通过tomcat中的代理进行ocsp

时间:2018-10-22 14:29:18

标签: tomcat proxy ocsp

我有一个运行在RHEL 6.9上的Tomcat 7.0.70 Web服务器,位于代理后面, 我将tomcat本机1.2.18与4月1.6.5 openssl 1.1.1一起用于SSL / TLS

我需要将tomcat ocsp请求(那些是Http请求在端口80上的ocsp响应器)转发到代理,然后再转发到ocsp服务器(ocsp.comodoca.com)? comodo ocsp服务器每次解析为不同的ip  如何在RHEL上使用iptables做到这一点?或任何其他方式。    当前,无法为tomcat中的ocsp请求指定代理服务器地址 我知道在使用有效的openssl ocsp实用程序时如何从命令行手动指定代理,

openssl ocsp -no_nonce -header Host=ocsp.comodoca.com -issuer issuer.crt -cert /home/idis/STAR_ieml_ru.crt
 -CAfile issuer.crt -host 192.168.1.6:3131 -path http://ocsp.comodoca.com/ -text

OCSP Request Data:
    Version: 1 (0x0)
    Requestor List:
        Certificate ID:
          Hash Algorithm: sha1
          Issuer Name Hash: 7AE13EE8A0C42A2CB428CBE7A605461940E2A1E9
          Issuer Key Hash: 90AF6A3A945A0BD890EA125673DF43B43A28DAE7
          Serial Number: F078CB8E2F4E5A678BFB9065A9611B57
OCSP Response Data:
    OCSP Response Status: successful (0x0)
    Response Type: Basic OCSP Response
    Version: 1 (0x0)
    Responder Id: 90AF6A3A945A0BD890EA125673DF43B43A28DAE7
    Produced At: Oct 14 07:35:10 2018 GMT
    Responses:
    Certificate ID:
      Hash Algorithm: sha1
      Issuer Name Hash: 7AE13EE8A0C42A2CB428CBE7A605461940E2A1E9
      Issuer Key Hash: 90AF6A3A945A0BD890EA125673DF43B43A28DAE7
      Serial Number: F078CB8E2F4E5A678BFB9065A9611B57
    Cert Status: good
    This Update: Oct 14 07:35:10 2018 GMT
    Next Update: Oct 21 07:35:10 2018 GMT

    Signature Algorithm: sha256WithRSAEncryption
         28:c0:93:7d:9b:4d:96:16:37:f4:1f:fc:ca:8c:32:b1:bb:22:
         be:d8:33:14:9b:e9:75:18:b2:a5:20:77:ef:f9:6c:48:1c:72:
         8f:db:87:4a:30:50:04:72:9d:75:0f:ce:09:82:b7:56:bf:aa:
         62:fe:50:b7:10:96:82:b6:53:0f:a0:c8:b1:49:bf:0e:88:19:
         bf:41:64:21:8f:8f:9a:f3:1a:e5:3b:36:d0:96:7e:01:89:c4:
         a2:c3:19:3c:fa:fa:e7:ad:df:4e:76:37:32:72:ba:95:23:4e:
         c6:09:c8:a6:a1:28:63:5f:e6:6a:62:55:e3:a2:a8:29:47:4b:
         70:a2:6b:e3:07:0a:a0:b2:28:79:61:24:f8:ab:9a:ff:bf:b6:
         ff:2b:ca:0e:f1:a8:cc:2a:ae:a5:4a:90:40:14:64:b1:ca:10:
         ca:44:a3:f9:00:af:d7:55:0b:5b:0e:0f:d9:8b:3a:c9:a2:41:
         4e:e5:23:23:9a:36:dc:28:c3:a8:4d:1c:08:c7:64:87:a5:0c:
         d7:08:57:a8:62:85:73:d5:f7:14:a2:c7:07:e9:57:e9:e1:1a:
         21:d0:d9:56:62:06:0f:05:bc:19:b7:c8:63:5a:a8:97:28:f3:
         1b:5b:30:3c:d6:31:ec:f5:cb:cd:f8:7e:61:cd:2b:ea:19:1c:
         17:8c:a4:9a
Response verify OK
/home/idis/STAR_ieml_ru.crt: good
        This Update: Oct 14 07:35:10 2018 GMT
        Next Update: Oct 21 07:35:10 2018 GMT

但是我该如何在tomcat本身中做到这一点?     我的tomcat https连接器

    <Connector protocol="HTTP/1.1" port="8080" redirectPort="443"  />

        <!-- Define a SSL HTTP/1.1 Connector on port 8443 -->
    <Connector allowTrace="false" server=" " port="8443" maxPostSize="10485760 "  maxHttpHeaderSize="1048576"
               protocol="org.apache.coyote.http11.Http11AprProtocol"
               connectionTimeout="20000"
               redirectPort="8443"
               SSLHonorCipherOrder="true"
               SSLCertificateFile="/home/idis/STAR_ieml_ru.crt"
               SSLCertificateKeyFile="/home/idis/server.key"
               SSLCertificateChainFile="/home/idis/authorities.crt"
               SSLProtocol="all-TLSv1"
               maxThreads="350"  minSpareThreads="25" SSLEnabled="true"
               enableLookups="false" disableUploadTimeout="true"
               acceptCount="100" scheme="https" secure="true"
       compression="force"
    SSLCipherSuite="TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA384,TLS_AES_128_GCM_SHA256,ECDHE-ECDSA-AES256-GCM-SHA384 ,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,    ECDHE-ECDSA-AES256-GCM-SHA256,ECDHE-RSA-AES256-GCM-SHA384,ECDHE-ECDSA-AES128-GCM-SHA256,  ECDHE-RSA-AES128-GCM-SHA256,ECDHE-ECDSA-AES256-SHA384,ECDHE-RSA-AES256-SHA384,ECDHE-ECDSA-AES128-SHA256,ECDHE-RSA-AES128-SHA256,
    ECDHE-RSA-AES128-SHA,ECDHE-RSA-AES256-SHA"/>

有什么想法吗?

0 个答案:

没有答案