No no .. when you ask an SSL namecheap asks the type of server you are
using to install this SSL cert.




2017-08-23 12:26 GMT-05:00 Maxim Solodovnik <solomax...@gmail.com>:

> Why do you need additional server?
> Are you going to set up proxy?
>
> On Thu, Aug 24, 2017 at 12:19 AM, Ramón Zárate Moedano <hor...@gmail.com>
> wrote:
>
>> Hello everyone.
>>
>> i am issuing a SSL certificate with namecheap. To use a "real one".
>>
>> What kind of the server type do i have to choose?
>> 1 .- Apache / cpanel
>> 2.- Microsoft IIS / Tomcat
>>
>>
>> Thanks.
>>
>> 2017-08-23 11:41 GMT-05:00 Maxim Solodovnik <solomax...@gmail.com>:
>>
>>> Hello Nick,
>>>
>>> please check this: https://builds.apache.or
>>> g/view/M-R/view/OpenMeetings/job/Openmeetings%203.3.x/site/o
>>> penmeetings-server/RTMPSAndHTTPS.html
>>> I'm not sure what is the difference between v1 and v2, too much text :(
>>>
>>> Thanks a lot for the contribution!
>>>
>>> On Wed, Aug 23, 2017 at 3:30 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>> wrote:
>>>
>>>> Maxim,
>>>>
>>>> red5.key missed
>>>>
>>>>
>>>>
>>>> The second edition.  J
>>>>
>>>>
>>>>
>>>> Using self-signed certificates.
>>>>
>>>> Prerequicites:
>>>>
>>>> - CA's root certificate: ca.crt
>>>>
>>>> - server key: red5.key (distinguished Name while creating key should be
>>>> assign to FQDN of your site, for example - vkc.company.com)
>>>>
>>>> - self-signed server certificate: red5.crt
>>>>
>>>>    Preparing of OM server.
>>>>
>>>> 1. Rename the existing keystore file red5/conf/keystore.jks to
>>>> red5/conf/keystore.jks.bak
>>>>
>>>>    Rename the existing truststore file red5/conf/truststore.jks to
>>>> red5/conf/truststore.jks.bak
>>>>
>>>> 2. Export existing keys into PKCS12 format:
>>>>
>>>>    enter to folder the ca.crt and red5.crt placed
>>>>
>>>>    openssl pkcs12 -export -in red5.crt -inkey red5.key -out red5.p12
>>>> -name red5 -certfile ca.crt
>>>>
>>>> 3. Import resulting red5.p12 into keystore:
>>>>
>>>>    keytool -importkeystore -srcstorepass changeit -srckeystore red5.p12
>>>> -srcstoretype PKCS12 -deststorepass changeit -destkeystore
>>>> /opt/red5/conf/keystore.jks -alias red5
>>>>
>>>>    This command creates the keystore.jks with password changeit (may be
>>>> any password)
>>>>
>>>> 4. Import your CA's root certificate into the keystore:
>>>>
>>>>    keytool -import -alias root -keystore /opt/red5/conf/keystore.jks
>>>> -trustcacerts -file ca.crt
>>>>
>>>>    (need to enter password to keystore.jks - changeit)
>>>>
>>>> 5. copy keystore to truststore
>>>>
>>>>    cd /opt/red5/conf
>>>>
>>>>    cp keystore.jks truststore.jks
>>>>
>>>> 6. Change /opt/red5/conf/red5.properties
>>>>
>>>>    rtmps.keystorepass=changeit
>>>>
>>>>    rtmps.truststorepass=changeit
>>>>
>>>>    jmx.keystorepass=changeit
>>>>
>>>> 7. Set up SSL according "SSL for the web interface" section.
>>>>
>>>> 8. Set RTMPS according "Tunneling RTMPS" or "Native RTMPS" sections.
>>>>
>>>> 9. Restart OM service or whole OM server. Now OM server is ready to
>>>> accept SSL-connections.
>>>>
>>>>
>>>>
>>>>    Preparing of clients.
>>>>
>>>> 1. Add the ca.crt certificate as trusted into the CA's list on all
>>>> windows PC at the system level (certmgr.msc applet).
>>>>
>>>> 2. Add the ca.crt certificate as trusted into Firefox if it used
>>>> (Firefox uses own store of certificates).
>>>>
>>>> 3. Add the ca.crt certificate into %JAVA%\lib\security\cacerts with
>>>> keytool utility on a PC that organizes screensharing.
>>>>
>>>>    For example, Java Version 8 Update 144 has been installed on Windows
>>>> machine by default location path.
>>>>
>>>>    Copy ca.crt to a folder :  c:\ca.crt
>>>>
>>>>    Start command line interface as administrator:
>>>>
>>>>    runas /user:AdminAccount cmd.exe
>>>>
>>>>    Enter admin password
>>>>
>>>>    Enter to bin directory of java:
>>>>
>>>>    cd "c:\Program Files\Java\jre1.8.0_144\bin"
>>>>
>>>>    Import ca.crt into keystore:
>>>>
>>>>    keytool -import -alias root -keystore ..\lib\security\cacerts -file
>>>> c:\ca.crt
>>>>
>>>>    Enter the password to keystore: changeit
>>>>
>>>>    Now the clients are ready to connect to OM via SSL.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> *From:* Yakovlev N. [mailto:yakovlev...@krvostok.ru]
>>>> *Sent:* Wednesday, August 23, 2017 11:04 AM
>>>>
>>>> *To:* user@openmeetings.apache.org
>>>> *Subject:* RE: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> Hi Maxim,
>>>>
>>>> This is the first eddition of "self-signed" section.
>>>>
>>>>
>>>>
>>>> Using self-signed certificates.
>>>>
>>>> Prerequicites:
>>>>
>>>> - CA's root certificate: ca.crt
>>>>
>>>> - self-signed server certificate: red5.crt (distinguished Name while
>>>> creating certificate should be assign to FQDN of your site, for example -
>>>> vkc.company.com)
>>>>
>>>>    Preparing of OM server.
>>>>
>>>> 1. Rename the existing keystore file red5/conf/keystore.jks to
>>>> red5/conf/keystore.jks.bak
>>>>
>>>>    Rename the existing truststore file red5/conf/truststore.jks to
>>>> red5/conf/truststore.jks.bak
>>>>
>>>> 2. Export existing keys into PKCS12 format:
>>>>
>>>>    enter to folder the ca.crt and red5.crt placed
>>>>
>>>>    openssl pkcs12 -export -in red5.crt -inkey red5.key -out red5.p12
>>>> -name red5 -certfile ca.crt
>>>>
>>>> 3. Import resulting red5.p12 into keystore:
>>>>
>>>>    keytool -importkeystore -srcstorepass changeit -srckeystore red5.p12
>>>> -srcstoretype PKCS12 -deststorepass changeit -destkeystore
>>>> /opt/red5/conf/keystore.jks -alias red5
>>>>
>>>>    This command creates the keystore.jks with password changeit (may be
>>>> any password)
>>>>
>>>> 4. Import your CA's root certificate into the keystore:
>>>>
>>>>    keytool -import -alias root -keystore /opt/red5/conf/keystore.jks
>>>> -trustcacerts -file ca.crt
>>>>
>>>>    (need to enter password to keystore.jks - changeit)
>>>>
>>>> 5. copy keystore to truststore
>>>>
>>>>    cd /opt/red5/conf
>>>>
>>>>    cp keystore.jks truststore.jks
>>>>
>>>> 6. Change passwords in  /opt/red5/conf/red5.properties:
>>>>
>>>>    rtmps.keystorepass=changeit
>>>>
>>>>    rtmps.truststorepass=changeit
>>>>
>>>>    jmx.keystorepass=changeit
>>>>
>>>> 7. Set up SSL according "SSL for the web interface" section.
>>>>
>>>> 8. Set up RTMPS according "Tunneling RTMPS" or "Native RTMPS" sections.
>>>>
>>>> 9. Restart OM service or whole OM server.   Now OM server is ready to
>>>> accept SSL-connections.
>>>>
>>>>
>>>>
>>>>    Preparing of clients.
>>>>
>>>> 1. Add the ca.crt certificate as trusted into the CA's list on all
>>>> windows PC at the system level (certmgr.msc applet).
>>>>
>>>> 2. Add the ca.crt certificate as trusted into Firefox if it used
>>>> (Firefox uses own store of certificates).
>>>>
>>>> 3. Add the ca.crt certificate into %JAVA%\lib\security\cacerts with
>>>> keytool utility on a PC that organizes screensharing.
>>>>
>>>>    For example, Java Version 8 Update 144 has been installed on Windows
>>>> machine by default location path.
