TLS简介
- TLS:传输层安全协议,是一种安全协议,目的是为互联网通信提供安全及数据完整性保障
- TLS协议的优势是与高层的应用层协议(如HTTP、FTP、Telnet等)无耦合。应用层协议能透明地运行在TLS协议之上,由TLS协议进行创建加密通道需要的协商和认证。应用层协议传送的数据在通过TLS协议时都会被加密,从而保证通信的私密性
Docker–TLS加密通讯配置
- 为了防止链路劫持、会话劫持等问题导致Docker通信时被中间人攻击,c/s两端应该通过加密方式通讯
1、在master上操作
(1)更改本地的hosts文件
[root@master ~]# vim /etc/hosts
127.0.0.1 master
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
(2)创建ca密钥
[root@master ~]# mkdir /tls
[root@master ~]# cd /tls/
[root@master tls]# openssl genrsa -aes256 -out ca-key.pem 4096
Generating RSA private key, 4096 bit long modulus
............................................................................................++
.........................++
e is 65537 (0x10001)
Enter pass phrase for ca-key.pem: //输入密码
Verifying - Enter pass phrase for ca-key.pem: //确认密码
(3)创建ca证书
[root@master tls]# openssl req -new -x509 -days 1000 -key ca-key.pem -sha256 -subj "/CN=*" -out ca.pem
Enter pass phrase for ca-key.pem: //输入创建ca密钥时的密码
[root@master tls]# ls
ca-key.pem ca.pem
(4)创建服务器私钥
[root@master tls]# openssl genrsa -out server-key.pem 4096
Generating RSA private key, 4096 bit long modulus
.............++
............................................................................++
e is 65537 (0x10001)
(5)签名私钥
[root@master tls]# openssl req -subj "/CN=*" -sha256 -new -key server-key.pem -out server.csr
(6)使用ca证书与私钥证书签名
[root@master tls]# openssl x509 -req -days 1000 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out server-cert.pem
Signature ok
subject=/CN=*
Getting CA Private Key
Enter pass phrase for ca-key.pem: //输入创建ca密钥时的密码
(7)生成客户端密钥
[root@master tls]# openssl genrsa -out key.pem 4096
Generating RSA private key, 4096 bit long modulus
................................................................................................................................++
..........................++
e is 65537 (0x10001)
(8)签名客户端
[root@master tls]# openssl req -subj "/CN=client" -new -key key.pem -out client.csr
(9)创建配置文件
[root@master tls]# echo extendedKeyUsage=clientAuth > extfile.cnf
[root@master tls]# cat extfile.cnf
extendedKeyUsage=clientAuth
(10)签名证书,需要(签名客户端,ca证书,ca密钥)
[root@master tls]# openssl x509 -req -days 1000 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out cert.pem -extfile extfile.cnf
Signature ok
subject=/CN=client
Getting CA Private Key
Enter pass phrase for ca-key.pem: //输入密码
(11)清除多余的文件
[root@master tls]# rm -rf ca.srl client.csr extfile.cnf server.csr
(12)配置docker
[root@master tls]# vim /usr/lib/systemd/system/docker.service
#ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock
ExecStart=/usr/bin/dockerd --tlsverify --tlscacert=/tls/ca.pem --tlscert=/tls/server-cert.pem --tlskey=/tls/server-key.pem -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock
#重启进程
[root@master tls]# systemctl daemon-reload
#重启docker服务
[root@master tls]# systemctl restart docker
(13)将 /tls/ca.pem /tls/cert.pem /tls/key.pem 三个文件复制到另一台主机
[root@master tls]# scp ca.pem [email protected]:/etc/docker
[root@master tls]# scp cert.pem [email protected]:/etc/docker
[root@master tls]# scp key.pem [email protected]:/etc/docker
(14)本地测试验证
[root@master tls]# docker --tlsverify --tlscacert=ca.pem --tlscert=cert.pem --tlskey=key.pem -H tcp://master:2376 pull nginx
Using default tag: latest
latest: Pulling from library/nginx
54fec2fa59d0: Pull complete
4ede6f09aefe: Pull complete
f9dc69acb465: Pull complete
Digest: sha256:86ae264c3f4acb99b2dee4d0098c40cb8c46dcf9e1148f05d3a51c4df6758c12
Status: Downloaded newer image for nginx:latest
docker.io/library/nginx:latest
2、在client上操作
(1)更改hosts文件
[root@client ~]# vim /etc/hosts
192.168.7.168 master
(2)使用密钥测试验证
- 在密钥文件目录下
[root@client ~]# cd /etc/docker/
[root@client docker]# docker --tlsverify --tlscacert=ca.pem --tlscert=cert.pem --tlskey=key.pem -H tcp://master:2376 images
REPOSITORY TAG IMAGE ID CREATED SIZE
nginx latest 602e111c06b6 3 days ago 127MB