我正在尝试使用Spring Security创建一个演示应用程序,我需要使用SSL证书保护Rest API。 这些是我创建示例的步骤: 1-使用keytool命令生成了JKS文件:
keytool -genkey -keyalg RSA -alias tomcat -keystore selfsigned.jks -validity 365 -keysize 2048
2-将生成的jks转换为pkcs12格式:
keytool -genkey -keyalg RSA -alias tomcat -keystore selfsigned.jks -validity 365 -keysize 2048
3-创建了一个服务器端应用程序,如下所示:
@EnableWebSecurity
public class X509AuthenticationServer extends WebSecurityConfigurerAdapter {
@Override
protected void configure(HttpSecurity http) throws Exception {
http
.authorizeRequests()
.anyRequest()
.authenticated()
.and()
.x509()
.subjectPrincipalRegex("OU=My self signed certificate");
}
}
@Controller
@RequestMapping("/get")
public class UserController {
@PostMapping(value = "/user")
public String user(@RequestBody UserInfo userInfo) {
return "Welcome: " + userInfo.getUsername();
}
}
server.ssl.key-store=/Users/mymacuser/devhome/certpoc/selfsigned.jks
server.ssl.key-store-password=marwan
server.ssl.key-alias=tomcat
server.ssl.key-password=marwan
server.ssl.enabled=true
server.port=8443
spring.security.user.name=Admin
spring.security.user.password=admin
spring.security.require-ssl=true
4-创建了如下客户端应用程序:
@Configuration
public class BeanConfig {
@Bean("httpsClient")
public RestTemplate getSSLRestTemplate() throws IOException, CertificateException, NoSuchAlgorithmException, KeyStoreException, UnrecoverableKeyException, KeyManagementException {
char[] storePassword = "marwan".toCharArray();
File keyStore = new File("/Users/mymacuser/devhome/certpoc/selfsigned.jks");
SSLContext sslContext = new SSLContextBuilder()
.loadTrustMaterial(keyStore, storePassword)
.loadKeyMaterial(keyStore, storePassword, storePassword)
.build();
SSLConnectionSocketFactory socketFactory = new SSLConnectionSocketFactory(sslContext, NoopHostnameVerifier.INSTANCE);
CloseableHttpClient client = HttpClients.custom().setSSLSocketFactory(socketFactory).build();
HttpComponentsClientHttpRequestFactory factory = new HttpComponentsClientHttpRequestFactory(client);
RestTemplate restTemplate = new RestTemplate(factory);
// restTemplate.setMessageConverters(List.of(new Jaxb2RootElementHttpMessageConverter()));
return restTemplate;
}
@RestController
@RequestMapping("/get")
public class ClientController {
@Autowired
@Qualifier("httpsClient")
private RestTemplate httpsClient;
@RequestMapping("/user")
public String getUserFromServer() throws URISyntaxException {
ResponseEntity<String> s = httpsClient.exchange("https://localhost:8443/get/user", HttpMethod.POST, new HttpEntity<UserInfo>(new UserInfo("marwan")), String.class);
return s.getBody();
}
}
您会注意到,我的客户端是中间服务人员(MITM),我是从POSTMAN或curl请求中调用的。
当我调用对MITM服务的请求时,得到的响应是:
{
"timestamp": "2020-02-17T09:16:20.399+0000",
"status": 500,
"error": "Internal Server Error",
"message": "403 : [{\"timestamp\":\"2020-02-17T09:16:20.325+0000\",\"status\":403,\"error\":\"Forbidden\",\"message\":\"Forbidden\",\"path\":\"/get/user\"}]",
"path": "/get/user"
}
我尝试同时打印MITM和服务器端的网络日志,并且都显示它们正在交换正确的证书
答案 0 :(得分:0)
好吧, 所以我解决了这个问题,如果有人感兴趣,这里是解决方案: 在TLS中,有两个不同的存储区: KeyStore-用于存储用于对另一个对等方进行标识的密钥 TrustStore-用户撕毁受信任对等项的密钥 对于服务器端身份验证,还需要指定信任库并包括客户端证书。 另外,需要将以下属性添加到application.properties文件中:
server.ssl.client-auth=need
因此application.properties应该包括:
server.ssl.trust-store=file:/Users/mymacuser/devhome/certpoc/trust.jks
server.ssl.trust-store-type=JKS
server.ssl.trust-store-password=marwan
server.ssl.client-auth=need