Sorry, posted with incorrect subject.
On 20 May 2019, at 3:29 pm, James Brown <jlbrown@bordo.com.au mailto:jlbrown@bordo.com.au> wrote:
Having problems installing version 5.54 on macOS X with this configure command:
./configure --with-ssl=/usr/local/Cellar/openssl@1.1/1.1.1b
Configure runs OK, as does make.
But ‘make check’ ends with:
$ make check Making check in src make[1]: Nothing to be done for `check'. Making check in doc make[1]: Nothing to be done for `check'. Making check in tools make[1]: Nothing to be done for `check'. Making check in tests Making check in certs /Library/Developer/CommandLineTools/usr/bin/make check-local ./maketestcert.sh keys & certificates successfully generated ./maketestcert.sh finished /Library/Developer/CommandLineTools/usr/bin/make check-local ./make_test Mon 20 May 2019 15:21:58 AEST stunnel 5.54 on x86_64-apple-darwin18.5.0 platform Compiled/running with OpenSSL 1.1.1b 26 Feb 2019 Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI
test 010_require_cert ok test 011_verify_peer ok test 012_verify_chain ok test 013_CRL_file ok test 014_PSK_secrets ok test 015_p12_cert ok test 020_IPv6 skipped test 021_FIPS skipped test 022_bind ok test 030_simple_execute ok test 031_redirect ok test 032_no_redirect ok test 033_redirect_exec ok test 034_no_redirect_exec ok test 035_SNI ok test 036_no_SNI ok test 037_failover_prio1 ok test 038_failover_prio2 ok test 039_failover_rr ok test 040_reload ok test 041_exec_connect ok test 042_inetd failed error logs logs/042_inetd.log test 043_session_delay ok test 044_session_nodelay ok test 045_include ok test 046_resume_PSK ok test 047_resume_redirect ok test 048_resume_noredirect ok test 050_ticket_secrets ok test 110_failure_require_cert ok test 111_failure_verify_peer ok test 112_failure_verify_chain ok test 113_failure_CRL_file ok test 114_failure_PSK_secrets ok test 115_failure_wrong_config ok summary: success 32, skip 2, fail 1 ./make_test finished make[3]: *** [check-local] Error 1 make[2]: *** [check-am] Error 2 make[1]: *** [check-recursive] Error 1 make: *** [check-recursive] Error 1
How can I fix this 042_ inetd failure?
Also, why did it skip the IPv6 test?
Thanks,
James.
stunnel-users mailing list stunnel-users@stunnel.org mailto:stunnel-users@stunnel.org https://www.stunnel.org/cgi-bin/mailman/listinfo/stunnel-users
On Mon, May 20, 2019 at 03:32:16PM +1000, James Brown wrote:
Sorry, posted with incorrect subject.
On 20 May 2019, at 3:29 pm, James Brown <jlbrown@bordo.com.au mailto:jlbrown@bordo.com.au> wrote:
Having problems installing version 5.54 on macOS X with this configure command:
./configure --with-ssl=/usr/local/Cellar/openssl@1.1/1.1.1b
Configure runs OK, as does make.
But ‘make check’ ends with:
$ make check
[snip]
Mon 20 May 2019 15:21:58 AEST stunnel 5.54 on x86_64-apple-darwin18.5.0 platform Compiled/running with OpenSSL 1.1.1b 26 Feb 2019 Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI
[snip]
test 042_inetd failed error logs logs/042_inetd.log
So what does this file contain?
G'luck, Peter
On 20 May 2019, at 6:08 pm, Peter Pentchev roam@ringlet.net wrote:
On Mon, May 20, 2019 at 03:32:16PM +1000, James Brown wrote:
Sorry, posted with incorrect subject.
On 20 May 2019, at 3:29 pm, James Brown <jlbrown@bordo.com.au mailto:jlbrown@bordo.com.au> wrote:
Having problems installing version 5.54 on macOS X with this configure command:
./configure --with-ssl=/usr/local/Cellar/openssl@1.1/1.1.1b
Configure runs OK, as does make.
But ‘make check’ ends with:
$ make check
[snip]
Mon 20 May 2019 15:21:58 AEST stunnel 5.54 on x86_64-apple-darwin18.5.0 platform Compiled/running with OpenSSL 1.1.1b 26 Feb 2019 Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI
[snip]
test 042_inetd failed error logs logs/042_inetd.log
So what does this file contain?
