[stunnel-users] Using stunnel for TLS with Geotrust cert?
jbogaty at classpass.com
Mon Mar 28 17:04:41 CEST 2016
Ideally what I'd love to do is enable developers to be able to connect
their remote apps to the database proxy *without* the client-side
handshake, but I was honestly not aware it was possible. So the ideal
Remote app connects directly via mysql driver to stunnel on port 3307
encrypted with TLS
stunnel forward the connection to the proxy on 3306
If that is possible without maintaining a connection stunnel to
stunnel that would be beyond awesome, I'm just totally failing to see
how to accomplish it!
One thing I did find though is the root cert for geotrust so I'm
running tests now to see if that helps or at least generates new info.
Based on your feedback I'm testing the following:
cert = /etc/stunnel/stunnel.pem
cafile = /etc/stunnel/GeoTrust_Global_CA.pem
verify = 3
On Mon, Mar 28, 2016 at 10:58 AM, Michał Trojnara
<Michal.Trojnara at stunnel.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> On 28.03.2016 16:27, Jon Bogaty wrote:
>> The issue is when I setup everything on the server and try to
>> connect with a client I either get for "verify 2" warnings about
>> MiTM authentication problems, or for "verify 3" or "verify 4",
>> which should disable CA checking altogether to my understanding,
>> "Please specify CApath".
> Verify levels 3 and 4 do *not* disable certificate verification.
> Verify level 3 requires the peer certificate in your CAfile.
> Verify level 4 *only* requires the peer certificate.
> Are you sure you want to enable peer certificate (i.e. client
> certificate) verification in your SSL server configuration?
> Best regards,
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> -----END PGP SIGNATURE-----
> stunnel-users mailing list
> stunnel-users at stunnel.org
More information about the stunnel-users