2012-02-27 20:09:35 +01:00
|
|
|
# TLS (SSL)
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2017-01-23 04:16:21 +01:00
|
|
|
<!--introduced_in=v0.10.0-->
|
|
|
|
|
2016-07-16 00:35:38 +02:00
|
|
|
> Stability: 2 - Stable
|
2012-03-03 00:14:03 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `tls` module provides an implementation of the Transport Layer Security
|
|
|
|
(TLS) and Secure Socket Layer (SSL) protocols that is built on top of OpenSSL.
|
|
|
|
The module can be accessed using:
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
```js
|
|
|
|
const tls = require('tls');
|
|
|
|
```
|
|
|
|
|
|
|
|
## TLS/SSL Concepts
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The TLS/SSL is a public/private key infrastructure (PKI). For most common
|
|
|
|
cases, each client and server must have a *private key*.
|
|
|
|
|
|
|
|
Private keys can be generated in multiple ways. The example below illustrates
|
|
|
|
use of the OpenSSL command-line interface to generate a 2048-bit RSA private
|
|
|
|
key:
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```sh
|
2016-01-17 18:39:07 +01:00
|
|
|
openssl genrsa -out ryans-key.pem 2048
|
|
|
|
```
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
With TLS/SSL, all servers (and some clients) must have a *certificate*.
|
|
|
|
Certificates are *public keys* that correspond to a private key, and that are
|
|
|
|
digitally signed either by a Certificate Authority or by the owner of the
|
|
|
|
private key (such certificates are referred to as "self-signed"). The first
|
|
|
|
step to obtaining a certificate is to create a *Certificate Signing Request*
|
|
|
|
(CSR) file.
|
|
|
|
|
|
|
|
The OpenSSL command-line interface can be used to generate a CSR for a private
|
|
|
|
key:
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```sh
|
2016-01-17 18:39:07 +01:00
|
|
|
openssl req -new -sha256 -key ryans-key.pem -out ryans-csr.pem
|
|
|
|
```
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Once the CSR file is generated, it can either be sent to a Certificate
|
|
|
|
Authority for signing or used to generate a self-signed certificate.
|
|
|
|
|
|
|
|
Creating a self-signed certificate using the OpenSSL command-line interface
|
|
|
|
is illustrated in the example below:
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```sh
|
2016-01-17 18:39:07 +01:00
|
|
|
openssl x509 -req -in ryans-csr.pem -signkey ryans-key.pem -out ryans-cert.pem
|
|
|
|
```
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Once the certificate is generated, it can be used to generate a `.pfx` or
|
|
|
|
`.p12` file:
|
2015-02-15 18:43:36 +01:00
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```sh
|
2016-05-23 21:46:10 +02:00
|
|
|
openssl pkcs12 -export -in ryans-cert.pem -inkey ryans-key.pem \
|
|
|
|
-certfile ca-cert.pem -out ryans.pfx
|
2016-01-17 18:39:07 +01:00
|
|
|
```
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Where:
|
|
|
|
|
|
|
|
* `in`: is the signed certificate
|
|
|
|
* `inkey`: is the associated private key
|
|
|
|
* `certfile`: is a concatenation of all Certificate Authority (CA) certs into
|
|
|
|
a single file, e.g. `cat ca1-cert.pem ca2-cert.pem > ca-cert.pem`
|
|
|
|
|
|
|
|
### Perfect Forward Secrecy
|
|
|
|
|
|
|
|
<!-- type=misc -->
|
|
|
|
|
|
|
|
The term "[Forward Secrecy]" or "Perfect Forward Secrecy" describes a feature of
|
|
|
|
key-agreement (i.e., key-exchange) methods. That is, the server and client keys
|
|
|
|
are used to negotiate new temporary keys that are used specifically and only for
|
|
|
|
the current communication session. Practically, this means that even if the
|
|
|
|
server's private key is compromised, communication can only be decrypted by
|
|
|
|
eavesdroppers if the attacker manages to obtain the key-pair specifically
|
|
|
|
generated for the session.
|
|
|
|
|
|
|
|
Perfect Forward Secrecy is achieved by randomly generating a key pair for
|
|
|
|
key-agreement on every TLS/SSL handshake (in contrast to using the same key for
|
|
|
|
all sessions). Methods implementing this technique are called "ephemeral".
|
|
|
|
|
|
|
|
Currently two methods are commonly used to achieve Perfect Forward Secrecy (note
|
|
|
|
the character "E" appended to the traditional abbreviations):
|
|
|
|
|
|
|
|
* [DHE] - An ephemeral version of the Diffie Hellman key-agreement protocol.
|
|
|
|
* [ECDHE] - An ephemeral version of the Elliptic Curve Diffie Hellman
|
|
|
|
key-agreement protocol.
|
|
|
|
|
|
|
|
Ephemeral methods may have some performance drawbacks, because key generation
|
|
|
|
is expensive.
|
|
|
|
|
|
|
|
To use Perfect Forward Secrecy using `DHE` with the `tls` module, it is required
|
2016-11-23 23:14:34 +01:00
|
|
|
to generate Diffie-Hellman parameters and specify them with the `dhparam`
|
|
|
|
option to [`tls.createSecureContext()`][]. The following illustrates the use of
|
|
|
|
the OpenSSL command-line interface to generate such parameters:
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```sh
|
2016-05-23 21:46:10 +02:00
|
|
|
openssl dhparam -outform PEM -out dhparam.pem 2048
|
2016-01-17 18:39:07 +01:00
|
|
|
```
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2016-09-01 16:55:42 +02:00
|
|
|
If using Perfect Forward Secrecy using `ECDHE`, Diffie-Hellman parameters are
|
2016-12-19 22:17:18 +01:00
|
|
|
not required and a default ECDHE curve will be used. The `ecdhCurve` property
|
2017-09-04 20:49:28 +02:00
|
|
|
can be used when creating a TLS Server to specify the list of names of supported
|
|
|
|
curves to use, see [`tls.createServer()`] for more info.
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2018-03-17 05:13:47 +01:00
|
|
|
### ALPN and SNI
|
2015-11-05 21:04:26 +01:00
|
|
|
|
|
|
|
<!-- type=misc -->
|
|
|
|
|
2018-03-17 05:13:47 +01:00
|
|
|
ALPN (Application-Layer Protocol Negotiation Extension) and
|
|
|
|
SNI (Server Name Indication) are TLS handshake extensions:
|
2015-11-05 21:04:26 +01:00
|
|
|
|
2018-03-17 05:13:47 +01:00
|
|
|
* ALPN - Allows the use of one TLS server for multiple protocols (HTTP, HTTP/2)
|
2016-05-23 21:46:10 +02:00
|
|
|
* SNI - Allows the use of one TLS server for multiple hostnames with different
|
|
|
|
SSL certificates.
|
|
|
|
|
|
|
|
### Client-initiated renegotiation attack mitigation
|
2012-02-27 20:09:35 +01:00
|
|
|
|
|
|
|
<!-- type=misc -->
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The TLS protocol allows clients to renegotiate certain aspects of the TLS
|
|
|
|
session. Unfortunately, session renegotiation requires a disproportionate amount
|
|
|
|
of server-side resources, making it a potential vector for denial-of-service
|
2012-02-15 19:26:43 +01:00
|
|
|
attacks.
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
To mitigate the risk, renegotiation is limited to three times every ten minutes.
|
|
|
|
An `'error'` event is emitted on the [`tls.TLSSocket`][] instance when this
|
|
|
|
threshold is exceeded. The limits are configurable:
|
2012-02-15 19:26:43 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `tls.CLIENT_RENEG_LIMIT` {number} Specifies the number of renegotiation
|
2018-04-02 03:44:32 +02:00
|
|
|
requests. **Default:** `3`.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `tls.CLIENT_RENEG_WINDOW` {number} Specifies the time renegotiation window
|
2018-04-02 03:44:32 +02:00
|
|
|
in seconds. **Default:** `600` (10 minutes).
|
2012-02-15 19:26:43 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The default renegotiation limits should not be modified without a full
|
2016-05-23 21:46:10 +02:00
|
|
|
understanding of the implications and risks.
|
2012-02-15 19:26:43 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
To test the renegotiation limits on a server, connect to it using the OpenSSL
|
|
|
|
command-line client (`openssl s_client -connect address:port`) then input
|
|
|
|
`R<CR>` (i.e., the letter `R` followed by a carriage return) multiple times.
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2015-08-18 00:51:51 +02:00
|
|
|
## Modifying the Default TLS Cipher suite
|
|
|
|
|
|
|
|
Node.js is built with a default suite of enabled and disabled TLS ciphers.
|
|
|
|
Currently, the default cipher suite is:
|
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```txt
|
2016-01-17 18:39:07 +01:00
|
|
|
ECDHE-RSA-AES128-GCM-SHA256:
|
|
|
|
ECDHE-ECDSA-AES128-GCM-SHA256:
|
|
|
|
ECDHE-RSA-AES256-GCM-SHA384:
|
|
|
|
ECDHE-ECDSA-AES256-GCM-SHA384:
|
|
|
|
DHE-RSA-AES128-GCM-SHA256:
|
|
|
|
ECDHE-RSA-AES128-SHA256:
|
|
|
|
DHE-RSA-AES128-SHA256:
|
|
|
|
ECDHE-RSA-AES256-SHA384:
|
|
|
|
DHE-RSA-AES256-SHA384:
|
|
|
|
ECDHE-RSA-AES256-SHA256:
|
|
|
|
DHE-RSA-AES256-SHA256:
|
|
|
|
HIGH:
|
|
|
|
!aNULL:
|
|
|
|
!eNULL:
|
|
|
|
!EXPORT:
|
|
|
|
!DES:
|
|
|
|
!RC4:
|
|
|
|
!MD5:
|
|
|
|
!PSK:
|
|
|
|
!SRP:
|
|
|
|
!CAMELLIA
|
|
|
|
```
|
2015-08-18 00:51:51 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
This default can be replaced entirely using the `--tls-cipher-list` command
|
2015-08-18 00:51:51 +02:00
|
|
|
line switch. For instance, the following makes
|
|
|
|
`ECDHE-RSA-AES128-GCM-SHA256:!RC4` the default TLS cipher suite:
|
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
```sh
|
2016-01-17 18:39:07 +01:00
|
|
|
node --tls-cipher-list="ECDHE-RSA-AES128-GCM-SHA256:!RC4"
|
|
|
|
```
|
2015-08-18 00:51:51 +02:00
|
|
|
|
2016-11-23 23:14:34 +01:00
|
|
|
The default can also be replaced on a per client or server basis using the
|
|
|
|
`ciphers` option from [`tls.createSecureContext()`][], which is also available
|
|
|
|
in [`tls.createServer()`], [`tls.connect()`], and when creating new
|
|
|
|
[`tls.TLSSocket`]s.
|
|
|
|
|
|
|
|
Consult [OpenSSL cipher list format documentation][] for details on the format.
|
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The default cipher suite included within Node.js has been carefully
|
2015-08-18 00:51:51 +02:00
|
|
|
selected to reflect current security best practices and risk mitigation.
