How do I connect to a MongoDB-server over SSL using Node.js?
I've read the sources of a few drivers (mongojs, mongodb-native) and I've been googling a while now, but can't seem to find any proper tutorials, guides or docs.
How do I connect to a MongoDB-server over SSL using Node.js?
I've read the sources of a few drivers (mongojs, mongodb-native) and I've been googling a while now, but can't seem to find any proper tutorials, guides or docs.
Step 1: Obtain MongoDB 3.0
The first thing you need to know is that that SSL is only supported out-of-the-box by MongoDB 3.0 and later. Ubuntu does not have 3.0 in the default repositories, so here's how you get it:
3.0.7 is the latest stable version as of now, but feel free to substitute 3.0.7 with your favorite release.
Step 2: Obtain Private Key, Certificate, and PEM files
The PEM contains a Public Key Certificate and its associated Private Key. These files can either be obtained with IRL dollars from a Certificate Authroity or generated with OpenSSL like so:
mongodb.pem will be used as the PEM file, mongodb-cert.key is the Private Key file, and mongodb-cert.crt is Certificate file which can also be used as the CA file. YOU WILL NEED ALL THREE OF THESE.
Step 3: Configure MongoD
We're going to assume that you copied these files to your /etc/ssl/ folder where they belong. Now we open up our MongoDB config file:
and modify the "# network interfaces" section like so:
PLEASE NOTE: we are commenting out bindIp. THIS ALLOWS EXTERNAL CONNECTIONS to access your Mongo database. We assume that this is your end goal (Why would your encrypt traffic on localhost?), but you should only do this AFTER SETTING UP AUTHORIZATION RULES for your MongoDB server.
The CAFile is also commented out as it is optional. I will explain how to set up Certificate Authority trust at the end of this post.
As always, you must restart MongoDB before config file changes will take effect:
DID YOUR SERVER FAIL TO START? You are on your own, but there is probably an issue with your certificate files. You can check start-up errors by running mongod manually:
Step 4: Test your server settings
Before we go messing with Node configurations, let's make sure that your server setup is working properly by connecting with the mongo command line client:
Unless the domain name on your certificate is 127.0.0.1 or localhost, the --sslAllowInvalidHostnames flag is necessary. Without it, you will probably get this error:
Step 5) Configure Node.JS / Mongoose
If you are using the node-mongodb-native package in your Node application, stop immediately and start using Mongoose. It's not that hard. That said, mongoose.connect() has virtually the same API as mongodb.connect(), so substitute appropriately.
Step 6) [Optionally] verify your Certificates via a Certificate Authority
In order to validate your SSL Certificates, you need to obtain a CA (or bundle) file from your Certificate Authority. This will look a lot like your Certificate file, but will often contain multiple Certificates (which form achain of trust to verify that a certificate is valid). If you are using a self-signed certificate, you can use your mongodb-cert.crt as a CA file.
You will also need to ensure that your MongoDB server's hostname matches the one used to create the certificate.
Step 6.3) Update your mongod configuration
and modify the "# network interfaces" section like so:
Step 6.4) Test your server settings
Mongo Clients can pass in the CA file as well to verify that they are talking to the correct server. This is done with the --sslCAFile parameter
Mongo Servers configured with a CAFile require that clients possess a valid Certificate AND the Private Key for the server. In the mongo shell client, this is done by passing in the --sslPEMKeyFile parameter.
Without a PEM file (which contains the server's Certificate), you may see this error:
The server can be configured to accept requests from clients without a PEM file by enabling net.ssl.weakCertificateValidation, but you will be weakening your security for no real gain.
Step 6.5) Configure Node.JS / Mongoose
There are a couple of gotchas here, so bear with me.
First, you NEED to have node-mongodb-native 2.0 or later. If you are using Mongoose, then you NEED Mongoose 4.0 or later. Previous Mongoose versions use node-mongodb-native 1.* which does not support Certificate validation in any capacity whatsoever.
Secondly, there is no sslAllowInvalidHostnames or similar option available in node-mongodb-native. This is not something that node-mongodb-native developers can fix (I would have by now) because the native TLS library available in Node 0.10.* offers no option for this. In Node 4.* and 5.*, there is a checkServerIdentity option which offers hope, but switching from the original Node branch to the branch after the io.js merge can cause a bit of headache at the current time.
So let's try this:
If you are getting hostname/IP mismatch errors, either fix your certificate, or negate all this hard work by disabling sslValidate:
Source: http://www.bainweb.com/2015/11/connecting-to-mongodb-over-tlsssl-with.html
If you want to authenticate using a certificate, using
node-mongodb-native
:As suggested in the comments, the
node-mongodb-native
has everything needed.I got it up and running using the following:
Edit
You can also do ssl from mongoose: