Arsen, you are right, that article is old. It presumes you're using stunnel3. The current version of stunnel is stunnel4; which uses a configuration file instead of those command line arguments. For example, below is what you would see in a generic stunnel server config file:
/etc/stunnel/stunnel.conf
cert = /etc/stunnel/apache.pem
key = /etc/stunnel/apache.pem
debug = 7
output = /etc/stunnel/debug.log
;sslVersion = all
setuid = nobody
setgid = nobody
pid = /var/run/stunnel/stunnel4.pid
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
[pop3s]
accept = 995
connect = 110
[imaps]
accept = 993
connect = 143
[ssmtp]
accept = 465
connect = 25
[stunnel-https]
accept = 443
connect = localhost:80
-------------------------------------------------------
. Only very limited command line arguments are permitted in stunnel4. In your case, if you want to get results quicker, it may be a lot easier to just look for an old version of stunnel3 to download.
----- Forwarded Message -----
I’m trying to set up wireshark debugging of ssl traffic by
following this article:
It lists following stunnel commands to do the job:
Listen on local IP and de-SSL
traffic to localhost:8080
sudo stunnel -p ps.pem -d 443 -r 8080
Listen on 8080, re-SSL to remote server on 443
sudo stunnel -c -d 8080 -r ps.palmws.com:443
The article seems outdated, and stunnel does not react on
these commands anymore.
Can anyone provide me with a proper configuration file to do
the same?