Docker啟用TLS實(shí)現(xiàn)安全配置的步驟
前言
之前開(kāi)啟了docker的2375 Remote API,接到公司安全部門的要求,需要啟用授權(quán),翻了下官方文檔
Protect the Docker daemon socket
啟用TLS
在docker服務(wù)器,生成CA私有和公共密鑰
$ openssl genrsa -aes256 -out ca-key.pem 4096 Generating RSA private key, 4096 bit long modulus ............................................................................................................................................................................................++ ........++ e is 65537 (0x10001) Enter pass phrase for ca-key.pem: Verifying - Enter pass phrase for ca-key.pem: $ openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -out ca.pem Enter pass phrase for ca-key.pem: You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [AU]: State or Province Name (full name) [Some-State]:Queensland Locality Name (eg, city) []:Brisbane Organization Name (eg, company) [Internet Widgits Pty Ltd]:Docker Inc Organizational Unit Name (eg, section) []:Sales Common Name (e.g. server FQDN or YOUR name) []:$HOST Email Address []:Sven@home.org.au
有了CA后,可以創(chuàng)建一個(gè)服務(wù)器密鑰和證書簽名請(qǐng)求(CSR)
$HOST 是你的服務(wù)器ip
$ openssl genrsa -out server-key.pem 4096 Generating RSA private key, 4096 bit long modulus .....................................................................++ .................................................................................................++ e is 65537 (0x10001) $ openssl req -subj "/CN=$HOST" -sha256 -new -key server-key.pem -out server.csr
接著,用CA來(lái)簽署公共密鑰:
$ echo subjectAltName = DNS:$HOST,IP:$HOST:127.0.0.1 >> extfile.cnf $ echo extendedKeyUsage = serverAuth >> extfile.cnf
生成key:
$ openssl x509 -req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem \ -CAcreateserial -out server-cert.pem -extfile extfile.cnf Signature ok subject=/CN=your.host.com Getting CA Private Key Enter pass phrase for ca-key.pem:
創(chuàng)建客戶端密鑰和證書簽名請(qǐng)求:
$ openssl genrsa -out key.pem 4096 Generating RSA private key, 4096 bit long modulus .........................................................++ ................++ e is 65537 (0x10001) $ openssl req -subj '/CN=client' -new -key key.pem -out client.csr
修改extfile.cnf:
echo extendedKeyUsage = clientAuth > extfile-client.cnf
生成簽名私鑰:
$ openssl x509 -req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem \ -CAcreateserial -out cert.pem -extfile extfile-client.cnf Signature ok subject=/CN=client Getting CA Private Key Enter pass phrase for ca-key.pem:
將Docker服務(wù)停止,然后修改docker服務(wù)文件
[Unit] Description=Docker Application Container Engine Documentation=http://docs.docker.io [Service] Environment="PATH=/opt/kube/bin:/bin:/sbin:/usr/bin:/usr/sbin" ExecStart=/opt/kube/bin/dockerd --tlsverify --tlscacert=/root/docker/ca.pem --tlscert=/root/docker/server-cert.pem --tlskey=/root/docker/server-key.pem -H unix:///var/run/docker.sock -H tcp://0.0.0.0:2375 ExecStartPost=/sbin/iptables -I FORWARD -s 0.0.0.0/0 -j ACCEPT ExecReload=/bin/kill -s HUP $MAINPID Restart=on-failure RestartSec=5 LimitNOFILE=infinity LimitNPROC=infinity LimitCORE=infinity Delegate=yes KillMode=process [Install] WantedBy=multi-user.target
