Статус: Участник
Группы: Участники
Зарегистрирован: 26.05.2020(UTC) Сообщений: 13 Откуда: Москва Сказал(а) «Спасибо»: 4 раз
|
Добрый день! Установил Stunnel для коннекта с сервисом заказных писем Почты России. У них работает Stunnel в режиме сервер, у меня в режиме клиент на Windows с таким конфигом: Stunnel.conf написал: output=C:\CryptoPro\Stunnel\stunnel.log socket=l:TCP_NODELAY=1 socket=r:TCP_NODELAY=1 debug=7
[https] client=yes accept=3088 connect=91.215.37.229:3080 cert=C:\CryptoPro\TestCert\AlexYakovlevTestExported.cer verify=0
Сертификат выдан Тестовым УЦ КриптоПро, сертификат УЦ добавлен к доверенным. Тестовый сертификат установлен в хранилище LOCAL_MACHINE, ключ в контейнере есть. При попытке соединиться к адресу http://localhost:3088/ из браузера получаю ERR_CONNECTION_REFUSED. В логе Stunnel вот такое: Stunnel.log написал: 2021.11.02 19:25:56 LOG5[2512:15796]: stunnel 4.18 on x86-pc-unknown 2021.11.02 19:25:56 LOG5[2512:15796]: Threading:WIN32 Sockets:SELECT,IPv6 2021.11.02 19:25:56 LOG5[2512:15796]: No limit detected for the number of clients 2021.11.02 19:25:56 LOG7[2512:15796]: FD 292 in non-blocking mode 2021.11.02 19:25:56 LOG7[2512:15796]: SO_REUSEADDR option set on accept socket 2021.11.02 19:25:56 LOG7[2512:15796]: https bound to 0.0.0.0:3088 2021.11.02 19:26:01 LOG7[2512:15796]: https accepted FD=316 from 127.0.0.1:58036 2021.11.02 19:26:01 LOG7[2512:15796]: Creating a new thread 2021.11.02 19:26:01 LOG7[2512:15796]: New thread created 2021.11.02 19:26:01 LOG7[2512:9200]: client start 2021.11.02 19:26:01 LOG7[2512:9200]: https started 2021.11.02 19:26:01 LOG7[2512:15796]: https accepted FD=324 from 127.0.0.1:64073 2021.11.02 19:26:01 LOG7[2512:9200]: FD 316 in non-blocking mode 2021.11.02 19:26:01 LOG7[2512:15796]: Creating a new thread 2021.11.02 19:26:01 LOG7[2512:9200]: TCP_NODELAY option set on local socket 2021.11.02 19:26:01 LOG5[2512:9200]: https connected from 127.0.0.1:58036 2021.11.02 19:26:01 LOG7[2512:15796]: New thread created 2021.11.02 19:26:01 LOG7[2512:14340]: client start 2021.11.02 19:26:01 LOG7[2512:14340]: https started 2021.11.02 19:26:01 LOG7[2512:14340]: FD 324 in non-blocking mode 2021.11.02 19:26:01 LOG7[2512:14340]: TCP_NODELAY option set on local socket 2021.11.02 19:26:01 LOG5[2512:14340]: https connected from 127.0.0.1:64073 2021.11.02 19:26:01 LOG7[2512:9200]: FD 380 in non-blocking mode 2021.11.02 19:26:01 LOG7[2512:9200]: https connecting 2021.11.02 19:26:01 LOG7[2512:14340]: FD 280 in non-blocking mode 2021.11.02 19:26:01 LOG7[2512:14340]: https connecting 2021.11.02 19:26:01 LOG7[2512:14340]: connect_wait: waiting 10 seconds 2021.11.02 19:26:01 LOG7[2512:9200]: connect_wait: waiting 10 seconds 2021.11.02 19:26:01 LOG7[2512:9200]: connect_wait: connected 2021.11.02 19:26:01 LOG7[2512:9200]: Remote FD=380 initialized 2021.11.02 19:26:01 LOG7[2512:9200]: TCP_NODELAY option set on remote socket 2021.11.02 19:26:01 LOG7[2512:9200]: start SSPI connect 2021.11.02 19:26:01 LOG5[2512:9200]: try to read the client certificate 2021.11.02 19:26:01 LOG7[2512:14340]: connect_wait: connected 2021.11.02 19:26:01 LOG7[2512:9200]: open file C:\CryptoPro\TestCert\AlexYakovlevTestExported.cer with certificate 2021.11.02 19:26:01 LOG7[2512:14340]: Remote FD=280 initialized 2021.11.02 19:26:01 LOG7[2512:14340]: TCP_NODELAY option set on remote socket 2021.11.02 19:26:01 LOG7[2512:14340]: start SSPI connect 2021.11.02 19:26:01 LOG5[2512:14340]: try to read the client certificate 2021.11.02 19:26:01 LOG5[2512:9200]: CertCreateCertificateContext(der) failed: 2148086027d. Trying certificate as base64
