Apache HTTP 服务器出现间歇性 SSL 握手错误

问题描述 投票:0回答:3

我发现 Java 客户端和浏览器通过 Apache HTTP 服务器访问站点时出现间歇性 SSL 握手错误。这种情况很少发生,但它每天都会破坏构建并影响用户体验。服务器配置为建立安全连接,但不需要客户端提供证书。

我已在 Java 测试客户端和服务器上打开 SSL 调试输出(见下文)。我观察到,每当发生握手异常时,服务器似乎都发送了对客户端证书的请求。我不明白为什么它会这样做,也不明白为什么这种情况只是偶尔发生。当它确实发送证书请求时,几乎总是会发生错误,但是我也捕获了成功的请求(可能是 1% 的时间,99% 失败)。

客户端使用Java 8(1.8.0_31-b13),Apache HTTP服务器版本为2.2.19。

以下是日志片段:

1) Apache 配置摘录

SSLProtocol ALL -SSLv2 -SSLv3
SSLCertificateFile <path-to-pem1>
SSLCertificateChainFile <path-to-pem2>
SSLCACertificateFile <path-to-pem3>
SSLVerifyDepth 10
SSLVerifyClient none

.pem 文件是世界可读的。

2)客户端日志(严重缩写)

*** ClientHello, TLSv1.2
***
*** ServerHello, TLSv1
***
*** Certificate chain
***
*** Diffie-Hellman ServerKeyExchange
*** CertificateRequest
*** ServerHelloDone
*** Certificate chain
***
*** ClientKeyExchange, DH
*** Finished
***
...
main, WRITE: TLSv1 Handshake, length = 48
main, waiting for close_notify or alert: state 1
main, Exception while waiting for close java.net.SocketException: Software caused connection abort: recv failed
main, handling exception: java.net.SocketException: Software caused connection abort: recv failed
%% Invalidated:  [Session-1, TLS_DHE_RSA_WITH_AES_128_CBC_SHA]
main, SEND TLSv1 ALERT:  fatal, description = unexpected_message
...
main, WRITE: TLSv1 Alert, length = 32
main, Exception sending alert: java.net.SocketException: Software caused connection abort: socket write error
main, called closeSocket()

3)服务器日志(略)

[info] [client x.x.x.x] Connection to child 1 established (server XXX:443)
[info] Seeding PRNG with 0 bytes of entropy
[debug] ssl_engine_kernel.c(1866): OpenSSL: Handshake: start
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: before/accept initialization
[debug] ssl_engine_io.c(1897): OpenSSL: read 11/11 bytes from BIO#82f6820 [mem: 82c5290] (BIO dump follows)
[debug] ssl_engine_io.c(1830): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1869): | 0000: XX XX XX XX XX XX XX XX-XX XX XX                 ...........      |
[debug] ssl_engine_io.c(1875): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1897): OpenSSL: read 245/245 bytes from BIO#82f6820 [mem: 82c529b] (BIO dump follows)
[debug] ssl_engine_io.c(1830): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1869): | 0000: XX XX XX XX XX XX XX XX-XX XX XX XX XX XX XX XX  ................ |
...
[debug] ssl_engine_io.c(1869): | 00f0: XX XX XX XX XX                                   .....            |
[debug] ssl_engine_io.c(1875): +-------------------------------------------------------------------------+
[debug] ssl_engine_kernel.c(1987): [client x.x.x.x] SSL virtual host for servername XXX found
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 read client hello A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write server hello A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write certificate A
[debug] ssl_engine_kernel.c(1274): [client x.x.x.x] handing out temporary 1024 bit DH key
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write key exchange A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write certificate request A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_io.c(1897): OpenSSL: read 5/5 bytes from BIO#82f6820 [mem: 82c5290] (BIO dump follows)
[debug] ssl_engine_io.c(1830): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1869): | 0000: 16 03 01 00 8d                                   .....            |
[debug] ssl_engine_io.c(1875): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1897): OpenSSL: read 141/141 bytes from BIO#82f6820 [mem: 82c5295] (BIO dump follows)
[debug] ssl_engine_io.c(1830): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1869): | 0000: XX XX XX XX XX XX XX XX-XX XX XX XX XX XX XX XX  ................ |
...
[debug] ssl_engine_io.c(1869): | 0080: XX XX XX XX XX XX XX XX-XX XX XX XX XX           .............    |
[debug] ssl_engine_io.c(1875): +-------------------------------------------------------------------------+
[debug] ssl_engine_kernel.c(1884): OpenSSL: Write: SSLv3 read client certificate B
[debug] ssl_engine_kernel.c(1903): OpenSSL: Exit: error in SSLv3 read client certificate B
[debug] ssl_engine_kernel.c(1903): OpenSSL: Exit: error in SSLv3 read client certificate B
[info] [client x.x.x.x] SSL library error 1 in handshake (server XXX:443)
[info] SSL Library Error: 336105671 error:140890C7:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate No CAs known to server for verification?
[info] [client x.x.x.x] Connection closed to child 1 with abortive shutdown (server XXX:443)

