Cant connect to mDash platform

The device can’t connect, exit with a authentication error.
The device is connected, connects to everything, except the mDash platform.
MOS version: 2.13.1

[May  2 16:51:47.783] mgos_rpc_channel_ws:261 0x3ffc6b08 Connecting to wss://dash.mongoose-os.com/api/v2/rpc, SSL? 1
[May  2 16:51:48.087] mg_ssl_if_mbedtls.c:207 0x3ffbca0c mbedTLS error: -0x2700
[May  2 16:51:48.130] mgos_rpc_channel_ws:205 0x3ffc6b08 TCP connect failed: -3

Config:

 "dash": {
    "enable": true,
    "token": "tokenstring"
}

Thank you Marcio.
Could not reproduce that on our side, works fine:

Devices connect happily.
Do you see a certificate warning when connecting to the https://dash.mongoose-os.com via a browser?
Both names for the service, mdash.net and dash.mongoose-os.com appear to have valid certs.

No certificate warnings in my side.

" 1. Devices connect to mDash using MQTT protocol, and authenticate with the MQTT username and password. In an added device, an “ID” field is MQTT username, and Token field is MQTT password. Thus, using device ID and Token, we can use any MQTT client to connect to the mDash."

MQTT is necessary ?
My device is connecting to my private MQTT server.

mDash can use either MQTT (using mqtt Mongoose OS library) or WebSocket (using dash Mongoose OS library). If you connect both to mDash and some other MQTT server, you need to use the dash library - the way you do now.

Try to change dash.server=wss://mdash.net/api/v2/rpc and see if that works out.

using dash.server:443=mdash.net/api/v2/rpc

[May  2 20:49:56.025] mgos_rpc_channel_ws:261 0x3ffc6c78 Connecting to mdash.net:443/api/v2/rpc, SSL? 0
[May  2 20:49:56.137] mgos_rpc_channel_ws.:52 0x3ffc6c78 WS handshake resp 400

using dash.server=wss://mdash.net/api/v2/rpc

[May  2 20:57:43.257] mgos_rpc_channel_ws:261 0x3ffc6b00 Connecting to wss://mdash.net/api/v2/rpc, SSL? 1
[May  2 20:57:43.609] mg_ssl_if_mbedtls.c:207 0x3ffcf4d4 mbedTLS error: -0x2700
[May  2 20:57:43.643] mgos_rpc_channel_ws:205 0x3ffc6b00 TCP connect failed: -3

Hmm. It’s either time not getting set via NTP, or there is something with the CA certs. Could you set the debug.level=3 and debug.mbedtls_level=3 please, and share the relevant device log snippet.

I’m not using NTP. But i’m wrote a code to sync the clock with google http.
The mg_time() returns a synced clock.

