Hello,

I am trying to configure Stunnel to use the insecure cipher PSK-NULL-SHA@SECLEVEL=0 but am encountering issues where a different cipher appears to be negotiated instead. My goal is to authenticate endpoints without encryption.

Here are the details of my setup:

Stunnel Version: 5.63
Operating System: Ubuntu
Stunnel Configuration:

; Stunnel Configuration
; Global Options
fips = no
output = /var/log/stunnel.log

; Specify the pre-shared key file
PSKsecrets = /etc/stunnel/psk.txt
sslVersion = TLSv1.2

; PSK Server Configuration
[PSK server]
accept = 192.168.20.11:5074
connect = 192.168.30.11:5074
ciphers = PSK-NULL-SHA  ;
In OpenSSL, I can achieve my goal using the following command, which works as expected:


openssl s_client -port 5074 -cipher "PSK-NULL-SHA@SECLEVEL=0" -psk 4f8583bca4d311ee9fd6034d1fcbd7c3 -tls1

However, with Stunnel, it appears a different cipher is negotiated, and I do not see any error messages in the logs.

I tcpdumped the connection and observed the traffic is being encrypt which was not the case when using openssl.  In my usecase I need to authenticate endpoints without encryption, hence the use of PSK-NULL-SHA@SECLEVEL=0.

Could you please advise on how to properly configure Stunnel to use the PSK-NULL-SHA@SECLEVEL=0 cipher, or if this is supported?

Thank you for your assistance.
Flavio Castro