多应用+插件架构,代码干净,二开方便,首家独创一键云编译技术,文档视频完善,免费商用码云13.8K 广告
# TLS (SSL) ~~~ 稳定度: 3 - 稳定 ~~~ 使用 `require('tls')` 来访问此模块。 `tls` 模块使用 OpenSSL 来提供传输层安全协议(Transport Layer Security)和/或安全套接层(Secure Socket Layer):加密过的流通讯。 TLS/SSL 是一种公钥/私钥架构。每个客户端和服务器都必有一个私钥。一个私钥使用类似的方式创建: ~~~ openssl genrsa -out ryans-key.pem 1024 ~~~ 所有服务器和某些客户端需要具备证书。证书是证书办法机构签发或自签发的公钥。获取证书的第一步是创建一个“证书签发申请”(CSR)文件。使用这条命令完成: ~~~ openssl req -new -key ryans-key.pem -out ryans-csr.pem ~~~ 像这样使用 CSR 创建一个自签名证书: ~~~ openssl x509 -req -in ryans-csr.pem -signkey ryans-key.pem -out ryans-cert.pem ~~~ 又或者你可以将 CSR 发送给一个数字证书认证机构请求签名。 (TODO: 对于创建一个CA文档, 感兴趣的用户暂时只能看Node的源代码`test/fixtures/keys/Makefile` 像这样创建 .pfx 或 .p12: ~~~ openssl pkcs12 -export -in agent5-cert.pem -inkey agent5-key.pem \ -certfile ca-cert.pem -out agent5.pfx ~~~ - `in`: certificate - `inkey`: private key - `certfile`: all CA certs concatenated in one file like `cat ca1-cert.pem ca2-cert.pem > ca-cert.pem` ### 客户端初始化的对缓解攻击的重新协商 TLS协议会令客户端可以重新协商TLS会话的某些方面。但是,会话的重新协商是需要相应量的服务器端资源的,所以导致其变成一个阻断服务攻击(denial-of-service)的潜在媒介。 为了减低这种情况的发生,重新协商被限制在每10分钟三次。如果超过这个数目,那么在[tls.TLSSocket](#)实例上就会分发一个错误。这个限制是可设置的: - `tls.CLIENT_RENEG_LIMIT`: 重新协商的次数限制,默认为3。 - `tls.CLIENT_RENEG_WINDOW`: 重新协商窗口的秒数,默认为600(10分钟)。 除非你完全理解整个机制和清楚自己要干什么,否则不要改变这个默认值。 要测试你的服务器的话,用命令 `openssl s_client -connect 地址:端口`连接上服务器,然后敲击`R<CR>`(字母键`R`加回车键)几次。 ### NPN 和 SNI NPN (Next Protocol Negotiation,下一个协议的协商)和SNI (Server Name Indication,服务器名称指示)是TLS握手扩展,它们允许你: - NPN - 同一个TLS服务器使用多种协议 (HTTP, SPDY) - SNI - 同一个TLS服务器使用多个主机名,与其相应的SSL证书。 ### tls.getCiphers() 返回一个数组,其中包含了所支持的SSL加密器的名字。 实例: ~~~ var ciphers = tls.getCiphers(); console.log(ciphers); // ['AES128-SHA', 'AES256-SHA', ...] ~~~ ### tls.createServer(options, [secureConnectionListener]) 新建一个新的 [tls.Server](#). The `connectionListener` 参数会自动设置为 [secureConnection](#) 事件的监听器. 这个 `options` 对象有这些可能性: - `pfx`: 一个String 或`Buffer`包含了私钥, 证书和CA certs, 一般是 PFX 或者 PKCS12 格式. (Mutually exclusive with the `key`, `cert` and `ca` options.) - `key`: 一个字符串或 `Buffer`对象,其中包含了PEF格式的服务器的私钥。 (必需) - `passphrase`: 私钥或pfx密码的字符串。 - `cert`: 字符串或者 `Buffer`,包含PEM格式的服务器证书密码。(必选) - `ca`: An array of strings or `Buffer`s of trusted certificates. If this is omitted several well known "root" CAs will be used, like VeriSign. These are used to authorize connections. - `crl` : Either a string or list of strings of PEM encoded CRLs (Certificate Revocation List) - `ciphers`: 一个字符串,描述了使用或排除的cipher。 ~~~ **NOTE**: Previous revisions of this section suggested `AES256-SHA` as an acceptable cipher. Unfortunately, `AES256-SHA` is a CBC cipher and therefore susceptible to BEAST attacks. Do *not* use it. ~~~ - `handshakeTimeout`: Abort the connection if the SSL/TLS handshake does not finish in this many milliseconds. The default is 120 seconds. ~~~ `tls.Server`对象在握手超时时,总会触发`'clientError'`事件。 ~~~ - `honorCipherOrder` : 当选择cipher时,使用服务器设置,而不是客户端设置。 ~~~ Although, this option is disabled by default, it is *recommended* that you use this option in conjunction with the `ciphers` option to mitigate BEAST attacks. ~~~ - `requestCert`: If `true` the server will request a certificate from clients that connect and attempt to verify that certificate. Default: `false`. - `rejectUnauthorized`: If `true` the server will reject any connection which is not authorized with the list of supplied CAs. This option only has an effect if `requestCert` is `true`. Default: `false`. - `NPNProtocols`: 一个数组或 `Buffer`,包含了可能的 NPN 协议。