Hi Guys,
first of all i wish to thank all of you for your hard work and for sharing your knowledge.
This is my very first post… I hope to properly format my post 
I’m a really beginner in Openhab, Linux, Raspberry (basically everything
) and I’m trying to configure my AC.
I’ve read a lot of posts but I still can’t obtain a token. Someone could be so kind to help me?
I don’t want to bother anyone but I’ll try to explain my situation in detail
My AC is relatively new (2019). I’m running OpenHab on Raspberry (Raspian OS) and I’m connecting via ssh from Win 10 (Powershell). I’m using the @jag binding
I’ve placed the cert.pem (the @vaillan one) in /etc/openhab2/services, the server.py script seems running fine but the token script give me some errors.
/usr/lib/python3/dist-packages/urllib3/connectionpool.py:849: InsecureRequestWarning: Unverified HTTPS request is being made. Adding certificate verification is strongly advised. See: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings
InsecureRequestWarning)
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 600, in urlopen
chunked=chunked)
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 384, in _make_request
six.raise_from(e, None)
File "<string>", line 3, in raise_from
File "/usr/lib/python3/dist-packages/urllib3/connectionpool.py", line 380, in _make_request
httplib_response = conn.getresponse()
File "/usr/lib/python3.7/http/client.py", line 1336, in getresponse
response.begin()
File "/usr/lib/python3.7/http/client.py", line 306, in begin
version, status, reason = self._read_status()
File "/usr/lib/python3.7/http/client.py", line 275, in _read_status
raise RemoteDisconnected("Remote end closed connection without"
http.client.RemoteDisconnected: Remote end closed connection without response
I’ve tried to connect via openssl
openssl s_client -connect 192.168.1.111:2837 -cert /etc/openhab2/services/cert.pem
and this is my output
CONNECTED(00000003)
Can't use SSL_get_servername
depth=1 CN = Samsung Electronics OCF HA Device SubCA v1, OU = OCF HA Device SubCA, O = Samsung Electronics, C = KR
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 CN = OCF Device: Appliance PUF (7f4a7bd2-2a70-45f1-89dd-e7a75e2ebc3b), OU = OCF HA Device, O = Samsung Electronics, C = KR
verify return:1
---
Certificate chain
0 s:CN = OCF Device: Appliance PUF (7f4a7bd2-2a70-45f1-89dd-e7a75e2ebc3b), OU = OCF HA Device, O = Samsung Electronics, C = KR
i:CN = Samsung Electronics OCF HA Device SubCA v1, OU = OCF HA Device SubCA, O = Samsung Electronics, C = KR
1 s:CN = Samsung Electronics OCF HA Device SubCA v1, OU = OCF HA Device SubCA, O = Samsung Electronics, C = KR
i:CN = Samsung Electronics OCF Root CA, OU = OCF Root CA, O = Samsung Electronics, C = KR
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = OCF Device: Appliance PUF (7f4a7bd2-2a70-45f1-89dd-e7a75e2ebc3b), OU = OCF HA Device, O = Samsung Electronics, C = KR
issuer=CN = Samsung Electronics OCF HA Device SubCA v1, OU = OCF HA Device SubCA, O = Samsung Electronics, C = KR
---
Acceptable client certificate CA names
CN = Samsung Electronics OCF Root CA, OU = OCF Root CA, O = Samsung Electronics, C = KR
CN = Samsung Electronics OCF HA Device SubCA v1, OU = OCF HA Device SubCA, O = Samsung Electronics, C = KR
CN = Samsung Electronics OCF Root CA TEST, OU = OCF Root CA, O = Samsung Electronics, C = KR
Client Certificate Types: RSA sign, ECDSA sign
Requested Signature Algorithms: RSA+SHA256:ECDSA+SHA256:RSA+SHA1:ECDSA+SHA1
Shared Requested Signature Algorithms: RSA+SHA256:ECDSA+SHA256:RSA+SHA1:ECDSA+SHA1
Peer signing digest: SHA256
Peer signature type: ECDSA
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 2025 bytes and written 1626 bytes
Verification error: unable to get local issuer certificate
---
New, TLSv1.2, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-ECDSA-AES128-GCM-SHA256
Session-ID: 4D72D29008059ECFED5657662FC713E7CA01C29B68DF1D30E85FF02CC24BE268
Session-ID-ctx:
Master-Key: 513D10993C208211A349BB332B983C6199777948FDD0F15AD44797A66467AFA72F2BC5DF85DD4EA3E43E9DBD3DF5C893
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1588585716
Timeout : 7200 (sec)
Verify return code: 20 (unable to get local issuer certificate)
Extended master secret: no
---
My AC also uses different ports (scanned using a smartphone app) that changing over the time.
Any ideas? Please I really need your help!