>>>>
>>>>    Copy ca.crt to a folder :  c:\ca.crt
>>>>
>>>>    Start command line interface as administrator:
>>>>
>>>>    runas /user:AdminAccount cmd.exe
>>>>
>>>>    Enter admin password
>>>>
>>>>    Enter to bin directory of java:
>>>>
>>>>    cd "c:\Program Files\Java\jre1.8.0_144\bin"
>>>>
>>>>    Import ca.crt into keystore:
>>>>
>>>>    keytool -import -alias root -keystore ..\lib\security\cacerts -file
>>>> c:\ca.crt
>>>>
>>>>    Enter the password to keystore: changeit
>>>>
>>>>    Now the clients are ready to connect to OM via SSL  https://
>>>> vkc.company.com:5443.
>>>>
>>>>
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com
>>>> <solomax...@gmail.com>]
>>>> *Sent:* Wednesday, August 23, 2017 8:58 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> I believe this is correct.
>>>>
>>>>
>>>>
>>>> will try to add "Self-signed" section to site
>>>>
>>>>
>>>>
>>>> On Wed, Aug 23, 2017 at 12:54 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> OK.
>>>>
>>>> I would like to sum up all the work with the SSL and I think one will
>>>> be interesting for our community.
>>>>
>>>> 1. The self-signed certificates can be used but using of them requires
>>>> some manual operations:
>>>>
>>>>   1.1.  The certificates (root CA and server) must be installed into
>>>> /opt/red5/conf/keystore.jks and /opt/red5/conf/truststore.jks on OM server
>>>>
>>>>     as described at http://openmeetings.apache.org/RTMPSAndHTTPS.html
>>>> page.
>>>>
>>>>   1.2.  It's not necessary to add the root certificate into
>>>> java/cacerts on OM server because all works OK with java/cacerts installed
>>>> by default.
>>>>
>>>>   1.3.  The root certificate must be added as trusted into the CA list
>>>> on all windows PC at the system level (certmgr.msc applet).
>>>>
>>>>   1.4.  The root certificate must be added as trusted into Firefox if
>>>> it is used (FF has own store for the certificates).
>>>>
>>>>   1.5.  The root certificate must be added into
>>>> %JAVA%\lib\security\cacerts with keytool utility on a PC that organizes
>>>> screensharing.
>>>>
>>>> 2.  The use of real certificates is more preferable since it does not
>>>> require as much work as described above.
>>>>
>>>>     There are only two places where the certificates have to be
>>>> installed: see 1.1 and 1.5 above.
>>>>
>>>> 3.  The http://openmeetings.apache.org/RTMPSAndHTTPS.html page should
>>>> be changed and supplemented.
>>>>
>>>>     It will allow to exсlude a lot of questions for OM users. Those
>>>> questions that I had to meet.
>>>>
>>>>
>>>>
>>>> Is all correct?
>>>>
>>>>
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Wednesday, August 23, 2017 7:41 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> I believe this is standard behavior for Windows systems
>>>>
>>>>
>>>>
>>>> On Tue, Aug 22, 2017 at 6:37 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> After adding CA into windows system store entering into rooms  works
>>>> good.
>>>>
>>>> Does FF use not only own ca-store but ca-store in system?!  Or it’s not
>>>> FF?
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Tuesday, August 22, 2017 2:05 PM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> ERR_UNKNOWN_ISSUER most probably caused by the fact
>>>>
>>>> 1) server cert was added to trusted
>>>>
>>>> 2) CA was not added
>>>>
>>>>
>>>>
>>>> in case of Windows it worth to add CA at system level AND to the
>>>> browser (CA tab with permission to verify sites code etc. I would check all
>>>> checkboxes)
>>>>
>>>>
>>>>
>>>> On Tue, Aug 22, 2017 at 4:41 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> Yes,  the ca certificate was added as trusted.
>>>>
>>>> I found one difference in behavior of FF when it connected to
>>>> https-sites with the self-signed certificates.
>>>>
>>>> Typically, the first connection prompts you to add the site to an
>>>> exception but OM server does not give us this option.
>>>>
>>>> See pls two screenshots.
>>>>
>>>> This occurs before the СA is added to the Trusted CAs lists.  If first
>>>> an root certificate is added to the CAs list then  we can access to an OM
>>>> cabinet with green lock icon but will have the errors in the rooms as I
>>>> wrote before.
>>>>
>>>> There is something in OM webserver…..
>>>>
>>>>
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Tuesday, August 22, 2017 11:54 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> I guess CA was added to trusted CA's of FF?
>>>>
>>>>
>>>>
>>>> On Tue, Aug 22, 2017 at 3:40 PM, Maxim Solodovnik <solomax...@gmail.com>
>>>> wrote:
>>>>
>>>> This is the issue of "self-signed" certificate.
