Dear community,

I have a strange behavior with my installation of OM. I want to proxy the web interface through apache (with SSL). This is working. I can remotely access OM. All right.

Now I want RMTP to be encrypted as well. Here I created another certificate from Let's Encrypt (LE) just for the RMTPS purpose. The common name (CN) is simply the host name just like e.g. for the https server.

Then I wanted to adopt the configuration of OM accordingly. This is set up that I enabled in <OM>/conf/red5-core.conf the corresponding section, added in the global configuration (web frontend) flash.secure=true and flash.secure.proxy=best. I added the keys to the keystore exaclty as in https://markmail.org/message/j4gx2q6woidyqj7l#query:+page:1+mid:ik4qdhdychl364bp+state:results as far as I can tell. I tried the network test of OM and get still a red cross for the RTMP(S) port when using Firefox.

A sniff with wireshark shows that the client connects to port 8443 as intended and an SSL session is started. The server sends the certificates I gave plus the intermediate certificate from LE. It does not send the root certificate. I do not know if this is right or wrong. Nevertheless, the client seems to refuse the certificate and shuts down the SSL connection with the reason "Unknown CA". This happen instantly after the server sent his certificate chain.

When looking into this it looks as Chrome seemed to accept the certificate. I know that Chrome does many things "differently", thus it is possible that everything is a problem of my local configuration withing firefox/OS. When trying the connection with `openssl s_client ...` I can successfully connect and verify the certificate chain. Thus in general it seems to work.

My interpretation is that the (flash) client refuses the LE root certificate for some reason and terminates the connection due to security concerns.

Is my interpretation correct? How can I overcome this?

Thank you and cheers
Christian

--
Mit freundlichen Grüßen
Christian Wolf

Reply via email to