Hi Peter.
042_inetd.log ends with:
... 2019.05.20 15:22:07 LOG7[main]: Created pid file /Users/jlbrown/Downloads/stunnel-5.54/tests/logs/stunnel.pid 2019.05.20 15:22:07 LOG7[cron]: Cron thread initialized 2019.05.20 15:22:07 LOG6[cron]: Executing cron jobs 2019.05.20 15:22:07 LOG6[cron]: Cron jobs completed in 0 seconds 2019.05.20 15:22:07 LOG7[cron]: Waiting 86400 seconds 2019.05.20 15:22:07 LOG7[main]: Found 1 ready file descriptor(s) 2019.05.20 15:22:07 LOG7[main]: FD=4 events=0x1 revents=0x0 2019.05.20 15:22:07 LOG7[main]: FD=8 events=0x1 revents=0x1 2019.05.20 15:22:07 LOG7[main]: Service [server] accepted (FD=3) from 127.0.0.1:52886 2019.05.20 15:22:07 LOG7[0]: Service [server] started 2019.05.20 15:22:07 LOG7[0]: Setting local socket options (FD=3) 2019.05.20 15:22:07 LOG7[0]: Option TCP_NODELAY set on local socket 2019.05.20 15:22:07 LOG5[0]: Service [server] accepted connection from 127.0.0.1:52886 2019.05.20 15:22:07 LOG6[0]: Peer certificate not required 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): before SSL initialization 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): before SSL initialization 2019.05.20 15:22:07 LOG7[0]: SNI: no virtual services defined 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS read client hello 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS write server hello 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS write change cipher spec 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): TLSv1.3 write encrypted extensions 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS write certificate 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): TLSv1.3 write server certificate verify 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS write finished 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): TLSv1.3 early data 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): TLSv1.3 early data 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS read finished 2019.05.20 15:22:07 LOG7[0]: 1 server accept(s) requested 2019.05.20 15:22:07 LOG7[0]: 1 server accept(s) succeeded 2019.05.20 15:22:07 LOG7[0]: 0 server renegotiation(s) requested 2019.05.20 15:22:07 LOG7[0]: 0 session reuse(s) 2019.05.20 15:22:07 LOG7[0]: 0 internal session cache item(s) 2019.05.20 15:22:07 LOG7[0]: 0 internal session cache fill-up(s) 2019.05.20 15:22:07 LOG7[0]: 0 internal session cache miss(es) 2019.05.20 15:22:07 LOG7[0]: 0 external session cache hit(s) 2019.05.20 15:22:07 LOG7[0]: 0 expired session(s) retrieved 2019.05.20 15:22:07 LOG7[0]: Generate session ticket callback 2019.05.20 15:22:07 LOG7[0]: Deallocating application specific data for session connect address 2019.05.20 15:22:07 LOG7[0]: New session callback 2019.05.20 15:22:07 LOG6[0]: No peer certificate received 2019.05.20 15:22:07 LOG6[0]: Session id: 27D62810FE6CA95AAA264F75DEB370E813B7BA81BB564D954A805492574FA6A6 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS write session ticket 2019.05.20 15:22:07 LOG7[0]: Generate session ticket callback 2019.05.20 15:22:07 LOG7[0]: Deallocating application specific data for session connect address 2019.05.20 15:22:07 LOG7[0]: New session callback 2019.05.20 15:22:07 LOG6[0]: No peer certificate received 2019.05.20 15:22:07 LOG6[0]: Session id: 2CAD498A86D07F29B27487C8B3AF66C0154ED36061BFC66DC753416530BB0468 2019.05.20 15:22:07 LOG7[0]: TLS state (accept): SSLv3/TLS write session ticket 2019.05.20 15:22:07 LOG6[0]: TLS accepted: new session