• Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular

    Unknowed brand IPcam

    Other Manufacturers
    5
    97
    7708
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Monocle
      Monocle last edited by

      Here is an example of what we are looking for (see example log below). Look at the RTSP CLIENT and ENDPOINT messages that follow the “INITIALIZE” block.

      -------------------------------------------------
      INITIALIZE RTSP STREAM:  Kitchen
      -------------------------------------------------
       - NAME  : Kitchen
       - LABEL : PRIMARY
       - URL   : rtsp://camera-kitchen-wifi:554/cam/realmonitor?channel=1&subtype=0
       - UUID  : STREAM:11d01a21-c6ca-46ee-bb0a-a1d9edaa4524
       - SESS  : d451aeb7-de42-4ca6-a6c1-5051eec6ad5f
       - MODIF : Fri Jun 28 2019 12:26:37 GMT-0400 (Eastern Daylight Time)
       - TAGS  : @tunnel
      -------------------------------------------------
      
      2019-07-15T18:30:18.861Z [INFO]  [10.1.2.249:39774 <r1QrUSc-B>] RTSP CLIENT SOCKET CONNECTED
      2019-07-15T18:30:18.991Z [INFO]  [10.1.2.249:39774 <r1QrUSc-B>] RTSP CLIENT ATTACHED TO STREAM: Kitchen (STREAM:11d01a21-c6ca-46ee-bb0a-a1d9edaa4524)
      2019-07-15T18:30:18.995Z [INFO]  [10.1.2.249:39774 <r1QrUSc-B>] RTSP ENDPOINT SOCKET CONNECTED {camera-kitchen-wifi:554}
      2019-07-15T18:30:18.996Z [DEBUG] [10.1.2.249:39774 <r1QrUSc-B>] [CLIENT REQUEST]  --> [DESCRIBE] rtsp://ef231161-9698-486f-8686-19d565749c09.mproxy.io:443/STREAM:11d01a21-c6ca-46ee-bb0a-a1d9edaa4524?session=d451aeb7-de42-4ca6-a6c1-5051eec6ad5f
      2019-07-15T18:30:18.996Z [TRACE] [10.1.2.249:39774 <r1QrUSc-B>] [CLIENT REQUEST]  --> [HEADERS] {
        "accept": "application/sdp",
        "user-agent": "stagefright/1.2 (Linux;Android 5.1.1)",
        "cseq": "1"
      }
      2019-07-15T18:30:18.996Z [DEBUG] [10.1.2.249:39774 <r1QrUSc-B>] [ENDPOINT REQUEST]  --> [DESCRIBE] rtsp://camera-kitchen-wifi:554/cam/realmonitor?channel=1&subtype=0
      2019-07-15T18:30:18.996Z [TRACE] [10.1.2.249:39774 <r1QrUSc-B>] [ENDPOINT REQUEST]  --> [HEADERS] {
        "accept": "application/sdp",
        "user-agent": "stagefright/1.2 (Linux;Android 5.1.1)",
        "cseq": "1"
      }
      
      

      Monocle: https://monoclecam.com
      Getting Started | Troubleshooting Guide | FAQ | Contact Support

      1 Reply Last reply Reply Quote 0
      • T
        Tueftler last edited by

        so i have Reboot the EchoShow and then testet with the Tag @tunnel

        -------------------------------------------------
        MONOCLE RUNTIME ENVIRONMENT
        -------------------------------------------------
        VERSION   = 0.0.4
        OS/ARCH   = win32\ia32
        PROCESS   = monocle-gateway (PID=7140)
        TIMESTAMP = 2019-07-16T08:52:47.044Z
        
        -------------------------------------------------
        MONOCLE GATEWAY SERVICE         (Version: 0.0.4)
        -------------------------------------------------
        [Monocle Starting]
        [Monocle Connecting]
        [Monocle Started]
        [RTSP Server Starting]
        [RTSP Server Listening] 0.0.0.0:8555 (RTSP)
        [RTSP Server Listening] 0.0.0.0:443 (RTSP-TLS)
        [RTSP Proxy Started] (PID=3200)
        [RTSP Server Listening] 0.0.0.0:8554 (PROXY)
        [RTSP Server Started]
        [Monocle Connected]
        [RTSP Server Registered]
        
