Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@OpenWrt:/etc/stunnel#
- root@OpenWrt:/etc/stunnel# cat stunnel.conf
- ; Sample stunnel configuration file by Michal Trojnara 2002-2009
- ;
- ; some options used here may not be adequate for your particular configuration
- ; please read the manual and make sure you understand them
- ; certificate/key is needed in server mode and optional in client mode
- cert = /tmp/ssl/test/server.example.net.crt
- key = /tmp/ssl/test/server.example.net.key
- ; protocol version (all, SSLv2, SSLv3, TLSv1)
- sslVersion = all
- ; security enhancements for UNIX systems - comment them out on Win32
- ; for chroot a copy of some devices and files is needed within the jail
- chroot = /var
- setuid = nobody
- setgid = nogroup
- ; PID is created inside the chroot jail
- pid = /stunnel.pid
- ; performance tunings
- socket = l:TCP_NODELAY=1
- socket = r:TCP_NODELAY=1
- ;compression = zlib
- ; workaround for Eudora bug
- ;options = DONT_INSERT_EMPTY_FRAGMENTS
- ; authentication stuff needs to be configured to prevent MITM attacks
- ; it is not enabled by default!
- verify = 2
- ; don't forget to c_rehash CApath
- ; CApath is located inside chroot jail
- ;CApath = /certs
- ; it's often easier to use CAfile
- CAfile = /tmp/ssl/test/myCA/cacert.pem
- ; don't forget to c_rehash CRLpath
- ; CRLpath is located inside chroot jail
- ;CRLpath = /crls
- ; alternatively CRLfile can be used
- ;CRLfile = /etc/stunnel/crls.pem
- ; debugging stuff (may useful for troubleshooting)
- ;debug = 7
- ;output = /var/log/stunnel.log
- ; SSL client mode
- ;client = yes
- ; service-level configuration
- [https-proxy]
- accept = 8443
- connect = 8888
- TIMEOUTclose = 0
- ; vim:ft=dosini
- root@OpenWrt:/etc/stunnel#
- root@OpenWrt:/etc/stunnel# diff -u stunnel.conf.orig stunnel.conf
- --- stunnel.conf.orig 2012-08-02 07:29:31.000000000 +0900
- +++ stunnel.conf 2013-11-07 23:15:59.343956484 +0900
- @@ -4,8 +4,8 @@
- ; please read the manual and make sure you understand them
- ; certificate/key is needed in server mode and optional in client mode
- -cert = /etc/stunnel/stunnel.pem
- -;key = /etc/stunnel/stunnel.pem
- +cert = /tmp/ssl/test/server.example.net.crt
- +key = /tmp/ssl/test/server.example.net.key
- ; protocol version (all, SSLv2, SSLv3, TLSv1)
- sslVersion = all
- @@ -28,12 +28,12 @@
- ; authentication stuff needs to be configured to prevent MITM attacks
- ; it is not enabled by default!
- -;verify = 2
- +verify = 2
- ; don't forget to c_rehash CApath
- ; CApath is located inside chroot jail
- ;CApath = /certs
- ; it's often easier to use CAfile
- -;CAfile = /etc/stunnel/certs.pem
- +CAfile = /tmp/ssl/test/myCA/cacert.pem
- ; don't forget to c_rehash CRLpath
- ; CRLpath is located inside chroot jail
- ;CRLpath = /crls
- @@ -49,26 +49,9 @@
- ; service-level configuration
- -;[pop3s]
- -;accept = 995
- -;connect = 110
- -
- -;[imaps]
- -;accept = 993
- -;connect = 143
- -
- -;[ssmtp]
- -;accept = 465
- -;connect = 25
- -
- -[https]
- -accept = 443
- -connect = 80
- -TIMEOUTclose = 0
- -
- -[chilli]
- -accept = 3443
- -connect = 3442
- +[https-proxy]
- +accept = 8443
- +connect = 8888
- TIMEOUTclose = 0
- ; vim:ft=dosini
- root@OpenWrt:/etc/stunnel#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement