The configuration files are :
pid = /var/stunnel.pid
;chroot = /var/lib/stunnel
setuid = nobody
setgid = nobody
foreground =yes
; Use it for client mode
client = yes
; Service-level configuration
[pop3s]
accept = 995
connect = 110
[imaps]
accept = 993
connect = 143
[ssmtp]
accept = 465
connect = 25
[mysqls]
accept = 3307
connect = 192.168.1.6:3307
On 192.168.1.6
----------------------
pid = /var/stunnel.pid
setuid =nobody
setgid = nobody
foreground = yes
client = no
; Service-…
[View More]level configuration
[pop3s]
accept = 995
connect = 110
[imaps]
accept = 993
connect = 143
[ssmtp]
accept = 465
connect = 25
[mysqls]
accept =3307
connect =3306
connecting like
/usr/local/mysql/bin/mysql -h 127.0.0.1 -u root -p -P 3307
Enter password:
On entring password the following lines appear :
ERROR 2013 (HY000): Lost connection to MySQL server at 'reading initial communication packet', system error: 104
Subrata
----- Original Message -----
From: Brian Hatch <bri(a)stunnel.org>
To: subrata(a)indiatimes.com
Sent: Sun, 7 Oct 2007 10:02:17 +0530 (IST)
Subject: Re: [stunnel-users] Stunnel on the same machine
Near 2007-10-05 22:17 +0530, subrata(a)indiatimes.com insisted:
> After starting stunnel and connecting the mysql client/usr/local/mysql/bin/mysql -h 127.0.0.1 -u root -p the flow gets stuck at the Enter password prompt any suggestions how to proceed from there.
What do your stunnel configuration files look like?
Other problem: mysql client may decide to use a local domain socket when
connecting to localhost, thwarting your attempts to go via Stunnel.
You might want to 'strace mysql ...' and look for the connect() lines.
--
Brian Hatch Time flies like an
Systems and arrow. Fruit flies
Security Engineer like a banana.
http://www.ifokr.org/bri/
Every message PGP signed
--
My life has changed. What about yours?
Log on to the new Indiatimes Mail and Live out of the Inbox!
[View Less]
Sometime near 2007-11-11 00:15 -0500, Marcio Marchini shouted:
> Researching online one can see that WebDAV's spec requires that they
> check both src and dest URLs for protocol & port. But with some proxies or
> SSL fronts like stunnel, only one of the URLs is rewritten, so one goes as
> http and the other as https. Here's one person explaining it, much better
> than me: http://svn.haxx.se/users/archive-2006-03/0549.shtml
Stunnel doesn't currently have the ability to …
[View More]scan and re-write the
plaintext. For HTTP redirects it could possibly be implemented
(re-write only the response before ^$, and redirects aren't chunked
and don't have content lengths to work with, etc) but you'd still
need enough HTTP logic to handle keepalives and such. It's not
trivial and not likely.
Another option would be to have something already HTTP aware doing
the rewriting in between stunnel and subversion. A re-writing
proxy.
Another option would be to use mod_rewrite in apache to rewrite
the urls.
But the best way would be to just use SSL inside apache and drop
stunnel entirely.
--
Brian Hatch The best way to accelerate
Systems and a Windows machine is at
Security Engineer 9.8 meters per second
http://www.ifokr.org/bri/ squared.
Every message PGP signed
[View Less]
Hi,
starting with v4.21, stunnel does not disconnect from the terminal anymore. This
can cause problems, if the caller does not redirect stdout/stderr to /dev/null.
This did not happen with v4.20.
The problem disappears, when I use he "--disable-libwrap" configure switch when
compiling stunnel.
I am running debian testing on i386 with the stunnel4 package 4.22-2.
How to reproduce:
1) stunnel config file:
setuid = lars
pid = /tmp/stunnel.pid
[server]
connect = 8080
accept = 443
cert =…
[View More] /some/file
2) command line:
cat stunnel.conf | stunnel4 -fd 0
3) process list:
erker:~/ttt/stunnel/testing/stunnel-4.26# ps -ef| grep stun
lars 29599 1 0 13:47 pts/1 00:00:00 src/stunnel -fd 0
lars 29600 1 0 13:47 pts/1 00:00:00 src/stunnel -fd 0
lars 29601 1 0 13:47 pts/1 00:00:00 src/stunnel -fd 0
lars 29602 1 0 13:47 pts/1 00:00:00 src/stunnel -fd 0
lars 29603 1 0 13:47 pts/1 00:00:00 src/stunnel -fd 0
lars 29604 1 0 13:47 ? 00:00:00 src/stunnel -fd 0
4) FDs of spawned processes:
erker:~/ttt/stunnel/testing/stunnel-4.26# ls -l /proc/29599/fd
lrwx------ 1 root root 64 Jan 10 13:50 1 -> /dev/pts/1
lrwx------ 1 root root 64 Jan 10 13:47 2 -> /dev/pts/1
lrwx------ 1 root root 64 Jan 10 13:50 3 -> socket:[903037]
Is this the expected behaviour?
I use stunnel in one of my projects (http://cryptonas.org) and it started to
hang with v4.22. After redirecting stdout/stderr to /dev/null, the program
works again.
I assume, that stunnel should take care for stdout/stderr on its own, when
started in daemon mode, right?
thanks for your great work!
Lars
[View Less]
Hi, I use the STunnel tool to connect to my Ms-SQL database. And so far
this works nice. However at one organization I have the following
problem:
<< connect_wait: s_poll_wait timeout>> And the connection fails.
Here is the log file and config file. Can you give me any hints how to
check where it goes wrong?
Thanks.
Reinier.
2009.02.23 14:45:12 LOG7[2156:3096]: RAND_status claims sufficient
entropy for the PRNG
2009.02.23 14:45:12 LOG7[2156:3096]: PRNG seeded …
[View More]successfully
2009.02.23 14:45:12 LOG7[2156:3096]: Certificate: stunnel.pem
2009.02.23 14:45:12 LOG7[2156:3096]: Certificate loaded
2009.02.23 14:45:12 LOG7[2156:3096]: Key file: stunnel.pem
2009.02.23 14:45:12 LOG7[2156:3096]: Private key loaded
2009.02.23 14:45:12 LOG7[2156:3096]: SSL context initialized for service
SQLServer
2009.02.23 14:45:12 LOG5[2156:3096]: stunnel 4.26 on x86-pc-mingw32-gnu
with OpenSSL 0.9.8i 15 Sep 2008
2009.02.23 14:45:12 LOG5[2156:3096]: Threading:WIN32 SSL:ENGINE
Sockets:SELECT,IPv6
2009.02.23 14:45:12 LOG5[2156:3852]: No limit detected for the number of
clients
2009.02.23 14:45:12 LOG7[2156:3852]: FD 184 in non-blocking mode
2009.02.23 14:45:12 LOG7[2156:3852]: SO_REUSEADDR option set on accept
socket
2009.02.23 14:45:12 LOG7[2156:3852]: SQLServer bound to 127.0.0.1:31433
2009.02.23 14:49:25 LOG7[2156:3852]: SQLServer accepted FD=208 from
127.0.0.1:2912
2009.02.23 14:49:25 LOG7[2156:3852]: Creating a new thread
2009.02.23 14:49:25 LOG7[2156:3852]: New thread created
2009.02.23 14:49:25 LOG7[2156:996]: SQLServer started
2009.02.23 14:49:25 LOG7[2156:996]: FD 208 in non-blocking mode
2009.02.23 14:49:25 LOG7[2156:996]: TCP_NODELAY option set on local
socket
2009.02.23 14:49:25 LOG5[2156:996]: SQLServer accepted connection from
127.0.0.1:2912
2009.02.23 14:49:25 LOG7[2156:996]: FD 232 in non-blocking mode
2009.02.23 14:49:25 LOG7[2156:996]: SQLServer connecting
10.17.98.33:8080
2009.02.23 14:49:25 LOG7[2156:996]: connect_wait: waiting 60 seconds
2009.02.23 14:50:25 LOG6[2156:996]: connect_wait: s_poll_wait timeout
2009.02.23 14:50:25 LOG5[2156:996]: Connection reset: 0 bytes sent to
