Hello all

About half a year ago, we started using stunnel on Solaris to secure NFS. The latest available pkg was 5.59 at that time.
After a couple of months, stunnel started to core dump on several systems.
We updated to the then latest version 5.63.
It took again some time until core dumps occurred with 5.63 (still same stack traces).
I am aware, that in the meantime 5.64 is out. We are in the process of updating it but it will take some time.

Could you please have a look at the below mdb output and tell me if you need any further information to find the root cause?

# mdb core.stunnel.339.60001
Loading modules: [ libc.so.1 ld.so.1 ]
> ::status
debugging core file of stunnel (32-bit) from xxxxxxx
file: /opt/csw/bin/stunnel
initial argv: /opt/csw/bin/stunnel /etc/opt/csw/stunnel/stunnel.conf start
threading model: multi-threaded
status: process terminated by SIGSEGV (Segmentation Fault)
> $c
libssl.so.1.0.0`freelist_extract+0x57(0, 2000000, 14, 42e4db16, 9bd6f8a0, eaf57a5d)
> $q


In the other dumps, libssl was involved as well.


This is the stunnel config:

setuid = nobody
setgid = nogroup

debug = info
output = /var/adm/stunnel
syslog = no

options = NO_SSLv2
options = NO_SSLv3
options = NO_TLSv1

sslVersion=TLSv1.2

renegotiation=no

options = SINGLE_ECDH_USE
options = SINGLE_DH_USE

ciphers = aes192-ctr:aes256-ctr
socket = a:TCP_NODELAY=1
socket = a:SO_KEEPALIVE=1

TIMEOUTidle = 300

pid = /tmp/stunnel.pid

;include = /etc/opt/csw/stunnel/conf.d

[tls-nfs-srv]
accept  = 31039
connect = localhost:2049
ciphers = PSK
PSKsecrets = /etc/opt/csw/stunnel/psk-s.keys
libwrap = yes


[tls-nfs-client-1]
client = yes
accept  = localhost:31701
connect = yyyyyy:31039
ciphers = PSK
PSKsecrets = /etc/opt/csw/stunnel/psk-c.key
libwrap = yes

; vim:ft=dosini


Kind regards
Sasha


This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager.