我需要在公司代理后面进行curl上传。根据我尝试的网站,我遇到了以下两种类型的问题,
详情如下:
案例1:
. . .
< HTTP/1.1 200 Connection established
< Proxy-agent: CCProxy
<
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* CONNECT phase completed!
* CONNECT phase completed!
* error:1408F10B:SSL routines:ssl3_get_record:wrong version number
* Closing connection 0
curl: (35) error:1408F10B:SSL routines:ssl3_get_record:wrong version number
案例2:
$ curl -vX POST -d "userId=5&title=Hello World&body=Post body." https://jsonplaceholder.typicode.com/posts
Note: Unnecessary use of -X or --request, POST is already inferred.
* Uses proxy env variable https_proxy == 'http://10.xx.xx.xx:808/'
* Trying 10.xx.xx.xx:808...
* TCP_NODELAY set
* Connected to 10.xx.xx.xx port 808 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to jsonplaceholder.typicode.com:443
> CONNECT jsonplaceholder.typicode.com:443 HTTP/1.1
> Host: jsonplaceholder.typicode.com:443
> User-Agent: curl/7.68.0
> Proxy-Connection: Keep-Alive
>
< HTTP/1.1 200 Connection established
< Proxy-agent: CCProxy
<
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* CONNECT phase completed!
* CONNECT phase completed!
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (OUT), TLS alert, unknown CA (560):
* SSL certificate problem: unable to get local issuer certificate
* Closing connection 0
curl: (60) SSL certificate problem: unable to get local issuer certificate
More details here: https://curl.haxx.se/docs/sslcerts.html
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above.
问题不是上面的CCProxy,而是我们公司使用的是Zscaler透明代理,它用自己的证书拦截SSL请求。
请问有什么办法可以解决吗?
$ curl --version
curl 7.68.0 (x86_64-pc-linux-gnu) libcurl/7.68.0 OpenSSL/1.1.1g zlib/1.2.11 brotli/1.0.7 libidn2/2.3.0 libpsl/0.21.0 (+libidn2/2.3.0) libssh2/1.8.0 nghttp2/1.40.0 librtmp/2.3
Release-Date: 2020-01-08
$ lsb_release -a
No LSB modules are available.
Distributor ID: Debian
Description: Debian GNU/Linux bullseye/sid
Release: testing
Codename: bullseye
两个选项中的第 1 步都将提取 Zscaler 证书。
curl
命令传递您要使用的证书。# 1
openssl s_client -showcerts \
-connect jsonplaceholder.typicode.com:443 </dev/null 2>/dev/null \
| sed -n '/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p' > typicode.crt
# 2
curl --cacert typicode.crt -v \
-d "userId=5&title=Hello World&body=Post body." \
https://jsonplaceholder.typicode.com/posts
如果
curl
命令由您无法控制的安装程序执行,则更新您的证书:
jsonplaceholder.typicode.com:443
)# 1
openssl s_client -showcerts \
-connect jsonplaceholder.typicode.com:443 </dev/null 2>/dev/null \
| sed -n '/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p' > typicode.crt
# 2
sudo mv typicode.crt /usr/local/share/ca-certificates/
# 3
sudo update-ca-certificates
# 4 execute your installer script
如果您需要/只想获取 Zscaler 证书,请从以下位置获取 IP:https://ip.zscaler.com
openssl s_client -showcerts -servername server -connect 165.225.216.33:443 </dev/null 2>/dev/null | sed -n '/-----BEGIN CERTIFICATE-----/,/-----END CERTIFICATE-----/p' | grep -m1 -B-1 -- '-----END CERTIFICATE-----' > zscaler.crt
更新(11/19/21):
curl
,不需要安装证书。在 Zscaler 代理后面的 Ubuntu 20 和 18 上进行了测试。
无证书
有证书
参考资料:
答案是“将该代理的证书添加到 CA 捆绑包中”,感谢 Daniel Stenberg 的回答。然后我想我应该填写其余的内容。所以这是我尝试解决剩下的问题/问题--
转至策略 > SSL 检查。在中级根证书SSL 拦截权限部分中,单击下载Zscaler根证书。导航到 ZscalerRootCerts。 zip 文件并解压它。
- 您可以使用
来提供您公司的CA证书。
curl --cacert <CA certificate>
- 或者您可以将公司 CA 证书添加到
并在那里运行
/etc/pki/tls/certs/
以使其在系统范围内可用。
make
此错误 (
SSL certificate problem
) 意味着curl 用于验证服务器对等方的CA 存储不包含证书,因此无法验证服务器。
如果希望curl与终止TLS的透明代理一起使用,您必须将该代理的证书添加到CA捆绑包中,或者完全忽略证书检查(我建议不要这样做)。
TLS 的透明代理当然会使连接完全不可靠并且破坏安全属性。
我将 RootCA 证书导出为 PEM 并将文件内容复制到我从 https://curl.se/docs/caextract.html 下载的文件中。现在,CURL 适用于所有请求,甚至是那些最终被 ZScaler 拦截的请求。我还设置了包含两个证书的文件的
SSL_CERT_FILE
环境变量。