[May  2 21:42:51.050] mgos_rpc_channel_ws:261 0x3ffc6b00 Connecting to wss://mdash.net/api/v2/rpc, SSL? 1
[May  2 21:42:51.050] mg_http.c:2934          wss://mdash.net/api/v2/rpc use_ssl? 1 tcp://mdash.net:443
[May  2 21:42:51.050] mg_net.c:928            0x3ffcf4bc tcp://mdash.net:443 -,-,ca.pem
[May  2 21:42:51.050] mgos_vfs.c:255          ca.pem -> /ca.pem pl 1 -> 1 0x3ffc5c78
[May  2 21:42:51.050] mgos_vfs.c:349          ca.pem 0x0 0x1b6 => 0x3ffc5c78 ca.pem 1 => 257 (refs 1)
[May  2 21:42:51.098] mgos_vfs.c:382          257 => 0x3ffc5c78:1 => 0 (refs 0)
[May  2 21:42:51.098] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow in_buf 0 => 13
[May  2 21:42:51.098] mg_net.c:928            0x3ffd00e4 udp://192.168.1.1:53 -,-,-
[May  2 21:42:51.098] mg_net.c:796            0x3ffd00e4 udp://192.168.1.1:53
[May  2 21:42:51.098] mgos_event.c:135        ev NET3 triggered 2 handlers
[May  2 21:42:51.098] mg_net.c:796            0x3ffbbc6c tcp://216.58.201.164:80
[May  2 21:42:51.098] mg_net.c:811            0x3ffcf388 udp://192.168.1.1:53 -> 0
[May  2 21:42:51.098] mg_net.c:811            0x3ffd00e4 udp://192.168.1.1:53 -> 0
[May  2 21:42:51.098] mg_net.c:811            0x3ffbbc6c tcp://216.58.201.164:80 -> 0
[May  2 21:42:51.143] mg_rpc.c:470            0x3ffc6f10 CHAN OPEN (loopback)
[May  2 21:42:51.143] mgos_event.c:135        ev RPC0 triggered 1 handlers
[May  2 21:42:51.143] mg_net.c:796            0x3ffcf4bc tcp://148.251.54.236:443
[May  2 21:42:51.143] mg_net.c:796            0x3ffbc9fc tcp://54.207.98.124:1883
[May  2 21:42:51.210] mgos_event.c:135        ev MOS3 triggered 1 handlers
[May  2 21:42:51.210] mg_net.c:811            0x3ffcf4bc tcp://148.251.54.236:443 -> 0
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => handshake
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client state: 0
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client state: 1
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:51.210] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:51.255] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => write client hello
[May  2 21:42:51.255] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow out_buf 0 => 145
[May  2 21:42:51.255] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, max version: [3:3]
[May  2 21:42:51.255] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc dumping 'client hello, random bytes' (32 bytes)
[May  2 21:42:51.255] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0000:  90 22 80 65 e4 73 06 45 1b fa 74 0b 82 a9 48 7f  .".e.s.E..t...H.
[May  2 21:42:51.255] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0010:  73 84 f2 d0 ea 95 e0 6e 51 b6 d0 b4 6c c6 d4 fd  s......nQ...l...
[May  2 21:42:51.299] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, session id len.: 0
[May  2 21:42:51.299] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc dumping 'client hello, session id' (0 bytes)
[May  2 21:42:51.299] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c02b TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
[May  2 21:42:51.299] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c02b
[May  2 21:42:51.299] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c023 TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
[May  2 21:42:51.299] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c023
[May  2 21:42:51.344] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c02f TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
[May  2 21:42:51.344] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c02f
[May  2 21:42:51.344] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c027 TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
[May  2 21:42:51.344] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c027
[May  2 21:42:51.344] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: 009e unknown
[May  2 21:42:51.344] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: 0067 unknown
[May  2 21:42:51.389] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c02d TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256
[May  2 21:42:51.389] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c02d
[May  2 21:42:51.389] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c025 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256
[May  2 21:42:51.389] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c025
[May  2 21:42:51.389] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c004 TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA
[May  2 21:42:51.433] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c004
[May  2 21:42:51.433] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c031 TLS-ECDH-RSA-WITH-AES-128-GCM-SHA256
[May  2 21:42:51.433] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c031
[May  2 21:42:51.433] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c029 TLS-ECDH-RSA-WITH-AES-128-CBC-SHA256
[May  2 21:42:51.433] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c029
[May  2 21:42:51.433] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: c00e TLS-ECDH-RSA-WITH-AES-128-CBC-SHA
[May  2 21:42:51.477] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: c00e
[May  2 21:42:51.477] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: 009c TLS-RSA-WITH-AES-128-GCM-SHA256
[May  2 21:42:51.477] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: 009c
[May  2 21:42:51.477] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: 003c TLS-RSA-WITH-AES-128-CBC-SHA256
[May  2 21:42:51.477] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: 003c
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, check ciphersuite: 002f TLS-RSA-WITH-AES-128-CBC-SHA
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, add ciphersuite: 002f
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, got 13 ciphersuites (excluding SCSVs)
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc adding EMPTY_RENEGOTIATION_INFO_SCSV
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, compress len.: 1
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, compress alg.: 0
[May  2 21:42:51.521] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, adding server name extension: mdash.net
[May  2 21:42:51.565] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, adding signature_algorithms extension
[May  2 21:42:51.566] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, adding supported_elliptic_curves extension
[May  2 21:42:51.566] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, adding supported_point_formats extension
[May  2 21:42:51.566] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow out_buf 145 => 148
[May  2 21:42:51.566] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, adding encrypt_then_mac extension
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow out_buf 148 => 152
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, adding extended_master_secret extension
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow out_buf 152 => 156
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client hello, total extension length: 70
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => write handshake message
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => write record
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc output record: msgtype = 22, version = [3:3], msglen = 143