SSL, 0 bytes sent to socket
2009.02.23 14:50:25 LOG7[2156:996]: SQLServer finished (0 left)
; Sample stunnel configuration file by Michal Trojnara 2002-2006
; Some options used here may not be adequate for your particular
configuration
; Certificate/key is needed in server mode and optional in client mode
; The default certificate is provided only for testing and should not
; be used in a production environment
cert = stunnel.pem
;key = stunnel.pem
; Some performance tunings
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
; Authentication stuff
;verify = 2
; Don't forget to c_rehash CApath
;CApath = certs
; It's often easier to use CAfile
;CAfile = certs.pem
; Don't forget to c_rehash CRLpath
;CRLpath = crls
; Alternatively you can use CRLfile
;CRLfile = crls.pem
; Some debugging stuff useful for troubleshooting
debug = 7
;output = stunnel.log
; Use it for client mode
client = yes
; Service-level configuration
[SQLServer]
accept = 127.0.0.1:31433
;connect = xx.xx.xxx.xxx:443
connect = 10.17.98.33:8080
protocol = connect
protocolHost = xx.xx.xxx.xxx:443
;session cache timeout
session = 60
;time to wait for expected data
TIMEOUTbusy = 60
;time to wait for close_notify (set to 0 for buggy MSIE)
;TIMEOUTclose = 30
;time to wait to connect a remote host
TIMEOUTconnect = 60
;time to keep an idle connection
;TIMEOUTidle = 60
[View Less]
>Adamson H wrote:
>> Hi, stunnel 4.26 solves a number of issues running on FreeBSD. However,
>> a stunnel client still has a problem reconnecting to a host with dynamic
>> DNS service after the host IP has changed. Stunnel client seems unaware
>> of the host update, pointing the dynamic DNS name to the old outdated
>> IP. In order to get reconnected to the host, I have to create a cron
>> script to detect the IP change and restart stunnel on the …
[View More]stunnel
>> client. My client conf file has the following:
>>
>> [1873]
>> accept = 1873
>> connect = hostname.dynaip.org:1873
>>
>> The ip of hostname.dynaip.org changes at a random interval.
>
>The solution is:
>delay = yes
>
>Best regards,
>Mike
>_______________________________________________
>stunnel-users mailing list
>stunnel-users(a)mirt.net <mailto:stunnel-users@mirt.net>
>http://stunnel.mirt.net/mailman/listinfo/stunnel-users
I added delay = yes to my stunnel client conf file and removed the cron
script. The rsync job (873) failed after the IP of the stunnel host had
changed. I had to manually restart stunnel to get the job done and put
the cron script back again.
delay = yes does not with work with ddns.
Regards,
Adamson H
[View Less]
Hi,
on my current project I have a strange error. Stunnel will work for
months and suddenly stop accepting connections. At other times it will
fail after a couple of hours. It doesn't crash. Connections are still
accepted, but no SSL negotiation does take place. Please find a log below.
It seems to be some problem with libwrap. As you can see in the logs the
last usage of libwrap doesn't release libwrap properly. "Released
libwrap process" log statement is missing. And after that just
…
[View More]everything hangs waiting for libwrap. But why is this happening?
Our host.allow and host.deny files are empty. libwrap is supposed to
allow everything.
Any suggestions are welcome!
