【问题标题】:Fallback configuration for unknown host when using Nginx and SNI?使用 Nginx 和 SNI 时未知主机的后备配置?
【发布时间】:2018-09-26 20:33:14
【问题描述】:

当我的 Nginx 服务器被要求提供一个它不知道的站点时,谁能指出我如何配置默认主机响应?我试过了:

server {
       listen 443 default_server;
       listen [::]:443 default_server;

       server_name _;

       return 444;
}

这只会导致所有其他网站导致“意外关闭连接”错误。

请注意,我没有计划支持旧版 https 客户端(那些不了解 SNI 的客户端)。

我使用的是 Nginx 1.14.0

【问题讨论】:

    标签: nginx sni


    【解决方案1】:

    通过浏览网络,答案似乎是您需要创建一个自签名证书,然后将其应用于默认主机。没有人会相信这一点,但考虑到他们最终会使用未处理的主机名,这可能并不重要?

    我按照Digital Ocean的说明进行操作,这里我将总结一下(内容太多,无法包含全部内容):

    • 创建自签名证书
    • 生成 dhparam 文件
    • 配置“默认”主机以在 https 配置中引用该主机(端口 443)

    生成 dhparm 文件(需要一段时间):

    sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048
    

    默认主机的443配置:

    server {
           listen 443 default_server;
           listen [::]:443 default_server;
    
           include snippets/self-signed.conf;
           include snippets/ssl-params.conf;
    
           server_name _;
    
            root /var/www/html;
    
            # Add index.php to the list if you are using PHP
            index index.html index.htm index.nginx-debian.html;
    
            server_name _;
    
            location / {
                    ssi on;
                    # First attempt to serve request as file, then
                    # as directory, then fall back to displaying a 404.
                    try_files $uri $uri/ =404;
            }
    }
    

    ssl-signed.conf 文件内容:

    ssl_certificate /etc/ssl/certs/nginx-selfsigned.crt;
    ssl_certificate_key /etc/ssl/private/nginx-selfsigned.key;
    

    ssl-params.conf 文件内容:

    # from https://cipherli.st/
    
    # and https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
    
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
    ssl_prefer_server_ciphers on;
    ssl_ciphers "EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH";
    ssl_ecdh_curve secp384r1;
    ssl_session_cache shared:SSL:10m;
    ssl_session_tickets off;
    ssl_stapling on;
    ssl_stapling_verify on;
    resolver 8.8.8.8 8.8.4.4 valid=300s;
    resolver_timeout 5s;
    # Disable preloading HSTS for now.  You can use the commented out header line that includes
    # the "preload" directive if you understand the implications.
    #add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
    add_header Strict-Transport-Security "max-age=63072000; includeSubdomains";
    add_header X-Frame-Options DENY;
    add_header X-Content-Type-Options nosniff;
    
    ssl_dhparam /etc/ssl/certs/dhparam.pem;
    

    请注意,以上内容是使用 Nginx 1.14.0 测试的

    【讨论】:

      猜你喜欢
      • 1970-01-01
      • 2020-11-06
      • 1970-01-01
      • 2017-01-21
      • 2018-10-30
      • 1970-01-01
      • 1970-01-01
      • 1970-01-01
      • 2011-08-17
      相关资源
      最近更新 更多