2021.11.02 19:26:01 LOG7[2512:14340]: open file C:\CryptoPro\TestCert\AlexYakovlevTestExported.cer with certificate 2021.11.02 19:26:01 LOG5[2512:9200]: CertFindCertificateInStore not find client certificate in store CURRENT_USER. Looking at LOCAL_MACHINE 2021.11.02 19:26:01 LOG5[2512:14340]: CertCreateCertificateContext(der) failed: 2148086027d. Trying certificate as base64
2021.11.02 19:26:01 LOG5[2512:14340]: CertFindCertificateInStore not find client certificate in store CURRENT_USER. Looking at LOCAL_MACHINE 2021.11.02 19:26:01 LOG3[2512:9200]: Credentials complete 2021.11.02 19:26:01 LOG3[2512:14340]: Credentials complete 2021.11.02 19:26:01 LOG7[2512:9200]: 120 bytes of handshake data sent 2021.11.02 19:26:01 LOG7[2512:14340]: 120 bytes of handshake data sent 2021.11.02 19:26:01 LOG5[2512:14340]: 1252 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:9200]: 1252 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:9200]: 215 bytes of handshake data sent 2021.11.02 19:26:01 LOG5[2512:14340]: 215 bytes of handshake data sent 2021.11.02 19:26:01 LOG5[2512:14340]: 31 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:9200]: 31 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:14340]: Handshake was successful 2021.11.02 19:26:01 LOG5[2512:14340]: PerformClientHandshake finish 2021.11.02 19:26:01 LOG5[2512:14340]: Verify_level = 0, skipping Server certificate verification 2021.11.02 19:26:01 LOG7[2512:14340]: add ssl read socket to pool 2021.11.02 19:26:01 LOG7[2512:14340]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:01 LOG7[2512:14340]: Enter pool section on transfer 2021.11.02 19:26:01 LOG7[2512:14340]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:01 LOG5[2512:9200]: Handshake was successful 2021.11.02 19:26:01 LOG5[2512:9200]: PerformClientHandshake finish 2021.11.02 19:26:01 LOG5[2512:9200]: Verify_level = 0, skipping Server certificate verification 2021.11.02 19:26:01 LOG7[2512:9200]: add ssl read socket to pool 2021.11.02 19:26:01 LOG7[2512:9200]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:01 LOG7[2512:9200]: Enter pool section on transfer 2021.11.02 19:26:01 LOG7[2512:9200]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:01 LOG7[2512:9200]: data reciev from socket = 770 2021.11.02 19:26:01 LOG7[2512:9200]: add ssl read socket to pool 2021.11.02 19:26:01 LOG7[2512:9200]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=770,want_rd = 0 2021.11.02 19:26:01 LOG7[2512:9200]: Enter pool section on transfer 2021.11.02 19:26:01 LOG7[2512:9200]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=302 2021.11.02 19:26:01 LOG5[2512:9200]: SSPI_write start 2021.11.02 19:26:01 LOG7[2512:9200]: SSPI_write data is GET 2021.11.02 19:26:01 LOG7[2512:9200]: send all data after encrypt 2021.11.02 19:26:01 LOG7[2512:9200]: data send to ssl_socket =770 2021.11.02 19:26:01 LOG7[2512:9200]: add ssl read socket to pool 2021.11.02 19:26:01 LOG7[2512:9200]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:01 LOG7[2512:9200]: Enter pool section on transfer 2021.11.02 19:26:01 LOG7[2512:9200]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:01 LOG7[2512:9200]: SSPI_read start 2021.11.02 19:26:01 LOG7[2512:9200]: recv ok on SSPI_read err= 13 2021.11.02 19:26:01 LOG5[2512:9200]: Received 13 bytes from ssl socket 2021.11.02 19:26:01 LOG5[2512:9200]: Client request RENEGOTIATE 2021.11.02 19:26:01 LOG5[2512:9200]: 110 bytes of handshake data sent 2021.11.02 19:26:01 LOG5[2512:9200]: 1380 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:9200]: 1448 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:9200]: 3764 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG3[2512:9200]: **** Error 0x8009035d returned by InitializeSecurityContext (2) 2021.11.02 19:26:01 LOG3[2512:9200]: Couldn't complete RENEGOTIATE 2021.11.02 19:26:01 LOG3[2512:9200]: error on SSPI_read 2021.11.02 19:26:01 LOG5[2512:9200]: Connection reset: 770 bytes sent to SSL, 0 bytes sent to socket 2021.11.02 19:26:01 LOG7[2512:9200]: free Buffers 2021.11.02 19:26:01 LOG7[2512:9200]: delete c->hContext 2021.11.02 19:26:01 LOG7[2512:9200]: delete c->hClientCreds 2021.11.02 19:26:01 LOG5[2512:9200]: incomp_mess = 1, extra_data = 0 2021.11.02 19:26:01 LOG7[2512:9200]: https finished (1 left) 2021.11.02 19:26:01 LOG7[2512:15796]: https accepted FD=1284 from 127.0.0.1:53323 2021.11.02 19:26:01 LOG7[2512:15796]: Creating a new thread 2021.11.02 19:26:01 LOG7[2512:15796]: New thread created 2021.11.02 19:26:01 LOG7[2512:4552]: client start 2021.11.02 19:26:01 LOG7[2512:4552]: https started 2021.11.02 19:26:01 LOG7[2512:4552]: FD 1284 in non-blocking mode 2021.11.02 19:26:01 LOG7[2512:4552]: TCP_NODELAY option set on local socket 2021.11.02 19:26:01 LOG5[2512:4552]: https connected from 127.0.0.1:53323 2021.11.02 19:26:01 LOG7[2512:4552]: FD 1256 in non-blocking mode 2021.11.02 19:26:01 LOG7[2512:4552]: https connecting 2021.11.02 19:26:01 LOG7[2512:4552]: connect_wait: waiting 10 seconds 2021.11.02 19:26:01 LOG7[2512:4552]: connect_wait: connected 2021.11.02 19:26:01 LOG7[2512:4552]: Remote FD=1256 initialized 2021.11.02 19:26:01 LOG7[2512:4552]: TCP_NODELAY option set on remote socket 2021.11.02 19:26:01 LOG7[2512:4552]: start SSPI connect 2021.11.02 19:26:01 LOG5[2512:4552]: try to read the client certificate 2021.11.02 19:26:01 LOG7[2512:4552]: open file C:\CryptoPro\TestCert\AlexYakovlevTestExported.cer with certificate 2021.11.02 19:26:01 LOG5[2512:4552]: CertCreateCertificateContext(der) failed: 2148086027d. Trying certificate as base64
2021.11.02 19:26:01 LOG5[2512:4552]: CertFindCertificateInStore not find client certificate in store CURRENT_USER. Looking at LOCAL_MACHINE 2021.11.02 19:26:01 LOG3[2512:4552]: Credentials complete 2021.11.02 19:26:01 LOG7[2512:4552]: 120 bytes of handshake data sent 2021.11.02 19:26:01 LOG5[2512:4552]: 1252 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:4552]: 215 bytes of handshake data sent 2021.11.02 19:26:01 LOG5[2512:4552]: 31 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:01 LOG5[2512:4552]: Handshake was successful 2021.11.02 19:26:01 LOG5[2512:4552]: PerformClientHandshake finish 2021.11.02 19:26:01 LOG5[2512:4552]: Verify_level = 0, skipping Server certificate verification 2021.11.02 19:26:01 LOG7[2512:4552]: add ssl read socket to pool 2021.11.02 19:26:01 LOG7[2512:4552]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:01 LOG7[2512:4552]: Enter pool section on transfer 2021.11.02 19:26:01 LOG7[2512:4552]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:02 LOG7[2512:14340]: data reciev from socket = 770 2021.11.02 19:26:02 LOG7[2512:14340]: add ssl read socket to pool 2021.11.02 19:26:02 LOG7[2512:14340]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=770,want_rd = 0 2021.11.02 19:26:02 LOG7[2512:14340]: Enter pool section on transfer 2021.11.02 19:26:02 