Thanks again :)

I've added user@ list so others can use your script :)


On Wed, Oct 18, 2017 at 10:17 PM, Jacob Wenzel <j...@energiakademiet.dk>
wrote:

> Fixed a few typos and added a script, that can repeat the process on
> renewal :)
>
> ------------------------------------
> RTMPS/HTTPS in OpenMeetings with letsencrypt (Replace [OM server FQDN]
> with your actual OpenMeetings FQDN)
>
>    1. cd to your red5/conf dir
>    2.
>
>    Export existing keys into PKCS12 format:
>
>    openssl pkcs12 -export -in /etc/letsencrypt/live/[OM server FQDN]/cert.pem 
> -inkey /etc/letsencrypt/live/[OM server FQDN]/privkey.pem -out red5.p12 -name 
> red5 -certfile /etc/letsencrypt/live/[OM server FQDN]/chain.pem
>
>    Enter Export Password: password
>    Verifying - Enter Export Password: password
>
>    3.
>
>    Import resulting red5.p12 into keystore:
>
>    keytool -importkeystore -srcstorepass password -srckeystore red5.p12
>    -srcstoretype PKCS12 -deststorepass password -destkeystore keystore.jks
>    -alias red5
>    4.
>
>    Import your letsencrypt certificate into the keystore
>
>    keytool -import -alias root -keystore keystore.jks -trustcacerts -file
>    /etc/letsencrypt/live/[OM server FQDN]/chain.pem
>    5.
>
>    Copy keystore to truststore
>
>    cp keystore.jks trustscore.jks
>    SSL for the web interface and Tunneling RTMPS
>    6. Edit ./jee-container.xml file
>    - Comment Tomcat without SSL enabled section
>    - UNComment Tomcat with SSL enabled section
>    7.
>
>    Edit ../webapps/openmeetings/public/config.xml and set
>
>    <protocol>https</protocol>
>    <red5httpport>5443</red5httpport>
>    <rtmpsslport>5443</rtmpsslport>
>    <useSSL>yes</useSSL>
>    <proxyType>none</proxyType>
>
>    8.
>
>    Restart red5 service (or reboot)
>    9. Visit https://[OM server FQDN]:5443 in your browser and sign in.
>    - Go to Administration > Configuration and set application.base.url to
>    https://[OM server FQDN]:5443/openmeetings/
>
> Script to run when letsencrypt certs are renewed
>
>    1.
>
>    Create /root/renew-red5-cert.sh with (check red5 install dir and
>    service name):
>
>    #!/bin/bash
>
>    mv /opt/red5/conf/keystore.jks /opt/red5/conf/keystore.bak
>
>    openssl pkcs12 -export -in /etc/letsencrypt/live/[OM server FQDN]/cert.pem 
> -inkey /etc/letsencrypt/live/[OM server FQDN]/privkey.pem -out 
> /opt/red5/conf/red5.p12 -name red5 -passout pass:password -certfile 
> /etc/letsencrypt/live/[OM server FQDN]/chain.pem
>
>    keytool -importkeystore -srcstorepass password -srckeystore 
> /opt/red5/conf/red5.p12 -srcstoretype PKCS12 -deststorepass password 
> -destkeystore /opt/red5/conf/keystore.jks -alias red5
>
>    keytool -import -alias root -keystore /opt/red5/conf/keystore.jks 
> -trustcacerts -storepass password -file /etc/letsencrypt/live/[OM server 
> FQDN]/chain.pem
>
>    cp -f /opt/red5/conf/keystore.jks /opt/red5/conf/trustscore.jks
>
>    /etc/init.d/red5-ubdeb2 restart
>
>    2.
>
>    Make it executable
>
>    chmod +x renew-red5-cert.sh
>    3. Enter crontab with crontab -e
>    - Add --renew-hook "/root/renew-red5-cert.sh" after certbot renew
>
>
> On 2017-10-18 14:22, Maxim Solodovnik wrote:
>
> Thanks for sharing!
>
> steps 1-5 need to be repeated, BUT they are simple and you can create
> script for this :)))
>
> On Wed, Oct 18, 2017 at 6:38 PM, Jacob Wenzel <j...@energiakademiet.dk>
> wrote:
>
>> Hi all!
>>
>> I had a few problems with translating the RTMPS/HTTPS guide
>> <https://openmeetings.apache.org/RTMPSAndHTTPS.html#Create_Keystore_using_existing_key-pair>
>> for use with letsencrypt certificates due to different file names, so I
>> documented the process for my own memory and anyone interested can see or
>> follow the steps below to get a working RTMPS/HTTPS setup for OpenMeetings.
>>
>> *But what happens when my certificates are renewed?* Will I have to
>> repeat steps 1 - 5 every time? If yes then I with try to create a bash
>> script that automates the process.
>>
>> --------------------------------------
>> RTMPS/HTTPS in OpenMeetings with letsencrypt (Replace [OM server FQDN]
>> with your actual OpenMeetings FQDN)
>>
>>    1. cd to your red5 install dir
>>    2.
>>
>>    Export existing keys into PKCS12 format:
>>
>>    openssl pkcs12 -export -in /etc/letsencrypt/live/[OM server 
>> FQDN]/cert.pem -inkey /etc/letsencrypt/live/[OM server FQDN]/privkey.pem 
>> -out red5.p12 -name red5 -certfile /etc/letsencrypt/live/[OM server 
>> FQDN]/chain.pem
>>
>>    Enter Export Password: password
>>    Verifying - Enter Export Password: password
>>
>>    3.
>>
>>    Import resulting red5.p12 into keystore:
>>
>>    keytool -importkeystore -srcstorepass password -srckeystore red5.p12
>>    -srcstoretype PKCS12 -deststorepass password -destkeystore keystore.jks
>>    -alias red5
>>    4.
>>
>>    Import your letsencrypt certificate into the keystore
>>
>>    keytool -import -alias root -keystore keystore.jks -trustcacerts
>>    -file /etc/letsencrypt/live/[OM server FQDN]/chain.pem
>>    5.
>>
>>    Copy keystore to truststore
>>
>>    cp keystore.jks trustscore.jks
>>    SSL for the web interface and Tunneling RTMPS
>>    6. Edit ./jee-container.xml file
>>    - Comment Tomcat without SSL enabled section
>>    - UNComment Tomcat with SSL enabled section
>>    7.
>>
>>    Edit ../webapps/openmeetings/public/config.xml and set
>>
>>    <protocol>https</protocol>
>>    <red5httpport>5443</red5httpport>
>>    <rtmpsslport>5443</rtmpsslport>
>>    <useSSL>yes</useSSL>
>>    <proxyType>none</proxyType>
>>
>>    8.
>>
>>    Restart red5 service (or reboot)
>>    9. Visit https://[OM server FQDN]:5443 in your browser and sign in.
>>    - Go to Administration > Configuration and set application.base.url
>>    to https://https://[OM server FQDN]:5443/openmeetings/
>>
>> --
>>
>> *Med venlig hilsen/Best regards*
>>
>>
>> *JACOB WENZEL Projektleder*
>>
>> *ENERGIAKADEMIET*
>> Strandengen 1
>> <https://maps.google.com/?q=Strandengen+1+%0D+8305+SAMS%C3%98&entry=gmail&source=g>
>> 8305 SAMSØ
>> +45 60 61 15 97
>> j...@energiakademiet.dk
>> www.energiakademiet.dk <http://energiakademiet.dk>
>>
>
>
>
> --
> WBR
> Maxim aka solomax
>
>
>


-- 
WBR
Maxim aka solomax

Reply via email to