[HTTPS] Can't open a camera network stream H264 + HTTPS
Posted: 20 May 2010 11:20
Hi,
I run VLC 1.0.5 for Windows (Graphical User Interface). I have a Panasonic camera on my local network. If I configure my camera in H264 + HTTP, I can open the network stream with VLC : I choose HTTP protocol and tip the address http://192.42.172.250:12345/nphH264AACa ... on=320x240. VLC asks me login/pass of the camera. After, the stream opens, I have audio and video.
When I configure my camera in H264 + HTTPS, I choose HTTPS protocol in VLC and tip the address https://192.42.172.250:12345/nphH264AAC ... on=320x240. VLC can't open the stream (before asking me login/pass).
In VLC log, I have :
In Wireshark :
If I change port to 443, I try to open https://192.42.172.250/nphH264AACauth?R ... on=320x240, VLC still can't open it. VLC log is the same but Wireshark log is not :
Can it be a GnuTLS problem ? A certificate problem ? A parameter in VLC I have to change ? I don't find it...
Thanks in advance for your help,
Sly
I run VLC 1.0.5 for Windows (Graphical User Interface). I have a Panasonic camera on my local network. If I configure my camera in H264 + HTTP, I can open the network stream with VLC : I choose HTTP protocol and tip the address http://192.42.172.250:12345/nphH264AACa ... on=320x240. VLC asks me login/pass of the camera. After, the stream opens, I have audio and video.
When I configure my camera in H264 + HTTPS, I choose HTTPS protocol in VLC and tip the address https://192.42.172.250:12345/nphH264AAC ... on=320x240. VLC can't open the stream (before asking me login/pass).
In VLC log, I have :
Code: Select all
main debug: `https://192.42.172.250:12345/nphH264AACauth?Resolution=320x240 ' gives access `https' demux `' path `192.42.172.250:12345/nphH264AACauth?Resolution=320x240 '
main debug: creating demux: access='https' demux='' path='192.42.172.250:12345/nphH264AACauth?Resolution=320x240 '
main debug: looking for access_demux module: 0 candidates
main debug: no access_demux module matched "https"
main debug: TIMER module_need() : 0.000 ms - Total 0.000 ms / 1 intvls (Avg 0.000 ms)
main debug: creating access 'https' path='192.42.172.250:12345/nphH264AACauth?Resolution=320x240 '
main debug: looking for access module: 1 candidate
access_http debug: http: server='192.42.172.250' port=12345 file='/nphH264AACauth?Resolution=320x240++
main debug: net: connecting to 192.42.172.250 port 12345
main debug: connection: Resource temporarily unavailable
main debug: connection succeeded (socket = 2784)
main debug: requested server name: 192.42.172.250
main debug: looking for tls client module: 1 candidate
qt4 debug: IM: Setting an input
qt4 debug: Updating the geometry
qt4 debug: Updating the geometry
gnutls debug: GnuTLS v2.8.5 initialized
gnutls warning: cannot add x509 credentials (C:\Documents and Settings\All Users\Application Data/ssl/certs/ca-certificates.crt): No such file or directory
main debug: using tls client module "gnutls"
main debug: TIMER module_need() : 246.000 ms - Total 246.000 ms / 1 intvls (Avg 246.000 ms)
gnutls error: TLS session: access denied
gnutls error: Certificate could not be verified
