# ../../sbin/stunnel stunnel-server.conf 2005.07.11 03:48:16 LOG5[593:0]: stunnel 4.11 on ia64-hp-hpux11.23 FORK+POLL+IPv4+LIBWRAP with OpenSSL 0.9.7e 25 Oct 2004 2005.07.11 03:48:16 LOG7[593:0]: Snagged 64 random bytes from /dev/random 2005.07.11 03:48:16 LOG7[593:0]: RAND_status claims sufficient entropy for the PRNG 2005.07.11 03:48:16 LOG6[593:0]: PRNG seeded successfully 2005.07.11 03:48:16 LOG7[593:0]: Certificate: /home/punitha/stunnel/etc/stunnel/stunnel.pem 2005.07.11 03:48:16 LOG7[593:0]: Key file: /home/punitha/stunnel/etc/stunnel/stunnel.pem 2005.07.11 03:48:16 LOG7[593:0]: Loaded verify certificates from /home/punitha/stunnel/etc/stunnel/stunnel.pem 2005.07.11 03:48:16 LOG6[593:0]: file ulimit = 2048 (can be changed with 'ulimit -n') 2005.07.11 03:48:16 LOG6[593:0]: poll() used - no FD_SETSIZE limit for file descriptors 2005.07.11 03:48:16 LOG5[593:0]: 1000 clients allowed 2005.07.11 03:48:16 LOG7[593:0]: FD 3 in non-blocking mode 2005.07.11 03:48:16 LOG7[593:0]: FD 4 in non-blocking mode 2005.07.11 03:48:16 LOG7[593:0]: FD 6 in non-blocking mode 2005.07.11 03:48:16 LOG7[593:0]: SO_REUSEADDR option set on accept socket 2005.07.11 03:48:16 LOG7[593:0]: test1 bound to 0.0.0.0:9090 2005.07.11 03:48:16 LOG7[593:0]: No pid file being created 2005.07.11 03:48:31 LOG7[593:0]: test1 accepted FD=8 from 127.0.0.1:50474 2005.07.11 03:48:31 LOG7[614:0]: test1 started 2005.07.11 03:48:31 LOG7[614:0]: FD 8 in non-blocking mode 2005.07.11 03:48:31 LOG5[614:0]: test1 connected from 127.0.0.1:50474 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): before/accept initialization 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 read client hello A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 write server hello A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 write certificate A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 write certificate request A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 flush data 2005.07.11 03:48:31 LOG5[614:0]: VERIFY OK: depth=0, /C=df/ST=fdl;f/L=dfl/O=dfldk/OU=fdkf/CN=lfdklf 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 read client certificate A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 read client key exchange A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 read certificate verify A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 read finished A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 write change cipher spec A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 write finished A 2005.07.11 03:48:31 LOG7[614:0]: SSL state (accept): SSLv3 flush data 2005.07.11 03:48:31 LOG7[614:0]: 1 items in the session cache 2005.07.11 03:48:31 LOG7[614:0]: 0 client connects (SSL_connect()) 2005.07.11 03:48:31 LOG7[614:0]: 0 client connects that finished 2005.07.11 03:48:31 LOG7[614:0]: 0 client renegotiatations requested 2005.07.11 03:48:31 LOG7[614:0]: 1 server connects (SSL_accept()) 2005.07.11 03:48:31 LOG7[614:0]: 1 server connects that finished 2005.07.11 03:48:31 LOG7[614:0]: 0 server renegotiatiations requested 2005.07.11 03:48:31 LOG7[614:0]: 0 session cache hits 2005.07.11 03:48:31 LOG7[614:0]: 0 session cache misses 2005.07.11 03:48:31 LOG7[614:0]: 0 session cache timeouts 2005.07.11 03:48:31 LOG6[614:0]: SSL accepted: new session negotiated 2005.07.11 03:48:31 LOG6[614:0]: Negotiated ciphers: AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 2005.07.11 03:48:31 LOG7[614:0]: FD 6 in non-blocking mode 2005.07.11 03:48:31 LOG7[614:0]: test1 connecting 127.0.0.1:23 2005.07.11 03:48:31 LOG7[614:0]: Remote FD=6 initialized 2005.07.11 03:48:44 LOG7[593:0]: test1 