- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Version 2.0 can have ssl mode. The property for this is
config.erizoController.ssl = true;
Our own certificates were replaced fine and anything worked... only in Chrome.
But Mozilla Throws Exception
Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://xxxxx:8080/socket.io/1/?t=1422131473673. This can be fixed by moving the resource to the same domain or enabling CORS.
When we tried to open https://xxxxx:8080/ Mozilla told us that certificate is unsecure.
So in default configuration our certificates weren't requested for ErizoController socket.io/1/
We had to change file ErizoController.js in part of enabling socket.io
i = require("https").createServer({ key: require("fs").readFileSync(config.certificate.key).toString(), cert: require("fs").readFileSync(config.certificate.cert).toString(), passphrase: config.certificate.passphrase, ca: config.certificate.ca }
was changed to
i = require("https").createServer{ key: fs.readFileSync(config.certificate.key2), cert: fs.readFileSync(config.certificate.cert2), requestCert: true };
config.certificate.key2,config.certificate.cert2 - is Full path to certificate and key like /home/xxx/Release-v2.0/...
after that - mozilla understood the certificate.
- Tags:
- HTML5
- JavaScript*
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Artem,
Do your certification have any difference between key/pem and key2/pem2?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No - it is the same certificates. The only difference is key/cert - has format like '../cert/cert.key'
and key2/cert2 - has absolute way like '/var/cert/.../cert.key'
Work both with .key/.cert formats and key.pem/cert.pem
passphrase and ca - are empty for me - so i removed it from start script
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Artem,
We have tested the scenario you provided, and here is the result:
1. Create the cert.pem and key.pem with no passphrase |
the remote resource at https://xxxxx:8080/socket.io/1/?t=1422131473673 can be accessed. |
pass |
|
the remote resource at https://xxxxx:8080/socket.io/1/?t=1422131473673 can be accessed. |
pass |
1. Create the cert.pem and key.pem with passphrase |
the remote resource at https://xxxxx:8080/socket.io/1/?t=1422131473673 can be accessed only the passphrase was correct. |
pass |
It seems to be OK and as expected...
Can you upload the certificate files you used whose passphrase and ca are empty?

- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page