Статус: Новичок
Группы: Участники
Зарегистрирован: 05.09.2019(UTC) Сообщений: 5  Откуда: спб
|
Здравствуйте, возникает ошибка при попытке установить защищенное соединение с ГИС ЖКХ с помощью stunnel Цитата:Status code: -2147352567 Source: WinHttp.WinHttpRequest Description: Ошибка поддержки безопасных каналов Stunnel 5.0.14413.0 КриптоПро SCP 5.0.11455 КС1 Stunnel работает в режиме службы под пользователем Соединение настраиваю на виртуальной машине Windows Server 2019 Доступ к закрытой части ключа на флешке с помощью утилиты AnywhereUSB Прокси сервер отключен Конфиг stunnel.conf
output=C:\stunnel\stunnel.log socket = l:TCP_NODELAY=1 socket = r:TCP_NODELAY=1 debug=7
[https] client=yes accept=localhost:10081 connect=api.dom.gosuslugi.ru:443 cert=C:\stunnel\*****.cer verify=2
Лог stunnel
2020.02.05 16:26:15 LOG5[8340:15984]: stunnel 4.18 on x86-pc-unknown 2020.02.05 16:26:15 LOG5[8340:15984]: Threading:WIN32 Sockets:SELECT,IPv6 2020.02.05 16:26:15 LOG5[8340:15984]: No limit detected for the number of clients 2020.02.05 16:26:15 LOG7[8340:15984]: FD 396 in non-blocking mode 2020.02.05 16:26:15 LOG7[8340:15984]: SO_REUSEADDR option set on accept socket 2020.02.05 16:26:15 LOG7[8340:15984]: https bound to ::1:10081 2020.02.05 16:26:16 LOG7[8340:15984]: https accepted FD=400 from ::1:52296 2020.02.05 16:26:16 LOG7[8340:15984]: Creating a new thread 2020.02.05 16:26:16 LOG7[8340:15984]: New thread created 2020.02.05 16:26:16 LOG7[8340:17168]: client start 2020.02.05 16:26:16 LOG7[8340:17168]: https started 2020.02.05 16:26:16 LOG7[8340:17168]: FD 400 in non-blocking mode 2020.02.05 16:26:16 LOG7[8340:17168]: TCP_NODELAY option set on local socket 2020.02.05 16:26:16 LOG5[8340:17168]: https connected from ::1:52296 2020.02.05 16:26:16 LOG7[8340:17168]: FD 468 in non-blocking mode 2020.02.05 16:26:16 LOG7[8340:17168]: https connecting 2020.02.05 16:26:16 LOG7[8340:17168]: connect_wait: waiting 10 seconds 2020.02.05 16:26:16 LOG7[8340:17168]: connect_wait: connected 2020.02.05 16:26:16 LOG7[8340:17168]: Remote FD=468 initialized 2020.02.05 16:26:16 LOG7[8340:17168]: TCP_NODELAY option set on remote socket 2020.02.05 16:26:16 LOG7[8340:17168]: start SSPI connect 2020.02.05 16:26:16 LOG5[8340:17168]: try to read the client certificate 2020.02.05 16:26:16 LOG7[8340:17168]: open file C:\stunnel\NelubinMY_20112019-24112020.cer with certificate 2020.02.05 16:26:17 LOG3[8340:17168]: Credentials complete 2020.02.05 16:26:17 LOG7[8340:17168]: 116 bytes of handshake data sent 2020.02.05 16:26:17 LOG5[8340:17168]: 2906 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:19 LOG5[8340:17168]: 5129 bytes of handshake data sent 2020.02.05 16:26:19 LOG5[8340:17168]: 2974 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:19 LOG5[8340:17168]: Handshake was successful 2020.02.05 16:26:19 LOG5[8340:17168]: PerformClientHandshake finish 2020.02.05 16:26:19 LOG5[8340:17168]: Server subject: C 2020.02.05 16:26:19 LOG5[8340:17168]: Server issuer: C 2020.02.05 16:26:19 LOG5[8340:17168]: No error on CertGetCertificateChain 2020.02.05 16:26:19 LOG5[8340:17168]: Protocol: 0x800 2020.02.05 16:26:19 LOG5[8340:17168]: Cipher: Gost 28147-89 2020.02.05 16:26:19 LOG5[8340:17168]: Cipher strength: 256 2020.02.05 16:26:19 LOG5[8340:17168]: Hash: 0x8021 2020.02.05 16:26:19 LOG5[8340:17168]: Hash strength: 256 2020.02.05 16:26:19 LOG5[8340:17168]: Key exchange: 0xaa47 2020.02.05 16:26:19 