功能类似于https://github.com/dlundquist/sniproxy
推荐 OpenResty 加上 stream 模块和 ngx_stream_lua_module 模块(https://github.com/openresty/stream-lua-nginx-module)。在 1.9.15.1 上测试通过。
示例配置:
stream {lua_resolver 8.8.8.8;
init_worker_by_lua_block {
sni_rules = {
["www.google.com"] = {"www.google.com", 443},
["www.facebook.com"] = {"9.8.7.6", 443},
["twitter.com"] = {"1.2.3.4"},
[".+.twitter.com"] = {nil, 443}
}
}
server {
error_log /var/log/nginx/sniproxy-error.log error;
listen 443;
content_by_lua_block {
local sni = require("resty.sniproxy")
local sp = sni:new()
sp:run()
}
}
}
A Lua table sni_rules should be defined in the init_worker_by_lua_block directive.
The key can be either whole host name or regular expression. Use . for a default host name. If no entry is matched, connection will be closed.
The value is a table containing host name and port. If host is set to nil, the server_name in SNI will be used. If the port is not defined or set to nil, 443 will be used.
Rules are applied with the priority as its occurrence sequence in the table. In the example above, twitter.com will match the third rule rather than the fourth.
If the protocol version is less than TLSv1 (eg. SSLv3, SSLv2), connection will be closed, since SNI extension is not supported in these versions.
----------
SNI Proxy based on ngx_stream_lua_module
Note that nginx stream module and ngx_stream_lua_module is required.
Tested on Openresty >= 1.9.15.1.
Back to TOC
The first value can be either whole host name or regular expression. Use
The second and third values are target host name and port. A host can be DNS name, IP address or UNIX domain socket path. If host is not defined or set to
Rules are applied with the priority as its occurrence sequence in the table. In the example above, api.twitter.com will match the third rule api.twitter.com rather than the fourth .+.twitter.com.
If the protocol version is less than TLSv1 (eg. SSLv3, SSLv2), connection will be closed, since SNI extension is not supported in these versions.
from https://github.com/fffonion/lua-resty-sniproxy
推荐 OpenResty 加上 stream 模块和 ngx_stream_lua_module 模块(https://github.com/openresty/stream-lua-nginx-module)。在 1.9.15.1 上测试通过。
示例配置:
stream {lua_resolver 8.8.8.8;
init_worker_by_lua_block {
sni_rules = {
["www.google.com"] = {"www.google.com", 443},
["www.facebook.com"] = {"9.8.7.6", 443},
["twitter.com"] = {"1.2.3.4"},
[".+.twitter.com"] = {nil, 443}
}
}
server {
error_log /var/log/nginx/sniproxy-error.log error;
listen 443;
content_by_lua_block {
local sni = require("resty.sniproxy")
local sp = sni:new()
sp:run()
}
}
}
A Lua table sni_rules should be defined in the init_worker_by_lua_block directive.
The key can be either whole host name or regular expression. Use . for a default host name. If no entry is matched, connection will be closed.
The value is a table containing host name and port. If host is set to nil, the server_name in SNI will be used. If the port is not defined or set to nil, 443 will be used.
Rules are applied with the priority as its occurrence sequence in the table. In the example above, twitter.com will match the third rule rather than the fourth.
If the protocol version is less than TLSv1 (eg. SSLv3, SSLv2), connection will be closed, since SNI extension is not supported in these versions.
----------
SNI Proxy based on ngx_stream_lua_module
Description
This library is an SNI proxy written in Lua. TLS parsing part is rewritten from dlundquist/sniproxyNote that nginx stream module and ngx_stream_lua_module is required.
Tested on Openresty >= 1.9.15.1.
Back to TOC
Status
Experimental.Synopsis
stream {
lua_resolver 8.8.8.8;
init_worker_by_lua_block {
sni_rules = {
{"www.google.com", "www.google.com", 443},
{"www.facebook.com", "9.8.7.6", 443},
{"api.twitter.com", "1.2.3.4"},
{".+.twitter.com", nil, 443},
{".", "unix:/var/run/nginx-default.sock"}
}
}
server {
error_log /var/log/nginx/sniproxy-error.log error;
listen 443;
content_by_lua_block {
local sni = require("resty.sniproxy")
local sp = sni:new()
sp:run()
}
}
}
A Lua array table sni_rules
should be defined in the init_worker_by_lua_block
directive.The first value can be either whole host name or regular expression. Use
.
for a default host name. If no entry is matched, connection will be closed.The second and third values are target host name and port. A host can be DNS name, IP address or UNIX domain socket path. If host is not defined or set to
nil
, server_name in SNI will be used. If the port is not defined or set to nil
, 443 will be used.Rules are applied with the priority as its occurrence sequence in the table. In the example above, api.twitter.com will match the third rule api.twitter.com rather than the fourth .+.twitter.com.
If the protocol version is less than TLSv1 (eg. SSLv3, SSLv2), connection will be closed, since SNI extension is not supported in these versions.
from https://github.com/fffonion/lua-resty-sniproxy
No comments:
Post a Comment