Thanks in advance
Ulrich
2009.02.10 09:23:16 LOG7[24594:3083130544]: epp accepted FD=22 from
212.227.111.32:59551
2009.02.10 09:23:16 LOG7[24594:3082640272]: epp started
2009.02.10 09:23:16 LOG7[24594:3082640272]: FD 22 in non-blocking mode
2009.02.10 09:23:16 LOG7[24594:3082640272]: TCP_NODELAY option set on
local socket
2009.02.10 09:23:16 LOG7[24594:3082640272]: Waiting for a libwrap process
2009.02.10 09:23:16 LOG7[24594:3082640272]: Acquired libwrap process #4
2009.02.10 09:23:16 LOG7[24594:3082640272]: Releasing libwrap process #4
2009.02.10 09:23:16 LOG7[24594:3082640272]: Released libwrap process #4
2009.02.10 09:23:16 LOG7[24594:3082640272]: epp permitted by libwrap
from 212.227.111.32:59551
2009.02.10 09:23:16 LOG5[24594:3082640272]: epp accepted connection from
212.227.111.32:59551
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept):
before/accept initialization
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
read client hello A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
write server hello A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
write certificate A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
write server done A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
flush data
2009.02.10 09:23:16 LOG7[24594:3082918800]: Socket closed on read
2009.02.10 09:23:16 LOG7[24594:3082918800]: SSL write shutdown
2009.02.10 09:23:16 LOG7[24594:3082918800]: SSL alert (write): warning:
close notify
2009.02.10 09:23:16 LOG6[24594:3082918800]: SSL socket closed on
SSL_shutdown
2009.02.10 09:23:16 LOG7[24594:3082918800]: Socket write shutdown
2009.02.10 09:23:16 LOG5[24594:3082918800]: Connection closed: 2249
bytes sent to SSL, 1169 bytes sent to socket
2009.02.10 09:23:16 LOG7[24594:3082918800]: epp finished (5 left)
2009.02.10 09:23:16 LOG7[24594:3082709904]: SSL state (accept): SSLv3
read client key exchange A
2009.02.10 09:23:16 LOG7[24594:3082709904]: SSL state (accept): SSLv3
read finished A
2009.02.10 09:23:16 LOG7[24594:3082709904]: SSL state (accept): SSLv3
write change cipher spec A
2009.02.10 09:23:16 LOG7[24594:3082709904]: SSL state (accept): SSLv3
write finished A
2009.02.10 09:23:16 LOG7[24594:3082709904]: SSL state (accept): SSLv3
flush data
2009.02.10 09:23:16 LOG7[24594:3082709904]: 36 items in the session cache
2009.02.10 09:23:16 LOG7[24594:3082709904]: 0 client connects
(SSL_connect())
2009.02.10 09:23:16 LOG7[24594:3082709904]: 0 client connects that
finished
2009.02.10 09:23:16 LOG7[24594:3082709904]: 0 client renegotiations
requested
2009.02.10 09:23:16 LOG7[24594:3082709904]: 292 server connects
(SSL_accept())
2009.02.10 09:23:16 LOG7[24594:3082709904]: 290 server connects that
finished
2009.02.10 09:23:16 LOG7[24594:3082709904]: 0 server renegotiations
requested
2009.02.10 09:23:16 LOG7[24594:3082709904]: 41 session cache hits
2009.02.10 09:23:16 LOG7[24594:3082709904]: 1 session cache misses
2009.02.10 09:23:16 LOG7[24594:3082709904]: 6 session cache timeouts
2009.02.10 09:23:16 LOG6[24594:3082709904]: SSL accepted: new session
negotiated
2009.02.10 09:23:16 LOG6[24594:3082709904]: Negotiated ciphers:
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
2009.02.10 09:23:16 LOG7[24594:3082709904]: FD 16 in non-blocking mode
2009.02.10 09:23:16 LOG7[24594:3082709904]: epp connecting 127.0.0.1:9777
2009.02.10 09:23:16 LOG7[24594:3082709904]: connect_wait: waiting 10 seconds
2009.02.10 09:23:16 LOG7[24594:3082709904]: connect_wait: connected
2009.02.10 09:23:16 LOG5[24594:3082709904]: epp connected remote server
from 127.0.0.1:40831
