I'm afraid in case of full secured proxied configuration you need to
use RTPMTS (tunneled secured RTMP)
example of RTMPT config can be found in mail archives, for ex here:
https://markmail.org/message/l7oltgy74zxo2pjc
On Tue, Jul 17, 2018 at 8:31 PM Christian Wolf <christianlu...@gmx.de> wrote:
>
> Dear community,
>
> I have a strange behavior with my installation of OM. I want to proxy
> the web interface through apache (with SSL). This is working. I can
> remotely access OM. All right.
>
> Now I want RMTP to be encrypted as well. Here I created another
> certificate from Let's Encrypt (LE) just for the RMTPS purpose. The
> common name (CN) is simply the host name just like e.g. for the https
> server.
>
> Then I wanted to adopt the configuration of OM accordingly. This is set
> up that I enabled in <OM>/conf/red5-core.conf the corresponding section,
> added in the global configuration (web frontend) flash.secure=true and
> flash.secure.proxy=best. I added the keys to the keystore exaclty as in
> https://markmail.org/message/j4gx2q6woidyqj7l#query:+page:1+mid:ik4qdhdychl364bp+state:results
> as far as I can tell. I tried the network test of OM and get still a red
> cross for the RTMP(S) port when using Firefox.
>
> A sniff with wireshark shows that the client connects to port 8443 as
> intended and an SSL session is started. The server sends the
> certificates I gave plus the intermediate certificate from LE. It does
> not send the root certificate. I do not know if this is right or wrong.
> Nevertheless, the client seems to refuse the certificate and shuts down
> the SSL connection with the reason "Unknown CA". This happen instantly
> after the server sent his certificate chain.
>
> When looking into this it looks as Chrome seemed to accept the
> certificate. I know that Chrome does many things "differently", thus it
> is possible that everything is a problem of my local configuration
> withing firefox/OS.
> When trying the connection with `openssl s_client ...` I can
> successfully connect and verify the certificate chain. Thus in general
> it seems to work.
>
> My interpretation is that the (flash) client refuses the LE root
> certificate for some reason and terminates the connection due to
> security concerns.
>
> Is my interpretation correct? How can I overcome this?
>
> Thank you and cheers
> Christian
>
> --
> Mit freundlichen Grüßen
> Christian Wolf



-- 
WBR
Maxim aka solomax

Reply via email to