxy-agent: nginx/%s\\r\\n\\r\\n", ngx.var.nginx_version)
';
nginx
Copy
Also note that?set ?or?rewrite_by_lua* ?directive is run during the REWRITE phase, which is ahead of dns resolving phase. It cannot get right value of some variables, for example,?$connect_addr ?value is?nil . In such case, you should use?proxy_connect_response?directive?instead.
The latest module is compatible with the following versions of nginx:
- 1.19.6 (mainline version of 1.19.x ~ 1.20.x)
- 1.18.0 (stable version of 1.18.x)
- 1.16.1 (stable version of 1.16.x)
- 1.14.2 (stable version of 1.14.x)
- 1.12.1 (stable version of 1.12.x)
- 1.10.3 (stable version of 1.10.x)
- 1.8.1 (stable version of 1.8.x)
- 1.6.3 (stable version of 1.6.x)
- 1.4.7 (stable version of 1.4.x)
The latest module is compatible with the following versions of OpenResty:
- 1.13.6 (version: 1.13.6.2)
- 1.15.8 (version: 1.15.8.1)
- 1.17.8 (version: 1.17.8.2)
- 1.19.3 (version: 1.19.3.1)
This module has been integrated into Tengine 2.3.0.
See?FAQ page.
- In HTTP/2, the CONNECT method is not supported. It only supports the CONNECT method request in HTTP/1.x and HTTPS.
See?LICENSE?for details.
本文为joshua317原创文章,转载请注明:转载自joshua317博客?nginx正向代理,支持https模块:ngx_http_proxy_connect_module - joshua317的博客
?
|