This module provides support for the CONNECT method request. This method is mainly used to tunnel SSL requests through proxy servers.
server {
listen 3128;
# dns resolver used by forward proxying
resolver 8.8.8.8;
# forward proxy for CONNECT requests
proxy_connect;
proxy_connect_allow 443 563;
proxy_connect_connect_timeout 10s;
proxy_connect_data_timeout 10s;
# defined by yourself for non-CONNECT requests
# Example: reverse proxy for non-CONNECT requests
location / {
proxy_pass http://$host;
proxy_set_header Host $host;
}
}
resolver
directive MUST be configured globally in server {}
block (or http {}
block).location {}
block, upstream {}
block and any other standard backend/upstream directives, such as proxy_pass
, do not impact the functionality of this module. (The proxy_connect module only executes the logic for requests that use the CONNECT method and that have a data flow under this tunnel.)
location {}
block as following:
location / {
return 403 "Non-CONNECT requests are forbidden";
}
With above configuration(configuration example
), you can get any https website via HTTP CONNECT tunnel. A simple test with command curl
is as following:
$ curl https://github.com/ -v -x 127.0.0.1:3128
* Trying 127.0.0.1... -.
* Connected to 127.0.0.1 (127.0.0.1) port 3128 (#0) | curl creates TCP connection with nginx (with proxy_connect module).
* Establish HTTP proxy tunnel to github.com:443 -'
> CONNECT github.com:443 HTTP/1.1 -.
> Host: github.com:443 (1) | curl sends CONNECT request to create tunnel.
> User-Agent: curl/7.43.0 |
> Proxy-Connection: Keep-Alive -'
>
< HTTP/1.0 200 Connection Established .- nginx replies 200 that tunnel is established.
< Proxy-agent: nginx (2)| (The client is now being proxied to the remote host. Any data sent
< '- to nginx is now forwarded, unmodified, to the remote host)
* Proxy replied OK to CONNECT request
* TLS 1.2 connection using TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 -.
* Server certificate: github.com |
* Server certificate: DigiCert SHA2 Extended Validation Server CA | curl sends "https://github.com" request via tunnel,
* Server certificate: DigiCert High Assurance EV Root CA | proxy_connect module will proxy data to remote host (github.com).
> GET / HTTP/1.1 |
> Host: github.com (3) |
> User-Agent: curl/7.43.0 |
> Accept: */* -'
>
< HTTP/1.1 200 OK .-
< Date: Fri, 11 Aug 2017 04:13:57 GMT |
< Content-Type: text/html; charset=utf-8 | Any data received from remote host will be sent to client
< Transfer-Encoding: chunked | by proxy_connect module.
< Server: GitHub.com (4)|
< Status: 200 OK |
< Cache-Control: no-cache |
< Vary: X-PJAX |
... |
... <other response headers & response body> ... |
... '-
The sequence diagram of above example is as following:
curl nginx (proxy_connect) github.com
| | |
(1) |-- CONNECT github.com:443 -->| |
| | |
| |----[ TCP connection ]--->|
| | |
(2) |<- HTTP/1.1 200 ---| |
| Connection Established | |
| | |
| |
========= CONNECT tunnel has been established. ===========
| |
| | |
| | |
| [ SSL stream ] | |
(3) |---[ GET / HTTP/1.1 ]----->| [ SSL stream ] |
| [ Host: github.com ] |---[ GET / HTTP/1.1 ]-->.
| | [ Host: github.com ] |
| | |
| | |
| | |
| | [ SSL stream ] |
| [ SSL stream ] |<--[ HTTP/1.1 200 OK ]---'
(4) |<--[ HTTP/1.1 200 OK ]------| [ < html page > ] |
| [ < html page > ] | |
| | |
server {
listen 3128 ssl;
# self signed certificate generated via openssl command
ssl_certificate_key /path/to/server.key;
ssl_certificate /path/to/server.crt;
ssl_session_cache shared:SSL:1m;
# dns resolver used by forward proxying
resolver 8.8.8.8;
# forward proxy for CONNECT request
proxy_connect;
proxy_connect_allow 443 563;
proxy_connect_connect_timeout 10s;
proxy_connect_data_timeout 10s;
# defined by yourself for non-CONNECT request
# Example: reverse proxy for non-CONNECT requests
location / {
proxy_pass http://$host;
proxy_set_header Host $host;
}
}
With above configuration(configuration example for CONNECT request in https), you can get any https website via HTTPS CONNECT tunnel(CONNECT request in https). A simple test with command curl
is as following:
Tips on using curl command:
-x https://...
makes curl send CONNECT request in https.--proxy-insecure
disables ssl signature verification for ssl connection established with nginx proxy_connect server(https://localhost:3128
), but it does not disable verification with proxied backend server(https://nginx.org
in the example below).
