nginx.conf 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. map $ssl_client_s_dn $ssl_client_s_dn_cn {
  2. default "no_client_cert";
  3. ~(^|,)CN=(?<CN>[^,]+) $CN;
  4. }
  5. server {
  6. listen 443 ssl default_server;
  7. server_name _;
  8. root /dev/null;
  9. # next 3 lines force clients to provide a client cert, and ensure that the
  10. # cert is trusted by the chain in clientssl.crt.
  11. ssl_verify_client on;
  12. ssl_client_certificate /etc/ssl/clientssl.crt;
  13. ssl_verify_depth 2;
  14. # Don't advertise
  15. server_tokens off;
  16. # Don't merge slashes
  17. merge_slashes off;
  18. location / {
  19. proxy_set_header X-Real-IP $remote_addr;
  20. proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
  21. proxy_set_header Host $http_host;
  22. proxy_set_header X-Forwarded-Proto $scheme;
  23. proxy_set_header X-Forwarded-Ssl on;
  24. proxy_set_header X-Forwarded-Port $server_port;
  25. proxy_set_header X-Forwarded-Host $host;
  26. # these next two headers are consumed by Nantum VTN to validate client cert
  27. # CN vs. VEN Common Name, and client cert fingerprint vs. VenID.
  28. proxy_set_header SSL_CLIENT_S_DN_CN $ssl_client_s_dn_cn;
  29. proxy_set_header SSL_CLIENT_CERTIFICATE $ssl_client_escaped_cert;
  30. proxy_redirect off;
  31. proxy_pass http://nantum-vtn-nodejs:8080;
  32. }
  33. ssl_certificate /etc/ssl/ssl.crt;
  34. ssl_certificate_key /etc/ssl/ssl.key;
  35. }