问题描述
网站https://example.org的大多数/许多访问者都获得了连接超时。一些访问者通过,可能是从http://example.org重定向的访问者,或者以前访问过该网站的那些访问者。
我正在尝试确定这是防火墙问题还是Nginx配置问题。
防火墙
我将UFW用作防火墙,它具有以下规则:
To Action From
-- ------ ----
SSH ALLOW Anywhere
Nginx Full ALLOW Anywhere
80/tcp ALLOW Anywhere
443/tcp ALLOW Anywhere
SSH (v6) ALLOW Anywhere (v6)
Nginx Full (v6) ALLOW Anywhere (v6)
80/tcp (v6) ALLOW Anywhere (v6)
443/tcp (v6) ALLOW Anywhere (v6)
如果有人需要的话,我可以从iptables中给出一些相关的规则,但是我需要有关查找内容的指导。
我得到sudo netstat -anop | grep LISTEN | grep ':443'
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 120907/Nginx: worke off (0.00/0/0)
tcp6 0 0 :::443 :::* LISTEN 120907/Nginx: worke off (0.00/0/0)
不确定“解决”是什么意思。
Nginx
这是一个虚拟主机,服务器名称为myservername.com,它提供两个网站example.org和example.com/directory。 Example.org指向运行eXist-db的Docker容器。 Example.com/directory正在localhost:8080上提供一个目录,该目录从example.com所在的另一台服务器代理。当我在浏览器中访问example.com/directory时,它在https上运行顺利-我认为这是因为它实际上是通过http与example.com主机通信的。
Example.org和myservername.com都具有certbot生成的加密证书。
当我从本地计算机尝试nmap时,我得到了一些我无法解释的结果。请注意端口80和端口443之间以及IPv4和IPv6之间的差异
$ nmap -A -T4 -p443 example.org
443/tcp filtered https
$ nmap -A -T4 -p443 my.server.ip.address
443/tcp filtered https
$ nmap -A -T4 -p443 -6 my:server:ip::v6:address
443/tcp open ssl/http Nginx 1.10.3
$ nmap -A -T4 -p80 example.org
80/tcp open http Nginx 1.10.3
$ nmap -A -T4 -p80 my.server.ip.address
80/tcp open http Nginx 1.10.3
我的 Nginx.conf 是
user www-data;
worker_processes auto;
pid /run/Nginx.pid;
include /etc/Nginx/modules-enabled/*.conf;
events {
worker_connections 768;
# multi_accept on;
}
http {
##
# Basic Settings
##
client_max_body_size 50M;
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 2048;
# server_tokens off;
server_names_hash_bucket_size 64;
# server_name_in_redirect off;
include /etc/Nginx/mime.types;
default_type application/octet-stream;
##
# SSL Settings
##
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; # Dropping SSLv3,ref: POODLE
ssl_prefer_server_ciphers on;
##
# Logging Settings
##
access_log /var/log/Nginx/access.log;
error_log /var/log/Nginx/error.log;
##
# Gzip Settings
##
gzip on;
gzip_disable "msie6";
# gzip_vary on;
# gzip_proxied any;
# gzip_comp_level 6;
# gzip_buffers 16 8k;
# gzip_http_version 1.1;
# gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+RSS text/javascript;
##
# Virtual Host Configs
##
include /etc/Nginx/conf.d/*.conf;
include /etc/Nginx/sites-enabled/*;
}
和我的 Nginx服务器阻止:
server {
listen 80 default_server;
listen [::]:80 default_server;
server_name _ myservername.com;
return 301 https://myservername.com$request_uri;
}
server {
# SSL configuration
#
listen 443 ssl default_server;
listen [::]:443 ssl default_server;
server_name _ myservername.com;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_pass http://localhost:8080;
}
ssl_certificate /etc/letsencrypt/live/myservername.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/myservername.com/privkey.pem;
}
server {
listen 80;
listen [::]:80;
server_name example.com www.example.com;
gzip off;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_pass http://localhost:8080;
}
}
server {
listen 80;
listen [::]:80;
server_name example.org www.example.org;
return 301 https://example.org$request_uri;
}
server {
# SSL configuration
#
listen 443 ssl;
listen [::]:443 ssl;
server_name example.org www.example.org;
gzip off;
location / {
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_pass http://docker.container.ip.address:port/exist/apps/example/;
}
location /workshop2020/ {
return 302 http://example.org/forum2020/;
}
location /exist/apps/example/ {
rewrite ^/exist/apps/example/(.*)$ /$1;
}
ssl_certificate /etc/letsencrypt/live/example.org/fullchain.pem; # managed by Certbot
ssl_certificate_key /etc/letsencrypt/live/example.org/privkey.pem; # managed by Certbot
}
非常感谢您的帮助!
解决方法
事实证明,它是防火墙,而不是nginx。尽管我将ufw用作防火墙,但是iptables中存在一个预先存在的INPUT DROP规则(但ip6tables中没有),该规则捕获了https请求。
感谢Francis Daly over in the nginx forums解释了如何识别对端口443的https请求是否甚至到达了nginx。
我在浏览器中禁用了IPv6,然后尝试加载该站点。通过在尝试加载站点的同时查看tcpdump,我可以看到请求发生了什么-$ sudo tcpdump -nnSX -v port 443
显示了一堆带有Flags [S]
的数据包。因此,请求到达了机器,但没有握手。
将此与nginx访问日志进行比较,我可以看到请求根本没有到达nginx。
所以我更加仔细地检查了iptables并发现了违规规则。