I made some changes to my stunnel config, and had one account working. I
added the remaining 3 and it seemed to start to work, but now it has
stopped. Outbound (send) seems to be fine. Any ideas?????
Telnet and post listening test results:
[CODE]$ netstat -an | grep -iw LISTEN
tcp 0 0 127.0.0.1:631 0.0.0.0:*
LISTEN
tcp 0 0 127.0.0.1:3000 0.0.0.0:*
LISTEN
tcp 0 0 127.0.0.1:3001 0.0.0.0:*
LISTEN
tcp 0 0 127.0.0.1:3002 0.0.0.0:*
LISTEN
tcp 0 0 127.0.0.1:3003 0.0.0.0:*
LISTEN
tcp6 0 0 :::80 :::*
LISTEN
tcp6 0 0 ::1:631 :::*
LISTEN
tcp6 0 0 :::445 :::*
LISTEN
tcp6 0 0 :::139 :::*
LISTEN
baronipc@baronipc:~$ telnet localhost 3000
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Connection closed by foreign host.
baronipc@baronipc:~$ telnet localhost 3001
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Connection closed by foreign host.
baronipc@baronipc:~$ telnet localhost 3002
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Connection closed by foreign host.
baronipc@baronipc:~$ telnet localhost 3003
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Connection closed by foreign host.
baronipc@baronipc:~$
[/CODE]
Copy of config file:
[CODE] ; Sample stunnel configuration file by Michal Trojnara 2002-2006
; Some options used here may not be adequate for your particular
configuration
; Please make sure you understand them (especially the effect of chroot
jail)
; Certificate/key is needed in server mode and optional in client mode
cert = /etc/stunnel/mail.pem
;key = /etc/stunnel/mail.pem
; Protocol version (all, SSLv2, SSLv3, TLSv1)
sslVersion = SSLv3
; Some security enhancements for UNIX systems - comment them out on
Win32
chroot = /var/lib/stunnel4/
setuid = stunnel4
setgid = stunnel4
; PID is created inside chroot jail
pid = /stunnel4.pid
; Some performance tunings
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
;compression = rle
; Workaround for Eudora bug
;options = DONT_INSERT_EMPTY_FRAGMENTS
; Authentication stuff
;verify = 2
; Don't forget to c_rehash CApath
; CApath is located inside chroot jail
;CApath = /certs
; It's often easier to use CAfile
;CAfile = /etc/stunnel/certs.pem
; Don't forget to c_rehash CRLpath
; CRLpath is located inside chroot jail
;CRLpath = /crls
; Alternatively you can use CRLfile
;CRLfile = /etc/stunnel/crls.pem
; Some debugging stuff useful for troubleshooting
debug = 7
output = /var/log/stunnel4/stunnel.log
; Use it for client mode
client = yes
; Service-level configuration
;[pop3s]
;accept = 995
;connect = 110
[imaps Work]
accept = 127.0.0.1:3000
connect = imap.gmail.com:993
[imaps Personal]
accept = 127.0.0.1:3001
connect = imap.gmail.com:993
[imaps Admin]
accept = 127.0.0.1:3002
connect = imap.gmail.com:993
[imaps Co]
accept = 127.0.0.1:3003
connect = imap.gmail.com:993
;[ssmtp Work]
;accept = 127.0.0.1:4000
;connect = smtp.gmail.com:465
;[ssmt Personal]
;accept = 127.0.0.1:4001
;connect = smtp.gmail.com:465
;[ssmtp Admin]
;accept = 127.0.0.1:4002
;connect = smtp.gmail.com:587
;[ssmtp Co]
;accept = 127.0.0.1:4003
;connect = smtp.gmail.com:587
;[ssmtp other]
;accept = 127.0.0.1:4004
;connect = 25
;[https]
;accept = 443
;connect = 80
;TIMEOUTclose = 0
; vim:ft=dosini[/CODE]
And /etc/default/stunnel4
[CODE]# /etc/default/stunnel
# Julien LEMOINE <speedblue(a)debian.org>
# September 2003
# Change to one to enable stunnel automatic startup
ENABLED=1
FILES="/etc/stunnel/*.conf"
OPTIONS=""
# Change to one to enable ppp restart scripts
PPP_RESTART=0[/CODE]
--
Regards
Jonathan