On my Ubuntu FF uses CAs from /etc/ssl/certs/, Chrome seems to use internal CAs
Can you check with keytool your keystore contains full chain (including CA)?

Example 
https://www.sslshopper.com/article-most-common-java-keytool-keystore-commands.html

keytool -list -v -keystore keystore.jks
On Wed, Jul 18, 2018 at 6:00 PM Christian Wolf
<christ...@wolf-stuttgart.net> wrote:
>
> Dear Maxim,
>
> Am 18.07.2018 um 12:40 schrieb Maxim Solodovnik:
> > just re-read your initial email (wasn't practice in English for a long
> > time, hard to read very long emails :(( )
> >
> > Have you added full certificates chain to both keystore and truststore of 
> > red5?
>
> As far as I can tell, yes, there are chains in keystore. truststore is a
> simple copy of keystore at the moment.
>
> I tried to verify with the following command (in one line):
> $ openssl s_client -connect www2.wolf-stuttgart.net:8443 -showcerts
> -CApath /etc/ssl/certs/ < /dev/null
> This says, that the certificate could be successfully verified. I thus
> assume, this is running all right.
>
> Now I tried 2 browsers, firefox and chrome, to navigate to
> https://www2.wolf-stuttgart.net/openmeetings/hash?swf=network.
>
> Firefox
> -------
> The second port symbol (RTMP connection) is a red cross.
>
> Investigation with a network sniffer led to the problem, that the client
> refuses/does not find the CA of the cert and closes down the connection.
>
> Chrome
> ------
> The symbol is green as desired.
>
> The handshake of the client/server pair is visible. After that the
> connection is encrypted and only binary "random" data is transmitted
> that cannot be read (as desired) in a sniff.
>
> Cheers
> Christian



-- 
WBR
Maxim aka solomax

Reply via email to