Name

nginx_tcp_proxy_module - support TCP proxy with Nginx


Installation

Download the latest stable version of the release tarball of this module from github (http://github.com/yaoweibin/nginx_tcp_proxy_module)

Grab the nginx source code from nginx.org (http://nginx.org/), for example, the version 1.2.1 (see nginx compatibility), and then build the source with this module:

    $ wget 'http://nginx.org/download/nginx-1.2.1.tar.gz'
    $ tar -xzvf nginx-1.2.1.tar.gz
    $ cd nginx-1.2.1/
    $ patch -p1 < /path/to/nginx_tcp_proxy_module/tcp.patch
    $ ./configure --add-module=/path/to/nginx_tcp_proxy_module
    $ make
    $ make install


Synopsis

http {

    server {
        listen 80;
        location /status {
            tcp_check_status;
        }
    }
}

#You can also include tcp_proxy.conf file individually

#include /path/to/tcp_proxy.conf;

tcp {

    upstream cluster {
        # simple round-robin
        server 192.168.0.1:80;
        server 192.168.0.2:80;
        check interval=3000 rise=2 fall=5 timeout=1000;
        #check interval=3000 rise=2 fall=5 timeout=1000 type=ssl_hello;
        #check interval=3000 rise=2 fall=5 timeout=1000 type=http;
        #check_http_send "GET / HTTP/1.0\r\n\r\n";
        #check_http_expect_alive http_2xx http_3xx;
    }
    server {
        listen 8888;
        proxy_pass cluster;
    }
}


Description

This module actually include many modules: ngx_tcp_module, ngx_tcp_core_module, ngx_tcp_upstream_module, ngx_tcp_proxy_module, ngx_tcp_websocket_module, ngx_tcp_ssl_module, ngx_tcp_upstream_ip_hash_module. All these modules work together to support TCP proxy with Nginx. I also added other features: ip_hash, upstream server health check, status monitor.

The motivation of writing these modules is Nginx's high performance and robustness. At first, I developed this module just for general TCP proxy. And now, this module is frequently used in websocket reverse proxying.

Note, You can't use the same listening port with HTTP modules.


Directives

ngx_tcp_moodule

tcp

syntax: tcp {...}

default: none

context: main

description: All the tcp related directives are contained in the tcp block.

ngx_tcp_core_moodule

server

syntax: server {...}

default: none

context: tcp

description: All the specific server directives are contained in the server block.

listen

syntax: listen address:port [ bind | ssl | default]

default: none

context: server

description: The same as listen (http://wiki.nginx.org/NginxMailCoreModule#listen). The parameter of default means the default server if you have several server blocks with the same port.

access_log

syntax: access_log path [buffer=size] | off

default: access_log logs/tcp_access.log

context: tcp, server

description: Set the access.log. Each record's format is like this:

log_time worker_process_pid client_ip host_ip accept_time upstream_ip bytes_read bytes_write

2011/08/02 06:19:07 [5972] 127.0.0.1 0.0.0.0:1982 2011/08/02 06:18:19 172.19.0.129:80 80 236305

allow

syntax: allow [ address | CIDR | all ]

default: none

context: server

description: Directive grants access for the network or addresses indicated.

deny

syntax: deny [ address | CIDR | all ]

default: none

context: server

description: Directive grants access for the network or addresses indicated.

so_keepalive

syntax: so_keepalive on|off

default: off

context: main, server

description: The same as so_keepalive (http://wiki.nginx.org/NginxMailCoreModule#so_keepalive).

tcp_nodelay

syntax: tcp_nodelay on|off

default: on

context: main, server

description: The same as tcp_nodelay (http://wiki.nginx.org/NginxHttpCoreModule#tcp_nodelay).

timeout

syntax: timeout milliseconds

default: 60000

context: main, server

description: set the timeout value with clients.

server_name

syntax: server_name name

default: The name of the host, obtained through gethostname()

context: tcp, server

description: The same as server_name (http://wiki.nginx.org/NginxMailCoreModule#server_name). You can specify several server name in different server block with the same port. They can be used in websocket module.

resolver

syntax: resolver address

default: none

context: tcp, server

description: DNS server

resolver_timeout

syntax: resolver_timeout time

default: 30s

context: tcp, server

description: Resolver timeout in seconds.