negotiated 2019.05.20 15:22:07 LOG6[0]: TLSv1.3 ciphersuite: TLS_CHACHA20_POLY1305_SHA256 (256-bit encryption) 2019.05.20 15:22:07 LOG7[0]: Compression: null, expansion: null 2019.05.20 15:22:07 LOG6[0]: Local mode child started (PID=70780) 2019.05.20 15:22:07 LOG7[0]: Setting remote socket options (FD=12) 2019.05.20 15:22:07 LOG7[0]: Option TCP_NODELAY set on remote socket 2019.05.20 15:22:07 LOG7[0]: Remote descriptor (FD=12) initialized 2019.05.20 15:22:07 LOG3[0]: SSL_read: Connection reset by peer (54) 2019.05.20 15:22:07 LOG5[0]: Connection reset: 0 byte(s) sent to TLS, 0 byte(s) sent to socket 2019.05.20 15:22:07 LOG7[0]: Remote descriptor (FD=12) closed 2019.05.20 15:22:07 LOG7[0]: linger (local): Invalid argument (22) 2019.05.20 15:22:07 LOG7[0]: Local descriptor (FD=3) closed 2019.05.20 15:22:07 LOG7[0]: Service [server] finished (0 left) 2019.05.20 15:22:07 LOG7[main]: Found 1 ready file descriptor(s) 2019.05.20 15:22:07 LOG7[main]: FD=4 events=0x1 revents=0x1 2019.05.20 15:22:07 LOG7[main]: FD=8 events=0x1 revents=0x0 2019.05.20 15:22:07 LOG7[main]: Dispatching a signal from the signal pipe 2019.05.20 15:22:07 LOG7[main]: Processing SIGCHLD 2019.05.20 15:22:07 LOG7[main]: Retrieving pid statuses with waitpid() 2019.05.20 15:22:07 LOG6[main]: Child process 70780 terminated on SIGPIPE *** inetd mode *** 2019.05.20 15:22:07 LOG7[ui]: Clients allowed=97656 2019.05.20 15:22:07 LOG5[ui]: stunnel 5.54 on x86_64-apple-darwin18.5.0 platform 2019.05.20 15:22:07 LOG5[ui]: Compiled/running with OpenSSL 1.1.1b 26 Feb 2019 2019.05.20 15:22:07 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI 2019.05.20 15:22:07 LOG7[ui]: errno: (*__error()) 2019.05.20 15:22:07 LOG5[ui]: Reading configuration from descriptor 9 2019.05.20 15:22:07 LOG5[ui]: UTF-8 byte order mark not detected 2019.05.20 15:22:07 LOG5[ui]: FIPS mode disabled 2019.05.20 15:22:07 LOG7[ui]: Compression disabled 2019.05.20 15:22:07 LOG7[ui]: No PRNG seeding was required 2019.05.20 15:22:07 LOG6[ui]: Initializing inetd mode configuration 2019.05.20 15:22:07 LOG7[ui]: Ciphers: HIGH:!aNULL:!SSLv2:!DH:!kDHEPSK 2019.05.20 15:22:07 LOG7[ui]: TLSv1.3 ciphersuites: TLS_CHACHA20_POLY1305_SHA256:TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256 2019.05.20 15:22:07 LOG7[ui]: TLS options: 0x02100004 (+0x00000000, -0x00000000) 2019.05.20 15:22:07 LOG7[ui]: No certificate or private key specified 2019.05.20 15:22:07 LOG4[ui]: Service [inetd client] needs authentication to prevent MITM attacks 2019.05.20 15:22:07 LOG5[ui]: Configuration successful 2019.05.20 15:22:07 LOG7[0]: Service [inetd client] started 2019.05.20 15:22:07 LOG5[0]: Service [inetd client] accepted connection 2019.05.20 15:22:07 LOG6[0]: s_connect: connecting 127.0.0.1:4433 2019.05.20 15:22:07 LOG7[0]: s_connect: s_poll_wait 127.0.0.1:4433: waiting 10 seconds 2019.05.20 15:22:07 LOG5[0]: s_connect: connected 127.0.0.1:4433 2019.05.20 15:22:07 LOG5[0]: Service [inetd client] connected remote server from 127.0.0.1:52886 2019.05.20 15:22:07 LOG7[0]: Setting remote socket options (FD=3) 2019.05.20 15:22:07 LOG7[0]: Option TCP_NODELAY set on remote socket 2019.05.20 15:22:07 LOG7[0]: Remote descriptor (FD=3) initialized 2019.05.20 15:22:07 LOG6[0]: SNI: sending servername: 127.0.0.1 2019.05.20 15:22:07 LOG6[0]: Peer certificate not required 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): before SSL initialization 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS write client hello 