[May  2 21:42:51.611] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc message length: 148, out_left: 148
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ssl->f_send() returned 148 (-0xffffff6c)
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc shrink out_buf 156 => 13
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= write record
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= write handshake message
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= write client hello
[May  2 21:42:51.657] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client state: 2
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => parse server hello
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => read record
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => fetch input
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:51.703] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= handshake
[May  2 21:42:51.704] mg_net.c:811            0x3ffbc9fc tcp://54.207.98.124:1883 -> 0
[May  2 21:42:51.751] mgos_mqtt.c:141         MQTT TCP connect ok (0)
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => handshake
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client state: 2
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => parse server hello
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => read record
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => fetch input
[May  2 21:42:51.751] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= handshake
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => handshake
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client state: 2
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => parse server hello
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => read record
[May  2 21:42:51.800] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => fetch input
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= fetch input
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc input record: msgtype = 22, version = [3:3], msglen = 91
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => fetch input
[May  2 21:42:51.846] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 5, nb_want: 96, in_buf_size: 13
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow in_buf 13 => 104
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 5, nb_want: 96, in_buf_size: 104
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ssl->f_recv(_timeout)() returned 91 (-0xffffffa5)
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= fetch input
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc handshake message: msglen = 91, type = 2, hslen = 91
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= read record
[May  2 21:42:51.892] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc dumping 'server hello, version' (2 bytes)
[May  2 21:42:51.936] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0000:  03 03                                            ..
[May  2 21:42:51.936] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc server hello, current time: 828126508
[May  2 21:42:51.936] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc dumping 'server hello, random bytes' (32 bytes)
[May  2 21:42:51.936] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0000:  31 5c 35 2c 93 aa b4 40 77 66 63 fd 3e 62 97 c6  1\5,...@wfc.>b..
[May  2 21:42:51.936] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0010:  19 4b 8f d5 47 f8 99 05 21 f0 30 19 c5 e2 42 0c  .K..G...!.0...B.
[May  2 21:42:51.936] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc server hello, session id len.: 32
[May  2 21:42:51.981] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc dumping 'server hello, session id' (32 bytes)
[May  2 21:42:51.981] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0000:  4f 99 15 2b e8 27 86 df f3 48 ae f8 29 a7 54 1a  O..+.'...H..).T.
[May  2 21:42:51.981] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc 0010:  43 ad aa 35 9b c9 8f 46 6a 5a 3e d9 c8 c9 71 ef  C..5...FjZ>...q.
[May  2 21:42:51.981] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc no session has been resumed
[May  2 21:42:51.981] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc server hello, chosen ciphersuite: c02f
[May  2 21:42:51.981] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc server hello, compress alg.: 0
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ciphersuite: TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc server hello, total extension length: 15
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc unknown extension found: 0 (ignoring)
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc found renegotiation extension
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc found supported_point_formats extension
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= parse server hello
[May  2 21:42:52.027] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc client state: 3
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => flush output
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= flush output
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => parse certificate
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => read record
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => fetch input
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 104
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc shrink in_buf 104 => 13
[May  2 21:42:52.073] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 0, nb_want: 5, in_buf_size: 13
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ssl->f_recv(_timeout)() returned 5 (-0xfffffffb)
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= fetch input
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc input record: msgtype = 22, version = [3:3], msglen = 2546
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc => fetch input
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 5, nb_want: 2551, in_buf_size: 13
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc grow in_buf 13 => 2559
[May  2 21:42:52.120] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc in_left: 5, nb_want: 2551, in_buf_size: 2559
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ssl->f_recv(_timeout)() returned 2546 (-0xfffff60e)
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= fetch input
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc handshake message: msglen = 2546, type = 11, hslen = 2546
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= read record
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc peer certificate #1:
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc cert. version     : 3
[May  2 21:42:52.168] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc serial number     : 03:21:7B:A7:9A:31:60:61:CD:14:7B:E3:10:64:1A:4D:2F:DF
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc issuer name       : C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc subject name      : CN=mdash.net
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc issued  on        : 2019-04-18 12:17:38
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc expires on        : 2019-07-17 12:17:38
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc signed using      : RSA with SHA-256
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc RSA key size      : 2048 bits
[May  2 21:42:52.212] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc basic constraints : CA=false