accepted FD=8 from 127.0.0.1:50477 2005.07.11 03:48:44 LOG7[640:0]: test1 started 2005.07.11 03:48:44 LOG7[640:0]: FD 8 in non-blocking mode 2005.07.11 03:48:44 LOG5[640:0]: test1 connected from 127.0.0.1:50477 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): before/accept initialization 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 read client hello A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 write server hello A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 write certificate A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 write certificate request A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 flush data 2005.07.11 03:48:44 LOG5[640:0]: VERIFY OK: depth=0, /C=df/ST=fdl;f/L=dfl/O=dfldk/OU=fdkf/CN=lfdklf 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 read client certificate A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 read client key exchange A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 read certificate verify A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 read finished A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 write change cipher spec A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 write finished A 2005.07.11 03:48:44 LOG7[640:0]: SSL state (accept): SSLv3 flush data 2005.07.11 03:48:44 LOG7[640:0]: 1 items in the session cache 2005.07.11 03:48:44 LOG7[640:0]: 0 client connects (SSL_connect()) 2005.07.11 03:48:44 LOG7[640:0]: 0 client connects that finished 2005.07.11 03:48:44 LOG7[640:0]: 0 client renegotiatations requested 2005.07.11 03:48:44 LOG7[640:0]: 1 server connects (SSL_accept()) 2005.07.11 03:48:44 LOG7[640:0]: 1 server connects that finished 2005.07.11 03:48:44 LOG7[640:0]: 0 server renegotiatiations requested 2005.07.11 03:48:44 LOG7[640:0]: 0 session cache hits 2005.07.11 03:48:44 LOG7[640:0]: 0 session cache misses 2005.07.11 03:48:44 LOG7[640:0]: 0 session cache timeouts 2005.07.11 03:48:44 LOG6[640:0]: SSL accepted: new session negotiated 2005.07.11 03:48:44 LOG6[640:0]: Negotiated ciphers: AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 2005.07.11 03:48:44 LOG7[640:0]: FD 6 in non-blocking mode 2005.07.11 03:48:44 LOG7[640:0]: test1 connecting 127.0.0.1:23 2005.07.11 03:48:44 LOG7[640:0]: Remote FD=6 initialized 2005.07.11 03:48:51 LOG7[640:0]: Socket closed on read 2005.07.11 03:48:51 LOG7[640:0]: SSL write shutdown 2005.07.11 03:48:51 LOG7[640:0]: SSL alert (write): warning: close notify 2005.07.11 03:48:51 LOG7[640:0]: SSL_shutdown retrying 2005.07.11 03:48:51 LOG7[640:0]: SSL doesn't need to read or write 2005.07.11 03:48:52 LOG7[640:0]: SSL alert (read): warning: close notify 2005.07.11 03:48:52 LOG7[640:0]: SSL closed on SSL_read 2005.07.11 03:48:52 LOG7[640:0]: Socket write shutdown 2005.07.11 03:48:52 LOG5[640:0]: Connection closed: 2342 bytes sent to SSL, 83 bytes sent to socket sendsig: useracc failed. 0x200000007f7fd200 0x00000000005000 Pid 593 was killed due to failure in writing the signal context - possible stack overflow. Illegal instruction # 2005.07.11 03:49:27 LOG7[614:0]: Socket closed on read 2005.07.11 03:49:27 LOG7[614:0]: SSL write shutdown 2005.07.11 03:49:27 LOG7[614:0]: SSL alert (write): warning: close notify 2005.07.11 03:49:27 LOG7[614:0]: SSL_shutdown retrying 2005.07.11 03:49:27 LOG7[614:0]: SSL doesn't need to read or write 2005.07.11 03:49:27 LOG7[614:0]: SSL alert (read): warning: close notify 2005.07.11 03:49:27 LOG7[614:0]: SSL closed on SSL_read 2005.07.11 03:49:27 LOG7[614:0]: Socket write shutdown 2005.07.11 03:49:27 LOG5[614:0]: Connection closed: 5483 bytes sent to SSL, 133 bytes sent to socket