Hi, folks.
I've been using stunnel on our mail server (sendmail, spamassassin, clamav, mailscanner, mailwatch). I note the following being written to syslog, and wonder if stunnel is causing it:
Mar 29 14:07:31 mail1 su(pam_unix)[29493]: session closed for user nobody
Mar 29 14:08:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s accepted connection from 192.168.100.58:1723
Mar 29 14:08:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s connected remote server from 127.0.0.1:33540
Mar 29 14:08:00 …
[View More]mail1 stunnel: LOG5[15993:3076422576]: Connection closed: 138 bytes sent to SSL, 42 bytes sent to socket
Mar 29 14:08:43 mail1 su(pam_unix)[29640]: session opened for user nobody by (uid=0)
Mar 29 14:08:43 mail1 su(pam_unix)[29640]: session closed for user nobody
Mar 29 14:09:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s accepted connection from 192.168.100.58:1724
Mar 29 14:09:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s connected remote server from 127.0.0.1:33544
Mar 29 14:09:00 mail1 stunnel: LOG5[15993:3076422576]: Connection closed: 138 bytes sent to SSL, 42 bytes sent to socket
Mar 29 14:10:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s accepted connection from 192.168.100.58:1725
Mar 29 14:10:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s connected remote server from 127.0.0.1:33546
Mar 29 14:10:00 mail1 stunnel: LOG5[15993:3076422576]: Connection closed: 138 bytes sent to SSL, 42 bytes sent to socket
Mar 29 14:10:11 mail1 su(pam_unix)[30025]: session opened for user nobody by (uid=0)
Mar 29 14:10:11 mail1 su(pam_unix)[30025]: session closed for user nobody
Mar 29 14:10:33 mail1 su(pam_unix)[30075]: session opened for user nobody by (uid=0)
Mar 29 14:10:33 mail1 su(pam_unix)[30075]: session closed for user nobody
Mar 29 14:11:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s accepted connection from 192.168.100.58:1726
Mar 29 14:11:00 mail1 stunnel: LOG5[15993:3076422576]: pop3s connected remote server from 127.0.0.1:33559
Mar 29 14:11:00 mail1 stunnel: LOG5[15993:3076422576]: Connection closed: 138 bytes sent to SSL, 42 bytes sent to socket
Mar 29 14:11:03 mail1 su(pam_unix)[30206]: session opened for user nobody by (uid=0)
Mar 29 14:11:03 mail1 su(pam_unix)[30206]: session closed for user nobody
Mar 29 14:11:06 mail1 su(pam_unix)[30215]: session opened for user nobody by (uid=0)
Mar 29 14:11:06 mail1 su(pam_unix)[30215]: session closed for user nobody
It's the sessions opened and closed for the user nobody that has me concerned. stunnel appears to be the only process being run by the user nobody. If, in fact, this is caused by stunnel, do I keep these (and only these) session opened/closed instances from being logged?
Thanks.
