-
I haven't worked with public endpoints for a while and now I need it. I have an HTTP Sender destination and need to send to an https:// URL but Mirth throws the following error and queues all messages:
Did I forget about a limitation sending to HTTPS endpoints? I thought it should always work but cannot validate SSL certificates... (which is still useful because traffic is encrypted, even if a man-in-the-middle attack cannot be detected). I thought the limitation is that Mirth cannot serve HTTPS as a source, unless you have paid for the SSL manager plugin/extension. If I'm wrong and Mirth cannot handle HTTPS URLs (without the plugin), then what's a workaround? I only need it for testing, not in production. Would this still work? https://forums.mirthproject.io/forum/mirth-connect/support/14439-http-sender-error?p=84210#post84210 |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 44 replies
-
Here is a little more info. HTTP Sender via Mirth will work with HTTPS if several conditions are met, otherwise you might have to use a 3rd Party application. https://gist.github.com/jonbartels/8abd121901eb930f46245d9ef0f5710e |
Beta Was this translation helpful? Give feedback.
-
Hi, I have to continue this discussion because there's still some things that I don't fully understand. I hope you can help me out? I learned - and I invite you to verify and confirm:
What works: HTTP Sender connecting to https://www.google.com What does not work:
A difference I noticed: abc.xyz.com uses a wildcard cert that is issued to *.xyz.com #1 What I did:
Result: still same handshake_failure #2 Then I did: Imported the 2 CA certs + webserver cert to Mirth's keystore #3 Then I did: Added the following two lines to
Same as for Java truststore: The CAs already existed in Windows' CA store but I re-imported the 2 CA certs again. Result: still same handshake_failure #4 Then I did:
Result: Works! But why?!? |
Beta Was this translation helpful? Give feedback.
-
Unfortunately, I cannot simply install everything from scratch because my Windows VM is a jump host to a 3rd party and the only way to access and troubleshoot its HTTPS interface because my VM is connected to their network via S2S VPN and my IP address is whitelisted. But the principle should be the same - no matter what Java release and where it's installation path is. Correct? When I run the following JS code in Mirth: logger.debug("Java version: " + java.lang.System.getProperty("java.version"));
logger.debug("Java home: " + java.lang.System.getProperty("java.home")); And the |
Beta Was this translation helpful? Give feedback.
@pacmano1 turns out you were in fact correct, the
https.ciphers
andhttps.client.protocols
inmirth.properties
feed into the configuration of the defaultHttpDispatcher
.connect/server/src/com/mirth/connect/connectors/http/DefaultHttpConfiguration.java
Lines 62 to 67 in bbeea45