        -------------------------------------------------
        MONOCLE RTSP SERVICE - INITIALIZED
        -------------------------------------------------
        FQDN = 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io
        HOST = 192.168.2.87
        PORT = 443
        -------------------------------------------------
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  Garten
        -------------------------------------------------
         - NAME  : Garten
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:df443cff-97a9-45ac-a21d-9768d4674f63
         - SESS  : 181e1901-a846-41c5-9002-38220b68dd58
         - MODIF : Tue Jul 16 2019 10:44:57 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  Garten
        -------------------------------------------------
         - NAME  : Garten
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:df443cff-97a9-45ac-a21d-9768d4674f63
         - SESS  : bcce9668-7ac4-4a4f-b729-09d83ec6e0a4
         - MODIF : Tue Jul 16 2019 10:44:57 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  Garten
        -------------------------------------------------
         - NAME  : Garten
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:df443cff-97a9-45ac-a21d-9768d4674f63
         - SESS  : 04665976-aad4-4e5d-9f8d-b9dac641e1d5
         - MODIF : Tue Jul 16 2019 10:44:57 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  test1
        -------------------------------------------------
         - NAME  : test1
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:6a68ae99-a5d8-4e50-bea2-be2bebf874b7
         - SESS  : 5d8a6595-153f-443b-8877-8277e901a804
         - MODIF : Tue Jul 16 2019 10:45:06 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @noaudio,@tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  test1
        -------------------------------------------------
         - NAME  : test1
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:6a68ae99-a5d8-4e50-bea2-be2bebf874b7
         - SESS  : af9e99c6-010e-4bc9-8996-30f7c08d3768
         - MODIF : Tue Jul 16 2019 10:45:06 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @noaudio,@tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  test1
        -------------------------------------------------
         - NAME  : test1
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:6a68ae99-a5d8-4e50-bea2-be2bebf874b7
         - SESS  : 76671991-0b69-43c2-ac0a-3e1d1ce9564b
         - MODIF : Tue Jul 16 2019 10:45:06 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @noaudio,@tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  test2
        -------------------------------------------------
         - NAME  : test2
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:7d8ddf5b-a0b3-45ff-b203-a7d1f4070cfc
         - SESS  : 66897bcc-c3e9-44f9-bb13-badc3dafa177
         - MODIF : Tue Jul 16 2019 10:45:15 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @fixaudio,@tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  test2
        -------------------------------------------------
         - NAME  : test2
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:7d8ddf5b-a0b3-45ff-b203-a7d1f4070cfc
         - SESS  : 627d1ed5-1add-41de-9848-ec35888eba5f
         - MODIF : Tue Jul 16 2019 10:45:15 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @fixaudio,@tunnel
        -------------------------------------------------
        
        
        -------------------------------------------------
        INITIALIZE RTSP STREAM:  test2
        -------------------------------------------------
         - NAME  : test2
         - LABEL : PRIMARY
         - URL   : rtsp://192.168.2.102:554/user=admin&password=xxx&channel=1&stream=1.sdp
         - UUID  : STREAM:7d8ddf5b-a0b3-45ff-b203-a7d1f4070cfc
         - SESS  : 8dae8c32-8973-494e-9c72-9ca27df648e6
         - MODIF : Tue Jul 16 2019 10:45:15 GMT+0200 (Mitteleuropäische Sommerzeit)
         - TAGS  : @fixaudio,@tunnel
        -------------------------------------------------
        
        [RTSP Server Stopping]
        [RTSP Server Stopped]
        [Monocle Stopping]
        [Monocle Stopped]
        [RTSP Proxy Stopped] CODE=0; SIGNAL=SIGTERM
        
        
        Monocle 1 Reply Last reply Reply Quote 0
        • Monocle
          Monocle @Tueftler last edited by Monocle

          @Tueftler

          Still no incoming TCP connections from Alexa devices.

          We have to try to narrow down why Alexa can’t connect. In all cases like this that we have seen, it always comes down to some networking or firewall related issue.

