Hello Igor, You should even: 1) setup RTMPS+HTTPS as described here: http://openmeetings.apache.org/RTMPSAndHTTPS.html or 2) use latest versions of 2.1.1 or 3.0.0
On Thu, Apr 11, 2013 at 10:05 PM, Igor V. Gubenko <c...@krowdbyz.com> wrote: > Hello, > > I've successfully setup OpenMeetings to work through a restrictive > firewall. > > securewebsite = https://url.com:444 > unsecurewebsite = http://url.com > omserver = internal.com > > I am using mod_proxy to proxy securewebsite/conference to > omserver:5080/conference > I am also using RMTPT to tunnel unsecurewebsite/flashposturls to > omserver:445 > > Everything works fine, except for screensharing. Screensharing link > generates a JNLP file that has http://url.com:444, instead of > https://url.com:444. Editing the JNLP to fix the path fixes the problem, > and the JNLP works. > > > red5.properties: > ------------------------------**--------------- > # Socket policy > policy.host=0.0.0.0 > policy.port=843 > > # HTTP > http.host=0.0.0.0 > http.port=5080 > https.port=5443 > http.URIEncoding=UTF-8 > http.max_keep_alive_requests=-**1 > http.max_threads=20 > http.acceptor_thread_count=10 > http.processor_cache=20 > > # RTMP > rtmp.host=0.0.0.0 > rtmp.port=1935 > rtmp.io_threads=16 > rtmp.send_buffer_size=65536 > rtmp.receive_buffer_size=65536 > rtmp.ping_interval=1000 > rtmp.max_inactivity=60000 > rtmp.max_handshake_time=5000 > rtmp.tcp_nodelay=true > rtmp.default_server_bandwidth=**10000000 > rtmp.default_client_bandwidth=**10000000 > rtmp.client_bandwidth_limit_**type=2 > rtmp.bandwidth_detection=true > rtmp.encoder_base_tolerance=**5000 > rtmp.encoder_drop_live_future=**false > rtmp.traffic_class=24 > > # RTMPT > rtmpt.host=0.0.0.0 > rtmpt.port=445 > rtmpt.ping_interval=5000 > rtmpt.max_inactivity=60000 > rtmpt.max_handshake_time=5000 > rtmpt.max_keep_alive_requests=**-1 > rtmpt.max_threads=20 > rtmpt.acceptor_thread_count=2 > rtmpt.processor_cache=20 > rtmpt.encoder_base_tolerance=**5000 > rtmpt.encoder_drop_live_**future=true > rtmpt.target_reponse_size=**65536 > ------------------------------**------------------------------ > > config.xml: > ------------------------------**------------------ > <rtmpport>1935</rtmpport> > <rtmpTunnelport>80</**rtmpTunnelport> > <red5httpport>444</**red5httpport> > <protocol>https</protocol> > ------------------------------**------------------ > > Proxy config: > > ssl website (Website, downloads): > ------------------------------**------- > SSLProxyEngine On > ProxyPreserveHost On > > ProxyPass /conference > http://internal.com:5080/**conference<http://internal.com:5080/conference> > ProxyPassReverse /conference > http://internal.com:5080/**conference<http://internal.com:5080/conference> > > ------------------------------**------- > > plaintext website (for RTMPT): > ------------------------------**------- > ProxyPreserveHost On > > ProxyPass /open http://internal.com:445/open > ProxyPassReverse /open http://internal.com:445/open > > ProxyPass /close http://internal.com:445/close > ProxyPassReverse /close http://internal.com:445/close > > ProxyPass /send http://internal.com:445/send > ProxyPassReverse /send http://internal.com:445/send > > ProxyPass /idle http://internal.com:445/idle > ProxyPassReverse /idle http://internal.com:445/idle > > ProxyPass /fcs http://internal.com:445/fcs > ProxyPassReverse /fcs http://internal.com:445/fcs > > ------------------------------**------------- > > I would really appreciate any leads. > > Thank you, > - Igor > > -- WBR Maxim aka solomax