|
|
|
|
Changing the default cipher suite can have a significant impact on the security
|
2016-11-23 23:14:34 +01:00
|
|
|
of an application. The `--tls-cipher-list` switch and `ciphers` option should by
|
|
|
|
used only if absolutely necessary.
|
|
|
|
|
|
|
|
The default cipher suite prefers GCM ciphers for [Chrome's 'modern
|
|
|
|
cryptography' setting] and also prefers ECDHE and DHE ciphers for Perfect
|
|
|
|
Forward Secrecy, while offering *some* backward compatibility.
|
|
|
|
|
|
|
|
128 bit AES is preferred over 192 and 256 bit AES in light of [specific
|
|
|
|
attacks affecting larger AES key sizes].
|
|
|
|
|
|
|
|
Old clients that rely on insecure and deprecated RC4 or DES-based ciphers
|
|
|
|
(like Internet Explorer 6) cannot complete the handshaking process with
|
|
|
|
the default configuration. If these clients _must_ be supported, the
|
|
|
|
[TLS recommendations] may offer a compatible cipher suite. For more details
|
|
|
|
on the format, see the [OpenSSL cipher list format documentation].
|
2012-02-17 23:58:42 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
## Class: tls.Server
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
|
|
|
-->
|
2015-05-08 20:54:34 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `tls.Server` class is a subclass of `net.Server` that accepts encrypted
|
2015-11-05 21:04:26 +01:00
|
|
|
connections using TLS or SSL.
|
2015-05-08 20:54:34 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### Event: 'newSession'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.9.2
|
|
|
|
-->
|
2014-08-27 11:00:13 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `'newSession'` event is emitted upon creation of a new TLS session. This may
|
|
|
|
be used to store sessions in external storage. The listener callback is passed
|
|
|
|
three arguments when called:
|
2012-12-03 18:29:01 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `sessionId` - The TLS session identifier
|
|
|
|
* `sessionData` - The TLS session data
|
|
|
|
* `callback` {Function} A callback function taking no arguments that must be
|
|
|
|
invoked in order for data to be sent or received over the secure connection.
|
2012-12-03 18:29:01 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Listening for this event will have an effect only on connections established
|
|
|
|
after the addition of the event listener.
|
2012-02-09 17:14:39 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### Event: 'OCSPRequest'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.13
|
|
|
|
-->
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `'OCSPRequest'` event is emitted when the client sends a certificate status
|
|
|
|
request. The listener callback is passed three arguments when called:
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `certificate` {Buffer} The server certificate
|
|
|
|
* `issuer` {Buffer} The issuer's certificate
|
|
|
|
* `callback` {Function} A callback function that must be invoked to provide
|
|
|
|
the results of the OCSP request.
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The server's current certificate can be parsed to obtain the OCSP URL
|
|
|
|
and certificate ID; after obtaining an OCSP response, `callback(null, resp)` is
|
|
|
|
then invoked, where `resp` is a `Buffer` instance containing the OCSP response.
|
|
|
|
Both `certificate` and `issuer` are `Buffer` DER-representations of the
|
|
|
|
primary and issuer's certificates. These can be used to obtain the OCSP
|
|
|
|
certificate ID and OCSP endpoint URL.
|
|
|
|
|
|
|
|
Alternatively, `callback(null, null)` may be called, indicating that there was
|
|
|
|
no OCSP response.
|
2015-04-23 08:25:15 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
Calling `callback(err)` will result in a `socket.destroy(err)` call.
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The typical flow of an OCSP Request is as follows:
|
2013-03-18 15:10:41 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
1. Client connects to the server and sends an `'OCSPRequest'` (via the status
|
2016-03-14 23:52:28 +01:00
|
|
|
info extension in ClientHello).
|
2016-05-23 21:46:10 +02:00
|
|
|
2. Server receives the request and emits the `'OCSPRequest'` event, calling the
|
|
|
|
listener if registered.
|
2016-03-14 23:52:28 +01:00
|
|
|
3. Server extracts the OCSP URL from either the `certificate` or `issuer` and
|
|
|
|
performs an [OCSP request] to the CA.
|
2018-04-09 18:30:22 +02:00
|
|
|
4. Server receives `'OCSPResponse'` from the CA and sends it back to the client
|
2016-03-14 23:52:28 +01:00
|
|
|
via the `callback` argument
|
|
|
|
5. Client validates the response and either destroys the socket or performs a
|
2015-11-05 21:04:26 +01:00
|
|
|
handshake.
|
2014-02-03 22:32:13 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The `issuer` can be `null` if the certificate is either self-signed or the
|
|
|
|
issuer is not in the root certificates list. (An issuer may be provided
|
2016-05-23 21:46:10 +02:00
|
|
|
via the `ca` option when establishing the TLS connection.)
|
2014-02-03 22:32:13 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Listening for this event will have an effect only on connections established
|
|
|
|
after the addition of the event listener.
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
An npm module like [asn1.js] may be used to parse the certificates.
|
2013-07-25 23:21:52 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### Event: 'resumeSession'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.9.2
|
|
|
|
-->
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `'resumeSession'` event is emitted when the client requests to resume a
|
|
|
|
previous TLS session. The listener callback is passed two arguments when
|
|
|
|
called:
|
|
|
|
|
|
|
|
* `sessionId` - The TLS/SSL session identifier
|
|
|
|
* `callback` {Function} A callback function to be called when the prior session
|
|
|
|
has been recovered.
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
When called, the event listener may perform a lookup in external storage using
|
|
|
|
the given `sessionId` and invoke `callback(null, sessionData)` once finished. If
|
|
|
|
the session cannot be resumed (i.e., doesn't exist in storage) the callback may
|
|
|
|
be invoked as `callback(null, null)`. Calling `callback(err)` will terminate the
|
|
|
|
incoming connection and destroy the socket.
|
2011-10-16 09:31:41 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Listening for this event will have an effect only on connections established
|
|
|
|
after the addition of the event listener.
|
2011-10-16 09:31:41 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The following illustrates resuming a TLS session:
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
2016-05-23 21:46:10 +02:00
|
|
|
const tlsSessionStore = {};
|
2016-01-17 18:39:07 +01:00
|
|
|
server.on('newSession', (id, data, cb) => {
|
|
|
|
tlsSessionStore[id.toString('hex')] = data;
|
|
|
|
cb();
|
|
|
|
});
|
|
|
|
server.on('resumeSession', (id, cb) => {
|
|
|
|
cb(null, tlsSessionStore[id.toString('hex')] || null);
|
|
|
|
});
|
|
|
|
```
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### Event: 'secureConnection'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
|
|
|
-->
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `'secureConnection'` event is emitted after the handshaking process for a
|
|
|
|
new connection has successfully completed. The listener callback is passed a
|
|
|
|
single argument when called:
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `tlsSocket` {tls.TLSSocket} The established TLS socket.
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `tlsSocket.authorized` property is a `boolean` indicating whether the
|
|
|
|
client has been verified by one of the supplied Certificate Authorities for the
|
|
|
|
server. If `tlsSocket.authorized` is `false`, then `socket.authorizationError`
|
|
|
|
is set to describe how authorization failed. Note that depending on the settings
|
|
|
|
of the TLS server, unauthorized connections may still be accepted.
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2018-03-17 05:13:47 +01:00
|
|
|
The `tlsSocket.alpnProtocol` property is a string that contains the selected
|
|
|
|
ALPN protocol. When ALPN has no selected protocol, `tlsSocket.alpnProtocol`
|
|
|
|
equals `false`.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `tlsSocket.servername` property is a string containing the server name
|
|
|
|
requested via SNI.
|
2011-10-26 19:34:56 +02:00
|
|
|
|
2017-02-13 03:49:35 +01:00
|
|
|
### Event: 'tlsClientError'
|
|
|
|
<!-- YAML
|
|
|
|
added: v6.0.0
|
|
|
|
-->
|
|
|
|
|
|
|
|
The `'tlsClientError'` event is emitted when an error occurs before a secure
|
|
|
|
connection is established. The listener callback is passed two arguments when
|
|
|
|
called:
|
|
|
|
|
|
|
|
* `exception` {Error} The `Error` object describing the error
|
|
|
|
* `tlsSocket` {tls.TLSSocket} The `tls.TLSSocket` instance from which the
|
|
|
|
error originated.
|
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### server.addContext(hostname, context)
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.5.3
|
|
|
|
-->
|
2010-12-11 11:26:48 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `hostname` {string} A SNI hostname or wildcard (e.g. `'*'`)
|
|
|
|
* `context` {Object} An object containing any of the possible properties
|
|
|
|
from the [`tls.createSecureContext()`][] `options` arguments (e.g. `key`,
|
|
|
|
`cert`, `ca`, etc).
|
|
|
|
|
|
|
|
The `server.addContext()` method adds a secure context that will be used if
|
2018-05-24 13:14:27 +02:00
|
|
|
the client request's SNI name matches the supplied `hostname` (or wildcard).
|
2010-12-11 11:26:48 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### server.address()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.6.0
|
|
|
|
-->
|
2010-12-11 11:26:48 +01:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {Object}
|
|
|
|
|
2016-03-14 23:52:28 +01:00
|
|
|
Returns the bound address, the address family name, and port of the
|
2018-04-02 07:38:48 +02:00
|
|
|
server as reported by the operating system. See [`net.Server.address()`][] for
|
2015-11-05 21:04:26 +01:00
|
|
|
more information.
|
2015-02-18 17:55:11 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### server.close([callback])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
|
|
|
-->
|
2011-12-07 14:47:06 +01:00
|
|
|
|
2018-08-27 04:12:53 +02:00
|
|
|
* `callback` {Function} A listener callback that will be registered to listen
|
|
|
|
for the server instance's `'close'` event.
|
2018-10-31 09:53:38 +01:00
|
|
|
* Returns: {tls.Server}
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `server.close()` method stops the server from accepting new connections.
|
|
|
|
|
|
|
|
This function operates asynchronously. The `'close'` event will be emitted
|
2016-11-17 21:24:43 +01:00
|
|
|
when the server has no more open connections.
|
2015-04-23 08:25:15 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### server.connections
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
2017-06-06 11:00:32 +02:00
|
|
|
deprecated: v0.9.7
|
2016-05-27 16:33:17 +02:00
|
|
|
-->
|
2011-07-30 16:03:05 +02:00
|
|
|
|
2017-06-06 11:00:32 +02:00
|
|
|
> Stability: 0 - Deprecated: Use [`server.getConnections()`][] instead.
|
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* {number}
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the current number of concurrent connections on the server.
|
2011-07-30 16:03:05 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### server.getTicketKeys()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v3.0.0
|
|
|
|
-->
|
2015-03-09 14:46:22 +01:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {Buffer}
|
|
|
|
|
2016-03-14 23:52:28 +01:00
|
|
|
Returns a `Buffer` instance holding the keys currently used for
|
2018-04-29 13:16:44 +02:00
|
|
|
encryption/decryption of the [TLS Session Tickets][].
|
2013-05-15 21:14:20 +02:00
|
|
|
|
2017-10-06 20:50:47 +02:00
|
|
|
### server.listen()
|
2010-12-11 11:26:48 +01:00
|
|
|
|
2017-10-06 20:50:47 +02:00
|
|
|
Starts the server listening for encrypted connections.
|
|
|
|
This method is identical to [`server.listen()`][] from [`net.Server`][].
|
2010-12-11 11:26:48 +01:00
|
|
|
|
2018-10-13 20:18:31 +02:00
|
|
|
### server.setSecureContext(options)
|
|
|
|
<!-- YAML
|
2018-10-03 01:01:19 +02:00
|
|
|
added: v11.0.0
|
2018-10-13 20:18:31 +02:00
|
|
|
-->
|
|
|
|
|
|
|
|
* `options` {Object} An object containing any of the possible properties from
|
|
|
|
the [`tls.createSecureContext()`][] `options` arguments (e.g. `key`, `cert`,
|
|
|
|
`ca`, etc).
|
|
|
|
|
|
|
|
The `server.setSecureContext()` method replaces the secure context of an
|
|
|
|
existing server. Existing connections to the server are not interrupted.
|
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### server.setTicketKeys(keys)
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v3.0.0
|
|
|
|
-->
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `keys` {Buffer} The keys used for encryption/decryption of the
|
|
|
|
[TLS Session Tickets][].
|
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
Updates the keys for encryption/decryption of the [TLS Session Tickets][].
|
2011-10-15 18:26:38 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The key's `Buffer` should be 48 bytes long. See `ticketKeys` option in
|
2018-04-29 19:46:41 +02:00
|
|
|
[`tls.createServer()`] for more information on how it is used.
|
2014-07-16 16:04:34 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Changes to the ticket keys are effective only for future server connections.
|
|
|
|
Existing or currently pending server connections will use the previous keys.