          From another computer (not the one running Monocle Gateway) on your network try this command:

          {{ PANEL(info, NOTE): You may have to install OpenSSL if you system does not come with it pre-installed. Here is the link to a Windows installer if you are running Windows: http://gnuwin32.sourceforge.net/packages/openssl.htm }}

          openssl s_client -showcerts -connect 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io:443 
          

          If the command is successful, it will print out information about the SSL certificate received from the Monocle Gateway. Additionally, in the Monocle Gateway log you should see something like this with the IP address from the computer you are running the command on:

          2019-07-16T16:12:59.568Z [WARN] [10.0.0.111:64966 <BJI_POoWS>] RTSP CLIENT SOCKET TIMEOUT
          2019-07-16T16:12:59.570Z [INFO] [10.0.0.111:64966 <BJI_POoWS>] RTSP CLIENT SOCKET CLOSED

          All we are trying to to is validate that the server running Monocle Gateway is allowing incoming connections from other nodes on your network.

          Monocle: https://monoclecam.com
          Getting Started | Troubleshooting Guide | FAQ | Contact Support

          1 Reply Last reply Reply Quote 0
          • T
            Tueftler last edited by

            I am not at home yet, but I have made a VPN connection from my Mobile phone to my Fritzbox and have Then made a Putty connection to my Raspberry PI. Then I have made the test with this output.

            Linux FhemServer 4.14.79-v7+ #1159 SMP Sun Nov 4 17:50:20 GMT 2018 armv7l
            
            The programs included with the Debian GNU/Linux system are free software;
            the exact distribution terms for each program are described in the
            individual files in /usr/share/doc/*/copyright.
            
            Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
            permitted by applicable law.
            Last login: Wed Jul 10 21:42:55 2019 from 192.168.2.73
            root@FhemServer:~# openssl s_client -showcerts -connect 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io:443
            CONNECTED(00000003)
            depth=2 O = Digital Signature Trust Co., CN = DST Root CA X3
            verify return:1
            depth=1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
            verify return:1
            depth=0 CN = *.mproxy.io
            verify return:1
            ---
            Certificate chain
             0 s:/CN=*.mproxy.io
               i:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
            -----BEGIN CERTIFICATE-----
            MIIFTjCCBDagAwIBAgISA0txqJQBvCxIB1rUs4MhJfjtMA0GCSqGSIb3DQEBCwUA
            MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD
            ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xOTA2MDQxMzM5NDRaFw0x
            OTA5MDIxMzM5NDRaMBYxFDASBgNVBAMMCyoubXByb3h5LmlvMIIBIjANBgkqhkiG
            9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvdSZ3VjowZQp8Qh6E4ey4iwTmwBOIl5Ioc4u
            unNlFBsIomTQ2ewKUA9UGypF1P3D1P1/+RPELvHmFpkDyck1y2DU/3t0D30hy6O7
            t18oUiV9oFC9RmKg5+bv5yx3vNYuvu413qK8m6lTYjSlGk7Owq45p3CSP9odpb/c
            cPCW/JcnrtW/6NXdmODqrAyuFe8ugUIqOj5FnOfOHI3lhlYwB07DfB1MODTjwpmE
            ajWYgZUsWSqaTq5ehF0C3WZshfUsM451EIsq7h2/6KX9djlgEOoClXWAT/Fg07eo
            6LQ2I2HPSfhhstNgNOcXUHvWjWLA5SKysOpjrDnH/deVl+lcFQIDAQABo4ICYDCC
            AlwwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD
            AjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTTKwBl532p8WiP+O/sLVg8/4Y3ETAf
            BgNVHSMEGDAWgBSoSmpjBH3duubRObemRWXv86jsoTBvBggrBgEFBQcBAQRjMGEw
            LgYIKwYBBQUHMAGGImh0dHA6Ly9vY3NwLmludC14My5sZXRzZW5jcnlwdC5vcmcw
            LwYIKwYBBQUHMAKGI2h0dHA6Ly9jZXJ0LmludC14My5sZXRzZW5jcnlwdC5vcmcv
            MBYGA1UdEQQPMA2CCyoubXByb3h5LmlvMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcG
            CysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5
            cHQub3JnMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYA4mlLribo6UAJ6IYbtjuD
            1D7n/nSI+6SPKJMBnd3x2/4AAAFrIu6B+AAABAMARzBFAiBaFEQrWtdE33vIncCy
            RnmtWx2s7jdF3e+DC/wKOM8BewIhANXSmFrMophglkP8xLtrD8B3x8GXYlo6U68X
            nV7LjEE8AHYAY/Lbzeg7zCzPC3KEJ1drM6SNYXePvXWmOLHHaFRL2I0AAAFrIu6D
            3wAABAMARzBFAiBq1ZQrA4UyRW31KWs4H4kWNVAOa99V6Kp+DJng9oaCXgIhAPNg
            +45M4nguZaP/jBsm+jaQ+AE/NrQpREgf8AdHFIUtMA0GCSqGSIb3DQEBCwUAA4IB
            AQCJlVE7b8ZslJDKb6g2Fr+U7fJQobuHv3l+Aw2XCm2JaY2Y1+jrDdvKxCAFJsfr
            swh+99rlQ2Ipbuy4HOsXKTJMJ8AE1kiKjeYpWmEVdOh6wfmh4yk0k2g5CccXz9TH
            WY8qYWb2SnhfvOVmrKlV1lmr1+nJwz9s/Y3feEiSDcRuuCr0VLo/R2IzmlZVFAhb
            c9jZCCq1anO1DjnLKnJwW/kMntIB1adqknFFHbGH/LuuL+5GmQRUT/hclvgpR5nZ
            rDE7b7Zv/eHpJBF0yLNNylG1lx/QreLMkW3FhEKYtVzw2zX89zi2AMrZVe1fEqct
            Z0o8QmrvM94AeGBnWXjArU2V
            -----END CERTIFICATE-----
             1 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             2 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             3 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             4 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             5 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             6 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             7 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             8 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
             9 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
            10 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
            11 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
            12 s:/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
               i:/O=Digital Signature Trust Co./CN=DST Root CA X3
            -----BEGIN CERTIFICATE-----
            MIIEkjCCA3qgAwIBAgIQCgFBQgAAAVOFc2oLheynCDANBgkqhkiG9w0BAQsFADA/
            MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
            DkRTVCBSb290IENBIFgzMB4XDTE2MDMxNzE2NDA0NloXDTIxMDMxNzE2NDA0Nlow
            SjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUxldCdzIEVuY3J5cHQxIzAhBgNVBAMT
            GkxldCdzIEVuY3J5cHQgQXV0aG9yaXR5IFgzMIIBIjANBgkqhkiG9w0BAQEFAAOC
            AQ8AMIIBCgKCAQEAnNMM8FrlLke3cl03g7NoYzDq1zUmGSXhvb418XCSL7e4S0EF
            q6meNQhY7LEqxGiHC6PjdeTm86dicbp5gWAf15Gan/PQeGdxyGkOlZHP/uaZ6WA8
            SMx+yk13EiSdRxta67nsHjcAHJyse6cF6s5K671B5TaYucv9bTyWaN8jKkKQDIZ0
            Z8h/pZq4UmEUEz9l6YKHy9v6Dlb2honzhT+Xhq+w3Brvaw2VFn3EK6BlspkENnWA
            a6xK8xuQSXgvopZPKiAlKQTGdMDQMc2PMTiVFrqoM7hD8bEfwzB/onkxEz0tNvjj
            /PIzark5McWvxI0NHWQWM6r6hCm21AvA2H3DkwIDAQABo4IBfTCCAXkwEgYDVR0T
            AQH/BAgwBgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwfwYIKwYBBQUHAQEEczBxMDIG
            CCsGAQUFBzABhiZodHRwOi8vaXNyZy50cnVzdGlkLm9jc3AuaWRlbnRydXN0LmNv
            bTA7BggrBgEFBQcwAoYvaHR0cDovL2FwcHMuaWRlbnRydXN0LmNvbS9yb290cy9k
            c3Ryb290Y2F4My5wN2MwHwYDVR0jBBgwFoAUxKexpHsscfrb4UuQdf/EFWCFiRAw
            VAYDVR0gBE0wSzAIBgZngQwBAgEwPwYLKwYBBAGC3xMBAQEwMDAuBggrBgEFBQcC
            ARYiaHR0cDovL2Nwcy5yb290LXgxLmxldHNlbmNyeXB0Lm9yZzA8BgNVHR8ENTAz
            MDGgL6AthitodHRwOi8vY3JsLmlkZW50cnVzdC5jb20vRFNUUk9PVENBWDNDUkwu
            Y3JsMB0GA1UdDgQWBBSoSmpjBH3duubRObemRWXv86jsoTANBgkqhkiG9w0BAQsF
            AAOCAQEA3TPXEfNjWDjdGBX7CVW+dla5cEilaUcne8IkCJLxWh9KEik3JHRRHGJo
            uM2VcGfl96S8TihRzZvoroed6ti6WqEBmtzw3Wodatg+VyOeph4EYpr/1wXKtx8/
            wApIvJSwtmVi4MFU5aMqrSDE6ea73Mj2tcMyo5jMd6jmeWUHK8so/joWUoHOUgwu
            X4Po1QYz+3dszkDqMp4fklxBwXRsW10KXzPMTZ+sOPAveyxindmjkW8lGy+QsRlG
            PfZ+G6Z6h7mjem0Y+iWlkYcV4PIWL1iwBi8saCbGS5jN2p8M+X+Q7UNKEkROb3N6
            KOqkqm57TH2H3eDJAkSnh6/DNFu0Qg==
            -----END CERTIFICATE-----
            ---
            Server certificate
            subject=/CN=*.mproxy.io
            issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
            ---
            No client certificate CA names sent
            Peer signing digest: SHA512
            Server Temp Key: ECDH, P-256, 256 bits
            ---
            SSL handshake has read 16172 bytes and written 302 bytes
            Verification: OK
            ---
            New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
            Server public key is 2048 bit
            Secure Renegotiation IS supported
            Compression: NONE
            Expansion: NONE
            No ALPN negotiated
            SSL-Session:
                Protocol  : TLSv1.2
                Cipher    : ECDHE-RSA-AES128-GCM-SHA256
                Session-ID: B9DCC213ABB4EC4890D0E1FAFA23DE9279E7E7203EBBE61A5B0EA6CB3665316D
                Session-ID-ctx:
                Master-Key: 7DC1D1B9CC9BA72ECA24158D09B2CEA59AE70C24D0E5693C7FF31850E7C756CEE909F3B9C1B3AC6ADAB557B9A7865F28
                PSK identity: None
                PSK identity hint: None
                SRP username: None
                TLS session ticket lifetime hint: 300 (seconds)
                TLS session ticket:
                0000 - be 11 62 5c 77 89 90 a1-d8 ba 94 26 5a 22 d2 45   ..b\w......&Z".E
                0010 - 05 9b 2e 72 6f f5 eb 87-ed d3 30 99 61 59 1c 93   ...ro.....0.aY..
                0020 - 2e 06 b9 63 10 7a 82 e3-b4 a8 4a 20 a5 4c 38 4c   ...c.z....J .L8L
                0030 - 6d e3 01 49 66 e0 29 6b-82 17 2a 8a 05 ee 0c 81   m..If.)k..*.....
                0040 - 30 88 db f8 90 d1 6a aa-d6 d0 11 55 2c 7f 88 b4   0.....j....U,...
                0050 - ce a1 ac 46 6b f4 6d 6f-53 e3 36 ff ee 93 0c 7d   ...Fk.moS.6....}
                0060 - 5a 55 e1 e3 8f 80 91 72-aa 7f 61 55 f3 a6 54 1d   ZU.....r..aU..T.
                0070 - a9 18 59 9e 3f 2b 84 b3-6a f4 1d fc af 7a 85 4e   ..Y.?+..j....z.N
                0080 - fe 41 b8 d6 d5 74 4d c1-5e 1e f8 21 66 ab fd 44   .A...tM.^..!f..D
                0090 - e1 e3 42 0e c1 4b 3a 0a-9c 6e 53 bf 37 36 0a c2   ..B..K:..nS.76..
                00a0 - d1 70 b6 87 eb e7 6a 93-70 5c 8a b6 8f 33 d1 8e   .p....j.p\...3..
                00b0 - aa 21 0d 04 71 1e 47 9e-4d 0e 19 75 32 46 88 5c   .!..q.G.M..u2F.\
            