[May  2 21:42:52.256] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc subject alt name  : mdash.net
[May  2 21:42:52.256] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc key usage         : Digital Signature, Key Encipherment
[May  2 21:42:52.256] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc ext key usage     : TLS Web Server Authentication, TLS Web Client Authentication
[May  2 21:42:52.256] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc value of 'crt->rsa.N' (2048 bits) is:
[May  2 21:42:52.256] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  b6 a4 ec f7 93 a9 db ca 31 79 95 89 b2 1e b0 a0
[May  2 21:42:52.256] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  65 2c 54 36 a5 f6 af 14 6b c2 51 9e 18 3a a7 5d
[May  2 21:42:52.301] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  0d 50 d0 6f f7 e1 6b d6 d0 40 96 13 71 f7 e8 e0
[May  2 21:42:52.301] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  02 5e 78 51 39 dd ee f5 0d 97 79 64 28 b7 64 07
[May  2 21:42:52.301] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  b1 4f 9c f9 3e f5 cd ae 10 36 ec f9 51 44 25 d9
[May  2 21:42:52.301] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  ff 57 9f 0a ab c3 2b 2f 89 b2 b8 bb 33 77 28 b2
[May  2 21:42:52.301] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  1a 13 45 f4 a5 2a 7e b2 fe 13 09 1c e3 69 66 91
[May  2 21:42:52.301] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  42 af e9 a4 31 4c dc 35 b0 a5 43 3d f3 97 59 e9
[May  2 21:42:52.345] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  46 95 2f 50 18 b9 0a 95 18 49 2a 7a d6 b8 71 41
[May  2 21:42:52.345] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  e7 3b a0 9b 52 f0 e2 9a dc 14 15 6a 4f ba 35 f9
[May  2 21:42:52.345] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  7c 9c 3a bc a6 28 f6 5c 7c fd ae 40 ef bf 57 9e
[May  2 21:42:52.345] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  fe 02 44 93 21 a7 3a 1e 6b 6f 02 da f6 92 57 fb
[May  2 21:42:52.345] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  73 91 dc a4 b7 6b f3 34 e6 59 48 5d 5d b7 d9 c5
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  23 81 19 64 28 94 49 ed ec 93 08 12 e7 75 26 41
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  c5 e8 94 a1 63 e0 ea 9b 4a 68 e4 54 11 43 36 2b
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  10 94 d0 37 18 49 1c ec 3c e2 69 cb 91 e2 e1 fb
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc value of 'crt->rsa.E' (17 bits) is:
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  01 00 01
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc peer certificate #2:
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc cert. version     : 3
[May  2 21:42:52.390] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc serial number     : 0A:01:41:42:00:00:01:53:85:73:6A:0B:85:EC:A7:08
[May  2 21:42:52.434] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc issuer name       : O=Digital Signature Trust Co., CN=DST Root CA X3
[May  2 21:42:52.434] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc subject name      : C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3
[May  2 21:42:52.434] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc issued  on        : 2016-03-17 16:40:46
[May  2 21:42:52.434] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc expires on        : 2021-03-17 16:40:46
[May  2 21:42:52.434] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc signed using      : RSA with SHA-256
[May  2 21:42:52.478] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc RSA key size      : 2048 bits
[May  2 21:42:52.478] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc basic constraints : CA=true, max_pathlen=0
[May  2 21:42:52.478] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc key usage         : Digital Signature, Key Cert Sign, CRL Sign
[May  2 21:42:52.478] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc value of 'crt->rsa.N' (2048 bits) is:
[May  2 21:42:52.478] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  9c d3 0c f0 5a e5 2e 47 b7 72 5d 37 83 b3 68 63
[May  2 21:42:52.478] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  30 ea d7 35 26 19 25 e1 bd be 35 f1 70 92 2f b7
[May  2 21:42:52.523] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  b8 4b 41 05 ab a9 9e 35 08 58 ec b1 2a c4 68 87
[May  2 21:42:52.523] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  0b a3 e3 75 e4 e6 f3 a7 62 71 ba 79 81 60 1f d7
[May  2 21:42:52.523] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  91 9a 9f f3 d0 78 67 71 c8 69 0e 95 91 cf fe e6
[May  2 21:42:52.523] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  99 e9 60 3c 48 cc 7e ca 4d 77 12 24 9d 47 1b 5a
[May  2 21:42:52.523] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  eb b9 ec 1e 37 00 1c 9c ac 7b a7 05 ea ce 4a eb
[May  2 21:42:52.523] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  bd 41 e5 36 98 b9 cb fd 6d 3c 96 68 df 23 2a 42
[May  2 21:42:52.568] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  90 0c 86 74 67 c8 7f a5 9a b8 52 61 14 13 3f 65
[May  2 21:42:52.568] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  e9 82 87 cb db fa 0e 56 f6 86 89 f3 85 3f 97 86
[May  2 21:42:52.568] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  af b0 dc 1a ef 6b 0d 95 16 7d c4 2b a0 65 b2 99
[May  2 21:42:52.568] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  04 36 75 80 6b ac 4a f3 1b 90 49 78 2f a2 96 4f
[May  2 21:42:52.568] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  2a 20 25 29 04 c6 74 c0 d0 31 cd 8f 31 38 95 16
[May  2 21:42:52.568] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  ba a8 33 b8 43 f1 b1 1f c3 30 7f a2 79 31 13 3d
[May  2 21:42:52.613] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  2d 36 f8 e3 fc f2 33 6a b9 39 31 c5 af c4 8d 0d
[May  2 21:42:52.613] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  1d 64 16 33 aa fa 84 29 b6 d4 0b c0 d8 7d c3 93
[May  2 21:42:52.613] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc value of 'crt->rsa.E' (17 bits) is:
[May  2 21:42:52.613] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc  01 00 01
[May  2 21:42:52.613] mgos_vfs.c:255          ca.pem -> /ca.pem pl 1 -> 1 0x3ffc5c78
[May  2 21:42:52.613] mgos_vfs.c:349          ca.pem 0x0 0x1b6 => 0x3ffc5c78 ca.pem 1 => 257 (refs 1)
[May  2 21:42:52.613] mgos_vfs.c:508          257 => 0x3ffc5c78:1 => 0 (size 4056)
[May  2 21:42:52.642] mgos_vfs.c:382          257 => 0x3ffc5c78:1 => 0 (refs 0)
[May  2 21:42:52.814] mgos_vfs.c:255          ca.pem -> /ca.pem pl 1 -> 1 0x3ffc5c78
[May  2 21:42:52.814] mgos_vfs.c:349          ca.pem 0x0 0x1b6 => 0x3ffc5c78 ca.pem 1 => 257 (refs 1)
[May  2 21:42:52.814] mgos_vfs.c:508          257 => 0x3ffc5c78:1 => 0 (size 4056)
[May  2 21:42:52.814] mgos_vfs.c:382          257 => 0x3ffc5c78:1 => 0 (refs 0)
[May  2 21:42:52.814] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc x509_verify_cert returned -9984
[May  2 21:42:52.814] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc   The certificate is not correctly signed by the trusted CA
[May  2 21:42:52.814] 
[May  2 21:42:52.814] mg_ssl_if_mbedtls.c:35  0x3ffcf4bc <= handshake
[May  2 21:42:52.814] mg_ssl_if_mbedtls.c:207 0x3ffcf4bc mbedTLS error: -0x2700
[May  2 21:42:52.860] mgos_rpc_channel_ws:205 0x3ffc6b00 TCP connect failed: -3