(协议应根据优先级排序) - `SNICallback(servername, cb)`: A function that will be called if client supports SNI TLS extension. Two argument will be passed to it: `servername`, and `cb`. `SNICallback` should invoke `cb(null, ctx)`, where `ctx` is a SecureContext instance. (You can use `crypto.createCredentials(...).context` to get proper SecureContext). If `SNICallback` wasn't provided - default callback with high-level API will be used (see below). - `sessionTimeout`: An integer specifying the seconds after which TLS session identifiers and TLS session tickets created by the server are timed out. See [SSL_CTX_set_timeout](http://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html) for more details. - `sessionIdContext`: A string containing a opaque identifier for session resumption. If `requestCert` is `true`, the default is MD5 hash value generated from command-line. Otherwise, the default is not provided. - `secureProtocol`: The SSL method to use, e.g. `SSLv3_method` to force SSL version 3. The possible values depend on your installation of OpenSSL and are defined in the constant [SSL_METHODS](http://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS). 这是一个简单的应答服务器例子: ~~~ var server = tls.createServer(options, function(socket) { console.log('服务器已连接', socket.authorized ? '已授权' : '未授权'); socket.write("欢迎!\n"); socket.setEncoding('utf8'); socket.pipe(socket); }); server.listen(8000, function() { console.log('server bound'); }); ~~~ 或者 ~~~ }; ~~~ ~~~ var server = tls.createServer(options, function(socket) { console.log('服务器已连接', socket.authorized ? '已授权' : '未授权'); socket.write("欢迎!\n"); socket.setEncoding('utf8'); socket.pipe(socket); }); server.listen(8000, function() { console.log('服务器已绑定'); }); ~~~ 您可以使用 `openssl s_client` 连接这个服务器来测试: ~~~ openssl s_client -connect 127.0.0.1:8000 ~~~ ### tls.connect(options, [callback]) ### tls.connect(port, [host], [options], [callback]) Creates a new client connection to the given `port` and `host` (old API) or `options.port` and `options.host`. (If `host` is omitted, it defaults to `localhost`.) `options` should be an object which specifies: - `host`: 客户端应连接到的主机 - `port`: 客户端应连接到的端口 - `socket`: Establish secure connection on a given socket rather than creating a new socket. If this option is specified, `host` and `port` are ignored. - `pfx`: 字符串或者 `Buffer`,包含 PFX 或 PKCS12 格式的服务器私钥、证书和CA证书。 - `key`: 字符串或 `Buffer`,包含 PEM 格式的客户端私钥。 - `passphrase`: 私钥或pfx密码的字符串。 - `cert`: 字符串或 `Buffer`,包含PEM格式的客户端证书密码。 - `ca`: An array of strings or `Buffer`s of trusted certificates. If this is omitted several well known "root" CAs will be used, like VeriSign. These are used to authorize connections. - `rejectUnauthorized`: If `true`, the server certificate is verified against the list of supplied CAs. An `'error'` event is emitted if verification fails. Default: `true`. - `NPNProtocols`: An array of string or `Buffer` containing supported NPN protocols. `Buffer` should have following format: `0x05hello0x05world`, where first byte is next protocol name's length. (Passing array should usually be much simpler: `['hello', 'world']`.) - `servername`: SNI (Server Name Indication) TLS 扩展的服务器名。 - `secureProtocol`: The SSL method to use, e.g. `SSLv3_method` to force SSL version 3. The possible values depend on your installation of OpenSSL and are defined in the constant [SSL_METHODS](http://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS). `callback`参数会被作为监听器添加到['secureConnect'](#)事件。 `tls.connect()`返回一个[tls.TLSSocket](#)对象。 下面是一个上述应答服务器的客户端的例子: ~~~ var socket = tls.connect(8000, options, function() { console.log('client connected', socket.authorized ? 'authorized' : 'unauthorized'); process.stdin.pipe(socket); process.stdin.resume(); }); socket.setEncoding('utf8'); socket.on('data', function(data) { console.log(data); }); socket.on('end', function() { server.close(); }); ~~~ 或者 ~~~ var socket = tls.connect(8000, options, function() { console.log('client connected', socket.authorized ? 'authorized' : 'unauthorized'); process.stdin.pipe(socket); process.stdin.resume(); }); socket.setEncoding('utf8'); socket.on('data', function(data) { console.log(data); }); socket.on('end', function() { server.close(); }); ~~~ ### Class: tls.TLSSocket Wrapper for instance of [net.Socket](#), replaces internal socket read/write routines to perform transparent encryption/decryption of incoming/outgoing data. ### new tls.TLSSocket(socket, options) Construct a new TLSSocket object from existing TCP socket. `socket`是一个[net.Socket](#)示例。 `options`是一个可能包含以下属性的对象: - `credentials`: 可选的,通过`crypto.createCredentials( ... )`得到的资格对象。 - `isServer`: 如果为真——TLS套接字将在服务器模式下实例化。 - `server`: 一个可选的[net.Server](#)实例 - `requestCert`: 可选的,见[tls.createSecurePair](#) - `rejectUnauthorized`: 可选的,见[tls.createSecurePair](#) - `NPNProtocols`: 可选的,见[tls.createServer](#) - `SNICallback`: 可选的,见[tls.createServer](#) ### tls.createSecurePair([credentials], [isServer], [requestCert], [rejectUnauthorized]) ~~~ 稳定性: 0 - 已废弃。使用 tls.TLSSocket 替代。 ~~~ Creates a new secure pair object with two streams, one of which reads/writes encrypted data, and one reads/writes cleartext data. Generally the encrypted one is piped to/from an incoming encrypted data stream, and the cleartext one is used as a replacement for the initial encrypted stream. - `credentials`: 通过`crypto.createCredentials( ... )`得到的资格对象 - `isServer`: A boolean indicating whether this tls connection should be opened as a server or a client. - `requestCert`: A boolean indicating whether a server should request a certificate from a connecting client. Only applies to server connections. - `rejectUnauthorized`: A boolean indicating whether a server should automatically reject clients with invalid certificates. Only applies to servers with `requestCert` enabled. `tls.createSecurePair()` returns a SecurePair object with `cleartext` and `encrypted` stream properties. NOTE: `cleartext` has the same APIs as [tls.TLSSocket](#) ### 类: SecurePair 由tls.createSecurePair返回。 ### 事件: 'secure' The event is emitted from the SecurePair once the pair has successfully established a secure connection. Similarly to the checking for the server 'secureConnection' event, pair.cleartext.authorized should be checked to confirm whether the certificate used properly authorized. ### 类: tls.Server This class is a subclass of `net.Server` and has the same methods on it. Instead of accepting just raw TCP connections, this accepts encrypted connections using TLS or SSL. ### 事件: 'secureConnection' `function (tlsSocket) {}` This event is emitted after a new connection has been successfully handshaked. The argument is a instance of [tls.TLSSocket](#). It has all the common stream methods and events. `socket.authorized` is a boolean value which indicates if the client has verified by one of the supplied certificate authorities for the server. If `socket.authorized` is false, then `socket.authorizationError` is set to describe how authorization failed. Implied but worth mentioning: depending on the settings of the TLS server, you unauthorized connections may be accepted. `socket.npnProtocol` is a string containing selected NPN protocol. `socket.servername` is a string containing servername requested with SNI. ### Event: 'clientError' `function (exception, tlsSocket) { }` When a client connection emits an 'error' event before secure connection is established - it will be forwarded here. `tlsSocket`就是`[tls.TLSSocket][]`,错误产生的地方。 ### 事件: 'newSession' `function (sessionId, sessionData) { }` Emitted on creation of TLS session. May be used to store sessions in external storage. NOTE: adding this event listener will have an effect only on connections established after addition of event listener. ### 事件: 'resumeSession' `function (sessionId, callback) { }` Emitted when client wants to resume previous TLS session. Event listener may perform lookup in external storage using given `sessionId`, and invoke `callback(null, sessionData)` once finished. If session can't be resumed (i.e. doesn't exist in storage) one may call `callback(null, null)`. Calling `callback(err)` will terminate incoming connection and destroy socket. NOTE: adding this event listener will have an effect only on connections established after addition of event listener. ### server.listen(port, [host], [callback]) Begin accepting connections on the specified `port` and `host`. If the `host` is omitted, the server will accept connections directed to any IPv4 address (`INADDR_ANY`). This function is asynchronous. The last parameter `callback` will be called when the server has been bound. 