<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Hotspot with V9.6 in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38929#M6934</link>
    <description>Yes, I added the new line just as you have shown above.
&lt;BR /&gt;&lt;BR /&gt;
c.setopt(pycurl.SSL_VERIFYPEER, False)
&lt;BR /&gt;
c.setopt(pycurl.SSL_VERIFYHOST, False)
&lt;BR /&gt;&lt;BR /&gt;
I will go back and try again. Thanks.</description>
    <pubDate>Wed, 14 May 2014 11:17:40 GMT</pubDate>
    <dc:creator>bc_chamberlin</dc:creator>
    <dc:date>2014-05-14T11:17:40Z</dc:date>
    <item>
      <title>Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38923#M6928</link>
      <description>Trying to get a demo of Secure Hotspot up and running. We're using ZD 1100 V9.6 Hotspot setup with RADIUS. RADIUS &amp;amp; ZD 'Test' Connection Okay.
&lt;BR /&gt;&lt;BR /&gt;
But getting this error message (on the client device) when connecting to open-dpsk (our open WLAN): (for this test we're using the unrestricted login script)
&lt;BR /&gt;&lt;BR /&gt;
Traceback (most recent call last):
&lt;BR /&gt;
&lt;PRE&gt;  File "/usr/lib/cgi-bin/xmlcommon.py", line 313, in sendXmlString
&lt;BR /&gt;
    c.perform()
&lt;BR /&gt;
&lt;B&gt;error: (51, "SSL: certificate subject name (Ruckus Wireless ZoneDirector SN-401123000658) does not match target
&lt;BR /&gt;
 host name '192.168.2.4'")
&lt;BR /&gt;
&lt;/B&gt;&lt;/PRE&gt;
&lt;BR /&gt;
Content-type: text/html 
&lt;BR /&gt;&lt;BR /&gt;
Unrestricted user generation failed: No response from ZoneDirector
&lt;BR /&gt;&lt;BR /&gt;
If we change to HTTP at port 80 by changing out HTTPS at 433 in /usr/lib/cgi-bin/hotspot_unrestricted.py we don't get the SSL error, but we get redirected back to unrestricted login page when we click 'I Agree'
&lt;BR /&gt;&lt;BR /&gt;
We've verified Northbound Passwords, sever_loc, and Secure SSID on both sides...  
&lt;BR /&gt;&lt;BR /&gt;
Struggling here...appreciate any advice, Thanks</description>
      <pubDate>Mon, 12 May 2014 02:23:16 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38923#M6928</guid>
      <dc:creator>bc_chamberlin</dc:creator>
      <dc:date>2014-05-12T02:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38924#M6929</link>
      <description>Ummm, I think I had the same problem and I added one line in xmlcommon.py
&lt;BR /&gt;&lt;BR /&gt;
search for this line in the file:
&lt;BR /&gt;&lt;BR /&gt;
  c.setopt(pycurl.SSL_VERIFYPEER, False)
&lt;BR /&gt;&lt;BR /&gt;
and add this one:
&lt;BR /&gt;&lt;BR /&gt;
  c.setopt(pycurl.SSL_VERIFYHOST, False)
&lt;BR /&gt;&lt;BR /&gt;
Let me know if helps.</description>
      <pubDate>Mon, 12 May 2014 09:01:54 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38924#M6929</guid>
      <dc:creator>alberto_de_la_c</dc:creator>
      <dc:date>2014-05-12T09:01:54Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38925#M6930</link>
      <description>Thanks Alberto, tried your suggestion, but completely different response, 
&lt;BR /&gt;
server internal error 500.  
&lt;BR /&gt;
regards</description>
      <pubDate>Tue, 13 May 2014 11:52:48 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38925#M6930</guid>
      <dc:creator>bc_chamberlin</dc:creator>
      <dc:date>2014-05-13T11:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38926#M6931</link>
      <description>500 error means the code won't run anymore due to a syntax error. Did you replace the line or add it?</description>
      <pubDate>Tue, 13 May 2014 12:34:30 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38926#M6931</guid>
      <dc:creator>keith_redfield</dc:creator>
      <dc:date>2014-05-13T12:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38927#M6932</link>
      <description>Yes, removed suggested code change, now back to original error condition:
&lt;BR /&gt;&lt;BR /&gt;
File "/usr/lib/cgi-bin/xmlcommon.py", line 313, in sendXmlString
&lt;BR /&gt;
    c.perform()
&lt;BR /&gt;
error: (51, "SSL: certificate subject name (Ruckus Wireless ZoneDirector SN-401123000658) does not match target
&lt;BR /&gt;
 host name '192.168.2.4'")</description>
      <pubDate>Wed, 14 May 2014 01:10:26 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38927#M6932</guid>
      <dc:creator>bc_chamberlin</dc:creator>
      <dc:date>2014-05-14T01:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38928#M6933</link>
      <description>But, as Keith said, did you replace the line or add it?
&lt;BR /&gt;&lt;BR /&gt;
You should have both in your code:
&lt;BR /&gt;&lt;BR /&gt;
c.setopt(pycurl.SSL_VERIFYPEER, False) 
&lt;BR /&gt;
c.setopt(pycurl.SSL_VERIFYHOST, False) 
&lt;BR /&gt;&lt;BR /&gt;
have you tried this?</description>
      <pubDate>Wed, 14 May 2014 08:18:53 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38928#M6933</guid>
      <dc:creator>alberto_de_la_c</dc:creator>
      <dc:date>2014-05-14T08:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38929#M6934</link>
      <description>Yes, I added the new line just as you have shown above.