-k
option.``` $ curl https://nginx.org/ -sv -o/dev/null -x https://localhost:3128 --proxy-insecure * Trying 127.0.0.1:3128... * TCP_NODELAY set * Connected to localhost (127.0.0.1) port 3128 (#0) * ALPN, offering http/1.1 * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [112 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [799 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [300 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [37 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use http/1.1 * Proxy certificate: * subject: C=AU; ST=Some-State; O=Internet Widgits Pty Ltd * start date: Nov 25 08:36:38 2022 GMT * expire date: Nov 25 08:36:38 2023 GMT * issuer: C=AU; ST=Some-State; O=Internet Widgits Pty Ltd * SSL certificate verify result: self signed certificate (18), continuing anyway. * allocate connect buffer! * Establish HTTP proxy tunnel to nginx.org:443 } [5 bytes data] > CONNECT nginx.org:443 HTTP/1.1 > Host: nginx.org:443 > User-Agent: curl/7.68.0 > Proxy-Connection: Keep-Alive > { [5 bytes data] < HTTP/1.1 200 Connection Established < Proxy-agent: nginx < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * CONNECT phase completed! * CONNECT phase completed! { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [80 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2749 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [300 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [37 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: CN=nginx.org * start date: Dec 9 15:29:31 2022 GMT * expire date: Mar 9 15:29:30 2023 GMT * subjectAltName: host "nginx.org" matched cert's "nginx.org" * issuer: C=US; O=Let's Encrypt; CN=R3 * SSL certificate verify ok. } [5 bytes data] > GET / HTTP/1.1 > Host: nginx.org > User-Agent: curl/7.68.0 > Accept: */* > { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: nginx/1.21.5 < Date: Mon, 06 Mar 2023 06:05:24 GMT < Content-Type: text/html; charset=utf-8 < Content-Length: 7488 < Last-Modified: Tue, 28 Feb 2023 21:07:43 GMT < Connection: keep-alive < Keep-Alive: timeout=15 < ETag: "63fe6d1f-1d40" < Accept-Ranges: bytes < { [7488 bytes data] * Connection #0 to host localhost left intact ```
You can configure your browser to use this nginx as PROXY server.
We can do access control on CONNECT request using nginx auth basic module.
See this guide for more details.
patch/
directory of this module. You dont need to download the patch directly from web page.nginx version | enable REWRITE phase | patch |
---|---|---|
1.4.x ~ 1.12.x | NO | proxy_connect.patch |
1.4.x ~ 1.12.x | YES | proxy_connect_rewrite.patch |
1.13.x ~ 1.14.x | NO | proxy_connect_1014.patch |
1.13.x ~ 1.14.x | YES | proxy_connect_rewrite_1014.patch |
1.15.2 | YES | proxy_connect_rewrite_1015.patch |
1.15.4 ~ 1.16.x | YES | proxy_connect_rewrite_101504.patch |
1.17.x ~ 1.18.x | YES | proxy_connect_rewrite_1018.patch |
1.19.x ~ 1.21.0 | YES | proxy_connect_rewrite_1018.patch |
1.21.1 ~ 1.22.x | YES | proxy_connect_rewrite_102101.patch |
1.23.x ~ 1.24.0 | YES | proxy_connect_rewrite_102101.patch |
1.25.0 ~ 1.26.x | YES | proxy_connect_rewrite_102101.patch |
1.27.1 | YES | proxy_connect_rewrite_102101.patch |
OpenResty version | enable REWRITE phase | patch |
---|---|---|
1.13.6 | NO | proxy_connect_1014.patch |
1.13.6 | YES | proxy_connect_rewrite_1014.patch |
1.15.8 | YES | proxy_connect_rewrite_101504.patch |
1.17.8 | YES | proxy_connect_rewrite_1018.patch |
1.19.3 | YES | proxy_connect_rewrite_1018.patch |
1.21.4 | YES | proxy_connect_rewrite_102101.patch |
1.25.3 | YES | proxy_connect_rewrite_102101.patch |
proxy_connect_<VERSION>.patch
disables nginx REWRITE phase for CONNECT request by default, which means if
, set
, rewrite_by_lua
and other REWRITE phase directives cannot be used.proxy_connect_rewrite_<VERSION>.patch
