[stunnel-users] Version 4.26 and using to secure IMAPS & POP3
Algol Tradent
tradent at yahoo.com
Mon Oct 20 06:17:29 CEST 2008
Hello,
I think your problem is on your config file for the server. On your config file you have the following option
# Authentication stuff
verify = 3
You probably don't want this option set. Because you are asking the client and the server to authenticate each other based on certificates... which I don;t think is the case here.
On your log file there is this line which is a good indicator of your problem.
routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
I hope this helps
--- On Sun, 10/19/08, Editor (Kevin) <editor at cellmail.com> wrote:
From: Editor (Kevin) <editor at cellmail.com>
Subject: [stunnel-users] Version 4.26 and using to secure IMAPS & POP3
To: stunnel-users at mirt.net
Date: Sunday, October 19, 2008, 8:21 AM
Hi:
I upgraded to the current 4.26 as I was having an issue with 4.15. The idea is
to secure IMAP traffic as well as inbound SMTP. The email client is the latest
Thunderbird and seems to be very stable. The mail Host is a Sun E-250 with
current patches for Solaris 9.
Note: I am using a public certificate and as it from "godaddy.com",
it is this
unusual two part certificate. This may be where the problem is as I had to
combine the two public certificate files together (maybe the next version of
STUNNEL could do this automatically so the risk of errors is reduced!).
However, using STUNNEL, I am having an issue connecting as I get a strange
error
message and the connection dies.
Error Log:
2008.10.19 13:10:41 LOG7[2104:1]: imaps accepted FD=0 from 80.38.96.194:4129
2008.10.19 13:10:41 LOG7[2104:3]: imaps started
2008.10.19 13:10:41 LOG7[2104:3]: FD 0 in non-blocking mode
2008.10.19 13:10:41 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:41 LOG7[2104:3]: TCP_NODELAY option set on local socket
2008.10.19 13:10:41 LOG7[2104:3]: Waiting for a libwrap process
2008.10.19 13:10:41 LOG7[2104:3]: Acquired libwrap process #0
2008.10.19 13:10:41 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:41 LOG7[2104:3]: Releasing libwrap process #0
2008.10.19 13:10:41 LOG7[2104:3]: Released libwrap process #0
2008.10.19 13:10:41 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:41 LOG7[2104:3]: imaps permitted by libwrap from
80.38.96.194:4129
2008.10.19 13:10:41 LOG5[2104:3]: imaps accepted connection from
80.38.96.194:4129
2008.10.19 13:10:41 LOG7[2104:3]: SSL state (accept): before/accept
initialization
2008.10.19 13:10:41 LOG7[2104:3]: SSL state (accept): SSLv3 read client hello A
2008.10.19 13:10:41 LOG7[2104:3]: SSL state (accept): SSLv3 write server hello
A
2008.10.19 13:10:41 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:41 LOG7[2104:3]: SSL state (accept): SSLv3 write certificate A
2008.10.19 13:10:41 LOG7[2104:3]: SSL state (accept): SSLv3 write certificate
request A
2008.10.19 13:10:41 LOG7[2104:3]: SSL state (accept): SSLv3 flush data
2008.10.19 13:10:42 LOG7[2104:3]: SSL alert (read): warning: no certificate
2008.10.19 13:10:42 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:42 LOG7[2104:3]: SSL alert (write): fatal: handshake failure
2008.10.19 13:10:42 LOG3[2104:3]: SSL_accept: 140890C7: error:140890C7:SSL
routines:SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificate
2008.10.19 13:10:42 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:42 LOG5[2104:3]: Connection reset: 0 bytes sent to SSL, 0
bytes
sent to socket
2008.10.19 13:10:42 LOG7[2104:1]: Cleaning up the signal pipe
2008.10.19 13:10:42 LOG7[2104:3]: imaps finished (0 left)
See the weird no client peer handshake????