LOG7[2512:14340]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=302 2021.11.02 19:26:02 LOG5[2512:14340]: SSPI_write start 2021.11.02 19:26:02 LOG7[2512:14340]: SSPI_write data is GET 2021.11.02 19:26:02 LOG7[2512:14340]: send all data after encrypt 2021.11.02 19:26:02 LOG7[2512:14340]: data send to ssl_socket =770 2021.11.02 19:26:02 LOG7[2512:14340]: add ssl read socket to pool 2021.11.02 19:26:02 LOG7[2512:14340]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:02 LOG7[2512:14340]: Enter pool section on transfer 2021.11.02 19:26:02 LOG7[2512:14340]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:02 LOG7[2512:14340]: SSPI_read start 2021.11.02 19:26:02 LOG7[2512:14340]: recv ok on SSPI_read err= 13 2021.11.02 19:26:02 LOG5[2512:14340]: Received 13 bytes from ssl socket 2021.11.02 19:26:02 LOG5[2512:14340]: Client request RENEGOTIATE 2021.11.02 19:26:02 LOG5[2512:14340]: 110 bytes of handshake data sent 2021.11.02 19:26:02 LOG5[2512:14340]: 1380 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:02 LOG5[2512:14340]: 5952 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:02 LOG3[2512:14340]: **** Error 0x8009035d returned by InitializeSecurityContext (2) 2021.11.02 19:26:02 LOG3[2512:14340]: Couldn't complete RENEGOTIATE 2021.11.02 19:26:02 LOG3[2512:14340]: error on SSPI_read 2021.11.02 19:26:02 LOG5[2512:14340]: Connection reset: 770 bytes sent to SSL, 0 bytes sent to socket 2021.11.02 19:26:02 LOG7[2512:14340]: free Buffers 2021.11.02 19:26:02 LOG7[2512:14340]: delete c->hContext 2021.11.02 19:26:02 LOG7[2512:14340]: delete c->hClientCreds 2021.11.02 19:26:02 LOG5[2512:14340]: incomp_mess = 1, extra_data = 0 2021.11.02 19:26:02 LOG7[2512:14340]: https finished (1 left) 2021.11.02 19:26:02 LOG7[2512:4552]: data reciev from socket = 770 2021.11.02 19:26:02 LOG7[2512:4552]: add ssl read socket to pool 2021.11.02 19:26:02 LOG7[2512:4552]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=770,want_rd = 0 2021.11.02 19:26:02 LOG7[2512:4552]: Enter pool section on transfer 2021.11.02 19:26:02 LOG7[2512:4552]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=302 2021.11.02 19:26:02 LOG5[2512:4552]: SSPI_write start 2021.11.02 19:26:02 LOG7[2512:4552]: SSPI_write data is GET 2021.11.02 19:26:02 LOG7[2512:4552]: send all data after encrypt 2021.11.02 19:26:02 LOG7[2512:4552]: data send to ssl_socket =770 2021.11.02 19:26:02 LOG7[2512:4552]: add ssl read socket to pool 2021.11.02 19:26:02 LOG7[2512:4552]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:02 LOG7[2512:4552]: Enter pool section on transfer 2021.11.02 19:26:02 LOG7[2512:4552]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:02 LOG7[2512:4552]: SSPI_read start 2021.11.02 19:26:02 LOG7[2512:4552]: recv ok on SSPI_read err= 13 2021.11.02 19:26:02 LOG5[2512:4552]: Received 13 bytes from ssl socket 2021.11.02 19:26:02 LOG5[2512:4552]: Client request RENEGOTIATE 2021.11.02 19:26:02 LOG5[2512:4552]: 110 bytes of handshake data sent 2021.11.02 19:26:02 LOG5[2512:4552]: 4208 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:02 LOG5[2512:4552]: 2384 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG3[2512:4552]: **** Error 0x8009035d returned by InitializeSecurityContext (2) 2021.11.02 19:26:03 LOG3[2512:4552]: Couldn't complete RENEGOTIATE 2021.11.02 19:26:03 LOG3[2512:4552]: error on SSPI_read 2021.11.02 19:26:03 LOG5[2512:4552]: Connection reset: 770 bytes sent to SSL, 0 bytes sent to socket 2021.11.02 19:26:03 LOG7[2512:4552]: free Buffers 2021.11.02 