Dimitri
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
[View Less]
hi,
i'm trying to trouble shoot a problem with a newsreader called pan
that i might be having. here's my setup:
ubuntu 6.10 kernel 2.6.17
pan 0.14.2
stunnel4 4.150
i created a snntp.conf file with only:
client = yes
foreground = yes
debug = 7
[nntps]
accept = localhost:2000
connect = inetnews.worldnet.att.net:563
then i run stunnel4 and this is the output:
ephman@wintermute:~$ sudo stunnel4 /etc/stunnel/snntp.conf
2007.03.29 13:54:47 LOG7[13414:3083015856]: RAND_status claims
sufficient …
[View More]entropy for the PRNG
2007.03.29 13:54:47 LOG6[13414:3083015856]: PRNG seeded successfully
2007.03.29 13:54:47 LOG7[13414:3083015856]: SSL context initialized
for service nntps
2007.03.29 13:54:47 LOG5[13414:3083015856]: stunnel 4.15 on
i486-pc-linux-gnu with OpenSSL 0.9.8b 04 May 2006
2007.03.29 13:54:47 LOG5[13414:3083015856]: Threading:PTHREAD
SSL:ENGINE Sockets:POLL,IPv6 Auth:LIBWRAP
2007.03.29 13:54:47 LOG6[13414:3083015856]: file ulimit = 1024 (can be
changed with 'ulimit -n')
2007.03.29 13:54:47 LOG6[13414:3083015856]: poll() used - no
FD_SETSIZE limit for file descriptors
2007.03.29 13:54:47 LOG5[13414:3083015856]: 500 clients allowed
2007.03.29 13:54:47 LOG7[13414:3083015856]: FD 3 in non-blocking mode
2007.03.29 13:54:47 LOG7[13414:3083015856]: FD 4 in non-blocking mode
2007.03.29 13:54:47 LOG7[13414:3083015856]: FD 5 in non-blocking mode
2007.03.29 13:54:47 LOG7[13414:3083015856]: SO_REUSEADDR option set on
accept socket
2007.03.29 13:54:47 LOG7[13414:3083015856]: nntps bound to 127.0.0.1:2000
2007.03.29 13:54:47 LOG7[13414:3083015856]: Created pid file
/var/run/stunnel4.pid
i then startup pan and it won't connect to the server the log file says:
Thu, 29 Mar 2007 13:58:15 - Pan 0.14.2.91 Started
Thu, 29 Mar 2007 13:58:15 - Directory
"/home/ephman/.pan/messages/cache" contains 0.0 MB in 0 files
Thu, 29 Mar 2007 13:58:15 - Directory
"/home/ephman/.pan/messages/folders/pan.sent" contains 0.0 MB in 0
files
Thu, 29 Mar 2007 13:58:15 - Directory
"/home/ephman/.pan/messages/folders/pan.sendlater" contains 0.0 MB in
0 files
Thu, 29 Mar 2007 13:58:15 - News server connection count: 0
Thu, 29 Mar 2007 13:58:19 - New connection 0x846da08 for
inetnews.worldnet.att.net, port 563
Thu, 29 Mar 2007 13:59:21 - NNTP handshake failed: Error reading from socket.
Thu, 29 Mar 2007 13:59:21 - Handshake failed: Error reading from socket.
Thu, 29 Mar 2007 13:59:26 - New connection 0x84a5850 for
inetnews.worldnet.att.net, port 563
any help or hints would be really helpful. thanks.
be well,
ephman
[View Less]
Hello,
I am using stunnel 4.18 and openca-ocspd 1.5.1. The OCSPd uses a delegate
certificate and the setup works when tested with openssl:
$ openssl ocsp -issuer /home/landau/ssl/cacert.pem -serial 3 -url
http://localhost:2560 -CAfile /home/landau/ssl/cacert.pem
Response verify OK
3: good
This Update: Mar 23 18:27:37 2007 GMT
Next Update: Mar 26 10:56:33 2007 GMT
But when it comes to using stunnel, I cannot figure out how to make it use
properly the OCSP. I could see that …
[View More]stunnel 4.19 had more options for ocsp, but
I am unsure this is related to my current issue.
Besides, is there a way to have stunnel fall back on local cert/crl files if the
ocsp server is not available ?
Regards,
--
Samuel Landau
____________________________________________________________________________
This email and any files transmitted with it are confidential and are
intended solely for the use of the individual or entity to which they are
addressed. Access to this e-mail by anyone else is unauthorised. If you are
not the intended recipient, any disclosure, copying, distribution or any
action taken or omitted to be taken in reliance on it, is prohibited. E-mail
messages are not necessarily secure. Archos does not accept responsibility
for any changes made to this message after it was sent.