2009.02.10 09:23:16 LOG7[24594:3082709904]: Remote FD=16 initialized
2009.02.10 09:23:16 LOG7[24594:3082709904]: TCP_NODELAY option set on
remote socket
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
read client key exchange A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
read finished A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
write change cipher spec A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
write finished A
2009.02.10 09:23:16 LOG7[24594:3082640272]: SSL state (accept): SSLv3
flush data
2009.02.10 09:23:16 LOG7[24594:3082640272]: 37 items in the session cache
2009.02.10 09:23:16 LOG7[24594:3082640272]: 0 client connects
(SSL_connect())
2009.02.10 09:23:16 LOG7[24594:3082640272]: 0 client connects that
finished
2009.02.10 09:23:16 LOG7[24594:3082640272]: 0 client renegotiations
requested
2009.02.10 09:23:16 LOG7[24594:3082640272]: 292 server connects
(SSL_accept())
2009.02.10 09:23:16 LOG7[24594:3082640272]: 291 server connects that
finished
2009.02.10 09:23:16 LOG7[24594:3082640272]: 0 server renegotiations
requested
2009.02.10 09:23:16 LOG7[24594:3082640272]: 41 session cache hits
2009.02.10 09:23:16 LOG7[24594:3082640272]: 1 session cache misses
2009.02.10 09:23:16 LOG7[24594:3082640272]: 6 session cache timeouts
2009.02.10 09:23:16 LOG6[24594:3082640272]: SSL accepted: new session
negotiated
2009.02.10 09:23:16 LOG6[24594:3082640272]: Negotiated ciphers:
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
2009.02.10 09:23:16 LOG7[24594:3082640272]: FD 18 in non-blocking mode
2009.02.10 09:23:16 LOG7[24594:3082640272]: epp connecting 127.0.0.1:9777
2009.02.10 09:23:16 LOG7[24594:3082640272]: connect_wait: waiting 10 seconds
2009.02.10 09:23:16 LOG7[24594:3082640272]: connect_wait: connected
2009.02.10 09:23:16 LOG5[24594:3082640272]: epp connected remote server
from 127.0.0.1:40832
2009.02.10 09:23:16 LOG7[24594:3082640272]: Remote FD=18 initialized
2009.02.10 09:23:16 LOG7[24594:3082640272]: TCP_NODELAY option set on
remote socket
2009.02.10 09:23:16 LOG7[24594:3083127696]: Socket closed on read
2009.02.10 09:23:16 LOG7[24594:3083127696]: SSL write shutdown
2009.02.10 09:23:16 LOG7[24594:3083127696]: SSL alert (write): warning:
close notify
2009.02.10 09:23:16 LOG6[24594:3083127696]: SSL socket closed on
SSL_shutdown
2009.02.10 09:23:16 LOG7[24594:3083127696]: Socket write shutdown
2009.02.10 09:23:16 LOG5[24594:3083127696]: Connection closed: 2249
bytes sent to SSL, 1169 bytes sent to socket
2009.02.10 09:23:16 LOG7[24594:3083127696]: epp finished (4 left)
2009.02.10 09:23:30 LOG7[24594:3083130544]: epp accepted FD=15 from
62.116.129.3:3503
2009.02.10 09:23:30 LOG7[24594:3083127696]: epp started
2009.02.10 09:23:30 LOG7[24594:3083127696]: FD 15 in non-blocking mode
2009.02.10 09:23:30 LOG7[24594:3083127696]: TCP_NODELAY option set on
local socket
2009.02.10 09:23:30 LOG7[24594:3083127696]: Waiting for a libwrap process
2009.02.10 09:23:30 LOG7[24594:3083127696]: Acquired libwrap process #4
2009.02.10 09:23:30 LOG7[24594:3083130544]: epp accepted FD=17 from
62.116.129.3:3504
2009.02.10 09:23:30 LOG7[24594:3082918800]: epp started
2009.02.10 09:23:30 LOG7[24594:3082918800]: FD 17 in non-blocking mode
2009.02.10 09:23:30 LOG7[24594:3082918800]: TCP_NODELAY option set on
local socket
2009.02.10 09:23:30 LOG7[24594:3082918800]: Waiting for a libwrap process
2009.02.10 09:23:30 LOG7[24594:3083127696]: Releasing libwrap process #4
2009.02.10 09:23:45 LOG7[24594:3083130544]: epp accepted FD=23 from
62.116.129.3:35076
2009.02.10 09:23:45 LOG7[24594:3082779536]: epp started