                Start Time: 1563296493
                Timeout   : 7200 (sec)
                Verify return code: 0 (ok)
                Extended master secret: no
            ---``
            Monocle 1 Reply Last reply Reply Quote 0
            • Monocle
              Monocle @Tueftler last edited by

              @Tueftler said in Unknowed brand IPcam:

              OK, look like the Monocle Gateway is listening on port 443, not getting blocked by a firewall and you are able to successfully make an external connection to it and obtain its SSL certificate. All looks good.

              So the last thing that is really left is the actual Amazon Alexa devices. Are you sure they are on the same network with access to the Monocle Gateway? Not on a guest or isolated network/VLAN? Unfortunately the Alexa devices are a bit of a black box and we have no way to really know if they are attempting the connection and why they might be failing. We seem to have verified any potential roadblocks that would prevent them from connecting. I fear the only options left are to packet sniff the network and see the traffic between the Alexa device and the Monocle Gateway to see if there is any attempts from Alexa. Does your Fritzbox provide any means for sniffing or packet capture? I use a PFSense router in my environment and there are add-ons that allow me to capture traffic and inspect it.

              I know other users with Fritzbox have had issues with DNS REBINDING, but that does not seem to be a problem in this case because you are able to connect via the DNS hostname.

              Thanks, Robert

              Monocle: https://monoclecam.com
              Getting Started | Troubleshooting Guide | FAQ | Contact Support

              1 Reply Last reply Reply Quote 0
              • T
                Tueftler last edited by

                I must read it again to understand all, because I am German and my technical Englisch is not the best.

                I have installed a terminal on my mobile phone and made the test again via VPN

                The result is this

                openssl s_client -showcerts -connect 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io:443
                527989941576:error:2008F002:BIO routines:BIO_lookup_ex:system lib:crypto/bio/b_addr.c:710:No address associated with hostname
                connect:errno=0
                $
                
                Monocle 1 Reply Last reply Reply Quote 0
                • T
                  Tueftler last edited by

                  Alexa, my Laptop and all other device in same Network Alexa and the Laptop also with the same SSID only the IP Cam is on a second Fritzbox with other SSID but they all in same Network.

                  I don’t now if there is a way to record network traffic on the Fritzbox.

                  1 Reply Last reply Reply Quote 0
                  • Monocle
                    Monocle @Tueftler last edited by

                    @Tueftler

                    The DNS hostname resolves to your local/private IP address.

                    > nslookup 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io
                    Server:		10.1.1.1
                    Address:	10.1.1.1#53
                    
                    Non-authoritative answer:
                    Name:	9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io
                    Address: 192.168.2.87
                    

                    So if you are testing it over the Internet, it will certainly fail. However, if you are testing over VPN, it should work assuming that your Fritzbox is properly allowing nodes to resolve the local IP address from the DNS hostname. I think the Fritzbox by default will BLOCK this as a DNS REBINDING attempt. Basically some routers like the Fritzbox won’t allow public DNS hostnames to resolve to private IP address on your network – as this could be considered a threat to your network. However in our case, Amazon only allows their Alexa devices to connect to publicly resolvable DNS hostnames – but they can resolve to private addresses. There is nothing technically wrong with doing this, but some routers see this as a potential vulnerability and block these type of DNS queries.

                    Its best to perform the PING tests and the OPENSSL test command from another computer on your local network separate from the computer running the Monocle Gateway (or from a computer or device connected via VPN should be fine?).

                    Thanks, Robert

                    Monocle: https://monoclecam.com
                    Getting Started | Troubleshooting Guide | FAQ | Contact Support

                    1 Reply Last reply Reply Quote 0
                    • T
                      Tueftler last edited by Tueftler

                      so now i have installed the Monocle Gateway on my Raspberry pi, this is running 24/7
                      now i can made the tests with the laptop

                      If i Test i become the same output in log:

                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]: INITIALIZE RTSP STREAM:  test2
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]: -------------------------------------------------
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - NAME  : test2
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - LABEL : PRIMARY
                      
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - URL   : rtsp://192.168.2.102:554/user=admin&password=marokaner1510&channel=1&stream=1.sdp
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - UUID  : STREAM:7d8ddf5b-a0b3-45ff-b203-a7d1f4070cfc
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - SESS  : dc987c54-8fdf-4c2c-8f47-324577513814
                      