2007.03.26 12:59:05 LOG5[29250:3083020512]: stunnel 4.18 on i486-pc-linux-gnu with OpenSSL 0.9.8c 05 Sep 2006
2007.03.26 12:59:05 LOG5[29250:3083020512]: Threading:PTHREAD SSL:ENGINE Sockets:POLL,IPv6 Auth:LIBWRAP
2007.03.26 12:59:05 LOG6[29250:3083020512]: file ulimit = 1024 (can be changed with 'ulimit -n')
2007.03.26 12:59:05 LOG6[29250:3083020512]: poll() used - no FD_SETSIZE limit for file descriptors
2007.03.26 12:59:05 LOG5[29250:3083020512]: 500 clients allowed
2007.03.26 12:59:05 LOG7[29250:3083020512]: FD 4 in non-blocking mode
2007.03.26 12:59:05 LOG7[29250:3083020512]: FD 5 in non-blocking mode
2007.03.26 12:59:05 LOG7[29250:3083020512]: FD 6 in non-blocking mode
2007.03.26 12:59:05 LOG7[29250:3083020512]: SO_REUSEADDR option set on accept socket
2007.03.26 12:59:05 LOG7[29250:3083020512]: server bound to 127.0.0.1:12345
2007.03.26 12:59:05 LOG7[29250:3083020512]: Created pid file /home/landau/stunnel4.pid
2007.03.26 12:59:12 LOG7[29250:3083020512]: server accepted FD=7 from 127.0.0.1:36200
2007.03.26 12:59:12 LOG7[29250:3082972080]: server started
2007.03.26 12:59:12 LOG7[29250:3082972080]: FD 7 in non-blocking mode
2007.03.26 12:59:12 LOG7[29250:3082972080]: TCP_NODELAY option set on local socket
2007.03.26 12:59:12 LOG7[29250:3082972080]: FD 8 in non-blocking mode
2007.03.26 12:59:12 LOG7[29250:3082972080]: FD 9 in non-blocking mode
2007.03.26 12:59:12 LOG7[29250:3083020512]: Cleaning up the signal pipe
2007.03.26 12:59:12 LOG6[29250:3083020512]: Child process 29252 finished with code 0
2007.03.26 12:59:12 LOG7[29250:3082972080]: Connection from 127.0.0.1:36200 permitted by libwrap
2007.03.26 12:59:12 LOG5[29250:3082972080]: server connected from 127.0.0.1:36200
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL state (accept): before/accept initialization
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL state (accept): SSLv3 read client hello A
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL state (accept): SSLv3 write server hello A
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL state (accept): SSLv3 write certificate A
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL state (accept): SSLv3 write certificate request A
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL state (accept): SSLv3 flush data
2007.03.26 12:59:12 LOG6[29250:3082972080]: *** starting OCSP verification ***
2007.03.26 12:59:12 LOG7[29250:3082972080]: FD 8 in non-blocking mode
2007.03.26 12:59:12 LOG7[29250:3082972080]: connect_wait: waiting 10 seconds
2007.03.26 12:59:12 LOG7[29250:3082972080]: connect_wait: connected
2007.03.26 12:59:12 LOG7[29250:3082972080]: OCSP server connected
2007.03.26 12:59:12 LOG7[29250:3082972080]: FD 8 in blocking mode
2007.03.26 12:59:12 LOG7[29250:3082972080]: FD 8 in non-blocking mode
2007.03.26 12:59:12 LOG6[29250:3082972080]: OCSP response received
2007.03.26 12:59:12 LOG3[29250:3082972080]: OCSP_basic_verify: 27069076: error:27069076:OCSP routines:OCSP_basic_verify:signer certificate not found
2007.03.26 12:59:12 LOG7[29250:3082972080]: SSL alert (write): fatal: certificate unknown
2007.03.26 12:59:12 LOG3[29250:3082972080]: SSL_accept: 140890B2: error:140890B2:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:no certificate returned
2007.03.26 12:59:12 LOG5[29250:3082972080]: Connection reset: 0 bytes sent to SSL, 0 bytes sent to socket
2007.03.26 12:59:12 LOG7[29250:3082972080]: server finished (0 left)
2007.03.26 12:59:16 LOG3[29250:3083020512]: Received signal 2; terminating
2007.03.26 12:59:16 LOG7[29250:3083020512]: removing pid file /home/landau/stunnel4.pid
cert = landau.pem
key = landau.key
sslVersion = SSLv3
pid =/home/landau/ssl/stunnel4.pid
socket =l:TCP_NODELAY=1
socket =r:TCP_NODELAY=1
compression =zlib
foreground =yes
verify =3
CApath =/home/landau/ssl/
CAfile =/home/landau/ssl/cacert.pem
debug =7
output =/home/landau/ssl/stunnel4.log
client =no
[server]
accept =localhost:12345
ocsp =http://localhost:2560
pty =no
exec =/bin/bash
execargs =bash
[View Less]
Hi stunnel users and especially newbies,
on http://stunnel.mirt.net/docs.html you can find a link to a
stunnel/OpenSSL/Synergy howto for the Win32 platform.
