我有一个基于 Linux 的 Docker 容器,如果我这样做:
curl https://google.com
…然后我收到一个错误:
curl:(60)SSL证书问题:证书链中的自签名证书更多详细信息: https ://curl.haxx.se/docs/sslcerts.html
任何 URL 都会发生同样的情况——这不是谷歌的问题。
上面引用的链接提出了各种解决方案,除了可能是最后一个建议更新证书存储区之外,似乎没有一个是合适的。但是没有关于如何做到这一点的说明(或者至少对我来说没有任何意义)。
这是正确的做法吗?如果是这样,该怎么做?
更新:根据要求,结果如下:
openssl s_client -showcerts -connect www.google.com:443
CONNECTED(00000003)
depth=3 DC = com, DC = forestroot, CN = SHA256RootCA
verify error:num=19:self signed certificate in certificate chain
---
Certificate chain
0 s:/C=US/ST=California/L=Mountain View/O=Google LLC/CN=www.google.com
i:/CN=ssl-decrypt
-----BEGIN CERTIFICATE-----
MIIDXzCCAkegAwIBAgIIXIk3p8xOX/kwDQYJKoZIhvcNAQELBQAwFjEUMBIGA1UE
AxMLc3NsLWRlY3J5cHQwHhcNMTgxMjE5MDgxNzAwWhcNMTkwMzEzMDgxNzAwWjBo
...
tq0VAGIoj4+YhO6bktTq3alCRoLstJuuxjVdb1wRkH4YRi0I6ZAB1Cw+M8Lg+2eQ
KuEo
-----END CERTIFICATE-----
1 s:/CN=ssl-decrypt
i:/DC=com/DC=bgs/CN=SHA256IssueCA
-----BEGIN CERTIFICATE-----
MIIGzDCCBLSgAwIBAgITEQAADvB9T7mSaacwDQABAAAO8DANBgkqhkiG9w0BAQsF
ADBCMRMwEQYKCZImiZPyLGQBGRYDY29tMRMwEQYKCZImiZPyLGQBGRYDYmdzMRYw
...
1z9f/nkj2XTRyGeACoy0qRd5uXJHp1iGM27l3RFDR9OjrfPV56pOBUYWAlc9Nn+1
Vr3qUZrcCkROrmYisVF4jg==
-----END CERTIFICATE-----
2 s:/DC=com/DC=MyCompanyServer/CN=SHA256IssueCA
i:/DC=com/DC=MyCompanyServer/CN=SHA256RootCA
-----BEGIN CERTIFICATE-----
MIIH4zCCBcugAwIBAgITOQAAAAOa4wv9nnK0uQAAAAAAAzANBgkqhkiG9w0BAQsF
ADBIMRMwEQYKCZImiZPyLGQBGRYDY29tMRowGAYKCZImiZPyLGQBGRYKZm9yZXN0
...
IomErcbcymIWBmN75PVMsk9EMyqDP394jG8+IOK+lVUVX4pxzhdd7eYbqTAwDE1X
bNWcZZkt/w==
-----END CERTIFICATE-----
3 s:/DC=com/DC=MyCompanyServer/CN=SHA256RootCA
i:/DC=com/DC=MyCompanyServer/CN=SHA256RootCA
-----BEGIN CERTIFICATE-----
MIIFgzCCA2ugAwIBAgIQULxmYXGJ1aFIlIyCHA4NIzANBgkqhkiG9w0BAQsFADBI
MRMwEQYKCZImiZPyLGQBGRYDY29tMRowGAYKCZImiZPyLGQBGRYKZm9yZXN0cm9v
...
jQBLY0/KIjHywv66GhtVWpexgQcXrLxQP2VHW7eXpsylvwkNU5XNQYzHTB7u+w5C
VunfRLt/7mVWyURcwkOre38tVSByKR4=
-----END CERTIFICATE-----
---
Server certificate
subject=/C=US/ST=California/L=Mountain View/O=Google LLC/CN=www.google.com
issuer=/CN=ssl-decrypt
---
No client certificate CA names sent
Peer signing digest: SHA256
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 6556 bytes and written 302 bytes
Verification error: self signed certificate in certificate chain
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES128-GCM-SHA256
Session-ID: 723D9976F985887CA5F256EE3C2E7B44B9C98A6B440AAF4E19564AE101F78D00
Session-ID-ctx:
Master-Key: C3D8759A753C1D269FF9C00854E59B8C10ABC1E94AFE9F0166486A649FE295ACE1AF5E5BEDB0129E557E781BC860D2FA
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1548690163
Timeout : 7200 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
Extended master secret: yes
---
read:errno=0
我从中收集到的是,这个链中有属于我工作的公司的证书(我已将其重命名为 MyCompanyServer),我想这就是问题所在。
我是否认为我需要为该证书安装某种密钥?这对我来说都是希腊语,所以为新手问题道歉。
原文由 Gary McGill 发布,翻译遵循 CC BY-SA 4.0 许可协议
可能容器中没有正确的 CA 证书,因此无法验证 TLS 连接。
尝试安装
ca-certificates
包(包可能有不同的名称,这取决于使用的发行版)。更新:
贵公司检查公司网络中的 TLS 连接,因此原始证书将替换为贵公司证书。您需要将您的公司 CA 证书添加到根 CA 证书。
Linux(Ubuntu,Debian):
/usr/local/share/ca-certificates/
sudo update-ca-certificates
如果您的主机操作系统已经正确预配置了 CA 证书(包括公司 CA 证书),那么您可以将它们作为卷挂载到容器中:
典型的 CA 证书位置:
/etc/ssl/certs/ca-certificates.crt
Debian/Ubuntu/Gentoo 等。/etc/pki/tls/certs/ca-bundle.crt
Fedora/RHEL 6/etc/ssl/ca-bundle.pem
OpenSUSE/etc/pki/tls/cacert.pem
OpenELEC/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
CentOS/RHEL 7