HTTP协议压缩、加密、重定向及反向代理、源码编译httpd-2.4.39

HTTP的压缩

1、使用mod_deflate模块压缩页面优化传输速度

2、压缩适于压缩的资源,例如文本文件

LoadModule deflate_module modules/mod_deflate.so SetOutputFilter DEFLATE

SetOutputFilter DEFLATE

# Restrict compression to these MIME types

AddOutputFilterByType DEFLATE text/plain(纯文本)

AddOutputFilterByType DEFLATE text/html

AddOutputFilterByType DEFLATE application/xhtml+xml

AddOutputFilterByType DEFLATE text/xml

AddOutputFilterByType DEFLATE application/xml

AddOutputFilterByType DEFLATE application/x-javascript

AddOutputFilterByType DEFLATE text/javascript

AddOutputFilterByType DEFLATE text/css

DeflateCompressionLevel 9(压缩等级为9)


HTTPS实现


1、实现https 安全网站

安装mod_ssl模块,然后重启httpd服务

2、利用私有CA实现HTTPS

(1)建立CA

进入/etc/pki/CA/文件夹中

(umask 077;openssl genrsa -out private/cakey.pem 4096)

openssl req -new -x509 -key /etc/pki/CA/private/cakey.pem -out /etc/pki/CA/cacert.pem -days 3650 <<EOF

CN

beijing

beijing

magedu

devops

ca.magedu.com

admin@magedu.com

EOF

touch /etc/pki/CA/index.txt

echo 01 > /etc/pki/CA/serial

(2)申请证书

mkdir /etc/httpd/conf.d/ssl

cd /etc/httpd/conf.d/ssl

(umask 066;openssl genrsa -out httpd.key 1024 )

openssl req -new -key httpd.key  -out httpd.csr

scp /etc/httpd/conf.d/ssl/httpd.csr  CAServer:/etc/pki/CA

(3)颁发证书

openssl ca -in /etc/pki/CA/httpd.csr -out /etc/pki/CA/certs/httpd.crt -days 100

scp /etc/pki/CA/certs/httpd.crt  192.168.37.7:/etc/httpd/conf.d/ssl/

scp /etc/pki/CA/cacert.pem  192.168.37.7:/etc/httpd/conf.d/ssl

(4)修改配置文件/etc/httpd/conf.d/ssl.conf

SSLCertificateFile /etc/httpd/conf.d/ssl/httpd.crt

SSLCertificateKeyFile /etc/httpd/conf.d/ssl/httpd.key

SSLCACertificateFile /etc/httpd/conf.d/ssl/cacert.pem


HTTP重定向为HTTPS

1、基于虚拟主机重定向(修改/etc/httpd/conf.d/test.conf)

2、不基于虚拟主机重定向(HSTS)

vim /etc/httpd/conf/httpd.conf

Header always set Strict-Transport-Security "max-age=31536000"(HSTS的缓存时间)

RewriteEngine on

RewriteRule ^(/.*)$ https://%{HTTP_HOST}$1 [redirect=302]


反向代理

1、启用反向代理

ProxyPass "/" "http://www.example.com/"

ProxyPassReverse "/" "http://www.example.com/"

2、特定URL反向代理

ProxyPass "/images" "http://www.example.com/"

ProxyPassReverse "/images" http://www.example.com/

示例:

<VirtualHost *>

ServerName www.magedu.com

ProxyPass / http://localhost:8080/

ProxyPassReverse / http://localhost:8080/

</VirtualHost>



面  http协议常用的状态码

200: 成功,请求数据通过响应报文的entity-body部分发送;OK

301: 请求的URL指向的资源已经被删除;但在响应报文中通过首部Location指明了资源现在所处的新位置;Moved Permanently

302: 响应报文Location指明资源临时新位置 Moved Temporarily

304: 客户端发出了条件式请求,但服务器上的资源未曾发生改变,则通过响应此响应状态码通知客户端;Not Modified

401: 需要输入账号和密码认证方能访问资源;Unauthorized

403: 请求被禁止;Forbidden

404: 服务器无法找到客户端请求的资源;Not Found

500: 服务器内部错误;Internal Server Error

502: 代理服务器从后端服务器收到了一条伪响应,如无法连接到网关;Bad Gateway

503: 服务不可用,临时服务器维护或过载,服务器无法处理请求

504: 网关超时



案例:源码编译安装httpd-2.4.39

环境:

apr-1.7.0.tar.bz2 

apr-util-1.6.1.tar.bz2

httpd-2.4.39.tar.bz2

1 合并源码文件

tar xvf apr-1.7.0.tar.bz2

tar xvf apr-util-1.6.1.tar.bz2

tar xvf httpd-2.4.39.tar.bz2

mv  apr-1.7.0 httpd-2.4.39/srclib/apr

mv apr-util-1.6.1 httpd-2.4.39/srclib/apr-util

2 安装相关的包

yum install gcc prce-devel openssl-devel expat-devel -y

3 编译安装

cd httpd-2.4.39/

./configure \

--prefix=/app/httpd24 \

--enable-so \

--enable-ssl \

--enable-cgi \

--enable-rewrite \

--with-zlib \

--with-pcre \

--with-included-apr \

--enable-modules=most \

--enable-mpms-shared=all \

--with-mpm=prefork

make -j 4 && make install

4 环境变量和启动

echo 'PATH=/app/httpd24/bin:$PATH' > /etc/profile.d/httpd24.sh

. /etc/profile.d/httpd24.sh

apachectl start

©著作权归作者所有,转载或内容合作请联系作者
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。