It is a short but hopefully useful doc how to install, configure and
use stunnel.
Feedback and comments are welcome.
- Patrick
Hi,
I know there is a way to do the following with SSH+PuTTY, with stunnel
too? Do I need further software?
Windows office computer --> (HTTP) --> Corporate firewall/proxy -->
(HTTP) --> Home computer --> WWW
Regards,
Patrick
Hi,
the following patch makes stunnel 4.20 to operate with TCP wrappers
7.6. I had not tried other versions of stunnel nor TCP wrappers.
The problem is the missing libnsl, so TCP wrappers will never be
activated in ./configure
Regards
Dieter
--- configure.ac.orig 2007-03-17 12:57:32.000000000 +0100
+++ configure.ac 2007-03-17 12:55:19.000000000 +0100
@@ -310,7 +310,7 @@
AC_MSG_RESULT([no (autodetecting)])
AC_MSG_CHECKING([for hosts_access in -lwrap])
…
[View More]saved_LIBS="$LIBS"
- LIBS="$saved_LIBS -lwrap"
+ LIBS="$saved_LIBS -lwrap -lnsl"
AC_LINK_IFELSE(
[AC_LANG_PROGRAM(
[[int hosts_access(); int allow_severity, deny_severity;]],
[View Less]
Hey all,
I'm getting this in the /var/adm/messages log on the server side when
attempting to connect from the client:
Mar 8 22:23:33 SERVERNAME stunnel: [ID 821868 daemon.error]
LOG3[27429:4]: SSL_connect: Peer suddenly disconnected
I have the server configured as follows:
cat /etc/stunnel/stunnel.test.conf
client=yes
debug=debug
cert=/etc/stunnel/stunnel.pem
[sunrpc]
accept=112
connect=127.0.0.1:111
TIMEOUTclose=10
This is started just by running stunnel with the config file and then
…
[View More]starting rpcbind normally.
The client is configured as follows:
# cat /etc/stunnel/stunnel.test.conf
client=yes
debug=debug
cert=/etc/stunnel/imnxnsm0.pem
[sunrpc]
accept=111
connect=SERVERNAME:112
The error shows up when I attempt to run "rpcinfo -p 127.0.0.1".
Snoop is showing the following (adjusted to remove hostnames/ips):
CLIENT -> SERVER TCP D=112 S=63986 Syn Seq=867918817 Len=0 Win=24820
Options=<nop,nop,sackOK,mss 1460>
SERVER -> CLIENT TCP D=63986 S=112 Syn Ack=867918818 Seq=209756753 Len=0
Win=24820 Options=<nop,nop,sackOK,mss 1460>
CLIENT -> SERVER TCP D=112 S=63986 Ack=209756754 Seq=867918818 Len=0
Win=24820
CLIENT -> SERVER TCP D=112 S=63986 Ack=209756754 Seq=867918818
Len=88 Win=24820
SERVER -> CLIENT TCP D=63986 S=112 Ack=867918906 Seq=209756754 Len=0
Win=24820
SERVER -> CLIENT TCP D=63986 S=112 Rst Seq=209756754 Len=0 Win=24820
I'm pretty new to stunnel, and am having a heck of a time getting this
to work. This configuration is the closest I've been to success so
far. Is there a better way for me to wrap rpcbind perhaps?
Any help with this will be appreciated.
Thanks,
Civil
[View Less]