Hello Igor,

You should even:
1) setup RTMPS+HTTPS as described here:
http://openmeetings.apache.org/RTMPSAndHTTPS.html
or
2) use latest versions of 2.1.1 or 3.0.0


On Thu, Apr 11, 2013 at 10:05 PM, Igor V. Gubenko <c...@krowdbyz.com> wrote:

> Hello,
>
> I've successfully setup OpenMeetings to work through a restrictive
> firewall.
>
> securewebsite = https://url.com:444
> unsecurewebsite = http://url.com
> omserver = internal.com
>
> I am using mod_proxy to proxy securewebsite/conference to
> omserver:5080/conference
> I am also using RMTPT to tunnel unsecurewebsite/flashposturls to
> omserver:445
>
> Everything works fine, except for screensharing. Screensharing link
> generates a JNLP file that has http://url.com:444, instead of
> https://url.com:444. Editing the JNLP to fix the path fixes the problem,
> and the JNLP works.
>
>
> red5.properties:
> ------------------------------**---------------
> # Socket policy
> policy.host=0.0.0.0
> policy.port=843
>
> # HTTP
> http.host=0.0.0.0
> http.port=5080
> https.port=5443
> http.URIEncoding=UTF-8
> http.max_keep_alive_requests=-**1
> http.max_threads=20
> http.acceptor_thread_count=10
> http.processor_cache=20
>
> # RTMP
> rtmp.host=0.0.0.0
> rtmp.port=1935
> rtmp.io_threads=16
> rtmp.send_buffer_size=65536
> rtmp.receive_buffer_size=65536
> rtmp.ping_interval=1000
> rtmp.max_inactivity=60000
> rtmp.max_handshake_time=5000
> rtmp.tcp_nodelay=true
> rtmp.default_server_bandwidth=**10000000
> rtmp.default_client_bandwidth=**10000000
> rtmp.client_bandwidth_limit_**type=2
> rtmp.bandwidth_detection=true
> rtmp.encoder_base_tolerance=**5000
> rtmp.encoder_drop_live_future=**false
> rtmp.traffic_class=24
>
> # RTMPT
> rtmpt.host=0.0.0.0
> rtmpt.port=445
> rtmpt.ping_interval=5000
> rtmpt.max_inactivity=60000
> rtmpt.max_handshake_time=5000
> rtmpt.max_keep_alive_requests=**-1
> rtmpt.max_threads=20
> rtmpt.acceptor_thread_count=2
> rtmpt.processor_cache=20
> rtmpt.encoder_base_tolerance=**5000
> rtmpt.encoder_drop_live_**future=true
> rtmpt.target_reponse_size=**65536
> ------------------------------**------------------------------
>
> config.xml:
> ------------------------------**------------------
> <rtmpport>1935</rtmpport>
> <rtmpTunnelport>80</**rtmpTunnelport>
> <red5httpport>444</**red5httpport>
> <protocol>https</protocol>
> ------------------------------**------------------
>
> Proxy config:
>
> ssl website (Website, downloads):
> ------------------------------**-------
> SSLProxyEngine On
> ProxyPreserveHost On
>
> ProxyPass /conference 
> http://internal.com:5080/**conference<http://internal.com:5080/conference>
> ProxyPassReverse /conference 
> http://internal.com:5080/**conference<http://internal.com:5080/conference>
>
> ------------------------------**-------
>
> plaintext website (for RTMPT):
> ------------------------------**-------
> ProxyPreserveHost On
>
> ProxyPass /open http://internal.com:445/open
> ProxyPassReverse /open http://internal.com:445/open
>
> ProxyPass /close http://internal.com:445/close
> ProxyPassReverse /close http://internal.com:445/close
>
> ProxyPass /send http://internal.com:445/send
> ProxyPassReverse /send http://internal.com:445/send
>
> ProxyPass /idle http://internal.com:445/idle
> ProxyPassReverse /idle http://internal.com:445/idle
>
> ProxyPass /fcs http://internal.com:445/fcs
> ProxyPassReverse /fcs http://internal.com:445/fcs
>
> ------------------------------**-------------
>
> I would really appreciate any leads.
>
> Thank you,
> - Igor
>
>


-- 
WBR
Maxim aka solomax

Reply via email to