Brian

As I said you can reproduce this with stunnel "client = no" , telnet to "accept" port and tcpdump. As soon as you hit ^] and type "q" to close connection you will see "RST" coming from stunnel.

I understand that tcp/ip is not part of stunnel. Theres got to be some way to close() socket and have OS send RST.

Its very old BigIP version 3.3.1

===== bigip.conf =====

pool appgen_1.1.1.69.8843 {
   lb_method least_conn
   member 2.2.2.140:8843 ratio 1 priority 1
   member 2.2.2.150:8843 ratio 1 priority 1
}
pool appgen_1.1.1.69.8844 {
   lb_method least_conn
   member 2.2.2.140:8844 ratio 1 priority 1
   member 2.2.2.150:8844 ratio 1 priority 1
}

vip 1.1.1.69:8843 unit 1 {
    netmask 255.255.255.0 broadcast 1.1.1.255
    use pool appgen_1.1.1.69.8843
}
vip 1.1.1.69:8844 unit 1 {
    netmask 255.255.255.0 broadcast 1.1.1.255
    use pool appgen_1.1.1.69.8844
}

=========== stunnel.conf ============

setuid = nobody
setgid = nogroup

CApath = /usr/local/etc/stunnel/certs
cert = /usr/local/etc/stunnel/cacert.pem
key = /usr/local/etc/stunnel/privkey-nopass.pem

debug = 2
output = /var/log/stunnel.log

client = no
verify = 1
delay = yes

[something1]
accept  = 8843
connect = 127.0.0.1:11111
TIMEOUTclose = 0

[something2]
accept  = 8844
connect = 127.0.0.1:22222
TIMEOUTclose = 0