• Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below
  • Forum
  • Website
  • GitHub
  • Status
  • Translation
  • Features
  • Team
  • Rules
  • Help
  • Feeds
User Links
  • Login
  • Register
  • Login Register
    Login
    Username/Email:
    Password:
    Or login with a social network below

    Useful Links Forum Website GitHub Status Translation Features Team Rules Help Feeds
    Jellyfin Forum Support Troubleshooting Networking & Access SOLVED: SSL Handshake Failed on Fire TV

    Pages (2): « Previous 1 2

     
    • 0 Vote(s) - 0 Average

    SOLVED: SSL Handshake Failed on Fire TV

    Linseed9747
    Offline

    Junior Member

    Posts: 11
    Threads: 1
    Joined: 2024 Jun
    Reputation: 0
    Country:United States
    #11
    2024-06-19, 06:16 PM (This post was last modified: 2024-06-19, 06:18 PM by Linseed9747.)
    One other thing I have found so far digging under the hood, EVERY service I have running on the reverse proxy contains it's own folder (a couple dozen), and each of those folders contains it's own file structure for all six of those PEM files. In other words, I feel like making any change to my certificates may require I change the files for EACH and EVERY one of those folders. I'm still trying to figure it out, but assuming I eventually feel comfortable trying to change a certificate directly by ssh, what exactly would I be changing?

    Okay, sorry I didn't catch your replies, I'll take a look at what you suggested and get back to you.
    Linseed9747
    Offline

    Junior Member

    Posts: 11
    Threads: 1
    Joined: 2024 Jun
    Reputation: 0
    Country:United States
    #12
    2024-06-19, 06:33 PM (This post was last modified: 2024-06-19, 06:34 PM by Linseed9747. Edited 1 time in total.)
    Okay, so when I nano the file referenced in your link, it contains a couple dozen server blocks, each service using reverse proxy has it's own block.  Here is the jellyfin block.

    Code:
    server {
        listen 443 ssl;
        listen [::]:443 ssl;

        server_name jellyfin.<redacted>.com ;

        if ( $host !~ "(^jellyfin.<redacted>.com$)" ) { return 404; }

        include /usr/syno/etc/www/certificate/ReverseProxy_71437579-6014-46a7-9c46-<redacted>/cert.conf*;

        include /usr/syno/etc/security-profile/tls-profile/config/ReverseProxy_71437579-6014-46a7-9c46-<redacted>.conf*;

        add_header Strict-Transport-Security "max-age=15768000; includeSubdomains; preload" always;

        proxy_ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3;

        location / {

            proxy_connect_timeout 60;

            proxy_read_timeout 60;

            proxy_send_timeout 60;

            proxy_intercept_errors off;

            proxy_http_version 1.1;

            proxy_set_header        Host            $http_host;

            proxy_set_header        X-Real-IP            $remote_addr;

            proxy_set_header        X-Forwarded-For            $proxy_add_x_forwarded_for;

            proxy_set_header        X-Forwarded-Proto            $scheme;

            proxy_pass http://<redacted>:8096;

        }

        error_page 403 404 500 502 503 504 /dsm_error_page;

        location /dsm_error_page {
            internal;
            root /usr/syno/share/nginx;
            rewrite (.*) /error.html break;
            allow all;
        }
    }
    TheDreadPirate
    Offline

    Community Moderator

    Posts: 15,374
    Threads: 10
    Joined: 2023 Jun
    Reputation: 460
    Country:United States
    #13
    2024-06-19, 06:45 PM
    What's in these files?

    include /usr/syno/etc/www/certificate/ReverseProxy_71437579-6014-46a7-9c46-<redacted>/cert.conf*;
    include /usr/syno/etc/security-profile/tls-profile/config/ReverseProxy_71437579-6014-46a7-9c46-<redacted>.conf*;
    Jellyfin 10.10.7 (Docker)
    Ubuntu 24.04.2 LTS w/HWE
    Intel i3 12100
    Intel Arc A380
    OS drive - SK Hynix P41 1TB
    Storage
        4x WD Red Pro 6TB CMR in RAIDZ1
    [Image: GitHub%20Sponsors-grey?logo=github]
    Linseed9747
    Offline

    Junior Member

    Posts: 11
    Threads: 1
    Joined: 2024 Jun
    Reputation: 0
    Country:United States
    #14
    2024-06-19, 07:17 PM
    #1 file

    ssl_certificate /usr/syno/etc/www/certificate/ReverseProxy_71437579-6014-46a7-9c46-<redacted>/dd624636-3fe2-4209-8840.pem;
    ssl_certificate_key /usr/syno/etc/www/certificate/ReverseProxy_71437579-6014-46a7-9c46-<redacted>/fc60cdf7-ee40-45c1-83bf.pem;

    # 2 file

    ssl_protocols TLSv1.2 TLSv1.3;
    ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECD>
    ssl_dhparam /usr/syno/etc/ssl/dh2048.pem;
    TheDreadPirate
    Offline

    Community Moderator

    Posts: 15,374
    Threads: 10
    Joined: 2023 Jun
    Reputation: 460
    Country:United States
    #15
    2024-06-19, 07:32 PM (This post was last modified: 2024-06-19, 07:34 PM by TheDreadPirate.)
    Comment out file #1. Then add these lines to the config.

    Code:
    ssl_certificate /path/to/fullchain.pem;
    ssl_certificate_key /path/to/privkey.pem;
    ssl_trusted_certificate /path/to/chain.pem;

    My nginx config for reference.

    https://sourceb.in/auQ7583d3q
    Jellyfin 10.10.7 (Docker)
    Ubuntu 24.04.2 LTS w/HWE
    Intel i3 12100
    Intel Arc A380
    OS drive - SK Hynix P41 1TB
    Storage
        4x WD Red Pro 6TB CMR in RAIDZ1
    [Image: GitHub%20Sponsors-grey?logo=github]
    Linseed9747
    Offline

    Junior Member

    Posts: 11
    Threads: 1
    Joined: 2024 Jun
    Reputation: 0
    Country:United States
    #16
    2024-06-20, 03:05 PM
    That was a good idea TheDreadPirate, but unfortunately making those modifications to the Nginx config directly on Synology seems to be a no-go. That entire reverse-proxy folder structure gets re-written by the software. Doing so completely killed the services that rely on the reverse-proxy. I saved a backup of the original config so I have been able to recover via shell.

    However, I did find the solution:

    SOLUTION:

    When you import new certificate files for a WILDCARD CERTIFICATE on a Synology NAS, you will be prompted to input three files:

    Private Key:
    Certificate:
    Intermediate certificate (optional):

    The private key and certificate are self explanatory, but when you are importing a wildcard certificate, make sure you obtain a CA Bundle from the certificate authority to import into the 'Intermediate certificate' field. I'm not completely sure what I input into that field originally, but when I obtained that 3-certificate bundle from my provider it fixed this issue. Thanks @TheDreadPirate for all your help.
    Pages (2): « Previous 1 2

    « Next Oldest | Next Newest »

    Users browsing this thread: 1 Guest(s)


    • View a Printable Version
    • Subscribe to this thread
    Forum Jump:

    Home · Team · Help · Contact
    © Designed by D&D - Powered by MyBB
    L


    Jellyfin

    The Free Software Media System

    Linear Mode
    Threaded Mode