更多信息见`net.Server`。 ### server.close() Stops the server from accepting new connections. This function is asynchronous, the server is finally closed when the server emits a `'close'` event. ### server.address() Returns the bound address, the address family name and port of the server as reported by the operating system. See [net.Server.address()](#) for more information. ### server.addContext(hostname, credentials) Add secure context that will be used if client request's SNI hostname is matching passed `hostname` (wildcards can be used). `credentials` can contain `key`, `cert` and `ca`. ### server.maxConnections Set this property to reject connections when the server's connection count gets high. ### server.connections 服务器的并发连接数. ### 类: CryptoStream ~~~ 稳定性: 0 - 已废弃。使用 tls.TLSSocket 替代。 ~~~ 这是一个被加密的流。 ### cryptoStream.bytesWritten A proxy to the underlying socket's bytesWritten accessor, this will return the total bytes written to the socket, *including the TLS overhead*. ### Class: tls.TLSSocket This is a wrapped version of [net.Socket](#) that does transparent encryption of written data and all required TLS negotiation. This instance implements a duplex [Stream](#) interfaces. It has all the common stream methods and events. ### 事件: 'secureConnect' This event is emitted after a new connection has been successfully handshaked. The listener will be called no matter if the server's certificate was authorized or not. It is up to the user to test `tlsSocket.authorized` to see if the server certificate was signed by one of the specified CAs. If `tlsSocket.authorized === false` then the error can be found in `tlsSocket.authorizationError`. Also if NPN was used - you can check `tlsSocket.npnProtocol` for negotiated protocol. ### tlsSocket.authorized A boolean that is `true` if the peer certificate was signed by one of the specified CAs, otherwise `false` ### tlsSocket.authorizationError The reason why the peer's certificate has not been verified. This property becomes available only when `tlsSocket.authorized === false`. ### tlsSocket.getPeerCertificate() Returns an object representing the peer's certificate. The returned object has some properties corresponding to the field of the certificate. 实例: ~~~ { subject: { C: 'UK', ST: 'Acknack Ltd', L: 'Rhys Jones', O: 'node.js', OU: 'Test TLS Certificate', CN: 'localhost' }, issuer: { C: 'UK', ST: 'Acknack Ltd', L: 'Rhys Jones', O: 'node.js', OU: 'Test TLS Certificate', CN: 'localhost' }, valid_from: 'Nov 11 09:52:22 2009 GMT', valid_to: 'Nov 6 09:52:22 2029 GMT', fingerprint: '2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF' } ~~~ 如果节点没有提供证书, 它将返回 `null` 或者一个空对象. ### tlsSocket.getCipher() 返回一个对象,表示了当前连接的cipher名与SSL/TLS协议版本。 Example: { name: 'AES256-SHA', version: 'TLSv1/SSLv3' } See SSL_CIPHER_get_name() and SSL_CIPHER_get_version() in [http://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_CIPHERS](http://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_CIPHERS) for more information. ### tlsSocket.renegotiate(options, callback) Initiate TLS renegotiation process. The `options` may contain the following fields: `rejectUnauthorized`, `requestCert` (See [tls.createServer](#) for details). `callback(err)` will be executed with `null` as `err`, once the renegotiation is successfully completed. NOTE: Can be used to request peer's certificate after the secure connection has been established. ANOTHER NOTE: When running as the server, socket will be destroyed with an error after `handshakeTimeout` timeout. ### tlsSocket.address() Returns the bound address, the address family name and port of the underlying socket as reported by the operating system. Returns an object with three properties, e.g. `{ port: 12346, family: 'IPv4', address: '127.0.0.1' }` ### tlsSocket.remoteAddress 远程IP地址的字符串表示。例如,`'74.125.127.100'`或 `'2001:4860:a005::68'`。 ### tlsSocket.remotePort 远程端口的数值表示。例如, `443`。 ### tlsSocket.localAddress 本地IP地址的字符串表达。 ### tlsSocket.localPort 本地端口的数值表示。