# Frequently Asked Questions

Document Version Content Revision Reviser Revision Date
V1.0 Official Release Wang Yao 2021-02-05
V1.1 Added closure of user authentication, reconnected to the database Wang Yao 2021-02-22
V1.2 Added method for updating keys Wang Yao 2021-03-23
V1.3 Added explanation of certificate function and how to configure port certificates on Windows 10 Wang Yao 2021-03-23
V1.4 Multi-window display issue Zhang Yu 2021-04-27
V1.5 Cross-domain configuration, popup shielding time setting Wang Yao 2021-08-08

# How to Obtain the Software?

Download link: Shanghai Sansi Universal Central Control (opens new window)

The above link allows you to download various system versions of the Xuandao Intelligent Control software (cyberhub). Please download the software suitable for your target device, extract it and install. It is compatible with 64-bit general operating systems on x86 and arm architectures. If you need special versions for MIPS/LoongArch architecture or adaptations for special operating systems, please contact the R&D team for assistance.

img_021

Program Name Architecture Applicable Operating Systems
cyberhub_x.x.x_windows_x64.zip x64 Windows 10 and above
cyberhub_x.x.x_windows_arm64.zip arm64 Windows 10 and above
cyberhub_x.x.x_mac_x64.zip x64 MacOS (Intel version)
cyberhub_x.x.x_mac_arm64.zip arm64 MacOS (M1, M2 versions)
cyberhub_x.x.x_linux_x64.deb x64 Ubuntu, CentOS, Zhongbiao Kylin, UOS, etc.
cyberhub_x.x.x_linux_arm64.deb arm64 Ubuntu, CentOS, Zhongbiao Kylin, UOS, etc.

# Unable to Log In?

If you logged into the system with HTTPS authentication enabled, and then logged in after disabling HTTPS, you may find that you are unable to log in. Please re-enable HTTPS or follow the steps below: img_001

img_002

Reason for the issue: Since the user's sid was previously set in the Cookie under HTTPS, when switching to HTTP mode, the browser read the data set in HTTPS, refused to reset the new Cookie data, resulting in an inability to complete the authentication process normally. Clearing the Cookie data or re-enabling HTTPS authentication can resolve this issue.

Related link:Browsers ignore Set-Cookie response header if we try to set a cookie which was Secure before (opens new window)

# Unable to Add Web Page to Desktop?

On Android tablets, you may not be able to add a webpage to the desktop in Chrome. This could be due to insufficient permissions; you need to enable the permission to add to the desktop by following these steps:

Settings => Permission Management => Google Chrome => Send to Desktop => Enable Send to Desktop Permission

# How to Disable User Authentication Mode?

Check the configuration file located at Sansi/CCS-Platform/config/ccs-server.json in your user directory.

Change true to false to disable user authentication mode. Then restart the software to disable user permission authentication.

img_004

# How to Connect to a New Database?

Check the configuration file located at Sansi/CCS-Platform/config/ccs-server.json in your user directory.

Delete the content next to the arangodb field, adjust it as shown below, and restart the software to re-specify the database.

img_005

# How to Update User Root Key?

here is an encrypt_key attribute in the configuration file, which is used to generate the encryption key. If you need to adjust the encryption information, simply modify this attribute.

You can set this attribute to any string, or leave it empty. When this attribute is empty, a random string will be automatically generated to fill this attribute.

Note:After updating the user key, you need to re-place the certificate file; otherwise, the certificate may not decrypt properly and could lead to program exceptions.

img_006

# How to Enable Cross-Domain for Pin Control Services

Check the configuration file located at Sansi/CCS-Platform/config/ccs-server.json in your user directory.

Set proxy to true and specify the address of the pin control service in proxy_cy.

img_007

# Modify Popup Shielding Time

Check the configuration file located at Sansi/CCS-Platform/config/ccs-editor.json in your user directory.

When a device fails, users will receive a popup alert. Each time a check is made, a prompt will be issued. If users feel that the prompts are too frequent, they can limit the frequency of popup alerts by setting the popup shielding duration. There are two parameters that can be adjusted:

Parameter Name Parameter Type Parameter Description
SYSTEM_NOTIFY_WAIT_TIME number System-level popup alert frequency, default is 600 seconds, i.e., 10 minutes
WEB_NOTIFY_WAIT_TIME number WEB webpage popup alert frequency, default is 5 seconds

notify_config_001

# Unable to Access Services?

If you are unable to access the services, please follow these steps to check:

img_003

# SSL Certificate Generation and Usage

# Certificate generation script
# Supports one-click generation of certificates bound to IP, generated in the following formats:
# pfx: Transfer server certificate
# crt + key: Central control server certificate
# pem: ArangoDB server certificate
#
# cer or crt: Client certificate

psw=Sansi@1280
if [ ! -d cert ]; then
  mkdir cert
fi
function makeSSL() {
  NAME=$1
  DNS=$2
  IP=$3
  echo $NAME $DNS $IP
  if [ ! -d "cert/$IP" ]; then
    mkdir "cert/$IP"
  fi
  openssl req -x509 -newkey rsa:4096 -sha256 -days 3650 -nodes -keyout "cert/$IP/$NAME.key" \
    -out "cert/$IP/$NAME.crt" -subj "/CN=$NAME-$IP" -addext "subjectAltName=DNS:$DNS,IP:$IP"
    
  cat "cert/$IP/$NAME.crt" "cert/$IP/$NAME.key" >"cert/$IP/$NAME.pem"
  
  openssl x509 -in "cert/$IP/$NAME.crt" -out "cert/$IP/$NAME.cer" -outform der
  openssl pkcs12 -export -inkey "cert/$IP/$NAME.key" -in "cert/$IP/$NAME.crt" -passout pass:"$psw" -out "cert/$IP/$NAME.pfx"
  echo "end ssl"
}

echo -n "Please enter the specified IP address (default is localhost):"
read ip
echo "ip = $ip"
if [ "$ip" = "localhost" ]; then
  makeSSL localhost localhost 127.0.0.1
elif [ "$ip" = "127.0.0.1" ]; then
  makeSSL localhost localhost 127.0.0.1
elif [ "$ip" = "" ]; then
  makeSSL localhost localhost 127.0.0.1
else
  makeSSL SANSI_CCS ccs.sansi.com "$ip"
fi

# Windows 10 Configure Port Certificate

To install a certificate for the Windows service port, the installation file must carry the certificate and private key. Here the process is illustrated using a pfx format certificate.

Note:The CCS_Transfer service configuration SSL needs to be bound via the service port.

If you encounter SSL certificate addition failed, error: 1312 The specified login session does not exist. (opens new window) during installation, please check if the certificate installation location is in Local Computer -> Personal.

# 1. Install Certificate

Double-click the pfx file to enter the installation program, and then follow the installation steps.

win_ssl_00

win_ssl_01

win_ssl_02

win_ssl_03

The default password for the certificate issued by Sansi is Sansi@1280

win_ssl_04

win_ssl_05

win_ssl_06

win_ssl_07

win_ssl_08

# 2. View Certificate Fingerprint

Next, to check the certificate fingerprint and see if the certificate has been installed in the correct location.

First, use the shortcut key Win + R o open the Run window, enter MMC to open the console management program.

win_ssl_09

After opening the console management program, go to the top right corner and select File -> Add/Remove Snap-in

win_ssl_10

win_ssl_11

win_ssl_12

win_ssl_13

win_ssl_14

After adding the certificate snap-in, check if the certificate has been installed in the corresponding directory. Select Certificates -> Personal -> Certificates to view, as shown in the figure below it indicates that the certificate has been installed correctly. Double-click the certificate to view the certificate details.

win_ssl_15

win_ssl_16

Record the fingerprint information for later use.