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
## Class: tls.TLSSocket
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2012-05-13 21:38:23 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `tls.TLSSocket` is a subclass of [`net.Socket`][] that performs transparent
|
|
|
|
encryption of written data and all required TLS negotiation.
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Instances of `tls.TLSSocket` implement the duplex [Stream][] interface.
|
2013-07-03 09:46:01 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Methods that return TLS connection metadata (e.g.
|
2016-01-31 13:51:08 +01:00
|
|
|
[`tls.TLSSocket.getPeerCertificate()`][] will only return data while the
|
|
|
|
connection is open.
|
2013-07-03 09:46:01 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### new tls.TLSSocket(socket[, options])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
2017-02-21 23:38:49 +01:00
|
|
|
changes:
|
|
|
|
- version: v5.0.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/2564
|
|
|
|
description: ALPN options are supported now.
|
2016-05-27 16:33:17 +02:00
|
|
|
-->
|
2013-07-03 09:46:01 +02:00
|
|
|
|
2017-12-11 04:37:47 +01:00
|
|
|
* `socket` {net.Socket|stream.Duplex}
|
|
|
|
On the server side, any `Duplex` stream. On the client side, any
|
|
|
|
instance of [`net.Socket`][] (for generic `Duplex` stream support
|
|
|
|
on the client side, [`tls.connect()`][] must be used).
|
2016-05-23 21:46:10 +02:00
|
|
|
* `options` {Object}
|
2017-10-02 18:10:44 +02:00
|
|
|
* `isServer`: The SSL/TLS protocol is asymmetrical, TLSSockets must know if
|
2016-11-23 23:14:34 +01:00
|
|
|
they are to behave as a server or a client. If `true` the TLS socket will be
|
2018-04-02 03:44:32 +02:00
|
|
|
instantiated as a server. **Default:** `false`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `server` {net.Server} A [`net.Server`][] instance.
|
2016-11-23 23:14:34 +01:00
|
|
|
* `requestCert`: Whether to authenticate the remote peer by requesting a
|
|
|
|
certificate. Clients always request a server certificate. Servers
|
2018-08-27 04:12:53 +02:00
|
|
|
(`isServer` is true) may set `requestCert` to true to request a client
|
|
|
|
certificate.
|
|
|
|
* `rejectUnauthorized`: See [`tls.createServer()`][]
|
|
|
|
* `ALPNProtocols`: See [`tls.createServer()`][]
|
|
|
|
* `SNICallback`: See [`tls.createServer()`][]
|
|
|
|
* `session` {Buffer} A `Buffer` instance containing a TLS session.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `requestOCSP` {boolean} If `true`, specifies that the OCSP status request
|
|
|
|
extension will be added to the client hello and an `'OCSPResponse'` event
|
|
|
|
will be emitted on the socket before establishing a secure communication
|
2018-08-27 04:12:53 +02:00
|
|
|
* `secureContext`: TLS context object created with
|
2016-11-23 23:14:34 +01:00
|
|
|
[`tls.createSecureContext()`][]. If a `secureContext` is _not_ provided, one
|
2017-01-17 04:36:42 +01:00
|
|
|
will be created by passing the entire `options` object to
|
2017-05-20 22:15:58 +02:00
|
|
|
`tls.createSecureContext()`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* ...: [`tls.createSecureContext()`][] options that are used if the
|
|
|
|
`secureContext` option is missing. Otherwise, they are ignored.
|
2016-12-30 18:14:10 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Construct a new `tls.TLSSocket` object from an existing TCP socket.
|
2014-04-14 19:15:57 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### Event: 'OCSPResponse'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.13
|
|
|
|
-->
|
2014-06-25 12:11:09 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `'OCSPResponse'` event is emitted if the `requestOCSP` option was set
|
|
|
|
when the `tls.TLSSocket` was created and an OCSP response has been received.
|
|
|
|
The listener callback is passed a single argument when called:
|
2014-06-25 12:11:09 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `response` {Buffer} The server's OCSP response
|
2014-06-25 12:11:09 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Typically, the `response` is a digitally signed object from the server's CA that
|
2015-11-05 21:04:26 +01:00
|
|
|
contains information about server's certificate revocation status.
|
2014-06-25 12:11:09 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### Event: 'secureConnect'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2014-06-25 12:11:09 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The `'secureConnect'` event is emitted after the handshaking process for a new
|
|
|
|
connection has successfully completed. The listener callback will be called
|
|
|
|
regardless of whether or not the server's certificate has been authorized. It
|
|
|
|
is the client's responsibility to check the `tlsSocket.authorized` property to
|
|
|
|
determine if the server certificate was signed by one of the specified CAs. If
|
|
|
|
`tlsSocket.authorized === false`, then the error can be found by examining the
|
2018-03-17 05:13:47 +01:00
|
|
|
`tlsSocket.authorizationError` property. If ALPN was used, the
|
|
|
|
`tlsSocket.alpnProtocol` property can be checked to determine the negotiated
|
|
|
|
protocol.
|
2014-06-25 12:11:09 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.address()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2011-03-29 18:58:50 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {Object}
|
|
|
|
|
2018-04-29 13:16:44 +02:00
|
|
|
Returns the bound `address`, the address `family` name, and `port` of the
|
|
|
|
underlying socket as reported by the operating system:
|
|
|
|
`{ port: 12346, family: 'IPv4', address: '127.0.0.1' }`.
|
2011-03-29 18:58:50 +02:00
|
|
|
|
2017-02-13 03:49:35 +01:00
|
|
|
### tlsSocket.authorizationError
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2017-02-13 03:49:35 +01:00
|
|
|
Returns the reason why the peer's certificate was not been verified. This
|
|
|
|
property is set only when `tlsSocket.authorized === false`.
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2017-02-13 03:49:35 +01:00
|
|
|
### tlsSocket.authorized
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {boolean}
|
|
|
|
|
2017-02-13 03:49:35 +01:00
|
|
|
Returns `true` if the peer certificate was signed by one of the CAs specified
|
|
|
|
when creating the `tls.TLSSocket` instance, otherwise `false`.
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2016-11-04 20:37:36 +01:00
|
|
|
### tlsSocket.disableRenegotiation()
|
|
|
|
<!-- YAML
|
2017-08-13 22:33:49 +02:00
|
|
|
added: v8.4.0
|
2016-11-04 20:37:36 +01:00
|
|
|
-->
|
|
|
|
|
|
|
|
Disables TLS renegotiation for this `TLSSocket` instance. Once called, attempts
|
|
|
|
to renegotiate will trigger an `'error'` event on the `TLSSocket`.
|
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.encrypted
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2015-05-05 09:41:16 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Always returns `true`. This may be used to distinguish TLS sockets from regular
|
|
|
|
`net.Socket` instances.
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2018-11-08 22:40:46 +01:00
|
|
|
### tlsSocket.getCertificate()
|
|
|
|
<!-- YAML
|
2018-11-14 01:57:14 +01:00
|
|
|
added: v11.2.0
|
2018-11-08 22:40:46 +01:00
|
|
|
-->
|
|
|
|
|
|
|
|
* Returns: {Object}
|
|
|
|
|
|
|
|
Returns an object representing the local certificate. The returned object has
|
|
|
|
some properties corresponding to the fields of the certificate.
|
|
|
|
|
|
|
|
See [`tls.TLSSocket.getPeerCertificate()`][] for an example of the certificate
|
|
|
|
structure.
|
|
|
|
|
|
|
|
If there is no local certificate, an empty object will be returned. If the
|
|
|
|
socket has been destroyed, `null` will be returned.
|
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.getCipher()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2016-01-31 07:28:41 +01:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {Object}
|
|
|
|
|
2017-09-23 06:35:33 +02:00
|
|
|
Returns an object representing the cipher name. The `version` key is a legacy
|
|
|
|
field which always contains the value `'TLSv1/SSLv3'`.
|
2013-06-13 15:36:00 +02:00
|
|
|
|
2018-04-29 13:16:44 +02:00
|
|
|
For example: `{ name: 'AES256-SHA', version: 'TLSv1/SSLv3' }`.
|
2012-02-27 20:09:35 +01:00
|
|
|
|
2017-09-23 06:35:33 +02:00
|
|
|
See `SSL_CIPHER_get_name()` in
|
2018-09-02 12:49:02 +02:00
|
|
|
<https://www.openssl.org/docs/man1.1.0/ssl/SSL_CIPHER_get_name.html> for more
|
2015-11-05 21:04:26 +01:00
|
|
|
information.
|
2012-02-27 20:09:35 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.getEphemeralKeyInfo()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v5.0.0
|
|
|
|
-->
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {Object}
|
|
|
|
|
2016-03-14 23:52:28 +01:00
|
|
|
Returns an object representing the type, name, and size of parameter of
|
|
|
|
an ephemeral key exchange in [Perfect Forward Secrecy][] on a client
|
2015-11-05 21:04:26 +01:00
|
|
|
connection. It returns an empty object when the key exchange is not
|
2016-05-23 21:46:10 +02:00
|
|
|
ephemeral. As this is only supported on a client socket; `null` is returned
|
|
|
|
if called on a server socket. The supported types are `'DH'` and `'ECDH'`. The
|
2018-04-29 19:46:41 +02:00
|
|
|
`name` property is available only when type is `'ECDH'`.
|
2011-08-03 04:17:16 +02:00
|
|
|
|
2018-04-29 13:16:44 +02:00
|
|
|
For example: `{ type: 'ECDH', name: 'prime256v1', size: 256 }`.