ngx_tcp_upstream_module

upstream

syntax: upstream {...}

default: none

context: tcp

description: All the upstream directives are contained in this block. The upstream server will be dispatched with round robin by default.

server

syntax: server name [parameters]

default: none

context: upstream

description: Most of the parameters are the same as server (http://wiki.nginx.org/NginxHttpUpstreamModule#server). Default port is 80.

check

syntax: check interval=milliseconds [fall=count] [rise=count] [timeout=milliseconds] [type=tcp|ssl_hello|smtp|mysql|pop3|imap]

default: none, if parameters omitted, default parameters are interval=30000 fall=5 rise=2 timeout=1000

context: upstream

description: Add the health check for the upstream servers. At present, the check method is a simple tcp connect.

The parameters' meanings are:

check_http_send

syntax: check_http_send http_packet

default: ``GET / HTTP/1.0\r\n\r\n''

context: upstream

description: If you set the check type is http, then the check function will sends this http packet to check the upstream server.

check_http_expect_alive

syntax: check_http_expect_alive [ http_2xx | http_3xx | http_4xx | http_5xx ]

default: http_2xx | http_3xx

context: upstream

description: These status codes indicate the upstream server's http response is OK, the backend is alive.

check_smtp_send

syntax: check_smtp_send smtp_packet

default: ``HELO smtp.localdomain\r\n''

context: upstream

description: If you set the check type is smtp, then the check function will sends this smtp packet to check the upstream server.

check_smtp_expect_alive

syntax: check_smtp_expect_alive [smtp_2xx | smtp_3xx | smtp_4xx | smtp_5xx]

default: smtp_2xx

context: upstream

description: These status codes indicate the upstream server's smtp response is OK, the backend is alive.

check_shm_size

syntax: check_shm_size size

default: (number_of_checked_upstream_blocks + 1) * pagesize

context: tcp

description: If you store hundreds of servers in one upstream block, the shared memory for health check may be not enough, you can enlarged it by this directive.

tcp_check_status

syntax: tcp_check_status

default: none

context: location

description: Display the health checking servers' status by HTTP. This directive is set in the http block.

The table field meanings are:

ngx_tcp_upstream_busyness_module

busyness

syntax: busyness

default: none

context: upstream

description: the upstream server will be dispatched by backend servers' busyness.

ngx_tcp_upstream_ip_hash_module

ip_hash

syntax: ip_hash

default: none

context: upstream

description: the upstream server will be dispatched by ip_hash.

ngx_tcp_proxy_module

proxy_pass

syntax: proxy_pass host:port

default: none

context: server

description: proxy the request to the backend server. Default port is 80.

proxy_buffer

syntax: proxy_buffer size

default: 4k

context: tcp, server

description: set the size of proxy buffer.

proxy_connect_timeout

syntax: proxy_connect_timeout miliseconds

default: 60000

context: tcp, server

description: set the timeout value of connection to backends.

proxy_read_timeout

syntax: proxy_read_timeout miliseconds

default: 60000

context: tcp, server

description: set the timeout value of reading from backends.

proxy_send_timeout

syntax: proxy_send_timeout miliseconds

default: 60000

context: tcp, server

description: set the timeout value of sending to backends.

ngx_tcp_websocket_module

websocket_pass

syntax: websocket_pass [path] host:port

default: none

context: server

description: proxy the websocket request to the backend server. Default port is 80. You can specify several different paths in the same server block.

websocket_buffer

syntax: websocket_buffer size

default: 4k

context: tcp, server

description: set the size of proxy buffer.

websocket_connect_timeout

syntax: websocket_connect_timeout miliseconds

default: 60000

context: tcp, server

description: set the timeout value of connection to backends.

websocket_read_timeout

syntax: websocket_read_timeout miliseconds

default: 60000

context: tcp, server

description: set the timeout value of reading from backends. Your timeout will be the minimum of this and the *timeout* parameter, so if you want a long timeout for your websockets, make sure to set both paramaters.

websocket_send_timeout

syntax: websocket_send_timeout miliseconds

default: 60000

context: tcp, server

description: set the timeout value of sending to backends.

ngx_tcp_ssl_module

The default config file includes this ngx_tcp_ssl_module. If you want to just compile nginx without ngx_tcp_ssl_module, copy the ngx_tcp_proxy_module/config_without_ssl to ngx_tcp_proxy_module/config, reconfigrure and compile nginx.

