<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><span></span></div><div><meta http-equiv="content-type" content="text/html; charset=utf-8"><div>Hi Claudio,</div><div><br></div><div>What happens if you Try client = no for proxy1 and client = yes for proxy2?<br></div><div><br></div><div id="AppleMailSignature">Regards,</div><div id="AppleMailSignature">José</div><div><br>El 23 feb 2016, a las 12:13, Claudio Beretta <<a href="mailto:claudio.beretta@helloinnovation.com">claudio.beretta@helloinnovation.com</a>> escribió:<br><br></div><blockquote type="cite"><div><div dir="ltr"><div>I'd like Stunnel to act as a reverse proxy that accepts TLS 1.0 and TLS 1.2 for <a href="https://example.com">https://example.com</a> and then forwards the traffic to <a href="https://example.net">https://example.net</a>, another web server that only accepts TLS 1.2<br></div><div>browser --TLS 1.0 or 1.2--> Stunnel --TLS 1.2--> Web App<br></div><div><br></div><div>The browser should have no idea that <a href="http://example.net">example.net</a> even exists (only <a href="http://example.com">example.com</a> certificate will be presented to the browser).</div><div>Is this something Stunnel can do?</div><div><br></div><div><br></div><div>This is what I got so far:</div><div><br></div><div><div>cert = example.com.pem</div><div>;stunnel.pem</div><div><br></div><div>[proxy1]</div><div>client = yes</div><div>accept = <a href="http://10.100.4.179:443">10.100.4.179:443</a></div><div>connect = localhost:54323</div><div>CAfile = sca.server1.crt.pem</div><div>;verify = 2</div><div><br></div><div>[proxy2]</div><div>client = no</div><div>accept = localhost:54323</div><div>connect = <a href="http://example.net:443">example.net:443</a></div><div>;CAfile = SymantecClass3EVSSLCA-G3.pem</div></div><div><br></div><div>example.com.pem contains the public and decrypted private key for <a href="http://example.com">example.com</a><br></div><div>sca.server1.crt.pem contains the intermediate and root certificates of the CA that issues the example.com.pem certificate<br></div><div><br></div><div>It partially works: the browser shows <a href="http://example.com">example.com</a> in the address bad and the content of <a href="http://example.net">example.net</a>, but the certificate that is returned is from <a href="http://example.net">example.net</a></div><div><br></div><div>What am I doing wrong?</div><div>Or do you have other recommendations to get something like this working on Windows Server 2008 R2? (IIS + Application Request Routing + URL Rewrite won't work: TLS1.2 is not properly supported)<br></div><div><br></div><div>Thank you</div><div>Claudio</div></div>
</div></blockquote><blockquote type="cite"><div><span>_______________________________________________</span><br><span>stunnel-users mailing list</span><br><span><a href="mailto:stunnel-users@stunnel.org">stunnel-users@stunnel.org</a></span><br><span><a href="https://www.stunnel.org/cgi-bin/mailman/listinfo/stunnel-users">https://www.stunnel.org/cgi-bin/mailman/listinfo/stunnel-users</a></span><br></div></blockquote></div></body></html>