>>>>
>>>> "Real" certificate provides the way to ensure it wasn't revoked.
>>>>
>>>>
>>>>
>>>> I would recommend to set up one of the free real certificates to prod
>>>> system
>>>>
>>>>
>>>>
>>>> On Tue, Aug 22, 2017 at 2:45 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> Hi Maxim,
>>>>
>>>> you was right when suggested to add a ca certificate into client
>>>> machine with screensharing. I added the root certificate not correctly via
>>>> "java control panel->security->manage certificates".  It's wrong and not ne
>>>> сessary. The certificate must be inserted into java/keystore with
>>>> keytool utility.
>>>>
>>>> Now screen sharing works as expected.
>>>>
>>>> But...
>>>>
>>>> I tried to connect from another machines to the machine with
>>>> screensharing  and all worked fine with remote desktop if IE used but not
>>>> Firefox.
>>>>
>>>> The error screenshots are attached and the errors take place when
>>>> entering into any rooms.
>>>>
>>>> Do you know how to resolve it?  And why only FF ?
>>>>
>>>> The latest version of FF and Adobe Flash Player for FF is used.
>>>>
>>>>
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Monday, August 21, 2017 11:46 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> I guess first thing to do is to ensure
>>>>
>>>> jre is used by javaws
>>>>
>>>> and
>>>>
>>>> jre containing cacert
>>>>
>>>>
>>>>
>>>> is the same jre
>>>>
>>>>
>>>>
>>>> can be checked using by inspecting PATH
>>>>
>>>> and checking which binaries are actually started using system task
>>>> manager
>>>>
>>>>
>>>>
>>>> On Mon, Aug 21, 2017 at 3:00 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> First i tried to add only one CA certificate  to java on a client
>>>> machine.
>>>>
>>>> Than the site certificate was added for additional checking.
>>>>
>>>> Both cases are unsuccessful.
>>>>
>>>> What I should make the next?
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Monday, August 21, 2017 9:51 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> Works for me
>>>>
>>>>
>>>>
>>>> What were your steps?
>>>>
>>>>
>>>>
>>>> BTW no need to add site certificate to trusted certs in case you are
>>>> having Root CA. Verified Root CA will successfully validate site cert
>>>>
>>>>
>>>>
>>>> On Mon, Aug 21, 2017 at 1:44 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> No,
>>>>
>>>> It did not help.
>>>>
>>>> The client machine is Windows, the CA root certificate (crt) and the
>>>> client self-signed certificate (p12)  have been added into java  via  java
>>>> control panel->security->manage certificates.
>>>>
>>>>
>>>>
>>>> The full error log is  :
>>>>
>>>>
>>>>
>>>> ERROR 08-21 09:39:23.861 63 o.a.o.s.RTMPTSScreenShare [Thread-23] - {}
>>>>
>>>> sun.security.validator.ValidatorException: PKIX path building failed:
>>>> sun.security.provider.certpath.SunCertPathBuilderException: unable to
>>>> find valid certification path to requested target
>>>>
>>>>                 at sun.security.validator.PKIXValidator.doBuild(Unknown
>>>> Source)
>>>>
>>>>                 at 
>>>> sun.security.validator.PKIXValidator.engineValidate(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.validator.Validator.validate(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.X509TrustManagerImpl.validate(Unknown
>>>> Source)
>>>>
>>>>                 at 
>>>> sun.security.ssl.X509TrustManagerImpl.checkTrusted(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.X509TrustMana
>>>> gerImpl.checkServerTrusted(Unknown Source)
>>>>
>>>>                 at 
>>>> sun.security.ssl.ClientHandshaker.serverCertificate(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.ClientHandshaker.processMessage(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.Handshaker.processLoop(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.Handshaker.process_record(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.SSLSocketImpl.readRecord(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.SSLSocketImpl
>>>> .performInitialHandshake(Unknown Source)
>>>>
>>>>                 at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown
>>>> Source)
>>>>
>>>>                 at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown
>>>> Source)
>>>>
>>>>                 at org.apache.http.conn.ssl.SSLCo
