Hamid,

Maybe a bug in your program? :) 

Take a look at http://stunnel.mirt.net/pipermail/stunnel-users/2012-January/003479.html

It may help.

Regards,

Jose

From: "Hamid.Shahid@sungard.com" <Hamid.Shahid@sungard.com>
To: josealf@rocketmail.com; stunnel-users@stunnel.org
Sent: Wednesday, January 25, 2012 12:58 PM
Subject: Strange Log

Hi Jose,
 
I am getting the following log, when I am trying connect my program with Stunnel, which is connected to a remote server using SSL. Can you please have a look and help me understand what is happening and what can be the reason?
 
Many thanks!
 
 
2012.01.25 18:50:12 LOG5[8384:2416]: Reading configuration from file stunnel.conf
2012.01.25 18:50:12 LOG7[8384:2416]: Snagged 64 random bytes from C:/.rnd
2012.01.25 18:50:12 LOG7[8384:2416]: Wrote 1024 new random bytes to C:/.rnd
2012.01.25 18:50:12 LOG7[8384:2416]: PRNG seeded successfully
2012.01.25 18:50:12 LOG6[8384:2416]: Initializing SSL context for service SSLHOST
2012.01.25 18:50:12 LOG7[8384:2416]: Certificate: ABC_Cert.pem
2012.01.25 18:50:12 LOG7[8384:2416]: Certificate loaded
2012.01.25 18:50:12 LOG7[8384:2416]: Key file: ABC_Cert_key.pem
2012.01.25 18:50:30 LOG7[8384:2416]: Private key loaded
2012.01.25 18:50:30 LOG7[8384:2416]: SSL options set: 0x00180004
2012.01.25 18:50:30 LOG6[8384:2416]: SSL context initialized
2012.01.25 18:50:30 LOG5[8384:2416]: Configuration successful
2012.01.25 18:50:30 LOG7[8384:2416]: accept socket: FD=652 allocated (non-blocking mode)
2012.01.25 18:50:30 LOG7[8384:2416]: Option SO_REUSEADDR set on accept socket
2012.01.25 18:50:30 LOG7[8384:2416]: Service SSLHOST bound to 127.0.0.1:2525
2012.01.25 18:50:30 LOG7[8384:2416]: Service SSLHOST opened FD=652
2012.01.25 18:50:46 LOG7[8384:2416]: local socket: FD=752 allocated (non-blocking mode)
2012.01.25 18:50:46 LOG7[8384:2416]: Service SSLHOST accepted FD=752 from 127.0.0.1:52075
2012.01.25 18:50:46 LOG7[8384:2416]: Creating a new thread
2012.01.25 18:50:46 LOG7[8384:2416]: New thread created
2012.01.25 18:50:46 LOG7[8384:12664]: Service SSLHOST started
2012.01.25 18:50:46 LOG7[8384:12664]: Option TCP_NODELAY set on local socket
2012.01.25 18:50:46 LOG5[8384:12664]: Service SSLHOST accepted connection from 127.0.0.1:52075
2012.01.25 18:50:46 LOG7[8384:12664]: remote socket: FD=768 allocated (non-blocking mode)
2012.01.25 18:50:46 LOG6[8384:12664]: connect_blocking: connecting <server_ip : port>
2012.01.25 18:50:46 LOG7[8384:12664]: connect_blocking: s_poll_wait <server_ip : port>: waiting 10 seconds
2012.01.25 18:50:46 LOG5[8384:12664]: connect_blocking: connected <server_ip : port>
2012.01.25 18:50:46 LOG5[8384:12664]: Service SSLHOST connected remote server from <server_ip : port>
2012.01.25 18:50:46 LOG7[8384:12664]: Remote FD=768 initialized
2012.01.25 18:50:46 LOG7[8384:12664]: Option TCP_NODELAY set on remote socket
2012.01.25 18:50:46 LOG7[8384:12664]: SNI: host name: <ip>
2012.01.25 18:50:46 LOG7[8384:12664]: Peer certificate was cached (1976 bytes)
2012.01.25 18:50:46 LOG6[8384:12664]: SSL connected: new session negotiated
2012.01.25 18:50:46 LOG6[8384:12664]: Negotiated ciphers: RC4-MD5 SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
2012.01.25 18:50:46 LOG7[8384:12664]: SSL closed on SSL_read
2012.01.25 18:50:46 LOG7[8384:12664]: Sending socket write shutdown
2012.01.25 18:50:46 LOG7[8384:12664]: Socket closed on read
2012.01.25 18:50:46 LOG7[8384:12664]: Sending SSL write shutdown
2012.01.25 18:50:46 LOG6[8384:12664]: SSL_shutdown successfully sent close_notify
2012.01.25 18:50:46 LOG5[8384:12664]: Connection closed: 133 bytes sent to SSL, 8 bytes sent to socket
2012.01.25 18:50:46 LOG7[8384:12664]: Service SSLHOST finished (0 left)
 
 
Kind Regards,
Hamid Shahid