enables these REWRITE phase directives.$ wget http://nginx.org/download/nginx-1.9.2.tar.gz
$ tar -xzvf nginx-1.9.2.tar.gz
$ cd nginx-1.9.2/
$ patch -p1 < /path/to/ngx_http_proxy_connect_module/patch/proxy_connect.patch
$ ./configure --add-module=/path/to/ngx_http_proxy_connect_module
$ make && make install
--add-dynamic-module=PATH
option instead of --add-module=PATH
on the ./configure
command line.$ wget http://nginx.org/download/nginx-1.9.12.tar.gz
$ tar -xzvf nginx-1.9.12.tar.gz
$ cd nginx-1.9.12/
$ patch -p1 < /path/to/ngx_http_proxy_connect_module/patch/proxy_connect.patch
$ ./configure --add-dynamic-module=/path/to/ngx_http_proxy_connect_module
$ make && make install
load_module
directive, for example,load_module /path/to/modules/ngx_http_proxy_connect_module.so;
$ wget https://openresty.org/download/openresty-1.19.3.1.tar.gz
$ tar -zxvf openresty-1.19.3.1.tar.gz
$ cd openresty-1.19.3.1
$ ./configure --add-module=/path/to/ngx_http_proxy_connect_module
$ patch -d build/nginx-1.19.3/ -p 1 < /path/to/ngx_http_proxy_connect_module/patch/proxy_connect_rewrite_101504.patch
$ make && make install
$ hg clone http://hg.nginx.org/nginx-tests/
# If you use latest lua-nginx-module that needs lua-resty-core and
# lua-resty-lrucache, you should add "lua_package_path ...;" directive
# into nginx.conf of test cases. You can use the following command:
#
# $ export TEST_NGINX_GLOBALS_HTTP='lua_package_path "/path/to/nginx/lib/lua/?.lua;;";'
$ export TEST_NGINX_BINARY=/path/to/nginx/binary
$ prove -v -I /path/to/nginx-tests/lib /path/to/ngx_http_proxy_connect_module/t/
This module logs its own error message beginning with "proxy_connect:"
string.
Some typical error logs are shown as following:
2019/08/07 17:27:20 [error] 19257#0: *1 proxy_connect: upstream connect timed out (peer:216.58.200.4:443) while connecting to upstream, client: 127.0.0.1, server: , request: "CONNECT www.google.com:443 HTTP/1.1", host: "www.google.com:443"
Syntax: proxy_connect
Default: none
Context: server
Enable "CONNECT" HTTP method support.
Syntax: proxy_connect_allow all | [port ...] | [port-range ...]
Default: 443 563
Context: server
This directive specifies a list of port numbers or ranges to which the proxy CONNECT method may connect.
By default, only the default https port (443) and the default snews port (563) are enabled.
Using this directive will override this default and allow connections to the listed ports only.
The value all
will allow all ports to proxy.
The value port
will allow specified port to proxy.
The value port-range
will allow specified range of port to proxy, for example:
proxy_connect_allow 1000-2000 3000-4000; # allow range of port from 1000 to 2000, from 3000 to 4000.
Syntax: proxy_connect_connect_timeout time
Default: none
Context: server
Defines a timeout for establishing a connection with a proxied server.
Syntax: proxy_connect_data_timeout time
Default: 60s
Context: server
Sets the timeout between two successive read or write operations on client or proxied server connections. If no data is transmitted within this time, the connection is closed.
Syntax: proxy_connect_read_timeout time
Default: 60s
Context: server
Deprecated.
It has the same function as the directive proxy_connect_data_timeout
for compatibility. You can configure only one of the directives (proxy_connect_data_timeout
or proxy_connect_read_timeout
).
Syntax: proxy_connect_send_timeout time
Default: 60s
Context: server
Deprecated.
It has no function.
Syntax: proxy_connect_address address | off
Default: none
Context: server
Specifiy an IP address of the proxied server. The address can contain variables.
The special value off is equal to none, which uses the IP address resolved from host name of CONNECT request line.
NOTE: If using set $<nginx variable>
and proxy_connect_address $<nginx variable>
together, you should use proxy_connect_rewrite.patch
instead, see Install for more details.
Syntax: proxy_connect_bind address [transparent] | off
Default: none
Context: server
Makes outgoing connections to a proxied server originate from the specified local IP address with an optional port.
Parameter value can contain variables. The special value off is equal to none, which allows the system to auto-assign the local IP address and port.
The transparent parameter allows outgoing connections to a proxied server originate from a non-local IP address, for example, from a real IP address of a client:
proxy_connect_bind $remote_addr transparent;
In order for this parameter to work, it is usually necessary to run nginx worker processes with the superuser privileges. On Linux it is not required (1.13.8) as if the transparent parameter is specified, worker processes inherit the CAP_NET_RAW capability from the master process. It is also necessary to configure kernel routing table to intercept network traffic from the proxied server.
NOTE: If using set $<nginx variable>
and proxy_connect_bind $<nginx variable>
together, you should use proxy_connect_rewrite.patch
instead, see Install for more details.
Syntax: proxy_connect_response CONNECT response
Default: HTTP/1.1 200 Connection Established\r\nProxy-agent: nginx\r\n\r\n
Context: server
Set the response of CONNECT request.
Note that it is only used for CONNECT request, it cannot modify the data flow over CONNECT tunnel.
For example:
proxy_connect_response "HTTP/1.1 200 Connection Established\r\nProxy-agent: nginx\r\nX-Proxy-Connected-Addr: $connect_addr\r\n\r\n";
The curl
command test case with above config is as following:
$ curl https://github.com -sv -x localhost:3128
* Connected to localhost (127.0.0.1) port 3128 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to github.com:443
> CONNECT github.com:443 HTTP/1.1
> Host: github.com:443
> User-Agent: curl/7.64.1
> Proxy-Connection: Keep-Alive
>
< HTTP/1.1 200 Connection Established --.
< Proxy-agent: nginx | custom CONNECT response
< X-Proxy-Connected-Addr: 13.229.188.59:443 --'
...
host name from CONNECT request line.
port from CONNECT request line.
IP address and port of the remote host, e.g. "192.168.1.5:12345". IP address is resolved from host name of CONNECT request line.
Get or set timeout of proxy_connect_connect_timeout
directive.
For example:
# Set default value
proxy_connect_connect_timeout 10s;
proxy_connect_data_timeout 10s;
# Overlap default value
if ($host = "test.com") {
set $proxy_connect_connect_timeout "10ms";
set $proxy_connect_data_timeout "10ms";
}
Get or set a timeout of proxy_connect_data_timeout
directive.
Deprecated.
It still can get or set a timeout of proxy_connect_data_timeout
directive for compatibility.
Deprecated. It has no function.
Keeps time spent on name resolving; the time is kept in seconds with millisecond resolution.
Keeps time spent on establishing a connection with the upstream server; the time is kept in seconds with millisecond resolution.
Keeps time to receive the first byte of data from the upstream server; the time is kept in seconds with millisecond resolution.
Get or set the response of CONNECT request.
The default response of CONNECT request is "HTTP/1.1 200 Connection Established\r\nProxy-agent: nginx\r\n\r\n".
Note that it is only used for CONNECT request, it cannot modify the data flow over CONNECT tunnel.
For example:
# modify default Proxy-agent header
set $proxy_connect_response "HTTP/1.1 200\r\nProxy-agent: nginx/1.19\r\n\r\n";
The variable value does not support nginx variables. You can use lua-nginx-module to construct string that contains nginx variable. For example:
# The CONNECT response may be "HTTP/1.1 200\r\nProxy-agent: nginx/1.19.6\r\n\r\n"
rewrite_by_lua '
ngx.var.proxy_connect_response =
string.format("HTTP/1.1 200\\r\\nProxy-agent: nginx/%s\\r\\n\\r\\n", ngx.var.nginx_version)
';
Also note that set
or rewrite_by_lua*
directive is run during the REWRITE phase, which is ahead of dns resolving phase. It cannot get right value of some variables, for example, $connect_addr
value is nil
. In such case, you should use proxy_connect_response
directive instead.
The latest module is compatible with the following versions of nginx:
The latest module is compatible with the following versions of OpenResty:
This module has been integrated into Tengine 2.3.0.
See FAQ page.
See LICENSE for details.