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2018-03-02 20:46:34 +01:00
|
|
|
### tlsSocket.getFinished()
|
|
|
|
<!-- YAML
|
2018-03-18 14:45:41 +01:00
|
|
|
added: v9.9.0
|
2018-03-02 20:46:34 +01:00
|
|
|
-->
|
|
|
|
|
|
|
|
* Returns: {Buffer|undefined} The latest `Finished` message that has been
|
|
|
|
sent to the socket as part of a SSL/TLS handshake, or `undefined` if
|
|
|
|
no `Finished` message has been sent yet.
|
|
|
|
|
|
|
|
As the `Finished` messages are message digests of the complete handshake
|
|
|
|
(with a total of 192 bits for TLS 1.0 and more for SSL 3.0), they can
|
|
|
|
be used for external authentication procedures when the authentication
|
|
|
|
provided by SSL/TLS is not desired or is not enough.
|
|
|
|
|
|
|
|
Corresponds to the `SSL_get_finished` routine in OpenSSL and may be used
|
|
|
|
to implement the `tls-unique` channel binding from [RFC 5929][].
|
|
|
|
|
2017-06-06 11:00:32 +02:00
|
|
|
### tlsSocket.getPeerCertificate([detailed])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-12-20 23:16:18 +01:00
|
|
|
* `detailed` {boolean} Include the full certificate chain if `true`, otherwise
|
|
|
|
include just the peer's certificate.
|
2018-11-14 01:10:31 +01:00
|
|
|
* Returns: {Object} A certificate object.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2018-11-14 01:10:31 +01:00
|
|
|
Returns an object representing the peer's certificate. If the peer does not
|
|
|
|
provide a certificate, an empty object will be returned. If the socket has been
|
|
|
|
destroyed, `null` will be returned.
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2018-04-29 19:46:41 +02:00
|
|
|
If the full certificate chain was requested, each certificate will include an
|
2016-12-20 23:16:18 +01:00
|
|
|
`issuerCertificate` property containing an object representing its issuer's
|
|
|
|
certificate.
|
|
|
|
|
2018-11-14 01:10:31 +01:00
|
|
|
#### Certificate Object
|
2018-11-10 00:05:34 +01:00
|
|
|
<!-- YAML
|
|
|
|
changes:
|
|
|
|
- version: REPLACEME
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/24358
|
|
|
|
description: Support Elliptic Curve public key info.
|
|
|
|
-->
|
2018-11-14 01:10:31 +01:00
|
|
|
|
|
|
|
A certificate object has properties corresponding to the fields of the
|
|
|
|
certificate.
|
|
|
|
|
|
|
|
* `raw` {Buffer} The DER encoded X.509 certificate data.
|
|
|
|
* `subject` {Object} The certificate subject, described in terms of
|
|
|
|
Country (`C:`), StateOrProvince (`ST`), Locality (`L`), Organization (`O`),
|
|
|
|
OrganizationalUnit (`OU`), and CommonName (`CN`). The CommonName is typically
|
|
|
|
a DNS name with TLS certificates. Example:
|
|
|
|
`{C: 'UK', ST: 'BC', L: 'Metro', O: 'Node Fans', OU: 'Docs', CN: 'example.com'}`.
|
|
|
|
* `issuer` {Object} The certificate issuer, described in the same terms as the
|
|
|
|
`subject`.
|
|
|
|
* `valid_from` {string} The date-time the certificate is valid from.
|
|
|
|
* `valid_to` {string} The date-time the certificate is valid to.
|
|
|
|
* `serialNumber` {string} The certificate serial number, as a hex string.
|
|
|
|
Example: `'B9B0D332A1AA5635'`.
|
|
|
|
* `fingerprint` {string} The SHA-1 digest of the DER encoded certificate. It is
|
|
|
|
returned as a `:` separated hexadecimal string. Example: `'2A:7A:C2:DD:...'`.
|
|
|
|
* `fingerprint256` {string} The SHA-256 digest of the DER encoded certificate.
|
|
|
|
It is returned as a `:` separated hexadecimal string. Example:
|
|
|
|
`'2A:7A:C2:DD:...'`.
|
|
|
|
* `ext_key_usage` {Array} (Optional) The extended key usage, a set of OIDs.
|
|
|
|
* `subjectaltname` {Array} (Optional) An array of names for the subject, an
|
|
|
|
alternative to the `subject` names.
|
|
|
|
* `infoAccess` {Array} (Optional) An array describing the AuthorityInfoAccess,
|
|
|
|
used with OCSP.
|
|
|
|
* `issuerCert` {Object} (Optional) The issuer certificate object. For
|
|
|
|
self-signed certificates, this may be a circular reference.
|
|
|
|
|
|
|
|
The certificate may contain information about the public key, depending on
|
|
|
|
the key type.
|
|
|
|
|
|
|
|
For RSA keys, the following properties may be defined:
|
2018-11-15 19:11:29 +01:00
|
|
|
* `bits` {number} The RSA bit size. Example: `1024`.
|
2018-11-14 01:10:31 +01:00
|
|
|
* `exponent` {string} The RSA exponent, as a string in hexadecimal number
|
2018-11-24 09:42:09 +01:00
|
|
|
notation. Example: `'0x010001'`.
|
2018-11-14 01:10:31 +01:00
|
|
|
* `modulus` {string} The RSA modulus, as a hexadecimal string. Example:
|
|
|
|
`'B56CE45CB7...'`.
|
|
|
|
* `pubkey` {Buffer} The public key.
|
|
|
|
|
2018-11-10 00:05:34 +01:00
|
|
|
For EC keys, the following properties may be defined:
|
|
|
|
* `pubkey` {Buffer} The public key.
|
|
|
|
* `bits` {number} The key size in bits. Example: `256`.
|
|
|
|
* `asn1Curve` {string} (Optional) The ASN.1 name of the OID of the elliptic
|
|
|
|
curve. Well-known curves are identified by an OID. While it is unusual, it is
|
|
|
|
possible that the curve is identified by its mathematical properties, in which
|
|
|
|
case it will not have an OID. Example: `'prime256v1'`.
|
|
|
|
* `nistCurve` {string} (Optional) The NIST name for the elliptic curve, if it
|
|
|
|
has one (not all well-known curves have been assigned names by NIST). Example:
|
|
|
|
`'P-256'`.
|
|
|
|
|
|
|
|
Example certificate:
|
2016-05-23 21:46:10 +02:00
|
|
|
```text
|
2016-01-17 18:39:07 +01:00
|
|
|
{ subject:
|
2018-11-14 01:10:31 +01:00
|
|
|
{ OU: [ 'Domain Control Validated', 'PositiveSSL Wildcard' ],
|
|
|
|
CN: '*.nodejs.org' },
|
2016-12-20 23:16:18 +01:00
|
|
|
issuer:
|
2018-11-14 01:10:31 +01:00
|
|
|
{ C: 'GB',
|
|
|
|
ST: 'Greater Manchester',
|
|
|
|
L: 'Salford',
|
|
|
|
O: 'COMODO CA Limited',
|
|
|
|
CN: 'COMODO RSA Domain Validation Secure Server CA' },
|
|
|
|
subjectaltname: 'DNS:*.nodejs.org, DNS:nodejs.org',
|
|
|
|
infoAccess:
|
|
|
|
{ 'CA Issuers - URI':
|
|
|
|
[ 'http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt' ],
|
|
|
|
'OCSP - URI': [ 'http://ocsp.comodoca.com' ] },
|
|
|
|
modulus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
|
|
|
|
exponent: '0x10001',
|
|
|
|
pubkey: <Buffer ... >,
|
|
|
|
valid_from: 'Aug 14 00:00:00 2017 GMT',
|
|
|
|
valid_to: 'Nov 20 23:59:59 2019 GMT',
|
|
|
|
fingerprint: '01:02:59:D9:C3:D2:0D:08:F7:82:4E:44:A4:B4:53:C5:E2:3A:87:4D',
|
|
|
|
fingerprint256: '69:AE:1A:6A:D4:3D:C6:C1:1B:EA:C6:23:DE:BA:2A:14:62:62:93:5C:7A:EA:06:41:9B:0B:BC:87:CE:48:4E:02',
|
|
|
|
ext_key_usage: [ '1.3.6.1.5.5.7.3.1', '1.3.6.1.5.5.7.3.2' ],
|
|
|
|
serialNumber: '66593D57F20CBC573E433381B5FEC280',
|
|
|
|
raw: <Buffer ... > }
|
2016-01-17 18:39:07 +01:00
|
|
|
```
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2018-03-02 20:46:34 +01:00
|
|
|
### tlsSocket.getPeerFinished()
|
|
|
|
<!-- YAML
|
2018-03-18 14:45:41 +01:00
|
|
|
added: v9.9.0
|
2018-03-02 20:46:34 +01:00
|
|
|
-->
|
|
|
|
|
|
|
|
* Returns: {Buffer|undefined} The latest `Finished` message that is expected
|
|
|
|
or has actually been received from the socket as part of a SSL/TLS handshake,
|
|
|
|
or `undefined` if there is no `Finished` message so far.
|
|
|
|
|
|
|
|
As the `Finished` messages are message digests of the complete handshake
|
|
|
|
(with a total of 192 bits for TLS 1.0 and more for SSL 3.0), they can
|
|
|
|
be used for external authentication procedures when the authentication
|
|
|
|
provided by SSL/TLS is not desired or is not enough.
|
|
|
|
|
|
|
|
Corresponds to the `SSL_get_peer_finished` routine in OpenSSL and may be used
|
|
|
|
to implement the `tls-unique` channel binding from [RFC 5929][].
|
|
|
|
|
2016-01-31 07:26:41 +01:00
|
|
|
### tlsSocket.getProtocol()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v5.7.0
|
|
|
|
-->
|
2016-01-31 07:26:41 +01:00
|
|
|
|
2018-11-20 22:42:15 +01:00
|
|
|
* Returns: {string|null}
|
2018-04-11 20:07:14 +02:00
|
|
|
|
2016-01-31 07:26:41 +01:00
|
|
|
Returns a string containing the negotiated SSL/TLS protocol version of the
|
2016-05-23 21:46:10 +02:00
|
|
|
current connection. The value `'unknown'` will be returned for connected
|
|
|
|
sockets that have not completed the handshaking process. The value `null` will
|
|
|
|
be returned for server sockets or disconnected client sockets.
|
2016-01-31 07:26:41 +01:00
|
|
|
|
2018-11-20 22:42:15 +01:00
|
|
|
Protocol versions are:
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2018-11-20 22:42:15 +01:00
|
|
|
* `'TLSv1'`
|
|
|
|
* `'TLSv1.1'`
|
|
|
|
* `'TLSv1.2'`
|
|
|
|
* `'SSLv3'`
|
2016-01-31 07:26:41 +01:00
|
|
|
|
2018-09-02 12:49:02 +02:00
|
|
|
See <https://www.openssl.org/docs/man1.1.0/ssl/SSL_get_version.html> for more
|
2016-01-31 07:26:41 +01:00
|
|
|
information.
|
2015-04-23 08:25:15 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.getSession()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the ASN.1 encoded TLS session or `undefined` if no session was
|
|
|
|
negotiated. Can be used to speed up handshake establishment when reconnecting
|
|
|
|
to the server.
