要給項目裝https,記錄一下避免本身忘記。https在tomcat上也能夠作,但缺點就是隻給一個tomcat用,非專業的軟件作了專業的事情,感受仍是nginx來配置更好些。
當咱們用客戶端訪問https網站時,這個客戶端會生成對稱密鑰對咱們輸入的數據進行加密。服務端會將nginx配置的公鑰和私鑰中的公鑰下發給客戶端,客戶端用這個公鑰來把對稱密鑰進行加密,而後傳到服務端,服務端用私鑰來解密獲得對稱密鑰的密碼而後再解密成明文。爲何不直接用公鑰來加密呢,由於若是傳輸大的文件用算法加密會很是的慢。nginx的https的默認端口時443
下面下載:php
wget http://zlib.net/zlib-1.2.11.tar.gz wget ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/pcre-8.39.tar.gz wget https://www.openssl.org/source/openssl-1.0.1t.tar.gz
上面三個是依賴包,都是先configure而後make,make install安裝(沒裝編譯工具的話 須要安裝一下 yum -y install gcc gcc-c++
)html
wget http://nginx.org/download/nginx-1.9.0.tar.gz
安裝 ./configure --prefix=/usr/local/nginx --with-http_ssl_module
報錯找不到庫文件nginx
yum -y install openssl openssl-devel
安裝一下就能夠了而後再make,make install。
也是同上面同樣的安裝方式,啓動報錯找不着庫文件。去 /lib64 建立一下軟鏈接 ln -s /lib64/libpcre.so.0.0.1 /lib64/libpcre.so.1
而後建個目錄生成證書就能夠了。
先生成一個私鑰c++
openssl genrsa -des3 -out server.key 2048
再生成一個根證書算法
openssl req -new -key server.key -out server.csr
而後去除密碼tomcat
cp server.key server.key.org openssl rsa -in server.key.org -out server.key
簽署簽名session
openssl x509 -req -sha256 -days 365 -in server.csr -signkey server.key -out server.crt
而後對文件進行配置就沒問題了,必定要注意開啓防火牆端口,443。app
#user nobody; worker_processes 1; events { worker_connections 1024; } http { include mime.types; default_type application/octet-stream; #log_format main '$remote_addr - $remote_user [$time_local] "$request" ' # '$status $body_bytes_sent "$http_referer" ' # '"$http_user_agent" "$http_x_forwarded_for"'; #access_log logs/access.log main; sendfile on; #tcp_nopush on; #keepalive_timeout 0; keepalive_timeout 65; #gzip on; server { listen 80; server_name localhost; #charset koi8-r; #access_log logs/host.access.log main; location / { proxy_pass https://127.0.0.1:8080/usso; } #error_page 404 /404.html; # redirect server error pages to the static page /50x.html # error_page 500 502 503 504 /50x.html; location = /50x.html { root html; } # proxy the PHP scripts to Apache listening on 127.0.0.1:80 # #location ~ \.php$ { # proxy_pass http://127.0.0.1; #} # pass the PHP scripts to FastCGI server listening on 127.0.0.1:9000 # #location ~ \.php$ { # root html; # fastcgi_pass 127.0.0.1:9000; # fastcgi_index index.php; # fastcgi_param SCRIPT_FILENAME /scripts$fastcgi_script_name; # include fastcgi_params; #} # deny access to .htaccess files, if Apache's document root # concurs with nginx's one # #location ~ /\.ht { # deny all; #} } # HTTPS server # server { listen 443 ssl; # server_name localhost; ssl_certificate /usr/local/nginx/ssl/server.crt; ssl_certificate_key /usr/local/nginx/ssl/server.key; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; #這三行是爲了防止nessus檢測支持中等算法漏洞 ssl_prefer_server_ciphers on; ssl_ciphers 'AES128+EECDH:AES128+EDH'; # ssl_session_cache shared:SSL:1m; # ssl_session_timeout 5m; # ssl_ciphers HIGH:!aNULL:!MD5; # ssl_prefer_server_ciphers on; location / { proxy_pass http://127.0.0.1:8080; proxy_set_header X-Real-IP $remote_addr; #這兩行是用來獲取真實ip proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } } server { listen 444 ssl; # server_name localhost; ssl_certificate /usr/local/nginx/ssl/server.crt; ssl_certificate_key /usr/local/nginx/ssl/server.key; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; ssl_ciphers 'AES128+EECDH:AES128+EDH'; # ssl_session_cache shared:SSL:1m; # ssl_session_timeout 5m; # ssl_ciphers HIGH:!aNULL:!MD5; # ssl_prefer_server_ciphers on; location / { proxy_pass http://127.0.0.1:8081; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } } server { listen 445 ssl; # server_name localhost; ssl_certificate /usr/local/nginx/ssl/server.crt; ssl_certificate_key /usr/local/nginx/ssl/server.key; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_prefer_server_ciphers on; ssl_ciphers 'AES128+EECDH:AES128+EDH'; # ssl_session_cache shared:SSL:1m; # ssl_session_timeout 5m; # ssl_ciphers HIGH:!aNULL:!MD5; # ssl_prefer_server_ciphers on; location / { proxy_pass http://127.0.0.1:8180; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; } } }