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - MODIF : Tue Jul 16 2019 10:45:15 GMT+0200 (CEST)
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]:  - TAGS  : @fixaudio,@tunnel
                      Jul 17 14:57:40 FhemServer monocle-gateway[27235]: -------------------------------------------------
                      
                      

                      i have installed openssl on the laptop by downloading the setup.exe and installing but in the commandpromt comes the messages that openssl is wrong or can not be found

                      openssl s_client -showcerts -connect 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io:443
                      

                      Edit: the ping test to the raspberry looks good:

                      C:\>ping 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io
                      
                      Ping wird ausgeführt für 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io [192.168
                      .2.172] mit 32 Bytes Daten:
                      Antwort von 192.168.2.172: Bytes=32 Zeit=5ms TTL=64
                      Antwort von 192.168.2.172: Bytes=32 Zeit=2ms TTL=64
                      Antwort von 192.168.2.172: Bytes=32 Zeit=3ms TTL=64
                      Antwort von 192.168.2.172: Bytes=32 Zeit=2ms TTL=64
                      
                      Ping-Statistik für 192.168.2.172:
                          Pakete: Gesendet = 4, Empfangen = 4, Verloren = 0
                          (0% Verlust),
                      Ca. Zeitangaben in Millisek.:
                          Minimum = 2ms, Maximum = 5ms, Mittelwert = 3ms
                      
                      

                      so what can i do

                      Monocle 1 Reply Last reply Reply Quote 0
                      • Monocle
                        Monocle @Tueftler last edited by

                        @Tueftler

                        On Windows, since the installer did not include the “openssl.exe” in your path by default, you can change directories at the command prompt before running the test using the first command below:

                        cd "\Program Files (x86)\GnuWin32\bin"
                        
                        openssl s_client -showcerts -connect 9dd28fe1-40f2-4459-805d-daa62fdc6ff5.mproxy.io:443 
                        

                        The successful ping test tells us that the DNS should be working and resolving properly on your network – so in theory, DNS REBINDING should not be a problem.

                        So I suspect this openssl command test will be successful as well. Lets go ahead and verify it just to make sure. This will further verify that we can in fact access port 443 and get a valid SSL certificate response.

                        Thanks, Robert

                        Monocle: https://monoclecam.com
                        Getting Started | Troubleshooting Guide | FAQ | Contact Support

                        1 Reply Last reply Reply Quote 0
                        • T
                          Tueftler last edited by

                          Okay here the result:

                          Server certificate
                          subject=/CN=*.mproxy.io
                          issuer=/C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
                          ---
                          No client certificate CA names sent
                          ---
                          SSL handshake has read 29777 bytes and written 450 bytes
                          ---
                          New, TLSv1/SSLv3, Cipher is AES256-SHA
                          Server public key is 2048 bit
                          Compression: NONE
                          Expansion: NONE
                          SSL-Session:
                              Protocol  : TLSv1
                              Cipher    : AES256-SHA
                              Session-ID: 5B7776799F28F9049A80093118EFDBCBC314C1408FCC8382D96CCD26D79F7B4E
                          
                              Session-ID-ctx:
                              Master-Key: 1AB19413C57A5FB7ECEB0883D2111B09C96C163B86B40A82803E2F7AB16ECAAE
                          3CD9279FECAC3C6C780226225177105E
                              Key-Arg   : None
                              Start Time: 1563460616
                              Timeout   : 300 (sec)
                              Verify return code: 20 (unable to get local issuer certificate)
                          ---
                          closed
                          

                          i have not copied the part with all the certifikate

                          1 Reply Last reply Reply Quote 0
                          • T
                            Tueftler last edited by

                            must the Port 443 linked in my Router to the Server where Monocle Gateway is running?
                            so Portforwarting port 443 to 192.168.2.172?

                            Monocle 1 Reply Last reply Reply Quote 0
                            • Monocle
                              Monocle @Tueftler last edited by

                              @Tueftler

                              No … no port forwarding should be necessary.

                              So all this is getting to be pretty strange. It looks like your gateway and network are perfectly fine, but for some reason Alexa simply will not even attempt to connect. Unfortunately Alexa does not provide any logging or diagnostics available to us to know if she is even attempting the connection or why it might be failing.