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.getTLSTicket()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2011-12-17 18:09:16 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the TLS session ticket or `undefined` if no session was negotiated.
|
2011-12-17 18:09:16 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
This only works with client TLS sockets. Useful only for debugging, for session
|
|
|
|
reuse provide `session` option to [`tls.connect()`][].
|
2011-12-17 18:09:16 +01:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.localAddress
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2012-07-07 22:20:23 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* {string}
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the string representation of the local IP address.
|
2012-07-07 22:20:23 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.localPort
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* {number}
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the numeric representation of the local port.
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.remoteAddress
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* {string}
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the string representation of the remote IP address. For example,
|
2015-11-05 21:04:26 +01:00
|
|
|
`'74.125.127.100'` or `'2001:4860:a005::68'`.
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.remoteFamily
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* {string}
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the string representation of the remote IP family. `'IPv4'` or `'IPv6'`.
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.remotePort
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.4
|
|
|
|
-->
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* {number}
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
Returns the numeric representation of the remote port. For example, `443`.
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.renegotiate(options, callback)
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.8
|
|
|
|
-->
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `options` {Object}
|
2018-02-12 08:31:55 +01:00
|
|
|
* `rejectUnauthorized` {boolean} If not `false`, the server certificate is
|
|
|
|
verified against the list of supplied CAs. An `'error'` event is emitted if
|
2018-04-02 03:44:32 +02:00
|
|
|
verification fails; `err.code` contains the OpenSSL error code. **Default:**
|
2016-03-27 15:09:08 +02:00
|
|
|
`true`.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `requestCert`
|
|
|
|
* `callback` {Function} A function that will be called when the renegotiation
|
|
|
|
request has been completed.
|
|
|
|
|
|
|
|
The `tlsSocket.renegotiate()` method initiates a TLS renegotiation process.
|
|
|
|
Upon completion, the `callback` function will be passed a single argument
|
|
|
|
that is either an `Error` (if the request failed) or `null`.
|
2015-10-06 20:50:45 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
This method can be used to request a peer's certificate after the secure
|
|
|
|
connection has been established.
|
2013-06-17 12:11:13 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
When running as the server, the socket will be destroyed with an error after
|
|
|
|
`handshakeTimeout` timeout.
|
2014-04-14 19:15:57 +02:00
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
### tlsSocket.setMaxSendFragment(size)
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.11
|
|
|
|
-->
|
2014-04-14 19:15:57 +02:00
|
|
|
|
2018-04-02 03:44:32 +02:00
|
|
|
* `size` {number} The maximum TLS fragment size. The maximum value is `16384`.
|
|
|
|
**Default:** `16384`.
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {boolean}
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `tlsSocket.setMaxSendFragment()` method sets the maximum TLS fragment size.
|
|
|
|
Returns `true` if setting the limit succeeded; `false` otherwise.
|
2014-04-14 19:15:57 +02:00
|
|
|
|
2016-03-14 23:52:28 +01:00
|
|
|
Smaller fragment sizes decrease the buffering latency on the client: larger
|
2015-11-05 21:04:26 +01:00
|
|
|
fragments are buffered by the TLS layer until the entire fragment is received
|
2016-03-14 23:52:28 +01:00
|
|
|
and its integrity is verified; large fragments can span multiple roundtrips
|
2015-11-05 21:04:26 +01:00
|
|
|
and their processing can be delayed due to packet loss or reordering. However,
|
|
|
|
smaller fragments add extra TLS framing bytes and CPU overhead, which may
|
|
|
|
decrease overall server throughput.
|
2014-04-14 19:15:57 +02:00
|
|
|
|
2018-05-24 13:14:27 +02:00
|
|
|
## tls.checkServerIdentity(hostname, cert)
|
2017-11-22 21:28:59 +01:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.8.4
|
|
|
|
-->
|
|
|
|
|
2018-11-06 18:58:42 +01:00
|
|
|
* `hostname` {string} The host name or IP address to verify the certificate
|
|
|
|
against.
|
2018-11-14 01:10:31 +01:00
|
|
|
* `cert` {Object} A [certificate object][] representing the peer's certificate.
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {Error|undefined}
|
2017-11-22 21:28:59 +01:00
|
|
|
|
2018-05-24 13:14:27 +02:00
|
|
|
Verifies the certificate `cert` is issued to `hostname`.
|
2017-11-22 21:28:59 +01:00
|
|
|
|
2018-11-06 18:58:42 +01:00
|
|
|
Returns {Error} object, populating it with `reason`, `host`, and `cert` on
|
2017-12-05 08:49:38 +01:00
|
|
|
failure. On success, returns {undefined}.
|
2017-11-22 21:28:59 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
This function can be overwritten by providing alternative function as part of
|
|
|
|
the `options.checkServerIdentity` option passed to `tls.connect()`. The
|
|
|
|
overwriting function can call `tls.checkServerIdentity()` of course, to augment
|
2017-11-22 21:28:59 +01:00
|
|
|
the checks done with additional verification.
|
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
This function is only called if the certificate passed all other checks, such as
|
2017-11-22 21:28:59 +01:00
|
|
|
being issued by trusted CA (`options.ca`).
|
|
|
|
|
2016-11-23 23:14:34 +01:00
|
|
|
## tls.connect(options[, callback])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.3
|
2017-02-21 23:38:49 +01:00
|
|
|
changes:
|
2017-03-16 04:26:14 +01:00
|
|
|
- version: v8.0.0
|
2017-05-05 01:05:35 +02:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/12839
|
|
|
|
description: The `lookup` option is supported now.
|
2017-03-16 04:26:14 +01:00
|
|
|
- version: v8.0.0
|
2017-03-22 07:42:04 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/11984
|
2018-10-02 04:52:30 +02:00
|
|
|
description: The `ALPNProtocols` option can be a `TypedArray` or
|
|
|
|
`DataView` now.
|
2017-02-21 23:38:49 +01:00
|
|
|
- version: v5.3.0, v4.7.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/4246
|
|
|
|
description: The `secureContext` option is supported now.
|
|
|
|
- version: v5.0.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/2564
|
|
|
|
description: ALPN options are supported now.
|
2016-05-27 16:33:17 +02:00
|
|
|
-->
|
2011-10-26 14:12:23 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `options` {Object}
|
2018-04-02 03:44:32 +02:00
|
|
|
* `host` {string} Host the client should connect to. **Default:**
|
|
|
|
`'localhost'`.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `port` {number} Port the client should connect to.
|
|
|
|
* `path` {string} Creates unix socket connection to path. If this option is
|
|
|
|
specified, `host` and `port` are ignored.
|
2017-12-11 04:37:47 +01:00
|
|
|
* `socket` {stream.Duplex} Establish secure connection on a given socket
|
|
|
|
rather than creating a new socket. Typically, this is an instance of
|
|
|
|
[`net.Socket`][], but any `Duplex` stream is allowed.
|
|
|
|
If this option is specified, `path`, `host` and `port` are ignored,
|
2018-04-02 07:38:48 +02:00
|
|
|
except for certificate validation. Usually, a socket is already connected
|
2017-12-11 04:37:47 +01:00
|
|
|
when passed to `tls.connect()`, but it can be connected later. Note that
|
2016-11-23 23:14:34 +01:00
|
|
|
connection/disconnection/destruction of `socket` is the user's
|
|
|
|
responsibility, calling `tls.connect()` will not cause `net.connect()` to be
|
|
|
|
called.
|
2018-02-12 08:31:55 +01:00
|
|
|
* `rejectUnauthorized` {boolean} If not `false`, the server certificate is
|
|
|
|
verified against the list of supplied CAs. An `'error'` event is emitted if
|
2018-04-02 03:44:32 +02:00
|
|
|
verification fails; `err.code` contains the OpenSSL error code. **Default:**
|
2016-05-23 21:46:10 +02:00
|
|
|
`true`.
|
2018-10-02 04:52:30 +02:00
|
|
|
* `ALPNProtocols`: {string[]|Buffer[]|TypedArray[]|DataView[]|Buffer|
|
|
|
|
TypedArray|DataView}
|
|
|
|
An array of strings, `Buffer`s or `TypedArray`s or `DataView`s, or a
|
|
|
|
single `Buffer` or `TypedArray` or `DataView` containing the supported ALPN
|
|
|
|
protocols. `Buffer`s should have the format `[len][name][len][name]...`
|
2018-11-07 22:16:50 +01:00
|
|
|
e.g. `'\x08http/1.1\x08http/1.0'`, where the `len` byte is the length of the
|
|
|
|
next protocol name. Passing an array is usually much simpler, e.g.
|
|
|
|
`['http/1.1', 'http/1.0']`. Protocols earlier in the list have higher
|
|
|
|
preference than those later.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `servername`: {string} Server name for the SNI (Server Name Indication) TLS
|
2018-11-07 22:25:52 +01:00
|
|
|
extension. It is the name of the host being connected to, and must be a host
|
|
|
|
name, and not an IP address. It can be used by a multi-homed server to
|
|
|
|
choose the correct certificate to present to the client, see the
|
|
|
|
`SNICallback` option to [`tls.createServer()`][].
|
2016-05-23 21:46:10 +02:00
|
|
|
* `checkServerIdentity(servername, cert)` {Function} A callback function
|
2018-01-02 00:39:17 +01:00
|
|
|
to be used (instead of the builtin `tls.checkServerIdentity()` function)
|
2017-11-22 21:28:59 +01:00
|
|
|
when checking the server's hostname (or the provided `servername` when
|
|
|
|
explicitly set) against the certificate. This should return an {Error} if
|
|
|
|
verification fails. The method should return `undefined` if the `servername`
|
|
|
|
and `cert` are verified.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `session` {Buffer} A `Buffer` instance, containing TLS session.
|
|
|
|
* `minDHSize` {number} Minimum size of the DH parameter in bits to accept a
|
|
|
|
TLS connection. When a server offers a DH parameter with a size less
|
|
|
|
than `minDHSize`, the TLS connection is destroyed and an error is thrown.
|
2018-04-02 03:44:32 +02:00
|
|
|
**Default:** `1024`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `secureContext`: TLS context object created with
|
2016-11-23 23:14:34 +01:00
|
|
|
[`tls.createSecureContext()`][]. If a `secureContext` is _not_ provided, one
|
|
|
|
will be created by passing the entire `options` object to
|
2017-05-20 22:15:58 +02:00
|
|
|
`tls.createSecureContext()`.
|
2018-04-02 03:44:32 +02:00
|
|
|
* `lookup`: {Function} Custom lookup function. **Default:**
|
|
|
|
[`dns.lookup()`][].
|
2018-08-27 04:12:53 +02:00
|
|
|
* ...: [`tls.createSecureContext()`][] options that are used if the
|
2017-05-20 22:15:58 +02:00
|
|
|
`secureContext` option is missing, otherwise they are ignored.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `callback` {Function}
|
2018-10-31 09:53:38 +01:00
|
|
|
* Returns: {tls.TLSSocket}
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `callback` function, if specified, will be added as a listener for the
|
2015-11-28 00:30:32 +01:00
|
|
|
[`'secureConnect'`][] event.
|
2015-07-22 22:52:23 +02:00
|
|
|
|
2016-02-19 14:54:37 +01:00
|
|
|
`tls.connect()` returns a [`tls.TLSSocket`][] object.