The configuration file:
# more /usr/local/etc/stunnel/stunnel.conf
# stunnel configuration file
# Use to provide ssl protection for https, pop3 and imap
#
# Setting up the root jail
chroot = /usr/local/var/stunnel
#
# The PID is created inside chroot jail
pid = /stunnel.pid
setuid = nobody
setgid = nogroup
; Some security enhancements for UNIX systems - comment them out on Win32
chroot = /usr/local/var/lib/stunnel/
setuid = nobody
setgid = nogroup
; Some performance tunings
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
# Authentication stuff
verify = 3
# Certicates to use
#
cert = /usr/local/etc/stunnel/stunnel.pem
CAfile = /usr/local/etc/stunnel/_.cellmail.com.crt
# SSLCertificateChainFile = /usr/local/etc/stunnel/gd_intermediate_bundle.crt
# Some debugging stuff
debug = 7
output = /var/log/stunnel.log
# Use it for client mode
#client = yes
# Service-level configuration
[pop3s]
accept = 199.4.110.39:995
connect = 110
[imaps]
accept = 199.4.110.39:993
connect = 143
[ssmtp]
accept = 199.4.110.39:465
connect = frog.cellmail.com:25
# TIMEOUTclose = 0
The startup log:
2008.10.19 13:02:50 LOG7[2077:1]: Snagged 64 random bytes from
/export/home/kgreene/.rnd
2008.10.19 13:02:50 LOG7[2077:1]: Wrote 1024 new random bytes to
/export/home/kgreene/.rnd
2008.10.19 13:02:50 LOG7[2077:1]: RAND_status claims sufficient entropy for the
PRNG
2008.10.19 13:02:50 LOG7[2077:1]: PRNG seeded successfully
2008.10.19 13:02:50 LOG7[2077:1]: Certificate:
/usr/local/etc/stunnel/stunnel.pem
2008.10.19 13:02:50 LOG7[2077:1]: Certificate loaded
2008.10.19 13:02:50 LOG7[2077:1]: Key file: /usr/local/etc/stunnel/stunnel.pem
2008.10.19 13:02:50 LOG7[2077:1]: Private key loaded
2008.10.19 13:02:50 LOG7[2077:1]: Loaded verify certificates from
/usr/local/etc/stunnel/_.cellmail.com.crt
2008.10.19 13:02:50 LOG7[2077:1]: Loaded
/usr/local/etc/stunnel/_.cellmail.com.crt revocation lookup file
2008.10.19 13:02:50 LOG7[2077:1]: SSL context initialized for service pop3s
2008.10.19 13:02:50 LOG7[2077:1]: Certificate:
/usr/local/etc/stunnel/stunnel.pem
2008.10.19 13:02:50 LOG7[2077:1]: Certificate loaded
2008.10.19 13:02:50 LOG7[2077:1]: Key file: /usr/local/etc/stunnel/stunnel.pem
2008.10.19 13:02:50 LOG7[2077:1]: Private key loaded
2008.10.19 13:02:50 LOG7[2077:1]: Loaded verify certificates from
/usr/local/etc/stunnel/_.cellmail.com.crt
2008.10.19 13:02:50 LOG7[2077:1]: Loaded
/usr/local/etc/stunnel/_.cellmail.com.crt revocation lookup file
2008.10.19 13:02:50 LOG7[2077:1]: SSL context initialized for service imaps
2008.10.19 13:02:50 LOG7[2077:1]: Certificate:
/usr/local/etc/stunnel/stunnel.pem
2008.10.19 13:02:50 LOG7[2077:1]: Certificate loaded
2008.10.19 13:02:50 LOG7[2077:1]: Key file: /usr/local/etc/stunnel/stunnel.pem
2008.10.19 13:02:50 LOG7[2077:1]: Private key loaded
2008.10.19 13:02:50 LOG7[2077:1]: Loaded verify certificates from
/usr/local/etc/stunnel/_.cellmail.com.crt
2008.10.19 13:02:50 LOG7[2077:1]: Loaded
/usr/local/etc/stunnel/_.cellmail.com.crt revocation lookup file
2008.10.19 13:02:50 LOG7[2077:1]: SSL context initialized for service ssmtp
2008.10.19 13:02:50 LOG5[2077:1]: stunnel 4.26 on sparc-sun-solaris2.9 with
OpenSSL 0.9.8h 28 May 2008
2008.10.19 13:02:50 LOG5[2077:1]: Threading:PTHREAD SSL:ENGINE
Sockets:POLL,IPv6
Auth:LIBWRAP
2008.10.19 13:02:50 LOG6[2077:1]: file ulimit = 256 (can be changed with
'ulimit
-n')
2008.10.19 13:02:50 LOG6[2077:1]: poll() used - no FD_SETSIZE limit for file
descriptors
2008.10.19 13:02:50 LOG5[2077:1]: 125 clients allowed
2008.10.19 13:02:50 LOG7[2077:1]: FD 11 in non-blocking mode
2008.10.19 13:02:50 LOG7[2077:1]: FD 12 in non-blocking mode
2008.10.19 13:02:50 LOG7[2077:1]: FD 13 in non-blocking mode
2008.10.19 13:02:50 LOG7[2077:1]: SO_REUSEADDR option set on accept socket
2008.10.19 13:02:50 LOG7[2077:1]: pop3s bound to 199.4.110.39:995
2008.10.19 13:02:50 LOG7[2077:1]: FD 14 in non-blocking mode
2008.10.19 13:02:50 LOG7[2077:1]: SO_REUSEADDR option set on accept socket
2008.10.19 13:02:50 LOG7[2077:1]: imaps bound to 199.4.110.39:993
2008.10.19 13:02:50 LOG7[2077:1]: FD 15 in non-blocking mode
2008.10.19 13:02:50 LOG7[2077:1]: SO_REUSEADDR option set on accept socket
2008.10.19 13:02:50 LOG7[2077:1]: ssmtp bound to 199.4.110.39:465
2008.10.19 13:02:50 LOG7[2083:1]: Created pid file /stunnel.pid
2008.10.19 13:02:50 LOG7[2083:1]: Cleaning up the signal pipe
_______________________________________________
stunnel-users mailing list
stunnel-users at mirt.net
http://stunnel.mirt.net/mailman/listinfo/stunnel-users
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
More information about the stunnel-users
mailing list