# 3. Certificate Binding

Run PowerShell with administrator privileges.

win_ssl_17

Then use commands in PowerShell to bind or unbind the port. The process is as follows.

win_ssl_18

Relevant commands:

PS C:\Users\ccc> netsh 													# Enter network configuration
netsh> http show sslcert												# View port binding status
netsh> http add sslcert ipport=0.0.0.0:9009 certhash=537cf713b335168bec44f03f815d04f2f3855715 appid={00112233-4455-6677-8899-AABBCCDDEEFF} 										# Bind port, remember to replace certhash with the certificate fingerprint
netsh> http delete sslcert ipport=0.0.0.0:9009 	# Unbind
netsh> quit																			# Exit network configuration

# Multi-window Display Issue

Some models of centralized splicing processors support a maximum of 8 windows for single output signals, and multiple windows may not display.

# Logs Not Showing for All Services?

no_log.png

Reason for the issue: The HTTPS certificate is not secure, leading to WSS being unable to retrieve log information.

# Solution 1: Disable HTTPS, as follows

  1. Click the 【Menu】 button in the upper right corner, and select 【Service Settings】.

no_log_method_1.png

  1. In the pop-up page, turn off 【HTTPS】, save and restart.

no_log_method_2.png

# Solution 2: Import HTTPS Certificate

Install HTTPS Certificate

# Install HTTPS Certificate

# ⚠Note: Starting from version 0.9.4, HTTPS is supported by default. After enabling HTTPS, the access address will be https://127.0.0.1:1280.

The certificate is generated dynamically, meaning that each host will generate a certificate based on its own IP list. Therefore, to avoid errors when accessing different hosts, different certificates must be installed.

Since a self-signed certificate is used, the first access from the browser will result in an error with a warning message. At this point, click the “Advanced” button as indicated by the red arrow.

image-20240125104909157

Click the link to continue to the page.

image-20240125105058461

After continuing, you can see the page, but it will still have errors.

image-20240125104720311

At this point, you need to obtain the certificate through the menu function. Click on the menu in the upper right corner to enter the service configuration.

image-20240125123142168

Use the function to obtain the SSL certificate to get the currently used certificate.

⚠Note:Resetting the certificate will generate a brand new certificate, which will cause previously installed certificates to become invalid. In most cases, please do not reset the certificate.

If the server's IP address changes, you can use the reset function to regenerate the certificate.

image-20240125123339424

image-20240125123558884

After clicking download, you will find a cer file in the browser's download directory.

# Installing Certificate on Windows

Find the Shanghai Sansi CCS Daemon.cer file in the download directory.

image-20240125124132888

Double-click it and choose the Cryptographic Service Provider extension to install.

image-20240125124442318

Click to install the certificate.

image-20240125124724682

By default, install for the current user. If you need it to be shared by multiple users, please select Local Computer.

image-20240125124852021

Install the certificate to the Trusted Root Certification Authorities as follows:

  1. Choose to place all certificates in the following store.
  2. Click Browse.
  3. Choose Trusted Root Certification Authorities.
  4. Click OK.
  5. Click Next.

image-20240125134738506

After checking that the storage location is the Trusted Root Certification Authorities, click Finish.

image-20240125134830747

If a warning message pops up, click the "Yes" button.

image-20240125135012731

It will prompt that the import was successful.

image-20240125125216545

Click OK to close the certificate pop-up.

image-20240125125316928

After completing the installation, close the browser. Then reopen it and enter the address again; the warning issue will no longer appear.

image-20240125135510051

# Installing Certificate on Linux

Testing for related functionality on Linux has not yet been conducted; it will be added later when needed.

# Installing Certificate on Mac

Find the downloaded certificate in Finder and double-click to install it.

image-20240125140258163

Open the Keychain App.

  1. Find Login.
  2. Find Certificates.
  3. Locate the "Shanghai Sansi CCS Daemon" certificate file.

image-20240125140804441

Double-click the certificate file to open it, then click to expand Trust.

image-20240125141101231

Select "Always Trust" and then close the window.

image-20240125141330617

Authenticate using fingerprint or password.

image-20240125141445728

If you see a plus sign above the certificate, it indicates that the setting was successful.

image-20240125141537839

After closing the browser and re-entering, the warning message will no longer appear.

image-20240125141705186