|
2011-07-30 16:03:05 +02:00
|
|
|
|
2018-11-07 23:18:10 +01:00
|
|
|
The following illustrates a client for the echo server example from
|
2018-10-03 10:24:29 +02:00
|
|
|
[`tls.createServer()`][]:
|
2010-12-08 22:22:12 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
2018-11-07 23:18:10 +01:00
|
|
|
// Assumes an echo server that is listening on port 8000.
|
2016-01-17 18:39:07 +01:00
|
|
|
const tls = require('tls');
|
|
|
|
const fs = require('fs');
|
|
|
|
|
|
|
|
const options = {
|
2018-11-07 23:18:10 +01:00
|
|
|
// Necessary only if the server requires client certificate authentication.
|
2016-01-17 18:39:07 +01:00
|
|
|
key: fs.readFileSync('client-key.pem'),
|
|
|
|
cert: fs.readFileSync('client-cert.pem'),
|
|
|
|
|
2018-11-07 23:18:10 +01:00
|
|
|
// Necessary only if the server uses a self-signed certificate.
|
|
|
|
ca: [ fs.readFileSync('server-cert.pem') ],
|
2016-01-17 18:39:07 +01:00
|
|
|
|
2018-11-07 23:18:10 +01:00
|
|
|
// Necessary only if the server's cert isn't for "localhost".
|
|
|
|
checkServerIdentity: () => { return null; },
|
2016-01-17 18:39:07 +01:00
|
|
|
};
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
const socket = tls.connect(8000, options, () => {
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log('client connected',
|
|
|
|
socket.authorized ? 'authorized' : 'unauthorized');
|
|
|
|
process.stdin.pipe(socket);
|
|
|
|
process.stdin.resume();
|
|
|
|
});
|
|
|
|
socket.setEncoding('utf8');
|
|
|
|
socket.on('data', (data) => {
|
|
|
|
console.log(data);
|
|
|
|
});
|
|
|
|
socket.on('end', () => {
|
2018-11-07 23:18:10 +01:00
|
|
|
console.log('server ends connection');
|
2016-01-17 18:39:07 +01:00
|
|
|
});
|
|
|
|
```
|
2013-01-24 00:17:04 +01:00
|
|
|
|
2017-02-13 03:49:35 +01:00
|
|
|
## tls.connect(path[, options][, callback])
|
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.3
|
|
|
|
-->
|
|
|
|
|
|
|
|
* `path` {string} Default value for `options.path`.
|
|
|
|
* `options` {Object} See [`tls.connect()`][].
|
|
|
|
* `callback` {Function} See [`tls.connect()`][].
|
2018-10-31 09:53:38 +01:00
|
|
|
* Returns: {tls.TLSSocket}
|
2017-02-13 03:49:35 +01:00
|
|
|
|
|
|
|
Same as [`tls.connect()`][] except that `path` can be provided
|
|
|
|
as an argument instead of an option.
|
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
A path option, if specified, will take precedence over the path argument.
|
2017-02-13 03:49:35 +01:00
|
|
|
|
|
|
|
## tls.connect(port[, host][, options][, callback])
|
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.3
|
|
|
|
-->
|
|
|
|
|
|
|
|
* `port` {number} Default value for `options.port`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `host` {string} Default value for `options.host`.
|
2017-02-13 03:49:35 +01:00
|
|
|
* `options` {Object} See [`tls.connect()`][].
|
|
|
|
* `callback` {Function} See [`tls.connect()`][].
|
2018-10-31 09:53:38 +01:00
|
|
|
* Returns: {tls.TLSSocket}
|
2017-02-13 03:49:35 +01:00
|
|
|
|
|
|
|
Same as [`tls.connect()`][] except that `port` and `host` can be provided
|
|
|
|
as arguments instead of options.
|
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
A port or host option, if specified, will take precedence over any port or host
|
|
|
|
argument.
|
2017-02-13 03:49:35 +01:00
|
|
|
|
2018-08-27 08:24:14 +02:00
|
|
|
## tls.createSecureContext([options])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.13
|
2017-02-21 23:38:49 +01:00
|
|
|
changes:
|
2018-11-30 19:53:30 +01:00
|
|
|
- version: REPLACEME
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/24405
|
|
|
|
description: The `minVersion` and `maxVersion` can be used to restrict
|
|
|
|
the allowed TLS protocol versions.
|
2018-09-19 19:40:44 +02:00
|
|
|
- version: v10.0.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/19794
|
|
|
|
description: The `ecdhCurve` cannot be set to `false` anymore due to a
|
|
|
|
change in OpenSSL.
|
2017-12-12 09:09:37 +01:00
|
|
|
- version: v9.3.0
|
2017-12-12 10:18:02 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/14903
|
2017-08-17 22:54:05 +02:00
|
|
|
description: The `options` parameter can now include `clientCertEngine`.
|
2017-02-21 23:38:49 +01:00
|
|
|
- version: v7.3.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/10294
|
|
|
|
description: If the `key` option is an array, individual entries do not
|
2018-04-29 19:46:41 +02:00
|
|
|
need a `passphrase` property anymore. `Array` entries can also
|
2017-02-21 23:38:49 +01:00
|
|
|
just be `string`s or `Buffer`s now.
|
|
|
|
- version: v5.2.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/4099
|
|
|
|
description: The `ca` option can now be a single string containing multiple
|
|
|
|
CA certificates.
|
2016-05-27 16:33:17 +02:00
|
|
|
-->
|
2013-01-24 00:17:04 +01:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `options` {Object}
|
2016-12-21 18:33:13 +01:00
|
|
|
* `ca` {string|string[]|Buffer|Buffer[]} Optionally override the trusted CA
|
|
|
|
certificates. Default is to trust the well-known CAs curated by Mozilla.
|
|
|
|
Mozilla's CAs are completely replaced when CAs are explicitly specified
|
2018-04-29 19:46:41 +02:00
|
|
|
using this option. The value can be a string or `Buffer`, or an `Array` of
|
|
|
|
strings and/or `Buffer`s. Any string or `Buffer` can contain multiple PEM
|
|
|
|
CAs concatenated together. The peer's certificate must be chainable to a CA
|
2018-04-02 07:38:48 +02:00
|
|
|
trusted by the server for the connection to be authenticated. When using
|
2016-12-21 18:33:13 +01:00
|
|
|
certificates that are not chainable to a well-known CA, the certificate's CA
|
|
|
|
must be explicitly specified as a trusted or the connection will fail to
|
|
|
|
authenticate.
|
|
|
|
If the peer uses a certificate that doesn't match or chain to one of the
|
|
|
|
default CAs, use the `ca` option to provide a CA certificate that the peer's
|
|
|
|
certificate can match or chain to.
|
|
|
|
For self-signed certificates, the certificate is its own CA, and must be
|
|
|
|
provided.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `cert` {string|string[]|Buffer|Buffer[]} Cert chains in PEM format. One cert
|
|
|
|
chain should be provided per private key. Each cert chain should consist of
|
|
|
|
the PEM formatted certificate for a provided private `key`, followed by the
|
|
|
|
PEM formatted intermediate certificates (if any), in order, and not
|
|
|
|
including the root CA (the root CA must be pre-known to the peer, see `ca`).
|
|
|
|
When providing multiple cert chains, they do not have to be in the same
|
|
|
|
order as their private keys in `key`. If the intermediate certificates are
|
|
|
|
not provided, the peer will not be able to validate the certificate, and the
|
|
|
|
handshake will fail.
|
|
|
|
* `ciphers` {string} Cipher suite specification, replacing the default. For
|
|
|
|
more information, see [modifying the default cipher suite][]. Permitted
|
|
|
|
ciphers can be obtained via [`tls.getCiphers()`][]. Cipher names must be
|
|
|
|
uppercased in order for OpenSSL to accept them.
|
|
|
|
* `clientCertEngine` {string} Name of an OpenSSL engine which can provide the
|
|
|
|
client certificate.
|
|
|
|
* `crl` {string|string[]|Buffer|Buffer[]} PEM formatted CRLs (Certificate
|
|
|
|
Revocation Lists).
|
2016-11-23 23:14:34 +01:00
|
|
|
* `dhparam` {string|Buffer} Diffie Hellman parameters, required for
|
|
|
|
[Perfect Forward Secrecy][]. Use `openssl dhparam` to create the parameters.
|
|
|
|
The key length must be greater than or equal to 1024 bits, otherwise an
|
|
|
|
error will be thrown. It is strongly recommended to use 2048 bits or larger
|
|
|
|
for stronger security. If omitted or invalid, the parameters are silently
|
|
|
|
discarded and DHE ciphers will not be available.
|
2018-06-04 21:23:26 +02:00
|
|
|
* `ecdhCurve` {string} A string describing a named curve or a colon separated
|
|
|
|
list of curve NIDs or names, for example `P-521:P-384:P-256`, to use for
|
2018-09-19 19:40:44 +02:00
|
|
|
ECDH key agreement. Set to `auto` to select the
|
2018-06-04 21:23:26 +02:00
|
|
|
curve automatically. Use [`crypto.getCurves()`][] to obtain a list of
|
|
|
|
available curve names. On recent releases, `openssl ecparam -list_curves`
|
|
|
|
will also display the name and description of each available elliptic curve.
|
|
|
|
**Default:** [`tls.DEFAULT_ECDH_CURVE`].
|
|
|
|
* `honorCipherOrder` {boolean} Attempt to use the server's cipher suite
|
|
|
|
preferences instead of the client's. When `true`, causes
|
|
|
|
`SSL_OP_CIPHER_SERVER_PREFERENCE` to be set in `secureOptions`, see
|
|
|
|
[OpenSSL Options][] for more information.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `key` {string|string[]|Buffer|Buffer[]|Object[]} Private keys in PEM format.
|
|
|
|
PEM allows the option of private keys being encrypted. Encrypted keys will
|
|
|
|
be decrypted with `options.passphrase`. Multiple keys using different
|
|
|
|
algorithms can be provided either as an array of unencrypted key strings or
|
|
|
|
buffers, or an array of objects in the form `{pem: <string|buffer>[,
|
|
|
|
passphrase: <string>]}`. The object form can only occur in an array.
|
|
|
|
`object.passphrase` is optional. Encrypted keys will be decrypted with
|
|
|
|
`object.passphrase` if provided, or `options.passphrase` if it is not.
|
2018-05-06 06:52:34 +02:00
|
|
|
* `maxVersion` {string} Optionally set the maximum TLS version to allow. One
|
|
|
|
of `TLSv1.2'`, `'TLSv1.1'`, or `'TLSv1'`. Cannot be specified along with the
|
|
|
|
`secureProtocol` option, use one or the other. **Default:** `'TLSv1.2'`.
|
|
|
|
* `minVersion` {string} Optionally set the minimum TLS version to allow. One
|
|
|
|
of `TLSv1.2'`, `'TLSv1.1'`, or `'TLSv1'`. Cannot be specified along with the
|
2018-11-24 09:42:09 +01:00
|
|
|
`secureProtocol` option, use one or the other. It is not recommended to use
|
2018-05-06 06:52:34 +02:00
|
|
|
less than TLSv1.2, but it may be required for interoperability.