>>>> nnectionSocketFactory.createLayeredSocket(SSLConnectionSocke
>>>> tFactory.java:396)
>>>>
>>>>                 at org.apache.http.conn.ssl.SSLCo
>>>> nnectionSocketFactory.connectSocket(SSLConnectionSocketFacto
>>>> ry.java:355)
>>>>
>>>>                 at org.apache.http.impl.conn.Defa
>>>> ultHttpClientConnectionOperator.connect(DefaultHttpClientCon
>>>> nectionOperator.java:142)
>>>>
>>>>                 at org.apache.http.impl.conn.Pool
>>>> ingHttpClientConnectionManager.connect(PoolingHttpClientConn
>>>> ectionManager.java:359)
>>>>
>>>>                 at org.apache.http.impl.execchain
>>>> .MainClientExec.establishRoute(MainClientExec.java:381)
>>>>
>>>>                 at org.apache.http.impl.execchain
>>>> .MainClientExec.execute(MainClientExec.java:237)
>>>>
>>>>                 at org.apache.http.impl.execchain
>>>> .ProtocolExec.execute(ProtocolExec.java:185)
>>>>
>>>>                 at org.apache.http.impl.execchain
>>>> .RetryExec.execute(RetryExec.java:89)
>>>>
>>>>                 at org.apache.http.impl.client.In
>>>> ternalHttpClient.doExecute(InternalHttpClient.java:185)
>>>>
>>>>                 at org.apache.http.impl.client.Cl
>>>> oseableHttpClient.execute(CloseableHttpClient.java:118)
>>>>
>>>>                 at org.apache.http.impl.client.Cl
>>>> oseableHttpClient.execute(CloseableHttpClient.java:56)
>>>>
>>>>                 at org.red5.client.net.rtmps.RTMP
>>>> TSClientConnector.openConnection(RTMPTSClientConnector.java:139)
>>>>
>>>>                 at org.red5.client.net.rtmps.RTMP
>>>> TSClientConnector.run(RTMPTSClientConnector.java:64)
>>>>
>>>> Caused by: sun.security.provider.certpath.SunCertPathBuilderException:
>>>> unable to find valid certification path to requested target
>>>>
>>>>                 at sun.security.provider.certpath
>>>> .SunCertPathBuilder.build(Unknown Source)
>>>>
>>>>                 at sun.security.provider.certpath
>>>> .SunCertPathBuilder.engineBuild(Unknown Source)
>>>>
>>>>                 at java.security.cert.CertPathBuilder.build(Unknown
>>>> Source)
>>>>
>>>>                 ... 27 common frames omitted
>>>>
>>>> sun.security.validator.ValidatorException: PKIX path building failed:
>>>> sun.security.provider.certpath.SunCertPathBuilderException: unable to
>>>> find valid certification path to requested target
>>>>
>>>> No context named default was found!!
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Monday, August 21, 2017 8:45 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> You can fix it by adding self-signed CA to the java/cacerts at the
>>>> "client" machine (The machine Screen-sharing web-app is started)
>>>>
>>>>
>>>>
>>>> On Mon, Aug 21, 2017 at 11:51 AM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> Tunneling RTMPS
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Monday, August 21, 2017 5:56 AM
>>>>
>>>>
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> What type of SSL are you checking? "native" of "tunneled" ?
>>>>
>>>>
>>>>
>>>> On Sun, Aug 20, 2017 at 10:45 AM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> Hi Maxim,
>>>>
>>>> Screensharing with SSL does not work.
>>>>
>>>>
>>>>
>>>> Java outputs the next errors:
>>>>
>>>> ERROR 08-20 06:00:11.429 63 o.a.o.s.RTMPTSScreenShare [Thread-22] - {}
>>>>
>>>> sun.security.validator.ValidatorException: PKIX path building failed:
>>>> sun.security.provider.certpath.SunCertPathBuilderException: unable to
>>>> find valid certification path to requested target
>>>>
>>>>
>>>>
>>>> Where can be place the datastore for screensharing and what its file
>>>> name?
>>>>
>>>> /opt/red5/conf/keystore.screen.jks or /opt/red5/conf/keystore.screen ?
>>>>
>>>> Where should be assigned  the password for this keystore?
>>>>
>>>>
>>>>
>>>> The /opt/red5/conf/jee-container.xml and
>>>> /opt/red5/conf/red5.properties files contain the following parameters:
>>>>
>>>>
>>>>
>>>> key="keystoreFile" value=......
>>>>
>>>> key="keystorePass" value=......
>>>>
>>>> key="truststoreFile" value=......
>>>>
>>>> key="truststorePass" value=......
>>>>
>>>>
>>>>
>>>> rtmps.keystorepass=xxxxx
>>>>
>>>> rtmps.keystorefile=conf/keystore.jks
>>>>
>>>> rtmps.truststorepass=xxxxx
>>>>
>>>> rtmps.truststorefile=conf/truststore.jks
>>>>
>>>>
>>>>
>>>> But for screensharing I could not find relevant information.
