

Lets say we want to have stunnel listen on our machine on port 9999 to support a fictitious protocol called foobar.įirst we would add the following line to /etc/services: foobar 9999/tcp # The foobar service Daemon mode will not fork if you have stunnel compiled with threads.

(if you installed stunnel in a different location than /usr/local/bin, use that path instead) and add the following line to /etc/services: foobar 9999/tcp # The foobar service We would add the following line to the file /etc/nf foobar stream tcp nowait root /usr/local/bin/stunnel stunnel Lets say we want to have stunnel listen on our machine on port 9999 to support a fictitious protocol called foobar. Inetd is the Unix 'super server' that allows you to launch a program (for example the telnet daemon) whenever a connection is established to a specified port.
#No validar certificados en stunnel windows
(This does not apply to Windows machines)
#No validar certificados en stunnel how to
The peer-certificate.pem file needs to contain the server certificate.This section gives you basic information on how to run the stunnel program in client and server mode. The following configuration requires stunnel version 4.46 or higher: The ca-certs.pem file contains the certificates of trusted certificate authorities.Īlternatively, a technique known as certificate pinning can be used. The following configuration requires stunnel 5.15 or later: Stunnel can use an existing PKI (Public Key Infrastructure). The "key" option may be omitted if cert.pem also contains the private key. A certificate can also be purchased from one of the available commercial certificate authorities. On Unix platforms, a certificate can be built with "make cert". The Windows installer of stunnel automatically builds a certificate. Unless PSK authentication is configured, each stunnel server needs a certificate with the corresponding private key. The advantage of this configuration is that it does not require individual secrets for each of the clients. Certificatesįor simplicity, this tutorial only covers server authentication. Otherwise, all the clients sharing the same key will have to be reconfigured if the key is compromised. The psk1.txt file only needs a single line: test1:oaP4EishaeSaishei6rio6xeeph3azĮach client needs a separate secret. The psk.txt file contains one line for each client: test1:oaP4EishaeSaishei6rio6xeeph3az Server ConfigurationĪ trivial configuration example: PSK authentication requires stunnel version 5.09 or higher. PSK is also the fastest TLS authentication. It provides both client and server authentication. The easiest way to configure authentication is with PSK (Pre-Shared Key). Client authentication allows for restricting access for individual clients (access control).Server authentication prevents Man-In-The-Middle (MITM) attacks on the encryption protocol.Either the TLS client, the TLS server, or both need to be authenticated:
