Hey Xavier, thats fine. Normally the keystore.jks file shoukd have the same data as the keystore file, but that is ald stuff I think and not longer necessary. No let us go to the server.xml file in the conf directory. Just type "sudo cat OM_Folder/conf/server.xml and have a look to the SSL Part. It should start with "<Connector port="5443"...". There you will find the used keystore password and the path for the keystore file.
If the configuration is the same as we did it days before with the commands I suggest there must be the "keystorePass="password"". Otherwise checkt for typos etc. We should check this before reinstall the old files (I can provide them if necessary). And yes, this is a folderlisting with -a (all, even hidden directorys and files) and -l (long). Greetz Stefan Am 07.07.2019 10:58, schrieb Xavier M: > Hi Stefan, > > No matters, we all have another life (or even some other lives?)... That's > the advantage of the e-mails, that we can report to later! > > First of all: you're right for the usergroup, I didn't take care that I > answered to the sender only when I was using Thunderbird (it is not the case > when I'm using the webmail). > > Then, 2 points: > > 1/ Can you please tell me which is the keystore from the original file from > the install source - that is in which folder I should find it? I guess I > modified the keystore files with the -import option of the command lines? > > 1bis/ There is no problem if I have to uninstall / install again OpenMeetings > to have it again. Is there any way to uninstall it properly, or do I have to > delete /opt/open500/ folder from a shell? > > 2/ Here the result you asked me (is it a list of files in the folder, with > the right for the access, owner and owner-group, and the date of last > modification?): > > _xavier@sd-118950:/opt/open500/conf$ ls -al_ > _total 264_ > _drwxr-xr-x 3 nobody nogroup 4096 juil. 5 14:45 ._ > _drwxr-xr-x 9 nobody nogroup 4096 juil. 3 10:27 .._ > _drwxr-x--- 3 root root 4096 juil. 3 10:34 Catalina_ > _-rw-r--r-- 1 nobody nogroup 12873 mars 13 22:58 catalina.policy_ > _-rw-r--r-- 1 nobody nogroup 7243 mars 13 22:58 catalina.properties_ > _-rw-r--r-- 1 nobody nogroup 1400 mars 13 22:58 context.xml_ > _-rw-r--r-- 1 nobody nogroup 1149 mars 13 22:58 jaspic-providers.xml_ > _-rw-r--r-- 1 nobody nogroup 2313 mars 13 22:58 jaspic-providers.xsd_ > _-rw-r--r-- 1 root root 5651 juil. 5 14:45 keystore_ > _-rw-r--r-- 1 root root 5651 juil. 4 21:43 keystore.jks_ > _-rw-r--r-- 1 nobody nogroup 4144 mars 13 22:58 logging.properties_ > _-rw------- 1 root root 4222 juil. 4 21:42 red5.p12_ > _-rw-r--r-- 1 nobody nogroup 6433 mars 28 21:01 server.xml_ > _-rw-r--r-- 1 root root 5651 juil. 5 14:45 trustscore.jks_ > _-rw-r--r-- 1 nobody nogroup 170202 mars 13 22:58 web.xml_ > _xavier@sd-118950:/opt/open500/conf$ _ > > Bis bald, > > Xavier > > Le 06/07/2019 à 22:36, Stefan Kühl a écrit : > > Hi Xavier, > > sorry for being late, I'm a bit busy these days ;-) > > First: we should keep the usergroup in loop, that's why I'm take the > user@openmeetings.apache.org in place. ;-) > > Second: I totally agree with maxim. Setting the ports in listening state for > the apache keep them busy and unusable for openmeetings. Of course the > address is reachable then, but only via the apache webserver. The error > message means that you want to deliver secure conten via an insecure apache > port. > > Can you please post the result from ls -al of the OM-Folder/conf? It's weird > that you get a password error message for the keystore, because we set it to > password at the import I think. Any typos in the code-lines? > > To cancel this lines, just copy the keystore from the original file fromn the > install source into the OM-Folder/conf. > > Greetz > > Stefan > > Am 06.07.2019 21:21, schrieb Xavier M: > > Hi Stefan, > > I wonder if there is a way to cancel what I did with these command lines? > Indeed, I can not connect anymore to OpenMeetings... and I want to check > where it comes from. In Catalina log, I can read things like: > > * Caused by: java.lang.IllegalArgumentException: keystore password was > incorrect > > * Caused by: java.io.IOException: keystore password was incorrect > > ... so I suppose that something went wrong. > > Thanks in advance, have a good week-end! > > Xavier > > Le 04/07/2019 à 22:05, Stefan Kühl a écrit : > > Ok, please restart the server and it should work. > If you use open500 as folder open500/conf is correct. > > Just restart it. > > Greetz > > Stefan > > PS: if you want to access to "permission denied" folders you need to switch > to root, sudo won't work in this case. But be careful, keep in mind that you > change the ownership if you change files as root. > > Bonne soiree > > Am 04.07.2019 21:57, schrieb Xavier M: > > Thank you! > > Each command line worked... But it did not change anything when I want to log > in. Maybe shall I restart "a service"? > > NB : as OM_Folder, I wrote "open500", where I found a "conf" subdirectory > with a "keystore" file. But I have an "openmeetings" subdirectory too... to > which I can not access (Permission denied). > > Greetings, > > Xavier > > Le 04/07/2019 à 21:35, Stefan Kühl a écrit : > > Yes, I'm sorry. Did this so many times and forgot an important point. First: > the password is: password > > ;-) > > Let's go through the lines: > > "sudo openssl pkcs12 -export -in /etc/letsencrypt/live/domain.eu/cert.pem > -inkey /etc/letsencrypt/live/domain.eu/privkey.pem -out > /opt/OM_Folder/conf/red5.p12 -name red5 -certfile > /etc/letsencrypt/live/domain.eu/chain.pem" > > Here you use the openssl library to export the the key from the letsencrypt > certificate into the red5.p12 file and store it in youtr OM Folder (red5 is > just an name - you could also use any other name) > > "sudo keytool -importkeystore -srcstorepass password -srckeystore > /opt/OM_Folder/conf/red5.p12 -srcstoretype PKCS12 -deststorepass password > -destkeystore /opt/OM_Folder/conf/keystore.jks -alias red5 > > sudo keytool -import -alias root -keystore /opt/OM_Folder/conf/keystore.jks > -trustcacerts -file /etc/letsencrypt/live/domain.eu/chain.pem" > > by using keytool you import the certificate key by setting the password > (-srcstorepass password -> deststorepass password) into the file keystore.jks > and confirming the trust by the chain.pem > > "sudo cp -f /opt/OM_Folder/conf/keystore.jks > /opt/OM_Folder/conf/trustscore.jks" > > now creating the trustscore.jks by copying the keystore.jks > > at least and only if you have OM 5.* installed: > > "sudo cp -f /opt/OM_Folder/conf/keystore.jks /opt/OM_Folder/conf/keystore" > this is neccesary because OM5-'looks only for keystore and not for > keystore.jks. You can do "mv keystore.jks keystore" also. Otherwise you could > update the config file to look for keystore.jks" > > So if you will be asked for > > _Enter Export Password:_ > _Verifying - Enter Export Password:_ > > _and again_ > > Enter Import Password: > Verifying - Enter Import Password: > > _you need to enter password _ > > _Just to keep it simple, you can choose your own password, but keep in mind > top change it within the command too;-)_ > > _Greetz_ > > _Stefan_ > > Am 04.07.2019 21:18, schrieb Xavier M: > > So... > > After having changed the folder names, I entered the first command line to > get: > > _Enter Export Password:_ > _Verifying - Enter Export Password:_ > > I wrote down a password - I guess I defined it at this step? > > Then the second command line delivered: > > _Importing keystore /opt/open500/conf/red5.p12 to > /opt/open500/conf/keystore.jks..._ > _keytool error: java.io.IOException: keystore password was incorrect_ > > Any idea of what happens and what I should do? I did not try the third > command line. > > By the way, can you explain me in a few words what I'm doing with these > command lines ? > > Have a good evening, > > Xavier > > Le 04/07/2019 à 19:15, Stefan Kühl a écrit : > > Maybe to make a quick check (every command in one line): > > sudo openssl pkcs12 -export -in /etc/letsencrypt/live/domain.eu/cert.pem > -inkey /etc/letsencrypt/live/domain.eu/privkey.pem -out > /opt/OM_Folder/conf/red5.p12 -name red5 -certfile > /etc/letsencrypt/live/domain.eu/chain.pem > > sudo keytool -importkeystore -srcstorepass password -srckeystore > /opt/OM_Folder/conf/red5.p12 -srcstoretype PKCS12 -deststorepass password > -destkeystore /opt/OM_Folder/conf/keystore.jks -alias red5 > > sudo keytool -import -alias root -keystore /opt/OM_Folder/conf/keystore.jks > -trustcacerts -file /etc/letsencrypt/live/domain.eu/chain.pem > > sudo cp -f /opt/OM_Folder/conf/keystore.jks > /opt/OM_Folder/conf/trustscore.jks > > sudo cp -f /opt/OM_Folder/conf/keystore.jks /opt/OM_Folder/conf/keystore (<- > only if you have version 5.*) > > Please remeber: If you leave it like this, you need to repaet this lines > after every renew of your certificate. Be aware of the folders -> domain.eu: > your domain an OM_Folder: your OM installation folder. > > Greetz > > Stefan > > Am 04.07.2019 18:00, schrieb Xavier M: > Then let's go with Proxy through Apache. > > I'm not running as root, but my account has the whole rights so that I > thought I could do exactly the same things. "sudo" is my friend... even sudo > chmod. > > The server works with Ubuntu - my account was created at the installation. > When I refer to a "LAMP-server", I executed the command > > sudo apt install apache2 php libapache2-mod-php mariadb-server php-mysql > > ... among other prior to install OM. > > Xavier > > ------------------------- > > DE : Aaron Hepp <aaron.h...@gmail.com> > ENVOYÉ : jeudi 4 juillet 2019 17:53 > À : user@openmeetings.apache.org > OBJET : Re: Log-in and security > > Proxy through Apache would be the easier solution for upgrading > > when you say Admin of the sever you are running as root or that you can log > into it? As well what "type" of server is it (REHL, CentOS, Ubuntu, etc.) > > On 7/4/19 11:48 AM, Xavier M wrote: > Thank you Aaron. > > Even if I have admin rights, I can access only to /etc/letsencrypt/. The > permission is denied when I want to open the subdirectory "live". > > How do both solution work? I know neither how to "Proxy through Apache", nor > how to "configure my OM instance to be able to read where the keys are". > Sorry for all that... > > Xavier > > ------------------------- > > DE : Aaron Hepp <aaron.h...@gmail.com> > ENVOYÉ : jeudi 4 juillet 2019 17:40 > À : user@openmeetings.apache.org > OBJET : Re: Log-in and security > > That is your issue. Apache has the cert installed via LetEncrypt. Tomcat > which is running on 5443 needs to have the configuration set to know where > the cert is located as well as the keystore created. > > You can do two things. Proxy through Apache, or configure your OM instance > to be able to read where the keys are. > > LetEncrypt places the cert at: > /etc/letsencrypt/live/<domain> > > On 7/4/19 11:34 AM, Xavier M wrote: > Hem... No... Do you mean I have to copy and paste the certificate in each > folder? Actually, I even don't know where the certificate is to be found on > the server... But I guess I find it somewhere if needed. > > Xavier > > ------------------------- > > DE : Stefan Kühl <ste...@quatrekuehl.eu> > ENVOYÉ : jeudi 4 juillet 2019 17:06 > À : user@openmeetings.apache.org > CC : R. Scholz > OBJET : Re: Log-in and security > > Hi @all, > > port should be irrelevant. I'm using Apache on Ubuntu with port 5443 too. > https works as expected. > Did you export they certificate keys (like keystore and trustscore) to your > %OM%/conf folder? > > Greetz > > Stefan > > Am 04.07.2019 16:57, schrieb R. Scholz: Hello Xavier, > > Hm, you using on Port 80 Tomcat or Apache? > > Best regards, > > René > > Am 04.07.2019 um 16:24 schrieb Xavier M: > Thank you for answering... I'm sorry, but I don't know enough about > certificates to give you a relevant answer. I think that : > * The common name is "rusa.fr" > * There is no subject alternative name (even www.rusa.fr [1]) > * It is not a wildcard > > ... But I'm not 100% sure, it is the first time I administrate a server, I'm > discovering many things at the same time! > > Xavier > > ------------------------- > > DE : Clayton, Robin <robin.clay...