|
|
|
|
**Default:** `'TLSv1.2'`, unless changed using CLI options. Using
|
|
|
|
`--tls-v1.0` changes the default to `'TLSv1'`. Using `--tls-v1.1` changes
|
|
|
|
the default to `'TLSv1.1'`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `passphrase` {string} Shared passphrase used for a single private key and/or
|
|
|
|
a PFX.
|
|
|
|
* `pfx` {string|string[]|Buffer|Buffer[]|Object[]} PFX or PKCS12 encoded
|
|
|
|
private key and certificate chain. `pfx` is an alternative to providing
|
|
|
|
`key` and `cert` individually. PFX is usually encrypted, if it is,
|
2018-06-04 21:23:26 +02:00
|
|
|
`passphrase` will be used to decrypt it. Multiple PFX can be provided either
|
|
|
|
as an array of unencrypted PFX buffers, or an array of objects in the form
|
|
|
|
`{buf: <string|buffer>[, passphrase: <string>]}`. The object form can only
|
|
|
|
occur in an array. `object.passphrase` is optional. Encrypted PFX will be
|
|
|
|
decrypted with `object.passphrase` if provided, or `options.passphrase` if
|
|
|
|
it is not.
|
2017-05-26 19:51:15 +02:00
|
|
|
* `secureOptions` {number} Optionally affect the OpenSSL protocol behavior,
|
2016-11-23 23:14:34 +01:00
|
|
|
which is not usually necessary. This should be used carefully if at all!
|
|
|
|
Value is a numeric bitmask of the `SSL_OP_*` options from
|
|
|
|
[OpenSSL Options][].
|
2018-11-16 00:51:55 +01:00
|
|
|
* `secureProtocol` {string} The TLS protocol version to use. The possible
|
|
|
|
values are listed as [SSL_METHODS][], use the function names as strings. For
|
|
|
|
example, use `'TLSv1_1_method'` to force TLS version 1.1, or `'TLS_method'`
|
|
|
|
to allow any TLS protocol version. It is not recommended to use TLS versions
|
|
|
|
less than 1.2, but it may be required for interoperability. **Default:**
|
2018-05-06 06:52:34 +02:00
|
|
|
none, see `minVersion`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `sessionIdContext` {string} Opaque identifier used by servers to ensure
|
|
|
|
session state is not shared between applications. Unused by clients.
|
2017-05-20 22:15:58 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
[`tls.createServer()`][] sets the default value of the `honorCipherOrder` option
|
|
|
|
to `true`, other APIs that create secure contexts leave it unset.
|
2017-05-20 22:15:58 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
[`tls.createServer()`][] uses a 128 bit truncated SHA1 hash value generated
|
|
|
|
from `process.argv` as the default value of the `sessionIdContext` option, other
|
|
|
|
APIs that create secure contexts have no default value.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `tls.createSecureContext()` method creates a credentials object.
|
|
|
|
|
2016-11-23 23:14:34 +01:00
|
|
|
A key is *required* for ciphers that make use of certificates. Either `key` or
|
|
|
|
`pfx` can be used to provide it.
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
If the 'ca' option is not given, then Node.js will use the default
|
2015-11-05 21:04:26 +01:00
|
|
|
publicly trusted list of CAs as given in
|
2017-11-23 00:04:16 +01:00
|
|
|
<https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt>.
|
2011-08-11 10:13:13 +02:00
|
|
|
|
2016-11-21 22:50:02 +01:00
|
|
|
## tls.createServer([options][, secureConnectionListener])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
2017-02-21 23:38:49 +01:00
|
|
|
changes:
|
2017-12-12 09:09:37 +01:00
|
|
|
- version: v9.3.0
|
2017-12-12 10:18:02 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/14903
|
2017-08-17 22:54:05 +02:00
|
|
|
description: The `options` parameter can now include `clientCertEngine`.
|
2017-03-16 04:26:14 +01:00
|
|
|
- version: v8.0.0
|
2017-03-22 07:42:04 +01:00
|
|
|
pr-url: https://github.com/nodejs/node/pull/11984
|
2018-10-02 04:52:30 +02:00
|
|
|
description: The `ALPNProtocols` option can be a `TypedArray` or
|
|
|
|
`DataView` now.
|
2017-02-21 23:38:49 +01:00
|
|
|
- version: v5.0.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/2564
|
|
|
|
description: ALPN options are supported now.
|
2016-05-27 16:33:17 +02:00
|
|
|
-->
|
2011-08-11 10:13:13 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
* `options` {Object}
|
2018-10-02 04:52:30 +02:00
|
|
|
* `ALPNProtocols`: {string[]|Buffer[]|TypedArray[]|DataView[]|Buffer|
|
|
|
|
TypedArray|DataView}
|
|
|
|
An array of strings, `Buffer`s or `TypedArray`s or `DataView`s, or a single
|
|
|
|
`Buffer` or `TypedArray` or `DataView` containing the supported ALPN
|
|
|
|
protocols. `Buffer`s should have the format `[len][name][len][name]...`
|
|
|
|
e.g. `0x05hello0x05world`, where the first byte is the length of the next
|
|
|
|
protocol name. Passing an array is usually much simpler, e.g.
|
|
|
|
`['hello', 'world']`. (Protocols should be ordered by their priority.)
|
2018-08-27 04:12:53 +02:00
|
|
|
* `clientCertEngine` {string} Name of an OpenSSL engine which can provide the
|
|
|
|
client certificate.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `handshakeTimeout` {number} Abort the connection if the SSL/TLS handshake
|
2018-04-02 03:44:32 +02:00
|
|
|
does not finish in the specified number of milliseconds.
|
|
|
|
A `'tlsClientError'` is emitted on the `tls.Server` object whenever
|
|
|
|
a handshake times out. **Default:** `120000` (120 seconds).
|
2016-03-27 15:09:08 +02:00
|
|
|
* `rejectUnauthorized` {boolean} If not `false` the server will reject any
|
2016-05-23 21:46:10 +02:00
|
|
|
connection which is not authorized with the list of supplied CAs. This
|
2018-04-02 03:44:32 +02:00
|
|
|
option only has an effect if `requestCert` is `true`. **Default:** `true`.
|
2018-06-04 21:23:26 +02:00
|
|
|
* `requestCert` {boolean} If `true` the server will request a certificate from
|
|
|
|
clients that connect and attempt to verify that certificate. **Default:**
|
|
|
|
`false`.
|
|
|
|
* `sessionTimeout` {number} An integer specifying the number of seconds after
|
|
|
|
which the TLS session identifiers and TLS session tickets created by the
|
|
|
|
server will time out. See [`SSL_CTX_set_timeout`] for more details.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `SNICallback(servername, cb)` {Function} A function that will be called if
|
|
|
|
the client supports SNI TLS extension. Two arguments will be passed when
|
|
|
|
called: `servername` and `cb`. `SNICallback` should invoke `cb(null, ctx)`,
|
2018-04-29 19:46:41 +02:00
|
|
|
where `ctx` is a `SecureContext` instance. (`tls.createSecureContext(...)`
|
|
|
|
can be used to get a proper `SecureContext`.) If `SNICallback` wasn't
|
|
|
|
provided the default callback with high-level API will be used (see below).
|
2016-05-23 21:46:10 +02:00
|
|
|
* `ticketKeys`: A 48-byte `Buffer` instance consisting of a 16-byte prefix,
|
|
|
|
a 16-byte HMAC key, and a 16-byte AES key. This can be used to accept TLS
|
2017-05-20 22:15:58 +02:00
|
|
|
session tickets on multiple instances of the TLS server.
|
2018-06-04 21:23:26 +02:00
|
|
|
* ...: Any [`tls.createSecureContext()`][] option can be provided. For
|
2016-11-23 23:14:34 +01:00
|
|
|
servers, the identity options (`pfx` or `key`/`cert`) are usually required.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `secureConnectionListener` {Function}
|
2018-10-31 09:53:38 +01:00
|
|
|
* Returns: {tls.Server}
|
2014-02-03 22:32:13 +01:00
|
|
|
|
2018-04-29 19:46:41 +02:00
|
|
|
Creates a new [`tls.Server`][]. The `secureConnectionListener`, if provided, is
|
2016-05-23 21:46:10 +02:00
|
|
|
automatically set as a listener for the [`'secureConnection'`][] event.
|
2014-02-03 22:32:13 +01:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The `ticketKeys` options is automatically shared between `cluster` module
|
|
|
|
workers.
|
2017-05-20 22:15:58 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
The following illustrates a simple echo server:
|
2011-10-26 14:12:23 +02:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
|
|
|
const tls = require('tls');
|
|
|
|
const fs = require('fs');
|
|
|
|
|
|
|
|
const options = {
|
|
|
|
key: fs.readFileSync('server-key.pem'),
|
|
|
|
cert: fs.readFileSync('server-cert.pem'),
|
|
|
|
|
2018-11-07 23:18:10 +01:00
|
|
|
// This is necessary only if using client certificate authentication.
|
2016-01-17 18:39:07 +01:00
|
|
|
requestCert: true,
|
|
|
|
|
2018-11-07 23:18:10 +01:00
|
|
|
// This is necessary only if the client uses a self-signed certificate.
|
2016-01-17 18:39:07 +01:00
|
|
|
ca: [ fs.readFileSync('client-cert.pem') ]
|
|
|
|
};
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
const server = tls.createServer(options, (socket) => {
|
2016-01-17 18:39:07 +01:00
|
|
|
console.log('server connected',
|
|
|
|
socket.authorized ? 'authorized' : 'unauthorized');
|
|
|
|
socket.write('welcome!\n');
|
|
|
|
socket.setEncoding('utf8');
|
|
|
|
socket.pipe(socket);
|
|
|
|
});
|
|
|
|
server.listen(8000, () => {
|
|
|
|
console.log('server bound');
|
|
|
|
});
|
|
|
|
```
|
2011-10-26 14:12:23 +02:00
|
|
|
|
2018-11-07 23:18:10 +01:00
|
|
|
The server can be tested by connecting to it using the example client from
|
|
|
|
[`tls.connect()`][].
|
2015-11-05 21:04:26 +01:00
|
|
|
|
|
|
|
## tls.getCiphers()
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.10.2
|
|
|
|
-->
|
2015-11-05 21:04:26 +01:00
|
|
|
|
2018-04-11 20:07:14 +02:00
|
|
|
* Returns: {string[]}
|
|
|
|
|
2015-11-05 21:04:26 +01:00
|
|
|
Returns an array with the names of the supported SSL ciphers.
|
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
```js
|
|
|
|
console.log(tls.getCiphers()); // ['AES128-SHA', 'AES256-SHA', ...]
|
|
|
|
```
|
|
|
|
|
2015-04-23 12:33:38 +02:00
|
|
|
## tls.DEFAULT_ECDH_CURVE
|
2017-01-24 23:04:08 +01:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.11.13
|
|
|
|
-->
|
2015-04-23 12:33:38 +02:00
|
|
|
|
|
|
|
The default curve name to use for ECDH key agreement in a tls server. The
|
2018-02-12 08:31:55 +01:00
|
|
|
default value is `'auto'`. See [`tls.createSecureContext()`] for further
|
|
|
|
information.
|
2015-04-23 12:33:38 +02:00
|
|
|
|
2016-05-23 21:46:10 +02:00
|
|
|
## Deprecated APIs
|
|
|
|
|
|
|
|
### Class: CryptoStream
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.4
|
|
|
|
deprecated: v0.11.3
|
|
|
|
-->
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2016-07-16 00:35:38 +02:00
|
|
|
> Stability: 0 - Deprecated: Use [`tls.TLSSocket`][] instead.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `tls.CryptoStream` class represents a stream of encrypted data. This class
|
2018-06-04 20:58:47 +02:00
|
|
|
is deprecated and should no longer be used.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
#### cryptoStream.bytesWritten
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.4
|
|
|
|
deprecated: v0.11.3
|
|
|
|
-->
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `cryptoStream.bytesWritten` property returns the total number of bytes
|
|
|
|
written to the underlying socket *including* the bytes required for the
|
|
|
|
implementation of the TLS protocol.
|
|
|
|
|
|
|
|
### Class: SecurePair
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
|
|
|
deprecated: v0.11.3
|
|
|
|
-->
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2016-07-16 00:35:38 +02:00
|
|
|
> Stability: 0 - Deprecated: Use [`tls.TLSSocket`][] instead.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2016-07-09 07:13:09 +02:00
|
|
|
Returned by [`tls.createSecurePair()`][].