然后重啟服務(wù)
systemctl daemon-reload systemctl restart docker.service
重啟后查看服務(wù)狀態(tài):
systemctl status docker.service ● docker.service - Docker Application Container Engine Loaded: loaded (/etc/systemd/system/docker.service; enabled; vendor preset: enabled) Active: active (running) since Thu 2019-08-08 19:22:26 CST; 1 min ago
已經(jīng)生效。
使用證書連接:
復(fù)制ca.pem,cert.pem,key.pem三個(gè)文件到客戶端
docker --tlsverify --tlscacert=ca.pem --tlscert=cert.pem --tlskey=key.pem -H=$HOST:2375 version連接即可
docker-java 啟用TLS
項(xiàng)目里使用docker的java客戶端docker-java調(diào)用docker,為了支持TLS,在創(chuàng)建客戶端時(shí),需要增加TLS設(shè)置。
首先將ca.pem cert.pem key.pem這三個(gè)文件拷貝到本地,例如E:\\docker\\",
然后DefaultDockerClientConfig里withDockerTlsVerify設(shè)為true,并設(shè)置certpath為剛拷貝的目錄。
DefaultDockerClientConfig.Builder builder = DefaultDockerClientConfig.createDefaultConfigBuilder() .withDockerHost("tcp://" + server + ":2375") .withApiVersion("1.30"); if (containerConfiguration.getDockerTlsVerify()) { builder = builder.withDockerTlsVerify(true) .withDockerCertPath("E:\\docker\\"); } return DockerClientBuilder.getInstance(builder.build()).build()
大工搞定。
總結(jié)
以上就是這篇文章的全部?jī)?nèi)容了,希望本文的內(nèi)容對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,謝謝大家對(duì)腳本之家的支持。
相關(guān)文章
Jenkins簡(jiǎn)介與Docker部署Jenkins的方法
今天小編就為大家分享一篇關(guān)于Jenkins簡(jiǎn)介與Docker部署Jenkins的方法,小編覺(jué)得內(nèi)容挺不錯(cuò)的,現(xiàn)在分享給大家,具有很好的參考價(jià)值,需要的朋友一起跟隨小編來(lái)看看吧2018-10-10Docker報(bào)錯(cuò):OCI?runtime?exec?failed:?exec?failed:?contain
這篇文章主要給大家介紹了關(guān)于Docker報(bào)錯(cuò):OCI?runtime?exec?failed:?exec?failed:?container_linux.go:380:?starting?container?process的解決方法,文中通過(guò)圖文介紹的非常詳細(xì),需要的朋友可以參考下2022-07-07docker如何安裝帶postgis插件的postgresql數(shù)據(jù)庫(kù)
這篇文章主要介紹了docker如何安裝帶postgis插件的postgresql數(shù)據(jù)庫(kù)問(wèn)題,具有很好的參考價(jià)值,希望對(duì)大家有所幫助,如有錯(cuò)誤或未考慮完全的地方,望不吝賜教2023-12-12Docker部署搭建WebDav服務(wù)的詳細(xì)過(guò)程
這篇文章主要介紹了Docker部署WebDav服務(wù),小編綜合了各種共享方式后最終選擇了使用 WebDav 來(lái)共享文件,下面小編把搭建部署過(guò)程分享給大家,需要的朋友可以參考下2022-08-08詳解ASP.NET Core 網(wǎng)站在Docker中運(yùn)行
本篇文章主要介紹了詳解ASP.NET Core 網(wǎng)站在Docker中運(yùn)行,非常具有實(shí)用價(jià)值,需要的朋友可以參考下2017-05-05Docker?Push?Skipped?foreign?layer?的錯(cuò)誤問(wèn)題及解決方案
當(dāng)Docker推送基于Windows鏡像到私有倉(cāng)庫(kù)的時(shí)候會(huì)遇到Skipped foreign layer的問(wèn)題,這篇文章主要介紹了Docker?Push?Skipped?foreign?layer?的錯(cuò)誤問(wèn)題及解決方案,需要的朋友可以參考下2022-05-05Docker 部署 Prometheus的安裝詳細(xì)教程
這篇文章主要介紹了Docker 部署 Prometheus及安裝方法,本文給大家介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或工作具有一定的參考借鑒價(jià)值,需要的朋友可以參考下2021-08-08Dockerfile指令與基本結(jié)構(gòu)的講解
今天小編就為大家分享一篇關(guān)于Dockerfile指令與基本結(jié)構(gòu)的講解,小編覺(jué)得內(nèi)容挺不錯(cuò)的,現(xiàn)在分享給大家,具有很好的參考價(jià)值,需要的朋友一起跟隨小編來(lái)看看吧2019-03-03