ssl

syntax: ssl [on|off]

default: ssl off

context: tcp, server

Enables SSL for a server.

ssl_certificate

syntax: ssl_certificate file

default: ssl_certificate cert.pem

context: tcp, server

This directive specifies the file containing the certificate, in PEM format. This file can contain also other certificates and the server private key.

ssl_certificate_key

syntax: ssl_certificate_key file

default: ssl_certificate_key cert.pem

context: tcp, server

This directive specifies the file containing the private key, in PEM format.

ssl_client_certificate

syntax: ssl_client_certificate file

default: none

context: tcp, server

This directive specifies the file containing the CA (root) certificate, in PEM format, that is used for validating client certificates.

ssl_dhparam

syntax: ssl_dhparam file

default: none

context: tcp, server

This directive specifies a file containing Diffie-Hellman key agreement protocol cryptographic parameters, in PEM format, utilized for exchanging session keys between server and client.

ssl_ciphers

syntax: ssl_ciphers openssl_cipherlist_spec

default: ssl_ciphers HIGH:!aNULL:!MD5

context: tcp, server

This directive describes the list of cipher suites the server supports for establishing a secure connection. Cipher suites are specified in the OpenSSL (http://openssl.org/docs/apps/ciphers.html) cipherlist format, for example:

ssl_ciphers ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP;

The complete cipherlist supported by the currently installed version of OpenSSL in your platform can be obtained by issuing the command: openssl ciphers

ssl_crl

syntax: ssl_crl file

default: none

context: tcp, server

This directive specifies the filename of a Certificate Revocation List, in PEM format, which is used to check the revocation status of certificates.

ssl_prefer_server_ciphers

syntax: ssl_prefer_server_ciphers [on|off]

default: ssl_prefer_server_ciphers off

context: tcp, server

The server requires that the cipher suite list for protocols SSLv3 and TLSv1 are to be preferred over the client supported cipher suite list.

ssl_protocols

syntax: ssl_protocols [SSLv2] [SSLv3] [TLSv1] [TLSv1.1] [TLSv1.2]

default: ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2

context: tcp, server

This directive enables the protocol versions specified.

ssl_verify_client

syntax: ssl_verify_client on|off|optional

default: ssl_verify_client off

context: tcp, server

This directive enables the verification of the client identity. Parameter 'optional' checks the client identity using its certificate in case it was made available to the server.

ssl_verify_depth

syntax: ssl_verify_depth number

default: ssl_verify_depth 1

context: tcp, server

This directive sets how deep the server should go in the client provided certificate chain in order to verify the client identity.

ssl_session_cache

syntax: ssl_session_cache off|none|builtin:size and/or shared:name:size

default: ssl_session_cache off

context: tcp, server

The directive sets the types and sizes of caches to store the SSL sessions.

The cache types are:

It's possible to use both types of cache &mdash; builtin and shared &mdash; simultaneously, for example:

ssl_session_cache builtin:1000 shared:SSL:10m;

Bear in mind however, that using only shared cache, i.e., without builtin, should be more effective.

ssl_session_timeout

syntax: ssl_session_timeout time

default: ssl_session_timeout 5m

context: tcp, server

This directive defines the maximum time during which the client can re-use the previously negotiated cryptographic parameters of the secure session that is stored in the SSL cache.


Compatibility


Notes

The http_response_parse.rl and smtp_response_parse.rl are ragel (http://www.complang.org/ragel/) scripts , you can edit the script and compile it like this:

    $ ragel -G2 http_response_parse.rl
    $ ragel -G2 smtp_response_parse.rl


TODO


Known Issues


Changelogs

v0.2.0

v0.19

v0.1


Authors

Weibin Yao(姚伟斌) yaoweibin at gmail dot com


Copyright & License

This README template copy from agentzh (http://github.com/agentzh).

I borrowed a lot of code from upstream and mail module from the nginx 0.7.* core. This part of code is copyrighted by Igor Sysoev. And the health check part is borrowed the design of Jack Lindamood's healthcheck module healthcheck_nginx_upstreams (http://github.com/cep21/healthcheck_nginx_upstreams);

This module is licensed under the BSD license.

Copyright (C) 2013 by Weibin Yao <yaoweibin@gmail.com>.

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.