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
#### Event: 'secure'
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
|
|
|
deprecated: v0.11.3
|
|
|
|
-->
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
The `'secure'` event is emitted by the `SecurePair` object once a secure
|
|
|
|
connection has been established.
|
|
|
|
|
2018-04-09 18:30:22 +02:00
|
|
|
As with checking for the server
|
|
|
|
[`'secureConnection'`](#tls_event_secureconnection)
|
2016-05-23 21:46:10 +02:00
|
|
|
event, `pair.cleartext.authorized` should be inspected to confirm whether the
|
|
|
|
certificate used is properly authorized.
|
|
|
|
|
2016-09-26 06:49:50 +02:00
|
|
|
### tls.createSecurePair([context][, isServer][, requestCert][, rejectUnauthorized][, options])
|
2016-05-27 16:33:17 +02:00
|
|
|
<!-- YAML
|
|
|
|
added: v0.3.2
|
|
|
|
deprecated: v0.11.3
|
2017-02-21 23:38:49 +01:00
|
|
|
changes:
|
|
|
|
- version: v5.0.0
|
|
|
|
pr-url: https://github.com/nodejs/node/pull/2564
|
|
|
|
description: ALPN options are supported now.
|
2016-05-27 16:33:17 +02:00
|
|
|
-->
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2016-07-16 00:35:38 +02:00
|
|
|
> Stability: 0 - Deprecated: Use [`tls.TLSSocket`][] instead.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
* `context` {Object} A secure context object as returned by
|
|
|
|
`tls.createSecureContext()`
|
|
|
|
* `isServer` {boolean} `true` to specify that this TLS connection should be
|
|
|
|
opened as a server.
|
|
|
|
* `requestCert` {boolean} `true` to specify whether a server should request a
|
|
|
|
certificate from a connecting client. Only applies when `isServer` is `true`.
|
2018-02-12 08:31:55 +01:00
|
|
|
* `rejectUnauthorized` {boolean} If not `false` a server automatically reject
|
|
|
|
clients with invalid certificates. Only applies when `isServer` is `true`.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `options`
|
2018-08-27 04:12:53 +02:00
|
|
|
* `secureContext`: A TLS context object from [`tls.createSecureContext()`][]
|
2016-05-23 21:46:10 +02:00
|
|
|
* `isServer`: If `true` the TLS socket will be instantiated in server-mode.
|
2018-04-02 03:44:32 +02:00
|
|
|
**Default:** `false`.
|
2018-08-27 04:12:53 +02:00
|
|
|
* `server` {net.Server} A [`net.Server`][] instance
|
|
|
|
* `requestCert`: See [`tls.createServer()`][]
|
|
|
|
* `rejectUnauthorized`: See [`tls.createServer()`][]
|
|
|
|
* `ALPNProtocols`: See [`tls.createServer()`][]
|
|
|
|
* `SNICallback`: See [`tls.createServer()`][]
|
|
|
|
* `session` {Buffer} A `Buffer` instance containing a TLS session.
|
2016-05-23 21:46:10 +02:00
|
|
|
* `requestOCSP` {boolean} If `true`, specifies that the OCSP status request
|
|
|
|
extension will be added to the client hello and an `'OCSPResponse'` event
|
2018-04-29 13:16:44 +02:00
|
|
|
will be emitted on the socket before establishing a secure communication.
|
2016-05-23 21:46:10 +02:00
|
|
|
|
|
|
|
Creates a new secure pair object with two streams, one of which reads and writes
|
|
|
|
the encrypted data and the other of which reads and writes the cleartext data.
|
|
|
|
Generally, the encrypted stream is piped to/from an incoming encrypted data
|
|
|
|
stream and the cleartext one is used as a replacement for the initial encrypted
|
|
|
|
stream.
|
|
|
|
|
|
|
|
`tls.createSecurePair()` returns a `tls.SecurePair` object with `cleartext` and
|
|
|
|
`encrypted` stream properties.
|
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
Using `cleartext` has the same API as [`tls.TLSSocket`][].
|
2016-05-23 21:46:10 +02:00
|
|
|
|
2018-02-06 06:55:16 +01:00
|
|
|
The `tls.createSecurePair()` method is now deprecated in favor of
|
2016-05-23 21:46:10 +02:00
|
|
|
`tls.TLSSocket()`. For example, the code:
|
|
|
|
|
|
|
|
```js
|
2017-04-21 06:53:00 +02:00
|
|
|
pair = tls.createSecurePair(/* ... */);
|
2016-05-23 21:46:10 +02:00
|
|
|
pair.encrypted.pipe(socket);
|
|
|
|
socket.pipe(pair.encrypted);
|
|
|
|
```
|
|
|
|
|
|
|
|
can be replaced by:
|
2015-11-05 21:04:26 +01:00
|
|
|
|
2016-01-17 18:39:07 +01:00
|
|
|
```js
|
2018-04-11 18:45:10 +02:00
|
|
|
secureSocket = tls.TLSSocket(socket, options);
|
2016-01-17 18:39:07 +01:00
|
|
|
```
|
2013-05-20 15:14:30 +02:00
|
|
|
|
2018-04-11 18:45:10 +02:00
|
|
|
where `secureSocket` has the same API as `pair.cleartext`.
|
2013-05-20 15:14:30 +02:00
|
|
|
|
2017-05-08 18:30:13 +02:00
|
|
|
[`'secureConnect'`]: #tls_event_secureconnect
|
|
|
|
[`'secureConnection'`]: #tls_event_secureconnection
|
2018-04-29 19:46:41 +02:00
|
|
|
[`SSL_CTX_set_timeout`]: https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_set_timeout.html
|
2017-05-08 18:30:13 +02:00
|
|
|
[`crypto.getCurves()`]: crypto.html#crypto_crypto_getcurves
|
2018-04-29 19:46:41 +02:00
|
|
|
[`dns.lookup()`]: dns.html#dns_dns_lookup_hostname_options_callback
|
2017-05-08 18:30:13 +02:00
|
|
|
[`net.Server.address()`]: net.html#net_server_address
|
|
|
|
[`net.Server`]: net.html#net_class_net_server
|
|
|
|
[`net.Socket`]: net.html#net_class_net_socket
|
2017-06-06 11:00:32 +02:00
|
|
|
[`server.getConnections()`]: net.html#net_server_getconnections_callback
|
2017-10-06 20:50:47 +02:00
|
|
|
[`server.listen()`]: net.html#net_server_listen
|
2017-05-08 18:30:13 +02:00
|
|
|
[`tls.DEFAULT_ECDH_CURVE`]: #tls_tls_default_ecdh_curve
|
2018-04-29 19:46:41 +02:00
|
|
|
[`tls.Server`]: #tls_class_tls_server
|
2017-05-08 18:30:13 +02:00
|
|
|
[`tls.TLSSocket.getPeerCertificate()`]: #tls_tlssocket_getpeercertificate_detailed
|
|
|
|
[`tls.TLSSocket`]: #tls_class_tls_tlssocket
|
|
|
|
[`tls.connect()`]: #tls_tls_connect_options_callback
|
|
|
|
[`tls.createSecureContext()`]: #tls_tls_createsecurecontext_options
|
|
|
|
[`tls.createSecurePair()`]: #tls_tls_createsecurepair_context_isserver_requestcert_rejectunauthorized_options
|
|
|
|
[`tls.createServer()`]: #tls_tls_createserver_options_secureconnectionlistener
|
2018-06-27 09:07:13 +02:00
|
|
|
[`tls.getCiphers()`]: #tls_tls_getciphers
|
2016-05-23 21:46:10 +02:00
|
|
|
[Chrome's 'modern cryptography' setting]: https://www.chromium.org/Home/chromium-security/education/tls#TOC-Cipher-Suites
|
2014-01-05 12:07:54 +01:00
|
|
|
[DHE]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
|
|
|
|
[ECDHE]: https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman
|
2015-04-23 12:33:38 +02:00
|
|
|
[Forward secrecy]: https://en.wikipedia.org/wiki/Perfect_forward_secrecy
|
2015-12-02 17:17:19 +01:00
|
|
|
[OCSP request]: https://en.wikipedia.org/wiki/OCSP_stapling
|
2015-04-23 12:33:38 +02:00
|
|
|
[OpenSSL Options]: crypto.html#crypto_openssl_options
|
2018-03-14 11:27:57 +01:00
|
|
|
[OpenSSL cipher list format documentation]: https://www.openssl.org/docs/man1.1.0/apps/ciphers.html#CIPHER-LIST-FORMAT
|
2015-04-23 12:33:38 +02:00
|
|
|
[Perfect Forward Secrecy]: #tls_perfect_forward_secrecy
|
2018-04-29 19:46:41 +02:00
|
|
|
[RFC 5929]: https://tools.ietf.org/html/rfc5929
|
2018-03-14 11:27:57 +01:00
|
|
|
[SSL_METHODS]: https://www.openssl.org/docs/man1.1.0/ssl/ssl.html#Dealing-with-Protocol-Methods
|
2015-04-23 12:33:38 +02:00
|
|
|
[Stream]: stream.html#stream_stream
|
2015-07-22 22:52:23 +02:00
|
|
|
[TLS Session Tickets]: https://www.ietf.org/rfc/rfc5077.txt
|
2015-04-23 12:33:38 +02:00
|
|
|
[TLS recommendations]: https://wiki.mozilla.org/Security/Server_Side_TLS
|
2018-07-14 14:10:10 +02:00
|
|
|
[asn1.js]: https://www.npmjs.com/package/asn1.js
|
2018-11-14 01:10:31 +01:00
|
|
|
[certificate object]: #tls_certificate_object
|
2015-04-23 12:33:38 +02:00
|
|
|
[modifying the default cipher suite]: #tls_modifying_the_default_tls_cipher_suite
|
|
|
|
[specific attacks affecting larger AES key sizes]: https://www.schneier.com/blog/archives/2009/07/another_new_aes.html
|