19:26:03 LOG7[2512:4552]: delete c->hContext 2021.11.02 19:26:03 LOG7[2512:4552]: delete c->hClientCreds 2021.11.02 19:26:03 LOG5[2512:4552]: incomp_mess = 1, extra_data = 0 2021.11.02 19:26:03 LOG7[2512:4552]: https finished (0 left) 2021.11.02 19:26:03 LOG7[2512:15796]: https accepted FD=332 from 127.0.0.1:60299 2021.11.02 19:26:03 LOG7[2512:15796]: Creating a new thread 2021.11.02 19:26:03 LOG7[2512:15796]: New thread created 2021.11.02 19:26:03 LOG7[2512:4868]: client start 2021.11.02 19:26:03 LOG7[2512:4868]: https started 2021.11.02 19:26:03 LOG7[2512:4868]: FD 332 in non-blocking mode 2021.11.02 19:26:03 LOG7[2512:4868]: TCP_NODELAY option set on local socket 2021.11.02 19:26:03 LOG5[2512:4868]: https connected from 127.0.0.1:60299 2021.11.02 19:26:03 LOG7[2512:4868]: FD 1132 in non-blocking mode 2021.11.02 19:26:03 LOG7[2512:4868]: https connecting 2021.11.02 19:26:03 LOG7[2512:4868]: connect_wait: waiting 10 seconds 2021.11.02 19:26:03 LOG7[2512:4868]: connect_wait: connected 2021.11.02 19:26:03 LOG7[2512:4868]: Remote FD=1132 initialized 2021.11.02 19:26:03 LOG7[2512:4868]: TCP_NODELAY option set on remote socket 2021.11.02 19:26:03 LOG7[2512:4868]: start SSPI connect 2021.11.02 19:26:03 LOG5[2512:4868]: try to read the client certificate 2021.11.02 19:26:03 LOG7[2512:4868]: open file C:\CryptoPro\TestCert\AlexYakovlevTestExported.cer with certificate 2021.11.02 19:26:03 LOG5[2512:4868]: CertCreateCertificateContext(der) failed: 2148086027d. Trying certificate as base64
2021.11.02 19:26:03 LOG5[2512:4868]: CertFindCertificateInStore not find client certificate in store CURRENT_USER. Looking at LOCAL_MACHINE 2021.11.02 19:26:03 LOG3[2512:4868]: Credentials complete 2021.11.02 19:26:03 LOG7[2512:4868]: 120 bytes of handshake data sent 2021.11.02 19:26:03 LOG5[2512:4868]: 1252 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG5[2512:4868]: 215 bytes of handshake data sent 2021.11.02 19:26:03 LOG5[2512:4868]: 31 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG5[2512:4868]: Handshake was successful 2021.11.02 19:26:03 LOG5[2512:4868]: PerformClientHandshake finish 2021.11.02 19:26:03 LOG5[2512:4868]: Verify_level = 0, skipping Server certificate verification 2021.11.02 19:26:03 LOG7[2512:4868]: add ssl read socket to pool 2021.11.02 19:26:03 LOG7[2512:4868]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:03 LOG7[2512:4868]: Enter pool section on transfer 2021.11.02 19:26:03 LOG7[2512:4868]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:03 LOG7[2512:4868]: data reciev from socket = 770 2021.11.02 19:26:03 LOG7[2512:4868]: add ssl read socket to pool 2021.11.02 19:26:03 LOG7[2512:4868]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=770,want_rd = 0 2021.11.02 19:26:03 LOG7[2512:4868]: Enter pool section on transfer 2021.11.02 19:26:03 LOG7[2512:4868]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=302 2021.11.02 19:26:03 LOG5[2512:4868]: SSPI_write start 2021.11.02 19:26:03 LOG7[2512:4868]: SSPI_write data is GET 2021.11.02 19:26:03 LOG7[2512:4868]: send all data after encrypt 2021.11.02 19:26:03 LOG7[2512:4868]: data send to ssl_socket =770 2021.11.02 19:26:03 LOG7[2512:4868]: add ssl read socket to pool 2021.11.02 19:26:03 LOG7[2512:4868]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:03 LOG7[2512:4868]: Enter pool section on transfer 2021.11.02 19:26:03 LOG7[2512:4868]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2021.11.02 19:26:03 LOG7[2512:4868]: SSPI_read start 2021.11.02 