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS write client hello 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS read server hello 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): TLSv1.3 read encrypted extensions 2019.05.20 15:22:07 LOG6[0]: Certificate verification disabled 2019.05.20 15:22:07 LOG6[0]: Certificate verification disabled 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS read server certificate 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): TLSv1.3 read server certificate verify 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS read finished 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS write change cipher spec 2019.05.20 15:22:07 LOG7[0]: TLS state (connect): SSLv3/TLS write finished 2019.05.20 15:22:07 LOG7[0]: 1 client connect(s) requested 2019.05.20 15:22:07 LOG7[0]: 1 client connect(s) succeeded 2019.05.20 15:22:07 LOG7[0]: 0 client renegotiation(s) requested 2019.05.20 15:22:07 LOG7[0]: 0 session reuse(s) 2019.05.20 15:22:07 LOG6[0]: TLS connected: new session negotiated 2019.05.20 15:22:07 LOG6[0]: TLSv1.3 ciphersuite: TLS_CHACHA20_POLY1305_SHA256 (256-bit encryption) 2019.05.20 15:22:07 LOG7[0]: Compression: null, expansion: null 2019.05.20 15:22:07 LOG3[0]: transfer() loop executes not transferring any data 2019.05.20 15:22:07 LOG3[0]: please report the problem to Michal.Trojnara@stunnel.org 2019.05.20 15:22:07 LOG3[0]: stunnel 5.54 on x86_64-apple-darwin18.5.0 platform 2019.05.20 15:22:07 LOG3[0]: Compiled/running with OpenSSL 1.1.1b 26 Feb 2019 2019.05.20 15:22:07 LOG3[0]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI 2019.05.20 15:22:07 LOG7[0]: errno: (*__error()) 2019.05.20 15:22:07 LOG3[0]: protocol=TLSv1.3, SSL_pending=0, SSL_has_pending=0 2019.05.20 15:22:07 LOG3[0]: sock_open_rd=Y, sock_open_wr=Y 2019.05.20 15:22:07 LOG3[0]: SSL_RECEIVED_SHUTDOWN=n, SSL_SENT_SHUTDOWN=n 2019.05.20 15:22:07 LOG3[0]: sock_can_rd=n, sock_can_wr=n 2019.05.20 15:22:07 LOG3[0]: ssl_can_rd=n, ssl_can_wr=n 2019.05.20 15:22:07 LOG3[0]: read_wants_read=Y, read_wants_write=n 2019.05.20 15:22:07 LOG3[0]: write_wants_read=n, write_wants_write=n 2019.05.20 15:22:07 LOG3[0]: shutdown_wants_read=n, shutdown_wants_write=n 2019.05.20 15:22:07 LOG3[0]: socket input buffer: 0 byte(s), TLS input buffer: 0 byte(s) 2019.05.20 15:22:07 LOG5[0]: Connection reset: 0 byte(s) sent to TLS, 0 byte(s) sent to socket 2019.05.20 15:22:07 LOG7[0]: Deallocating application specific data for session connect address 2019.05.20 15:22:07 LOG7[0]: Remote descriptor (FD=3) closed 2019.05.20 15:22:07 LOG7[0]: Service [inetd client] finished (0 left) 2019.05.20 15:22:07 LOG7[0]: Deallocating section defaults 2019.05.20 15:22:07 LOG7[main]: Found 1 ready file descriptor(s) 2019.05.20 15:22:07 LOG7[main]: FD=4 events=0x1 revents=0x1 2019.05.20 15:22:07 LOG7[main]: FD=8 events=0x1 revents=0x0 2019.05.20 15:22:07 LOG7[main]: Dispatching a signal from the signal pipe 2019.05.20 15:22:07 LOG7[main]: Processing SIGNAL_TERMINATE 2019.05.20 15:22:07 LOG5[main]: Terminated 2019.05.20 15:22:07 LOG7[main]: Leak detection table utilization: 100/997, 10.03% 2019.05.20 15:22:07 LOG7[main]: Removed pid file /Users/jlbrown/Downloads/stunnel-5.54/tests/logs/stunnel.pid 2019.05.20 15:22:07 LOG7[main]: Terminating the cron thread 2019.05.20 15:22:07 LOG5[main]: Terminating 1 service thread(s) 2019.05.20 15:22:07 LOG5[main]: Service threads terminated 2019.05.20 15:22:07 LOG7[main]: Deallocating section defaults
James.