&lt;BR /&gt;&lt;BR /&gt;
c.setopt(pycurl.SSL_VERIFYPEER, False)
&lt;BR /&gt;
c.setopt(pycurl.SSL_VERIFYHOST, False)
&lt;BR /&gt;&lt;BR /&gt;
I will go back and try again. Thanks.</description>
      <pubDate>Wed, 14 May 2014 11:17:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38929#M6934</guid>
      <dc:creator>bc_chamberlin</dc:creator>
      <dc:date>2014-05-14T11:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38930#M6935</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I'm having the exact same problem, I've added the SSL_VERIFY HOST entry but am now getting the error 500.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If I run the .py file from terminal (I've hard coded the form values)&amp;nbsp;I get this:&lt;BR /&gt;&lt;BR /&gt;







&lt;P&gt;* About to connect() to 10.97.0.12 port 443 (#0)&lt;/P&gt;
&lt;P&gt;* &amp;nbsp; Trying 10.97.0.12... * connected&lt;/P&gt;
&lt;P&gt;* Connected to 10.97.0.12 (10.97.0.12) port 443 (#0)&lt;/P&gt;
&lt;P&gt;* found 141 certificates in /etc/ssl/certs/ca-certificates.crt&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 server certificate verification SKIPPED&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 common name: Ruckus Wireless ZoneDirector SN-171308000099 (does not match '10.97.0.12')&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 server certificate expiration date OK&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 server certificate activation date OK&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 certificate public key: RSA&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 certificate version: #3&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 subject: C=US,ST=CA,O=Ruckus Wireless\, Inc.,CN=Ruckus Wireless ZoneDirector SN-171308000099&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 start date: Thu, 18 Jul 2013 02:02:12 GMT&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 expire date: Fri, 14 Jul 2028 02:02:12 GMT&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 issuer: CN=Ruckus Wireless ZoneDirector Internal CA SN-171308000099,O=Ruckus Wireless\, Inc.,ST=CA,C=US&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 compression: NULL&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 cipher: ARCFOUR-128&lt;/P&gt;
&lt;P&gt;*&amp;nbsp;	 MAC: SHA1&lt;/P&gt;
&lt;P&gt;&amp;gt; POST /admin/_portalintf.jsp HTTP/1.1&lt;/P&gt;
&lt;P&gt;User-Agent: PycURL/7.19.7&lt;/P&gt;
&lt;P&gt;Host: 10.97.0.12&lt;/P&gt;
&lt;P&gt;Accept: text/xml&lt;/P&gt;
&lt;P&gt;Accept-Charset: UTF-8&lt;/P&gt;
&lt;P&gt;Content-Length: 175&lt;/P&gt;
&lt;P&gt;Content-Type: application/x-www-form-urlencoded&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;lt; HTTP/1.1 200 OK&lt;/P&gt;
&lt;P&gt;&amp;lt; Date: Fri, 20 Feb 2015 22:55:24 GMT&lt;/P&gt;
&lt;P&gt;&amp;lt; Server: Embedthis-Appweb/3.4.2&lt;/P&gt;
&lt;P&gt;&amp;lt; Cache-Control: no-cache&lt;/P&gt;
&lt;P&gt;&amp;lt; Content-Length: 101&lt;/P&gt;
&lt;P&gt;&amp;lt; Connection: keep-alive&lt;/P&gt;
&lt;P&gt;&amp;lt; Keep-Alive: timeout=5, max=99&lt;/P&gt;
&lt;P&gt;&amp;lt; Last-Modified: Fri, 20 Feb 2015 22:55:24 GMT&lt;/P&gt;
&lt;P&gt;&amp;lt; Content-type:&amp;nbsp; text/xml&lt;/P&gt;
&lt;P&gt;&amp;lt; Cache-control: no-cache="set-cookie"&lt;/P&gt;
&lt;P&gt;&amp;lt; Set-Cookie: -ejs-session-=x6e5951bc9766a677250946238c588b93; path=/;&lt;/P&gt;
&lt;P&gt;&amp;lt; X-Appweb-Seq: 1846864&lt;/P&gt;
&lt;P&gt;&amp;lt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;* Connection #0 to host 10.97.0.12 left intact&lt;/P&gt;
&lt;P&gt;* Closing connection #0&lt;/P&gt;
&lt;P&gt;&lt;META http-equiv="REFRESH" content="0; url=&amp;lt;code&amp;gt;http://login-unrestricted.html?login_result=failed" /&gt;;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 23:09:20 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38930#M6935</guid>
      <dc:creator>paul_cross_6661</dc:creator>
      <dc:date>2015-02-20T23:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Hotspot with V9.6</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38931#M6936</link>
      <description>OK, fixed that problem - had to change the urls to http instead of https -&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;from nbi_url =&amp;nbsp;"&lt;A href="https://"&gt;https://"&amp;nbsp;+ zd_ip +&amp;nbsp;"/admin/_portalintf.jsp"&lt;BR /&gt;to&amp;nbsp;&lt;BR /&gt;







nbi_url = "&lt;/A&gt;&lt;A href="http://" rel="nofollow"&gt;http://&lt;/A&gt;" + zd_ip + "/admin/_portalintf.jsp"&lt;BR /&gt;&lt;BR /&gt;Different error now, but script has got further and is telling me there's a problem in xmlcommon now.&amp;nbsp;</description>
      <pubDate>Thu, 26 Feb 2015 09:45:47 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Secure-Hotspot-with-V9-6/m-p/38931#M6936</guid>
      <dc:creator>paul_cross_6661</dc:creator>
      <dc:date>2015-02-26T09:45:47Z</dc:date>
    </item>
  </channel>
</rss>

