问题描述
我想手动(使用 socket 和 ssl 模块)通过本身使用 HTTPS 的代理发出
.HTTPS
请求
I'd like to manually (using the socket and ssl modules) make an HTTPS
request through a proxy which itself uses HTTPS
.
我可以很好地执行初始 CONNECT
交换:
I can perform the initial CONNECT
exchange just fine:
import ssl, socket
PROXY_ADDR = ("proxy-addr", 443)
CONNECT = "CONNECT example.com:443 HTTP/1.1
"
sock = socket.create_connection(PROXY_ADDR)
sock = ssl.wrap_socket(sock)
sock.sendall(CONNECT)
s = ""
while s[-4:] != "
":
s += sock.recv(1)
print repr(s)
上面的代码打印了 HTTP/1.1 200 Connection created
加上一些标头,这正是我所期望的.所以现在我应该准备好提出请求了,例如
The above code prints HTTP/1.1 200 Connection established
plus some headers, which is what I expect. So now I should be ready to make the request, e.g.
sock.sendall("GET / HTTP/1.1
")
但上面的代码返回
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
Reason: You're speaking plain HTTP to an SSL-enabled server port.<br />
Instead use the HTTPS scheme to access this URL, please.<br />
</body></html>
这也很有意义,因为我仍然需要与我要通过隧道连接的 example.com
服务器进行 SSL 握手.但是,如果不是立即发送 GET
请求,我说
This makes sense too, since I still need to do an SSL handshake with the example.com
server to which I'm tunneling. However, if instead of immediately sending the GET
request I say
sock = ssl.wrap_socket(sock)
与远程服务器握手,然后我得到一个异常:
to do the handshake with the remote server, then I get an exception:
Traceback (most recent call last):
File "so_test.py", line 18, in <module>
ssl.wrap_socket(sock)
File "/usr/lib/python2.6/ssl.py", line 350, in wrap_socket
suppress_ragged_eofs=suppress_ragged_eofs)
File "/usr/lib/python2.6/ssl.py", line 118, in __init__
self.do_handshake()
File "/usr/lib/python2.6/ssl.py", line 293, in do_handshake
self._sslobj.do_handshake()
ssl.SSLError: [Errno 1] _ssl.c:480: error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol
那么如何与远程 example.com
服务器进行 SSL 握手?
So how can I do the SSL handshake with the remote example.com
server?
我很确定在我第二次调用 wrap_socket
之前没有额外的数据可用,因为调用 sock.recv(1)
会无限期地阻塞.
I'm pretty sure that no additional data is available before my second call to wrap_socket
because calling sock.recv(1)
blocks indefinitely.
推荐答案
如果 CONNECT 字符串重写如下,这应该可以工作:
This should work if the CONNECT string is rewritten as follows:
CONNECT = "CONNECT %s:%s HTTP/1.0
Connection: close
" % (server, port)
不确定为什么会这样,但可能与我使用的代理有关.这是一个示例代码:
Not sure why this works, but maybe it has something to do with the proxy I'm using. Here's an example code:
from OpenSSL import SSL
import socket
def verify_cb(conn, cert, errun, depth, ok):
return True
server = 'mail.google.com'
port = 443
PROXY_ADDR = ("proxy.example.com", 3128)
CONNECT = "CONNECT %s:%s HTTP/1.0
Connection: close
" % (server, port)
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(PROXY_ADDR)
s.send(CONNECT)
print s.recv(4096)
ctx = SSL.Context(SSL.SSLv23_METHOD)
ctx.set_verify(SSL.VERIFY_PEER, verify_cb)
ss = SSL.Connection(ctx, s)
ss.set_connect_state()
ss.do_handshake()
cert = ss.get_peer_certificate()
print cert.get_subject()
ss.shutdown()
ss.close()
注意如何先打开套接字,然后再打开置于 SSL 上下文中的套接字.然后我手动初始化 SSL 握手.和输出:
Note how the socket is first opened and then open socket placed in SSL context. Then I manually initialize SSL handshake. And output:
HTTP/1.1 200 连接建立
<X509Name object '/C=US/ST=California/L=Mountain View/O=Google Inc/CN=mail.google.com'>
它基于 pyOpenSSL,因为我也需要获取无效的证书,并且 Python 内置的 ssl 模块将始终尝试验证收到的证书.
It's based on pyOpenSSL because I needed to fetch invalid certificates too and Python built-in ssl module will always try to verify the certificate if it's received.
这篇关于使用 ssl 模块的 HTTPS 代理隧道的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!