Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
stunnel
stunnel.conf
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File stunnel.conf of Package stunnel
# Sample stunnel configuration file # Copyright by Michal Trojnara 2002-2004 # --with changes for SuSE package # client = yes | no # client mode (remote service uses SSL) # default: no (server mode) client = no # # chroot + user (comment out to disable) # chroot = /var/lib/stunnel/ setuid = stunnel setgid = nogroup # note about the chroot feature and the "exec" keyword to start other services... # while the init script /etc/init.d/stunnel will copy the binaries and libraries # into the chroot jail, more files might be needed in the jail (configuration # files etc.) pid = /var/run/stunnel.pid # # debugging # #debug = 7 #output = stunnel.log # # Some performance tunings # # disable Nagle algorithm (a.k.a. tinygram prevention, see man 7 tcp) socket = l:TCP_NODELAY=1 socket = r:TCP_NODELAY=1 #compression = rle # Workaround for Eudora bug #options = DONT_INSERT_EMPTY_FRAGMENTS # Authentication stuff #verify = 2 # Don't forget to c_rehash CApath; CApath is located inside chroot jail: #CApath = /certs # It's often easier to use CAfile: #CAfile = /etc/stunnel/certs.pem # Don't forget to c_rehash CRLpath; CRLpath is located inside chroot jail: #CRLpath = /crls # Alternatively you can use CRLfile: #CRLfile = /etc/stunnel/crls.pem cert = /etc/stunnel/stunnel.pem # # Examples for service-level configuration: # # [pop3s] # accept = 995 # connect = 110 # [imaps] # accept = 993 # connect = 143 # [imaps] # accept = 993 # exec = /usr/sbin/imapd # execargs = imapd # pty = no # [ssmtp] # accept = 465 # connect = 25 # [s1] # accept = 5000 # connect = mail.example.com:110 # delay = yes # [s2] # accept = 5001 # connect = mail.example.com:25 # [https] # accept = 443 # connect = 80 # TIMEOUTclose = 0 # [swat] # accept = 902 # connect = 901 # # mysql over stunnel example: # # [mysqls] <-- on the server # accept = 3307 # connect = localhost:mysql # # client = yes <-- on the client # [mysqls] # accept = 3307 # connect = remote-mysql-server.example.com:3307 # # Hint. Use the mysql client with "-h 127.0.0.1", not "-h localhost", because # "localhost" will mean it will go through the local socket and ignore the port. # # pppd over stunnel example: # (note: read http://sites.inka.de/sites/bigred/devel/tcp-tcp.html , and # look for better alternatives like cipe or openvpn.) # # [ppp] <-- on the server # accept = 2020 # exec = /usr/sbin/pppd # execargs = pppd local # # the pty option doesn't work in chroot jail without further efforts # #pty = yes # # # [ppp] <-- on the "client" # connect = host.example.com:2020 # exec = /usr/sbin/pppd # execargs = pppd local nodeflate nobsdcomp 192.168.20.20:192.168.20.21 # # the pty option doesn't work in chroot jail without further efforts # #pty = yes
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor