Hello,
We've been working on data acquisition with Node-RED on this website : https://rucheconnectee.mc.
The GNU/Linux OS used is CentOS7.
I had a self-signed SSL certificate to encrypt the website, but I had security warnings on all the web browsers. I eventually got a SSL certificate from Let's Encrypt that listens to 443 port and works well.
On Google Chrome, Mozilla Firefox and Microsoft Edge, when I get to the page that embeds the Node-RED page, it doesn't display and the user needs to open the page in a new tab and to accept to surf on the website despite the security warning.
In Chrome and Edge, a security warning remains on the URL bar. When I click on the warning, the web browser tells the SSL certificate is valid, but it's apparently self-signed.
I looked at the /home/user directory, in which I can find ca.crt, ca.csr and ca.key - strange for me! These are the names of the self-signed SSL certificate I had generated, but these files may be different, as the ones I had created are in another folder.
When I type the openssl command:
$ openssl s_client -showcerts -connect 80.94.97.61:1880
here's what I get:
CONNECTED(00000003)
depth=0 C = MC, ST = MONACO, L = Monaco, O = DENJS, OU = DENJS, CN = rucheconnectee.mc, emailAddress = fnguyen@gouv.mc
verify error:num=18:self signed certificate
verify return:1
depth=0 C = MC, ST = MONACO, L = Monaco, O = DENJS, OU = DENJS, CN = rucheconnectee.mc, emailAddress = fnguyen@gouv.mc
verify return:1
Certificate chain
0 s:/C=MC/ST=MONACO/L=Monaco/O=DENJS/OU=DENJS/CN=rucheconnectee.mc/emailAddress=fnguyen@gouv.mc
i:/C=MC/ST=MONACO/L=Monaco/O=DENJS/OU=DENJS/CN=rucheconnectee.mc/emailAddress=fnguyen@gouv.mc
-----BEGIN CERTIFICATE-----
XXX
-----END CERTIFICATE-----
Server certificate
subject=/C=MC/ST=MONACO/L=Monaco/O=DENJS/OU=DENJS/CN=rucheconnectee.mc/emailAddress=fnguyen@gouv.mc
issuer=/C=MC/ST=MONACO/L=Monaco/O=DENJS/OU=DENJS/CN=rucheconnectee.mc/emailAddress=fnguyen@gouv.mc
No client certificate CA names sent
Peer signing digest: SHA256
Server Temp Key: ECDH, P-256, 256 bits
SSL handshake has read 1606 bytes and written 415 bytes
New, TLSv1/SSLv3, Cipher is XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : XXXXXXXXXX
Session-ID: XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Session-ID-ctx:
Master-Key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
XXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXX
Start Time: 1666684067
Timeout : 300 (sec)
Verify return code: 18 (self signed certificate)
So, Node-RED actually uses a self-signed SSL certiticate on my webserver.
Does anyone know where I can change the Node-RED certificate so that it uses the Let's Ecrypt one in CentOS7?
Thanks!