在良好的情况下,我们始终在客户端上看到没有“*** CertificateRequest”,并在服务器上看到这样的输出

[debug] ssl_engine_kernel.c(1987): [client x.x.x.x] SSL virtual host for servername XXX found
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 read client hello A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write server hello A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write certificate A
[debug] ssl_engine_kernel.c(1274): [client x.x.x.x] handing out temporary 1024 bit DH key
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write key exchange A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 write server done A
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 flush data
[debug] ssl_engine_io.c(1897): OpenSSL: read 5/5 bytes from BIO#82d82d8 [mem: 82c8790] (BIO dump follows)
[debug] ssl_engine_io.c(1830): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1869): | 0000: 16 03 01 00 86                                   .....            |
[debug] ssl_engine_io.c(1875): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1897): OpenSSL: read 134/134 bytes from BIO#82d82d8 [mem: 82c8795] (BIO dump follows)
[debug] ssl_engine_io.c(1830): +-------------------------------------------------------------------------+
[debug] ssl_engine_io.c(1869): | 0000: XX XX XX XX XX XX XX XX-XX XX XX XX XX XX XX XX  ................ |
...
[debug] ssl_engine_io.c(1869): | 0080: XX XX XX XX XX XX                                ......           |
[debug] ssl_engine_io.c(1875): +-------------------------------------------------------------------------+
[debug] ssl_engine_kernel.c(1874): OpenSSL: Loop: SSLv3 read client key exchange A

Java客户端代码概要:

URL url = new URL("https://...");
HttpsURLConnection connection = (HttpsURLConnection) url.openConnection();
connection.setRequestProperty("Authorization", "Basic " + DatatypeConverter.printBase64Binary((user + ":" + pass).getBytes(Charset.forName("UTF-8"))));
connection.setReadTimeout(60*1000);
connection.setUseCaches(false);
connection.connect();

一起奔跑
java -Djavax.net.ssl.trustStore=... -Djavax.net.ssl.trustStoreType=jks -Djavax.net.ssl.trustStorePassword=... -Djavax.net.debug=all ...

问题:

  1. 是什么让服务器发送证书请求,导致 在客户端输出“*** CertificateRequest”?
  2. 设置“SSLVerifyClient none”是否不会阻止证书请求?
  3. 对于下一步要看什么有什么建议吗?

更新:我注意到使用Java 6时Java客户端永远不会显示错误。 Java 7 和 8、Chrome、Internet Explorer 和 Firefox 中都会出现此问题。这似乎表明 TLSv1.1 或 TLSv1.2 存在问题(另请参阅 https://serverfault.com/questions/513961/how-to-disable-tls-1-1-1-2-in-apache “OpenSSL v1.0.1 存在一些与 TLSv1.2 相关的已知问题”)。我会尝试至少检查在 Java 客户端中禁用 TLSv1.1/2 是否会使问题消失。

java apache ssl handshake
3个回答
0
投票

是什么让服务器发送证书请求,导致客户端输出“*** CertificateRequest”?

您将

SSLVerifyClient
设置为“可选”或更高的位置,可能在 .htaccess 文件中,这就是您在配置文件中找不到它的原因。这会覆盖全局设置的“SSLVerifyClient none”。


0
投票

是什么让服务器发送证书请求,导致客户端输出“*** CertificateRequest”?

呼叫服务器上的

SSL_CTX_set_client_CA_list
。它是一个专有名称列表。另请参阅
SSL_CTX_set_client_CA_list
手册页

服务器还需要调用

SSL_CTX_load_verify_locations
来建立对 CA 的信任。另请参阅
SSL_CTX_load_verify_locations
手册页


设置“SSLVerifyClient none”是否不会阻止证书请求?

有可能。从

SSL_CTX_set_verify
手册页,您需要
SSL_VERIFY_PEER
,可能还需要
SSL_VERIFY_FAIL_IF_NO_PEER_CERT


对于下一步要看什么有什么建议吗?

您应该显示您的相关Java代码。

您应该注明服务器和客户端使用的 OpenSSL 版本。


0
投票

经过漫长而繁琐的调试和分析,我想报告一下结果。该问题与客户端发送的 TLS 握手的第一条

ClientHello
消息有关。

Java 7 和 Java 8 客户端(可能还有所有现代浏览器)使用“服务器名称指示”(SNI) 扩展。仅当使用此扩展时才会出现此问题。 Java 6 客户端不发送它,并且该问题从未发生过。问题发生在 TLSv1 和 TLSv1.2 上 - 我们从未观察到 TLSv1.1 请求,因此我无法发表评论。

对于 Java 7 和 8 客户端,为了防止出现此问题,我们可以设置

-Djsse.enableSNIExtension=false
,以阻止客户端发送 SNI 扩展。

我们将尝试更改

httpd.conf
配置(和包含的文件),看看是否能让服务器表现良好。如果我们成功,即是否有服务器端解决方法,我可能会发布信息。上面提到的 Java 开关是一种客户端解决方法,至少对于我们的夜间构建来说足够好。

© www.soinside.com 2019 - 2024. All rights reserved.