使用PHP中的cURL访问HTTPS(SSL/TLS)保护的站点

Form PHP,you can access the useful cURL Library(libcurl) to make requests to URLs using a variety of protocols such as HTTP,FTP,LDAP and even Goper.(If you've sepnt time on the *nix command line,most enviromnts also have the curl command available that uses the libcurl library)

In practice ,however,the most commonly-used protocol tends to be HTTP,especially when using PHP for server-to-server communication. Typically this involves accessing another web server as part of a web service call, using some method such as XML-RPC or REST to query a resource.For example, Delicious offers a HTTP-based API to manipulate and read a user's posts. However, when trying to access a HTTPS resource (such as the delicious API), there's a little more configuration you have to do before you can get cURL working right in PHP

The problem

If you simply try to access a HTTPS (SSL or TLS-protected resource) in PHP using cURL,you're likely to run into some difficulty. Say you have the follwing code: (Error handling omitted for brevity)

// Initialize session and set URL.

$ch = curl_init();

curl_setopt($ch, CURLOPT_URL, $url);

//set so curl_exec returns the result instead of outputting it.

curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);

//Get the response and close the channel.

$response = curl_exec($ch);

curl_close($ch);

if $url points toward an HTTPS resource,you're likely to encounter an error like the one bellowing:

Failed: Error Number:60. Reason: SSL certificate problem, verify the CA cert is OK.Details: error: 14090086: SSL routines: SSL3_GET_SERVER_CERTIFICATE: certificate verify failed

The problem is that cURL has not been configured to trust the server's HTTPS certificate.The concepts of certificates and PKI revolves around the trust of Certificate Authorities(CAs), and by default , cURL is setup to not turst any CAs,thus it won't trust any web server's certificate. So why don't you have problems visiting HTTPS sites through your web browser ? As it happens, the browser developers were nice enough to include a list of default CAs to trust, converting most sutuations, so as long as the website operator purchased a certificate from one of the CAs.

The quick fix

There are two ways to solve this problem .Firstly, we can simply configure cURL to accept any server(peer) certificate. This isn/t optioa from a secutity point of view, but if you're not passing sensitive information back and forth, this is probably alright. Simply add the following line before calling curl_exec();

curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);

This basically causes cURL to blindly accept any server certification, without doing any verification as to which CA signed it , and whether or not that CA is trusted. If you're at all concerned about data you're passing to or receiving from the server, you'll want to enable this peer verification properly. Doing so is a bit more cimplicated.

The proper fix

The proper fix involves setting the CURLOPT_CAINFO parameter. This is used to point towards a CA certificate that cURL should trust. Thus, any server/peer certificates issued by this CA will alse be trusted. In order to do this, we first need to get the CA certificate. In this example, I'll be using the https://api.del.icio.us/ server as a reference.

First,you'll need to visit the URL with your web browser in order to grab the CA certificate. Then,(in Firefox) open up the sucurity detals for the site by dubleclicking on the padlock icon in the lower right corner: 在此输入图片描述

Then click on 'View Certificate':

在此输入图片描述

Bring up the "Details" tab of the certificates page, and select the certificate at the top of the hierarchy.This is the CA certificate.

在此输入图片描述

Then click 'Export' , and save the CA certificate to your selected location, making sure to select the X.509 Certificate(PEM) as the save type/format.

在此输入图片描述

Now we need to modify the cURL setup to use this CA certificate , with CURLOPT_CAINFO set to point to where we saved the CA certificate file to.

curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, true);

curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);

curl_setopt($ch, CURLOPT_CAINFO, getcwd()."/CAcerts/BuiltinOjectToken-EquifaxSecureCA.crt");

The other option I've included, CURLOPT_SSL_VERIFYHOST can be set to the following integer values:

0: Don't check the common name(CN) attribute

1: Check that the common name attribute at least exists

2: Check that the common name exists and that it mathes the host name of the sercer

If you have CURLOPT_SSL_VERIFYPEER set to false, then from a security perspective, it dosen't really matter what you've set CURLOPT_SSL_VERIFYHOST to, since without peer certificate verification, the server could use any certificate, including a self-signed one that was guaranteed to have a CN that matched the server's host name. So this setting is really only relevant if you've enabled certificate verification.

This ensures that not just any server certificate will be trustd by your cURL session. For example, if an attacker were to somehow redirect traffic from api.delicous.com to their own server , the cURL session here would not properly initialize, since the attacker would not have access to a server certificate(i.e. would not have the private key) trusted by the CA we added.These steps effectively export the trusted CA from the web browser to the cURL configuration.

More information

If you have the CA certification, but it is not in the PEM format(i.e. it is in a binary or DER format that isn't Base-encoded), you'll need to use something like OpenSSL to convert it to the PEM format. The exact command differs depending on whether you're converting from PKCS12 or DER format.

There is a CURLOPT_CAPATH option that allows you to specify a directory that holds multiple CA certificates to trust .But it's not sa simple as dumping every single CA certificate in this directory. Instead , they CA certificates must be named properly, and the OpenSSL c_rehash utiltity can be used to properly setup this directory for use by cURL.

转载于:https://my.oschina.net/syc2013/blog/168937

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值