>>>>
>>>>
>>>>
>>>> Best regards,
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Yakovlev N. [mailto:yakovlev...@krvostok.ru]
>>>> *Sent:* Saturday, August 19, 2017 8:23 AM
>>>> *To:* user@openmeetings.apache.org
>>>> *Subject:* RE: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> Hi Maxim,
>>>>
>>>> SSL is working fine.
>>>>
>>>> I found a mistake in  http://openmeetings.apache.org/RTMPSAndHTTPS.html
>>>> manual:
>>>>
>>>> All  keytool commands must have the filename   keystore.jks    but none
>>>> keystore without extension.  J
>>>>
>>>> This also applies to the filename truststore:  it should be
>>>> truststore.jks.
>>>>
>>>>
>>>>
>>>> Otherwise the names of kestore and truststore should be changed in
>>>> /opt/red5/conf/red5.properties.
>>>>
>>>>
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com
>>>> <solomax...@gmail.com>]
>>>> *Sent:* Saturday, August 19, 2017 7:23 AM
>>>> *To:* Openmeetings user-list
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> I'll try to check steps with self-signed cert and will report back
>>>>
>>>>
>>>>
>>>> On Sat, Aug 19, 2017 at 11:21 AM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> Hello Ramon,
>>>>
>>>> All the hope of Maxim….:)
>>>>
>>>>
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Ramón Zárate Moedano [mailto:hor...@gmail.com]
>>>> *Sent:* Saturday, August 19, 2017 2:22 AM
>>>>
>>>>
>>>> *To:* user@openmeetings.apache.org
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> Hello everyone ...
>>>>
>>>>
>>>>
>>>> i just cannot install SSL (from namecheap) ... this is beyond my skills.
>>>>
>>>>
>>>>
>>>> Is there someone who can help me with the installation in exchange for
>>>> some money????
>>>>
>>>>
>>>>
>>>> Thanks in advance.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> 2017-08-18 1:23 GMT-05:00 Yakovlev N. <yakovlev...@krvostok.ru>:
>>>>
>>>> Hi Maxim,
>>>>
>>>> Thanks for reply.
>>>>
>>>> I've reinstalled two times certificates but ssl does not work.
>>>>
>>>> 1. Both certificates root-CA and client one were added into
>>>> /etc/pki/ca-trust/extracted/java/cacerts (this place is for Centos)
>>>> with commands:
>>>>
>>>> keytool -import -keystore cacerts -file red5.crt -alias red5
>>>>
>>>> keytool -import -keystore cacerts -trustcacerts -file ca.crt -alias root
>>>>
>>>> 2. As you recommend OM was started with red5-debug + option
>>>> "-Djavax.net.debug=all"
>>>>
>>>> Logs have nothing while a ssl session was established.
>>>>
>>>> To exclude the impact of browsers, I tried to start up a session using
>>>> telnet.
>>>>
>>>> Session to port 5080 (none ssl) were fixed in loggs but sessions to
>>>> 5443 did not.
>>>>
>>>> In this case, the netstat command shows ESTABLISHED status to port 5443.
>>>>
>>>> Firewall is off.
>>>>
>>>> According to http://openmeetings.apache.org/RTMPSAndHTTPS.html two
>>>> config files have to be changed:
>>>>
>>>> 1. Edit red5/conf/jee-container.xml file:
>>>>
>>>>    Comment Tomcat without SSL enabled section
>>>>
>>>>    UNComment Tomcat with SSL enabled section
>>>>
>>>> 2. Edit red5/webapps/openmeetings/public/config.xml and set
>>>>
>>>>    <protocol>https</protocol>
>>>>
>>>>    <red5httpport>5443</red5httpport>
>>>>
>>>> Are these changes enough or need more?
>>>>
>>>>
>>>>
>>>> Best regards,
>>>>
>>>> Nik
>>>>
>>>>
>>>>
>>>> *From:* Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> *Sent:* Thursday, August 17, 2017 10:28 AM
>>>> *To:* Openmeetings user-list
>>>>
>>>>
>>>> *Subject:* Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>>
>>>>
>>>> Here is useful link
>>>>
>>>> I'm using these scripts (with some modifications) Chrome shows green
>>>> icon :)
>>>>
>>>> https://stackoverflow.com/questions/7580508/getting-chrome-t
>>>> o-accept-self-signed-localhost-certificate/43666288#43666288
>>>>
>>>>
>>>>
>>>> On Thu, Aug 17, 2017 at 2:25 PM, Maxim Solodovnik <solomax...@gmail.com>
>>>> wrote:
>>>>
>>>> The steps on the site are for the "real" certificates ...