19:26:03 LOG7[2512:4868]: recv ok on SSPI_read err= 13 2021.11.02 19:26:03 LOG5[2512:4868]: Received 13 bytes from ssl socket 2021.11.02 19:26:03 LOG5[2512:4868]: Client request RENEGOTIATE 2021.11.02 19:26:03 LOG5[2512:4868]: 110 bytes of handshake data sent 2021.11.02 19:26:03 LOG5[2512:4868]: 5792 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG5[2512:4868]: 1540 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG3[2512:4868]: **** Error 0x8009035d returned by InitializeSecurityContext (2) 2021.11.02 19:26:03 LOG3[2512:4868]: Couldn't complete RENEGOTIATE 2021.11.02 19:26:03 LOG3[2512:4868]: error on SSPI_read 2021.11.02 19:26:03 LOG5[2512:4868]: Connection reset: 770 bytes sent to SSL, 0 bytes sent to socket 2021.11.02 19:26:03 LOG7[2512:4868]: free Buffers 2021.11.02 19:26:03 LOG7[2512:4868]: delete c->hContext 2021.11.02 19:26:03 LOG7[2512:4868]: delete c->hClientCreds 2021.11.02 19:26:03 LOG5[2512:4868]: incomp_mess = 1, extra_data = 0 2021.11.02 19:26:03 LOG7[2512:4868]: https finished (0 left) 2021.11.02 19:26:03 LOG7[2512:15796]: https accepted FD=1160 from 127.0.0.1:50633 2021.11.02 19:26:03 LOG7[2512:15796]: Creating a new thread 2021.11.02 19:26:03 LOG7[2512:15796]: New thread created 2021.11.02 19:26:03 LOG7[2512:7444]: client start 2021.11.02 19:26:03 LOG7[2512:7444]: https started 2021.11.02 19:26:03 LOG7[2512:7444]: FD 1160 in non-blocking mode 2021.11.02 19:26:03 LOG7[2512:7444]: TCP_NODELAY option set on local socket 2021.11.02 19:26:03 LOG5[2512:7444]: https connected from 127.0.0.1:50633 2021.11.02 19:26:03 LOG7[2512:7444]: FD 932 in non-blocking mode 2021.11.02 19:26:03 LOG7[2512:7444]: https connecting 2021.11.02 19:26:03 LOG7[2512:7444]: connect_wait: waiting 10 seconds 2021.11.02 19:26:03 LOG7[2512:7444]: connect_wait: connected 2021.11.02 19:26:03 LOG7[2512:7444]: Remote FD=932 initialized 2021.11.02 19:26:03 LOG7[2512:7444]: TCP_NODELAY option set on remote socket 2021.11.02 19:26:03 LOG7[2512:7444]: start SSPI connect 2021.11.02 19:26:03 LOG5[2512:7444]: try to read the client certificate 2021.11.02 19:26:03 LOG7[2512:7444]: open file C:\CryptoPro\TestCert\AlexYakovlevTestExported.cer with certificate 2021.11.02 19:26:03 LOG5[2512:7444]: CertCreateCertificateContext(der) failed: 2148086027d. Trying certificate as base64
2021.11.02 19:26:03 LOG5[2512:7444]: CertFindCertificateInStore not find client certificate in store CURRENT_USER. Looking at LOCAL_MACHINE 2021.11.02 19:26:03 LOG3[2512:7444]: Credentials complete 2021.11.02 19:26:03 LOG7[2512:7444]: 120 bytes of handshake data sent 2021.11.02 19:26:03 LOG5[2512:7444]: 1252 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG5[2512:7444]: 215 bytes of handshake data sent 2021.11.02 19:26:03 LOG5[2512:7444]: 31 bytes of handshake(in handshake loop) data received. 2021.11.02 19:26:03 LOG5[2512:7444]: Handshake was successful 2021.11.02 19:26:03 LOG5[2512:7444]: PerformClientHandshake finish 2021.11.02 19:26:03 LOG5[2512:7444]: Verify_level = 0, skipping Server certificate verification 2021.11.02 19:26:03 LOG7[2512:7444]: add ssl read socket to pool 2021.11.02 19:26:03 LOG7[2512:7444]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2021.11.02 19:26:03 LOG7[2512:7444]: Enter pool section on transfer 2021.11.02 19:26:03 LOG7[2512:7444]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0
Подскажите, пожалуйста, почему не устанавливается соединение? Отредактировано пользователем 2 ноября 2021 г. 19:31:32(UTC)
| Причина: Не указана
|