2009.02.10 09:23:45 LOG7[24594:3082779536]: FD 23 in non-blocking mode
2009.02.10 09:23:45 LOG7[24594:3082779536]: TCP_NODELAY option set on
local socket
2009.02.10 09:23:45 LOG7[24594:3082779536]: Waiting for a libwrap process
2009.02.10 09:23:48 LOG7[24594:3083130544]: epp accepted FD=24 from
212.209.10.53:4853
2009.02.10 09:23:48 LOG7[24594:3083058064]: epp started
2009.02.10 09:23:48 LOG7[24594:3083058064]: FD 24 in non-blocking mode
2009.02.10 09:23:48 LOG7[24594:3083058064]: TCP_NODELAY option set on
local socket
2009.02.10 09:23:48 LOG7[24594:3083058064]: Waiting for a libwrap process
2009.02.10 09:24:01 LOG7[24594:3083130544]: epp accepted FD=25 from
62.116.129.3:35084
2009.02.10 09:24:01 LOG7[24594:3082570640]: epp started
2009.02.10 09:24:01 LOG7[24594:3082570640]: FD 25 in non-blocking mode
2009.02.10 09:24:01 LOG7[24594:3082570640]: TCP_NODELAY option set on
local socket
2009.02.10 09:24:01 LOG7[24594:3082570640]: Waiting for a libwrap process
2009.02.10 09:24:50 LOG7[24594:3083130544]: epp accepted FD=26 from
91.203.4.58:3814
2009.02.10 09:24:50 LOG7[24594:3082501008]: epp started
2009.02.10 09:24:50 LOG7[24594:3082501008]: FD 26 in non-blocking mode
2009.02.10 09:24:50 LOG7[24594:3082501008]: TCP_NODELAY option set on
local socket
2009.02.10 09:24:50 LOG7[24594:3082501008]: Waiting for a libwrap process
2009.02.10 09:25:29 LOG7[24594:3083130544]: epp accepted FD=27 from
87.96.215.128:34595
2009.02.10 09:25:29 LOG7[24594:3082431376]: epp started
2009.02.10 09:25:29 LOG7[24594:3082431376]: FD 27 in non-blocking mode
2009.02.10 09:25:29 LOG7[24594:3082431376]: TCP_NODELAY option set on
local socket
2009.02.10 09:25:29 LOG7[24594:3082431376]: Waiting for a libwrap process
2009.02.10 09:25:40 LOG7[24594:3083130544]: epp accepted FD=28 from
195.249.40.26:36799
2009.02.10 09:25:40 LOG7[24594:3082361744]: epp started
2009.02.10 09:25:40 LOG7[24594:3082361744]: FD 28 in non-blocking mode
[View Less]
Hi, stunnel 4.26 solves a number of issues running on FreeBSD. However,
a stunnel client still has a problem reconnecting to a host with dynamic
DNS service after the host IP has changed. Stunnel client seems unaware
of the host update, pointing the dynamic DNS name to the old outdated
IP. In order to get reconnected to the host, I have to create a cron
script to detect the IP change and restart stunnel on the stunnel
client. My client conf file has the following:
[1873]
accept = …
[View More]1873
connect = hostname.dynaip.org:1873
The ip of hostname.dynaip.org changes at a random interval.
Please help.
Adamosn H
[View Less]
kommersz wrote:
> My understanding was that there was a patch merged into Stunnel codeline
> with version 4.05 a long time ago which allows the parameters
> "httpsproxy_dest" and some others to be used when specifying a [https]
> connection in stunnel.conf.
Your understanding is not correct, but similar functionality was
re-implemented from scratch.
You may consider Reading The Fine Manual at:
http://stunnel.mirt.net/static/stunnel.html
The relevant part is:
protocol = proto
…
[View More] application protocol to negotiate SSL
currently supported: cifs, connect, imap, nntp, pop3, smtp
protocolAuthentication = auth_type
authentication type for protocol negotiations
currently supported: basic, NTLM
Currently authentication type only applies to 'connect' protocol.
default: basic
protocolHost = host:port
destination address for protocol negotiations
protocolPassword = password
password for protocol negotiations
protocolUsername = username
username for protocol negotiations
Best regards,
Mike
[View Less]