Hi,
I'm trying to use stunnel 4.25 on Vista over the Microsoft Loopback Adapter, but I always get the following error shown next to ">>>" below. Note that the session seems to have been negotiated okay. I found some notes about using "Run as administrator", but I still get the same behavior with this. The same setup works fine on XP. Any ideas before I start looking at code?
Thanks, Jim
2008.09.10 15:27:42 LOG7[2844:692]: RAND_status claims sufficient entropy for the PRNG 2008.09.10 15:27:42 LOG7[2844:692]: PRNG seeded successfully 2008.09.10 15:27:42 LOG7[2844:692]: Certificate: stunnel.pem 2008.09.10 15:27:42 LOG7[2844:692]: Certificate loaded 2008.09.10 15:27:42 LOG7[2844:692]: Key file: stunnel.pem 2008.09.10 15:27:42 LOG7[2844:692]: Private key loaded 2008.09.10 15:27:42 LOG7[2844:692]: SSL context initialized for service smb 2008.09.10 15:27:42 LOG5[2844:692]: stunnel 4.25 on x86-pc-mingw32-gnu with OpenSSL 0.9.8h 28 May 2008 2008.09.10 15:27:42 LOG5[2844:692]: Threading:WIN32 SSL:ENGINE Sockets:SELECT,IPv6 2008.09.10 15:27:42 LOG5[2844:2656]: No limit detected for the number of clients 2008.09.10 15:27:42 LOG7[2844:2656]: FD 248 in non-blocking mode 2008.09.10 15:27:42 LOG7[2844:2656]: SO_REUSEADDR option set on accept socket 2008.09.10 15:27:42 LOG7[2844:2656]: smb bound to 192.168.0.253:139 2008.09.10 15:28:13 LOG7[2844:2656]: smb accepted FD=240 from 192.168.0.253:49238 2008.09.10 15:28:13 LOG7[2844:2656]: Creating a new thread 2008.09.10 15:28:13 LOG7[2844:2656]: New thread created 2008.09.10 15:28:13 LOG7[2844:2856]: smb started 2008.09.10 15:28:13 LOG7[2844:2856]: FD 240 in non-blocking mode 2008.09.10 15:28:13 LOG7[2844:2856]: TCP_NODELAY option set on local socket 2008.09.10 15:28:13 LOG5[2844:2856]: smb accepted connection from 192.168.0.253:49238 2008.09.10 15:28:13 LOG7[2844:2856]: FD 264 in non-blocking mode 2008.09.10 15:28:13 LOG7[2844:2856]: smb connecting 128.221.79.49:10005 2008.09.10 15:28:13 LOG7[2844:2856]: connect_wait: waiting 10 seconds 2008.09.10 15:28:13 LOG7[2844:2856]: connect_wait: connected 2008.09.10 15:28:13 LOG5[2844:2856]: smb connected remote server from 128.221.79.44:49239 2008.09.10 15:28:13 LOG7[2844:2856]: Remote FD=264 initialized 2008.09.10 15:28:13 LOG7[2844:2856]: TCP_NODELAY option set on remote socket 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): before/connect initialization 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 write client hello A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 read server hello A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 read server certificate A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 read server done A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 write client key exchange A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 write change cipher spec A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 write finished A 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 flush data 2008.09.10 15:28:13 LOG7[2844:2856]: SSL state (connect): SSLv3 read finished A 2008.09.10 15:28:13 LOG7[2844:2856]: 1 items in the session cache 2008.09.10 15:28:13 LOG7[2844:2856]: 1 client connects (SSL_connect()) 2008.09.10 15:28:13 LOG7[2844:2856]: 1 client connects that finished 2008.09.10 15:28:13 LOG7[2844:2856]: 0 client renegotiations requested 2008.09.10 15:28:13 LOG7[2844:2856]: 0 server connects (SSL_accept()) 2008.09.10 15:28:13 LOG7[2844:2856]: 0 server connects that finished 2008.09.10 15:28:13 LOG7[2844:2856]: 0 server renegotiations requested 2008.09.10 15:28:13 LOG7[2844:2856]: 0 session cache hits 2008.09.10 15:28:13 LOG7[2844:2856]: 0 session cache misses 2008.09.10 15:28:13 LOG7[2844:2856]: 0 session cache timeouts 2008.09.10 15:28:13 LOG6[2844:2856]: SSL connected: new session negotiated 2008.09.10 15:28:13 LOG6[2844:2856]: SSL connected: new session negotiated 2008.09.10 15:28:13 LOG6[2844:2856]: Negotiated ciphers: AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
2008.09.10 15:28:44 LOG3[2844:2856]: readsocket: Connection reset by
peer (WSAECONNRESET) (10054) 2008.09.10 15:28:44 LOG5[2844:2856]: Connection reset: 153 bytes sent to SSL, 0 bytes sent to socket 2008.09.10 15:28:44 LOG7[2844:2856]: smb finished (0 left)
Relevant info stunnel.conf on client:
[smb] accept = 192.168.0.253:139 connect = [server ipaddress]:10005
Relevant info stunnel.conf on server:
[smb] accept = 10005 connect = 139 ;connect = 445