Documentation for controlling and preserving Bose SoundTouch devices
SoundTouch speakers communicate with cloud services over HTTPS. For the local service to work over HTTPS, speakers must trust the AfterTouch Root CA. The service manages this automatically — it generates a CA on first start and the web UI guides you through installing it on each speaker as part of the migration flow.
The service includes a built-in HTTPS listener (default port 8443) that presents a certificate covering all Bose cloud hostnames. The certificate is signed by the AfterTouch Root CA, which is generated automatically on first start and stored in data/certs/.
Domain coverage — the certificate covers:
*.api.bose.io, *.api.bosecm.comstreaming.bose.com, bmx.bose.com, stats.bose.com, updates.bose.com, worldwide.bose.com, bose-prod.apigee.net, media.bose.io, downloads.bose.com, voice.api.bose.io, and moreNote: The hostname you configure as
HTTPS_SERVER_URL(e.g.https://soundtouch.fritz.box:8443) is also added as a Subject Alternative Name, ensuring valid TLS for direct browser or API access.
The migration flow in the web UI includes a CA trust step that:
/etc/pki/tls/certs/ca-bundle.crt)This is handled automatically — you don’t need to manage CA files manually unless you’re doing an advanced or manual setup.
You can download the Root CA for manual installation on other devices (phones, PCs, additional speakers):
http://<server>:8000/setup/ca.crt
Speakers expect HTTPS on the default port 443. Since binding to port 443 requires elevated privileges, you have three options:
iptables or your firewall/router.sudo setcap 'cap_net_bind_service=+ep' ./soundtouch-serviceIf you prefer to use Nginx or another proxy for TLS termination:
server {
listen 443 ssl;
server_name streaming.bose.com bmx.bose.com stats.bose.com updates.bose.com;
ssl_certificate /path/to/data/certs/server.crt;
ssl_certificate_key /path/to/data/certs/server.key;
ssl_protocols TLSv1.2;
ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-CHACHA20-POLY1305:AES128-GCM-SHA256:AES256-GCM-SHA384';
location / {
proxy_pass http://localhost:8000;
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
}
}
Tell the service to honour
X-Real-IP/X-Forwarded-For. When deploying behind a reverse proxy on the same host as above, set"trust_forwarded_headers": trueindata/settings.json. With that flag on, the service rewritesr.RemoteAddrfrom the proxy-supplied headers, so handlers that act on the source IP (e.g. the Spotify priming triggered by/marge/streaming/support/power_on) see the speaker’s real address instead of the proxy’s loopback peer.By default only
127.0.0.0/8and::1/128are trusted to set those headers. If your reverse proxy lives on a different host, list its CIDR(s) in"trusted_proxy_cidrs"(e.g.["10.0.0.0/8"]). Do not enabletrust_forwarded_headerson a flat LAN deployment without a proxy: a malicious speaker on the LAN can send the headers itself and spoof its source IP.
If you need to inject the CA manually (e.g. without the web UI migration flow):
# Copy the CA to the speaker
scp data/certs/ca.crt root@<SPEAKER-IP>:/tmp/
# Make the filesystem writable and append the CA to the trust store
ssh root@<SPEAKER-IP> "(rw || mount -o remount,rw /) && cat /tmp/ca.crt >> /etc/pki/tls/certs/ca-bundle.crt"
SoundTouch speakers run OpenSSL 1.0.2, supporting up to TLS 1.2. The service is configured accordingly:
ECDHE-RSA-AES128-GCM-SHA256, ECDHE-RSA-AES256-GCM-SHA384, ECDHE-RSA-CHACHA20-POLY1305RSA-AES128-GCM-SHA256, RSA-AES256-GCM-SHA384