>>>>
>>>> 1) add certificate to trusted certs of Java
>>>>
>>>>
>>>>
>>>> means Java need to know about your certificate I'm using self-signed CA
>>>> for testing and I'm adding it to
>>>>
>>>> /usr/lib/jvm/java-8-oracle/jre/lib/security/cacerts
>>>>
>>>>
>>>>
>>>> Additionally I would recommend to run red5 using red5-debug and modify
>>>> it by adding "*-Djavax.net.debug=all*"  to see all SSL messages
>>>>
>>>>
>>>>
>>>> On Thu, Aug 17, 2017 at 1:23 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>>
>>>> Hello Maxim,
>>>> Don't worry that my question was missed because we all understand how
>>>> much work you do.
>>>> Your message made me return to the question of HTTPS for OM.
>>>>
>>>> So...
>>>>
>>>> 1) add certificate to trusted certs of Java
>>>>
>>>> Lets see an output of command keytool:
>>>>
>>>> cd /opt/red5/conf
>>>> keytool -list -keystore keystore
>>>> Enter keystore password:
>>>> xxxxx
>>>> Keystore type: JKS
>>>> Keystore provider: SUN
>>>>
>>>> Your keystore contains 2 entries
>>>>
>>>> vkc.krvostok.ru, Aug 16, 2017, PrivateKeyEntry,
>>>> Certificate fingerprint (SHA1): 7D:39:11:AA:76:5F:BF:D1:E5:57:
>>>> 99:67:D5:1C:B8:25:1A:D9:88:0F
>>>> root, Aug 16, 2017, trustedCertEntry,
>>>> Certificate fingerprint (SHA1): FF:2B:E0:44:3C:0F:83:36:6F:F0:
>>>> 6E:2F:1F:9A:83:F9:B0:1F:E1:45
>>>>
>>>> Is it OK?
>>>>
>>>> 2) add certificate to trusted certs of browser (icon should be green)
>>>> Done
>>>>
>>>> 3) correctly create red5 keystore/truststore
>>>> Done according to the reference http://openmeetings.apache.org
>>>> /RTMPSAndHTTPS.html
>>>> truststore is a copy of keystore
>>>> OK?
>>>>
>>>> Maxim, I would like to draw on one detail.
>>>> A simple way to test of a SSL-connection is to use the next command:
>>>> openssl s_client -connect FQDN:port
>>>> For example,
>>>> openssl s_client -connect www.mail.ru:443,
>>>> openssl s_client -connect www.ya.ru:443
>>>> and so on.
>>>> This way does not use browsers and allows to test ssl-connections at a
>>>> lower level than using browsers.
>>>> This command does not work and hangs for my OM as I wrote before and I
>>>> think that the question is not in the types of certificates (trusted or
>>>> selfsigned ones).
>>>> But where is the problem? I don't now yet...
>>>>
>>>> Nik
>>>>
>>>> -----Original Message-----
>>>> From: Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>>
>>>> Sent: Wednesday, August 16, 2017 5:51 PM
>>>> To: Openmeetings user-list
>>>> Subject: Re: [ANNOUNCE] HTTPS is now required
>>>>
>>>> Hello Nik,
>>>>
>>>> I'm trying to answer all emails, sorry if I missed yours :( To make
>>>> self-signed certificate work with red5 you MUST
>>>> 1) add certificate to trusted certs of Java
>>>> 2) add certificate to trusted certs of browser (icon should be green)
>>>> 3) correctly create red5 keystore/truststore
>>>>
>>>> to provide thurther help I need you detailed steps
>>>>
>>>> On Wed, Aug 16, 2017 at 8:30 PM, Yakovlev N. <yakovlev...@krvostok.ru>
>>>> wrote:
>>>> > Hi Andreas,
>>>> > OK, your opinion is your opinion and I respect it.
>>>> > We speak about an internal OM service but not about the world one...
>>>> > I understand the trusted certificates are more preferable but in my
>>>> case unnecessary I think.
>>>> > I'm not sure blacklists are my cases...
>>>> >
>>>> > Nik
>>>> >
>>>> > -----Original Message-----
>>>> > From: df...@gmx.de [mailto:df...@gmx.de]
>>>> > Sent: Wednesday, August 16, 2017 4:18 PM
>>>> > To: user@openmeetings.apache.org
>>>> > Subject: Re: [ANNOUNCE] HTTPS is now required
>>>> >
>>>> > Hi Nik,
>>>> >
>>>> > sorry - I cannot agree to your "I cannot agree". Most email client
>>>> programs do check certificates and deny connections if certificate is not
>>>> trusted. May be 5% will work - but 95% will not (and tomorrow percentage is
>>>> higher than today). I can not recommend to use any self-signed certificate
>>>> (except for internal tasks). Additionally maybe you are added to blacklists
>>>> if you are "on the air" using a self-signed certificate.