@cumberland.co.uk> > ENVOYÉ : jeudi 4 juillet 2019 15:43 > À : user@openmeetings.apache.org > OBJET : RE: Log-in and security > > What is the CN of the certificate, is there any SAN entries on the > certificate? Or is it a wildcard? > > The TCP port should be irrelevant. > > Rob > > FROM: Stefan Kühl [mailto:ste...@quatrekuehl.eu] > SENT: 04 July 2019 14:16 > TO: user@openmeetings.apache.org > CC: Xavier M > SUBJECT: Re: Log-in and security > > Hi, > > are you sure that you request your certificate also for domain.eu [2] or only > for www.domain.eu [3]. You should check this. Sometimes webhoster only use > the www adresses for certificates. > > Greetz > > Stefan > > Am 04.07.2019 14:18, schrieb Xavier M: > > Hi everybody, > > I'm quite sure that the answer is already somewhere, but I couldn't find > it... > > After having installed OM on a web-server, the "written" way to access to the > log-in is following, according to Alvaro's tuto: > > https://localhost:5443/openmeetings > > If OM is installed on a web server, let's say "domain.eu [2]", it works > correctly with: > > https://domain.eu:5443/openmeetings > > But the user will get a warning for security reason, even if domain.eu [2] > works with https, since the common certificates will not work with this port. > > I stated that following URL worked for the "demo version": > > https://om.alteametasoft.com/openmeetings > > Does anyone know how this was done? I would like to avoid the use of the port > 5443 with the warning. > > Have a good day! > > Xavier > > DISCLAIMER > > This email has been scanned by the Mimecast security service. > > DISCLAIMER > > Please, consider your environmental responsibility. Before printing this > e-mail ask yourself: Do I need a hard copy? > > Cumberland Building Society > Cumberland House > Cooper Way > Parkhouse > CARLISLE CA3 0JF > To help us monitor and improve customer service telephone calls may be > recorded. > Cumberland Building Society is authorised by the Prudential Regulation > Authority and regulated by the Financial Conduct Authority and Prudential > Regulation Authority. We arrange life assurance and critical illness cover > only with Legal & General Assurance Society Limited and general insurance > only with Aviva Insurance Limited. > To find out more about us, visit www.cumberland.co.uk [4] > > CONFIDENTIALITY: This e-mail and any files transmitted with it are > confidential, may be legally privileged and are intended for the addressee(s) > only. If you are not the intended recipient you may not disclose, copy, > distribute, or retain all or part of this e-mail without our authority. > Please notify the sender immediately by replying to this e-mail and then > permanently delete it. > > Any views or opinions expressed are solely those of the author and do not > necessarily represent those of Cumberland Building Society or any of its > subsidiaries. > > Although we have taken steps to ensure that this e-mail and any attachments > are free from virus contamination, please rely on your own virus checking > procedures as no guarantee is implied or given. We will not be liable for any > loss or damage arising from alteration of the contents of this e-mail by a > third party or as a result of any virus. > > This email has been scanned by the Mimecast security service. Links: ------ [1] http://www.rusa.fr [2] http://domain.eu [3] http://www.domain.eu [4] http://www.cumberland.co.uk/