gnutls error: Certificate's signer was not found
main error: TLS client session handshake error
gnutls debug: GnuTLS deinitialized
main debug: removing module "gnutls"
access_http error: cannot establish HTTP/TLS session
main warning: no access module matching "https" could be loaded
Code: Select all
No. Time Source Destination Protocol Info
80 6.825686 192.42.172.142 192.42.172.250 TCP infocrypt > italk [SYN] Seq=0 Win=16384 Len=0 MSS=1460
81 6.826749 192.42.172.250 192.42.172.142 TCP italk > infocrypt [SYN, ACK] Seq=0 Ack=1 Win=4096 Len=0 MSS=1460
82 6.826805 192.42.172.142 192.42.172.250 TCP infocrypt > italk [ACK] Seq=1 Ack=1 Win=17520 Len=0
83 6.841234 192.42.172.142 192.42.172.250 TCP infocrypt > italk [PSH, ACK] Seq=1 Ack=1 Win=17520 Len=98
84 6.845263 192.42.172.250 192.42.172.142 TCP italk > infocrypt [PSH, ACK] Seq=1 Ack=99 Win=4096 Len=79
87 6.991064 192.42.172.142 192.42.172.250 TCP infocrypt > italk [ACK] Seq=99 Ack=80 Win=17441 Len=0
88 6.992696 192.42.172.250 192.42.172.142 TCP italk > infocrypt [PSH, ACK] Seq=80 Ack=99 Win=4096 Len=453
89 6.994604 192.42.172.142 192.42.172.250 TCP infocrypt > italk [PSH, ACK] Seq=99 Ack=533 Win=16988 Len=139
96 7.289603 192.42.172.250 192.42.172.142 TCP italk > infocrypt [ACK] Seq=533 Ack=238 Win=4096 Len=0
97 7.289623 192.42.172.142 192.42.172.250 TCP infocrypt > italk [PSH, ACK] Seq=238 Ack=533 Win=16988 Len=43
101 7.484408 192.42.172.250 192.42.172.142 TCP italk > infocrypt [PSH, ACK] Seq=533 Ack=281 Win=4096 Len=43
102 7.485426 192.42.172.142 192.42.172.250 TCP infocrypt > italk [PSH, ACK] Seq=281 Ack=576 Win=16945 Len=23
103 7.485716 192.42.172.142 192.42.172.250 TCP infocrypt > italk [FIN, ACK] Seq=304 Ack=576 Win=16945 Len=0
104 7.486855 192.42.172.250 192.42.172.142 TCP italk > infocrypt [ACK] Seq=576 Ack=305 Win=4073 Len=0
105 7.495599 192.42.172.250 192.42.172.142 TCP italk > infocrypt [FIN, ACK] Seq=576 Ack=305 Win=4096 Len=0
106 7.495620 192.42.172.142 192.42.172.250 TCP infocrypt > italk [ACK] Seq=305 Ack=577 Win=16945 Len=0
Code: Select all
No. Time Source Destination Protocol Info
130 8.547996 192.42.172.142 192.42.172.250 TCP dict-lookup > https [SYN] Seq=0 Win=16384 Len=0 MSS=1460
131 8.549043 192.42.172.250 192.42.172.142 TCP https > dict-lookup [SYN, ACK] Seq=0 Ack=1 Win=4096 Len=0 MSS=1460
132 8.549133 192.42.172.142 192.42.172.250 TCP dict-lookup > https [ACK] Seq=1 Ack=1 Win=17520 Len=0
133 8.554577 192.42.172.142 192.42.172.250 TLSv1.1 Client Hello
134 8.558609 192.42.172.250 192.42.172.142 TLSv1.1 Server Hello
137 8.684000 192.42.172.142 192.42.172.250 TCP dict-lookup > https [ACK] Seq=99 Ack=80 Win=17441 Len=0
138 8.685555 192.42.172.250 192.42.172.142 TLSv1.1 Certificate, Server Hello Done
139 8.686956 192.42.172.142 192.42.172.250 TLSv1.1 Client Key Exchange
142 8.968452 192.42.172.250 192.42.172.142 TCP https > dict-lookup [ACK] Seq=533 Ack=238 Win=4096 Len=0
143 8.968474 192.42.172.142 192.42.172.250 TLSv1.1 Change Cipher Spec, Encrypted Handshake Message
150 9.168511 192.42.172.250 192.42.172.142 TLSv1.1 Change Cipher Spec, Encrypted Handshake Message
151 9.169268 192.42.172.142 192.42.172.250 TLSv1.1 Encrypted Alert
Thanks in advance for your help,
Sly