                              Do you know how to do network packet sniffing or have a router that can capture the traffic out from the Alexa device?

                              What country are you located in? Just trying to determine if this could be a regional issue.

                              Let me think on this and see what steps might help shed further light on this.

                              Thanks, Robert

                              Monocle: https://monoclecam.com
                              Getting Started | Troubleshooting Guide | FAQ | Contact Support

                              1 Reply Last reply Reply Quote 0
                              • T
                                Tueftler last edited by

                                I am from Germany, so is the reason my english is not the best.

                                can we do anything with wireshark? i have seen it but not used befor.

                                Monocle 2 Replies Last reply Reply Quote 0
                                • Monocle
                                  Monocle @Tueftler last edited by

                                  @Tueftler

                                  Yes, you should be able to use WireShark to capture data over the network. It’s been several years since I have used it so not sure what all the requirements are, but you may need a network adapter that supports promiscuous mode to see all the traffic. You might also check into the support for your router. I know that I can analyze traffic using my PFSense router. What we would be looking for is any TCP traffic originating from the Alexa device to the host computer running the Monocle Gateway on port 443. Or potentially any DNS requests attempting to resolve your gateway’s host record “*.mproxy.io” coming from the Alexa device.

                                  In the meantime, I think I will try to setup a public testing camera or video feed that you can also try to use. It may take me a few days to get it up as I am traveling. This could at least allow us to verify the Alexa device is connecting to a resource over the cloud and verify the SSL certificates, etc.

                                  Thanks, Robert

                                  Monocle: https://monoclecam.com
                                  Getting Started | Troubleshooting Guide | FAQ | Contact Support

                                  1 Reply Last reply Reply Quote 0
                                  • Monocle
                                    Monocle @Tueftler last edited by

                                    @Tueftler

                                    After thinking a bit further, I’m not sure WireShark alone can get to the information needed. The Alexa device will be connecting to your WiFi router and in between the WiFi and your other computer/laptop the traffic is likely going over a switched network which means the computer/laptop running WireShark may not be able to see the traffic coming from Alexa. So this may be a bit more involved to capture this data.

                                    Monocle: https://monoclecam.com
                                    Getting Started | Troubleshooting Guide | FAQ | Contact Support

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      Tueftler last edited by

                                      Sorry I repeat do late, I have tester with Wireshark but I don’t now to use it.

                                      My last idea is to take a not used Raspberry Pi as bridge between Alexa and my rooter and there install a network Swiffer bekause my Fritzbox from Unitymedia have disabled the network monitor tool.

                                      Or did you have a other idea?

                                      1 Reply Last reply Reply Quote 0
                                      • T
                                        Tueftler last edited by Tueftler

                                        So I have connected Alexa with a other Fritzbox, Ther i can record the network traffic. After starting record I have tester to show the 3 device Garten, test1 and test2, then I have stopped the record.
                                        In the attachment is the record file I hope it helps

                                        i can not upload the file, not privileges

                                        Monocle 2 Replies Last reply Reply Quote 0
                                        • Monocle
                                          Monocle @Tueftler last edited by

                                          @Tueftler

                                          I sent a PM to you via the chat on this forum site for additional follow up.

                                          Thanks, Robert

                                          Monocle: https://monoclecam.com
                                          Getting Started | Troubleshooting Guide | FAQ | Contact Support

                                          1 Reply Last reply Reply Quote 0
                                          • Monocle
                                            Monocle @Tueftler last edited by

                                            @Tueftler

                                            OK, here is a test feed to try with your Echo Show (Gen 1).

                                            This first test does not require any tags.

                                            Here is the RTSP URL:
                                            rtsp://demo.mproxy.io:443/resort

                                            Here it is configured in my camera settings in the Monocle Web Portal:

                                            0a2e4fcc-3cd7-4ad7-81c9-1bd7175d42a1-image.png

                                            This will at least test the SSL certificates and certification chain to make sure that is not the problem.

                                            Thanks, Robert

                                            Monocle: https://monoclecam.com
                                            Getting Started | Troubleshooting Guide | FAQ | Contact Support

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Privacy Policy  |  Terms & Conditions

                                            © 2018 shadeBlue, LLC.