[stunnel-users] server does not send its cert?
Keresztfalvi Laszlo
lkereszt at gmail.com
Tue Feb 14 10:05:15 CET 2012
Hello,
after a day of trying..
- 2 box of *Win7 Pro x64*
- fresh install of *stunnel 4.52*
- keys generated with C:\Program Files (x86)\stunnel>* **.\openssl.exe
req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem
-keyout stunnel.pem*
- *certs.pem* on both box contains certificate part of stunnel.pem from
both machine
server stunnel.conf (192.168.0.52):
debug = 7
cert = stunnel.pem
verify = 2
CAfile = certs.pem
options = NO_SSLv2
[unison]
accept = 10001
connect = 127.0.0.1:10000
client stunnel.conf (192.168.0.216):
client = yes
debug = 7
cert = stunnel.pem
verify = 2
CAfile = certs.pem
options = NO_SSLv2
[unison]
client = yes
accept = 127.0.0.1:10000
connect = 192.168.0.52:10001
Test #1: *OK*
C:\Program Files (x86)\stunnel>* .\openssl verify -CAfile certs.pem
stunnel.pem*
*stunnel.pem: OK*
C:\Program Files (x86)\stunnel>* .\openssl verify -CAfile certs.pem
certs.pem*
*certs.pem: OK*
Test #2: *OK*
C:\Program Files (x86)\stunnel> *.\openssl s_server -accept 10001 -cert
stunnel.pem -verify 2 -CAfile certs.pem -no_ssl2*
vs
C:\Program Files (x86)\stunnel> *.\openssl s_client -connect
192.168.0.52:10001 -cert stunnel.pem -verify 2 -CAfile certs.pem -no_ssl2*
Test #3: *OK - "certificate accepted"
*
C:\Program Files (x86)\stunnel> *.\openssl s_server -accept 10001 -cert
stunnel.pem -verify 2 -CAfile certs.pem -no_ssl2*
vs
*stunnel client**
*
Test #4: *OK - "certificate accepted"
*
*stunnel server*
vs
C:\Program Files (x86)\stunnel> *.\openssl s_client -connect
192.168.0.52:10001 -cert stunnel.pem -verify 2 -CAfile certs.pem -no_ssl2*
Test #5: *FAILED*
*stunnel server*
Service unison accepted connection from 192.168.0.216:23134
2012.02.14 09:02:39 LOG3[134028:132792]: SSL_accept: 140943F2:
error:140943F2:SSL routines:*SSL3_READ_BYTES:sslv3 alert unexpected message*
2012.02.14 09:02:39 LOG5[134028:132792]: Connection reset: 0 bytes sent to
SSL, 0 bytes sent to socket*
*
vs
*stunnel client
*
2012.02.14 09:02:33 LOG5[2500:5876]: Service unison connected remote server
from 192.168.0.216:23134
2012.02.14 09:02:33 LOG7[2500:5876]: Remote FD=372 initialized
2012.02.14 09:02:33 LOG3[2500:5876]: SSL_connect: 140870E8:
error:140870E8:SSL routines:*SSL3_GET_CERTIFICATE_**REQUEST:tls client cert
req with anon cipher*
2012.02.14 09:02:33 LOG5[2500:5876]: Connection reset: 0 bytes sent to SSL,
0 bytes sent to socket
After a *stunnel.conf **reload* on both box (yes, only a reload) then the
following details and differences appear:
*stunnel server* vs *openssl s_client : OK - "certificate accepted"
*
2012.02.14 09:42:02 LOG5[134236:132440]: Service unison accepted connection
from 192.168.0.216:23698
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): before/accept
initialization
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 read
client hello B
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): *SSLv3 write
server hello A*
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): *SSLv3 write
certificate A*
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): *SSLv3 write
key exchange A*
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 write
certificate request A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 flush
data
2012.02.14 09:42:02 LOG7[134236:132440]: Starting certificate verification:
depth=0, /C=HU/ST=Mazovia Province/L=Budapest/O=-/OU=client/CN=x-pc
2012.02.14 09:42:02 LOG5[134236:132440]: Certificate accepted: depth=0,
/C=HU/ST=Mazovia Province/L=Budapest/O=-/OU=client/CN=x-pc
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 read
client certificate A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 read
client key exchange A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 read
certificate verify A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 read
finished A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 write
session ticket A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 write
change cipher spec A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 write
finished A
2012.02.14 09:42:02 LOG7[134236:132440]: SSL state (accept): SSLv3 flush
data
*stunnel server* vs *stunnel client : FAILED
*
*server:*
2012.02.14 09:45:24 LOG5[134236:134552]: Service unison accepted connection
from 192.168.0.216:23752
2012.02.14 09:45:24 LOG7[134236:134552]: SSL state (accept): before/accept
initialization
2012.02.14 09:45:24 LOG7[134236:134552]: SSL state (accept): SSLv3 read
client hello B
2012.02.14 09:45:24 LOG7[134236:134552]: SSL state (accept): *SSLv3 write
server hello A*
2012.02.14 09:45:24 LOG7[134236:134552]: SSL state (accept): *SSLv3 write
key exchange A*
2012.02.14 09:45:24 LOG7[134236:134552]: SSL state (accept): SSLv3 write
certificate request A
2012.02.14 09:45:24 LOG7[134236:134552]: SSL state (accept): SSLv3 flush
data
2012.02.14 09:45:24 LOG7[134236:134552]: SSL alert (read): fatal:
unexpected_message
2012.02.14 09:45:24 LOG3[134236:134552]: SSL_accept: 140943F2:
error:140943F2:SSL routines:*SSL3_READ_BYTES:sslv3 alert unexpected message*
2012.02.14 09:45:24 LOG5[134236:134552]: Connection reset: 0 bytes sent to
SSL, 0 bytes sent to socket
2012.02.14 09:45:24 LOG7[134236:134552]: Service unison finished (0 left)
*client:*
2012.02.14 09:45:18 LOG5[1100:7176]: Service unison connected remote server
from 192.168.0.216:23752
2012.02.14 09:45:18 LOG7[1100:7176]: Remote FD=452 initialized
2012.02.14 09:45:18 LOG7[1100:7176]: SSL state (connect): before/connect
initialization
2012.02.14 09:45:18 LOG7[1100:7176]: SSL state (connect): SSLv3 write
client hello A
2012.02.14 09:45:18 LOG7[1100:7176]: SSL state (connect): *SSLv3 read
server hello A*
2012.02.14 09:45:18 LOG7[1100:7176]: SSL state (connect): *SSLv3 read
server key exchange A*
2012.02.14 09:45:18 LOG7[1100:7176]: SSL alert (write): *fatal:
unexpected_message*
2012.02.14 09:45:18 LOG3[1100:7176]: SSL_connect: 140870E8:
error:140870E8:SSL routines:*SSL3_GET_CERTIFICATE_**REQUEST:tls client cert
req with anon cipher*
2012.02.14 09:45:18 LOG5[1100:7176]: Connection reset: 0 bytes sent to SSL,
0 bytes sent to socket
Please, give me some clues.
Thank you,
Laszlo
**
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.stunnel.org/pipermail/stunnel-users/attachments/20120214/4ff6411f/attachment.html>
More information about the stunnel-users
mailing list