My mos.yml

build_vars:
    ESP_IDF_SDKCONFIG_OPTS: "${build_vars.ESP_IDF_SDKCONFIG_OPTS} CONFIG_TCPIP_TASK_STACK_SIZE=18432 CONFIG_PM_ENABLE=y CONFIG_FREERTOS_USE_TICKLESS_IDLE=y CONFIG_PM_USE_RTC_TIMER_REF=n"
    ESP_IDF_EXTRA_PARTITION: data,data,spiffs,,448K

cflags:
    - "-DBME280_FLOAT_ENABLE"
sources:
    - src
    - src/lib

filesystem:
    - fs

libs:
    # common mgos libs
    - origin: https://github.com/mongoose-os-libs/wifi
    - origin: https://github.com/mongoose-os-libs/ca-bundle
    - origin: https://github.com/mongoose-os-libs/adc

    - origin: https://github.com/marciopamplona/ds3231
    - origin: https://github.com/mongoose-os-libs/mqtt
    - origin: https://github.com/mongoose-os-libs/onewire

    - origin: https://github.com/mongoose-os-libs/rpc-common
    - origin: https://github.com/mongoose-os-libs/rpc-service-config
    - origin: https://github.com/mongoose-os-libs/rpc-service-fs
    - origin: https://github.com/mongoose-os-libs/rpc-service-ota
    - origin: https://github.com/mongoose-os-libs/rpc-service-wifi
    - origin: https://github.com/mongoose-os-libs/rpc-uart
    - origin: https://github.com/mongoose-os-libs/rpc-loopback
    - origin: https://github.com/mongoose-os-libs/dash
    - origin: https://github.com/mongoose-os-libs/fstab
    - origin: https://github.com/marciopamplona/wifi-captive-portal

Does vanilla demo-js app connect to mdash for you?

Yes, it works. I will investigate, some clues ?

If you’re using the unmodified ca.pem, then the suspicion is on the current time. Maybe revert to NTP and see how does that help? Maybe it’s daylight saving, some zone-specific stuff.

It was a modified ca.pem, i delete the file and works. Sorry!

1 Like