>>>> >
>>>> > Best regards
>>>> > Andreas
>>>> >
>>>> > Am Mittwoch, 16. August 2017, 16:01:52 CEST schrieb Yakovlev N.:
>>>> >> I don't agree.
>>>> >> I use selfsigned certiticates on other corporate services
>>>> successfully (mail, cloud and so on).
>>>> >> Yes, browsers ask questions but this is no problem. In this case
>>>> such certificates must be added as trusted ones.
>>>> >>
>>>> >> Nik
>>>> >>
>>>> >> -----Original Message-----
>>>> >> From: df...@gmx.de [mailto:df...@gmx.de]
>>>> >> Sent: Wednesday, August 16, 2017 3:44 PM
>>>> >> To: user@openmeetings.apache.org
>>>> >> Subject: Re: [ANNOUNCE] HTTPS is now required
>>>> >>
>>>> >> Self-signed will not be accepted by most browsers and will not work.
>>>> The goal of SSL *IS THE POSSIBILITY OF VERIFICATION OF THE PAGE OWNER*...
>>>> >>
>>>> >> Try certificates from lets encrypt - they are free ;)
>>>> >>
>>>> >> Best regards
>>>> >> Andreas
>>>> >>
>>>> >> Am Mittwoch, 16. August 2017, 15:25:17 CEST schrieb Yakovlev N.:
>>>> >> > Hi, Maxim!
>>>> >> > I have some problems with SSL and no ideas to solve them.
>>>> >> > Five months ago  I asked community how to install SSL on OM but
>>>> nobody answered.
>>>> >> > (http://mail-archives.apache.org/mod_mbox/openmeetings-user/
>>>> 201703.mbox/browser    Subject: SSL with OM   Date Mon, 20 Mar 2017
>>>> 08:30:40 GMT  )
>>>> >> > The manual listed on page http://openmeetings.apache.org
>>>> /RTMPSAndHTTPS.html did not help me.
>>>> >> > No any errors in logs, browser hangs and shows an empty page.
>>>> >> > Firefox outputs "Executing TLS-handshaking with vkc.krvostok.ru"
>>>> on the left bottom side.
>>>> >> > The "openssl   s_client   -connect   vkc.krvostok.ru:5443"
>>>> command hangs also and outputs only one line: CONNECTED(00000003).
>>>> >> > Firewall is off, tcp-5443 port is listening on the OM host.
>>>> >> >
>>>> >> > Is there any roadmap of using selfsigned serfificates for OM?
>>>> >> >
>>>> >> > Best regards
>>>> >> > Nik
>>>> >> >
>>>> >> > -----Original Message-----
>>>> >> > From: Maxim Solodovnik [mailto:solomax...@gmail.com]
>>>> >> > Sent: Wednesday, August 16, 2017 7:23 AM
>>>> >> > To: Openmeetings user-list
>>>> >> > Subject: [ANNOUNCE] HTTPS is now required
>>>> >> >
>>>> >> > Hello All,
>>>> >> >
>>>> >> > Google developers are trying to move WWW to HTTPS To force this
>>>> transition they restrict features available to HTTP sites in
>>>> Chrome/Chromium Latest restriction is: Camera and microphone will not be
>>>> available to JS/Flash code for HTTP sites: proof:
>>>> >> >
>>>> >> > "Microphone and Camera access no longer works on insecure origins.
>>>> To use this feature, you should consider switching your application to a
>>>> secure origin, such as HTTPS. See https://goo.gl/rStTGz for more
>>>> details."
>>>> >> >
>>>> >> > So please set up HTTPS for your OM site to prevent
>>>> camera/microphone issues.
>>>> >> >
>>>> >> > --
>>>> >> > WBR
>>>> >> > Maxim aka solomax
>>>> >> >
>>>> >> >
>>>> >>
>>>> >>
>>>> >>
>>>> >
>>>> >
>>>>
>>>>
>>>>
>>>> --
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> WBR
>>>> Maxim aka solomax
>>>>
>>>
>>>
>>>
>>> --
>>> WBR
>>> Maxim aka solomax
>>>
>>
>>
>
>
> --
> WBR
> Maxim aka solomax
>

Reply via email to