LOG5[8340:17168]: Key exchange strength: 512 2020.02.05 16:26:19 LOG7[8340:17168]: Handshake_done 2020.02.05 16:26:19 LOG7[8340:17168]: add ssl read socket to pool 2020.02.05 16:26:19 LOG7[8340:17168]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:19 LOG7[8340:17168]: Enter pool section on transfer 2020.02.05 16:26:19 LOG7[8340:17168]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:19 LOG7[8340:17168]: data reciev from socket = 178 2020.02.05 16:26:19 LOG7[8340:17168]: add ssl read socket to pool 2020.02.05 16:26:19 LOG7[8340:17168]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=178,want_rd = 0 2020.02.05 16:26:19 LOG7[8340:17168]: Enter pool section on transfer 2020.02.05 16:26:19 LOG7[8340:17168]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=b2 2020.02.05 16:26:19 LOG5[8340:17168]: SSPI_write start 2020.02.05 16:26:19 LOG7[8340:17168]: SSPI_write data is 2020.02.05 16:26:19 LOG7[8340:17168]: send all data after encrypt 2020.02.05 16:26:19 LOG7[8340:17168]: data send to ssl_socket =178 2020.02.05 16:26:19 LOG7[8340:17168]: add ssl read socket to pool 2020.02.05 16:26:19 LOG7[8340:17168]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:19 LOG7[8340:17168]: Enter pool section on transfer 2020.02.05 16:26:19 LOG7[8340:17168]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:19 LOG7[8340:17168]: SSPI_read start 2020.02.05 16:26:19 LOG7[8340:17168]: recv ok on SSPI_read err= 1831 2020.02.05 16:26:19 LOG5[8340:17168]: Received 1831 bytes from ssl socket 2020.02.05 16:26:19 LOG7[8340:17168]: SSPI_read data in ssl_buff is HTTP 2020.02.05 16:26:19 LOG7[8340:17168]: data read from ssl_sock =1822 2020.02.05 16:26:19 LOG7[8340:17168]: add ssl read socket to pool 2020.02.05 16:26:19 LOG7[8340:17168]: ssl_rd = 1, c->ssl_ptr = 1822,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:19 LOG7[8340:17168]: add write socket to poll 2020.02.05 16:26:19 LOG7[8340:17168]: Enter pool section on transfer 2020.02.05 16:26:19 LOG7[8340:17168]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 71e c->sock_ptr=0 2020.02.05 16:26:19 LOG7[8340:17168]: data send to socket = 1822 2020.02.05 16:26:19 LOG7[8340:17168]: SSPI_read start 2020.02.05 16:26:19 LOG7[8340:17168]: recv ok on SSPI_read err= 0 2020.02.05 16:26:19 LOG3[8340:17168]: recv return 0 and ask more but there is not complete data for decrypt. Peer disconnected? 2020.02.05 16:26:19 LOG5[8340:17168]: SSPI_read: read socket closed 2020.02.05 16:26:19 LOG7[8340:17168]: Socket write shutdown 2020.02.05 16:26:19 LOG7[8340:17168]: c->ssl_ptr = 0 2020.02.05 16:26:19 LOG7[8340:17168]: Enter pool section on transfer 2020.02.05 16:26:19 LOG7[8340:17168]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:19 LOG7[8340:17168]: Socket closed on read 2020.02.05 16:26:19 LOG7[8340:17168]: SSL write shutdown 2020.02.05 16:26:19 LOG7[8340:17168]: Enter pool section on transfer 2020.02.05 16:26:19 LOG7[8340:17168]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:19 LOG7[8340:15984]: https accepted FD=1744 from ::1:52298 2020.02.05 16:26:19 LOG7[8340:15984]: Creating a new thread 2020.02.05 16:26:19 LOG7[8340:15984]: New thread created 2020.02.05 16:26:19 LOG7[8340:15172]: client start 2020.02.05 16:26:19 LOG7[8340:15172]: https started 2020.02.05 16:26:19 LOG7[8340:15172]: FD 1744 in non-blocking mode 2020.02.05 16:26:19 LOG7[8340:15172]: TCP_NODELAY option set on local socket 2020.02.05 16:26:19 LOG5[8340:15172]: https connected from ::1:52298 2020.02.05 16:26:19 LOG7[8340:15172]: FD 1760 in non-blocking mode 2020.02.05 16:26:19 LOG7[8340:15172]: https connecting 2020.02.05 16:26:19 LOG7[8340:15172]: connect_wait: waiting 10 seconds 2020.02.05 16:26:19 LOG5[8340:17168]: 11 bytes of close_notify data sent 2020.02.05 16:26:19 LOG6[8340:17168]: SSL_shutdown successfully sent close_notify 2020.02.05 16:26:19 LOG5[8340:17168]: Connection closed: 178 bytes sent to SSL, 1822 bytes sent to socket 2020.02.05 16:26:19 LOG7[8340:17168]: free Buffers 2020.02.05 16:26:19 LOG7[8340:17168]: delete c->hContext 2020.02.05 16:26:19 LOG7[8340:17168]: delete c->hClientCreds 2020.02.05 16:26:19 LOG5[8340:17168]: incomp_mess = 2, extra_data = 0 2020.02.05 16:26:19 LOG7[8340:17168]: https finished (1 left) 2020.02.05 16:26:19 LOG7[8340:15172]: connect_wait: connected 2020.02.05 16:26:19 LOG7[8340:15172]: Remote FD=1760 initialized 2020.02.05 16:26:19 LOG7[8340:15172]: TCP_NODELAY option set on remote socket 2020.02.05 16:26:19 LOG7[8340:15172]: start SSPI connect 2020.02.05 16:26:19 LOG5[8340:15172]: try to read the client certificate 2020.02.05 16:26:19 LOG7[8340:15172]: open file C:\stunnel\NelubinMY_20112019-24112020.cer with certificate 2020.02.05 16:26:21 LOG3[8340:15172]: Credentials complete 2020.02.05 16:26:21 LOG7[8340:15172]: 112 bytes of handshake data sent 2020.02.05 16:26:21 LOG5[8340:15172]: 1380 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:21 LOG5[8340:15172]: 1526 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:22 LOG5[8340:15172]: 5129 bytes of handshake data sent 2020.02.05 16:26:22 LOG5[8340:15172]: 1380 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:22 LOG5[8340:15172]: 1594 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:22 LOG5[8340:15172]: Handshake was successful 2020.02.05 16:26:22 LOG5[8340:15172]: PerformClientHandshake finish 2020.02.05 16:26:22 LOG5[8340:15172]: Server subject: C 2020.02.05 16:26:22 LOG5[8340:15172]: Server issuer: C 2020.02.05 16:26:22 LOG5[8340:15172]: No error on CertGetCertificateChain 2020.02.05 16:26:22 LOG5[8340:15172]: Protocol: 0x800 2020.02.05 16:26:22 LOG5[8340:15172]: Cipher: Gost 28147-89 2020.02.05 16:26:22 LOG5[8340:15172]: Cipher strength: 256 2020.02.05 16:26:22 LOG5[8340:15172]: Hash: 0x8021 2020.02.05 16:26:22 LOG5[8340:15172]: Hash strength: 256 2020.02.05 16:26:22 LOG5[8340:15172]: Key exchange: 0xaa47 2020.02.05 16:26:22 LOG5[8340:15172]: Key exchange strength: 512 2020.02.05 16:26:22 LOG7[8340:15172]: Handshake_done 2020.02.05 16:26:22 LOG7[8340:15172]: add ssl read socket to pool 2020.02.05 16:26:22 LOG7[8340:15172]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:22 LOG7[8340:15172]: Enter pool section on transfer 2020.02.05 16:26:22 LOG7[8340:15172]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:22 LOG7[8340:15172]: data reciev from socket = 126 2020.02.05 16:26:22 LOG7[8340:15172]: add ssl read socket to pool 2020.02.05 16:26:22 LOG7[8340:15172]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=126,want_rd = 0 2020.02.05 16:26:22 LOG7[8340:15172]: Enter pool section on transfer 2020.02.05 16:26:22 LOG7[8340:15172]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=7e 2020.02.05 16:26:22 LOG5[8340:15172]: SSPI_write start 2020.02.05 16:26:22 LOG7[8340:15172]: SSPI_write data is 2020.02.05 16:26:22 LOG7[8340:15172]: send all data after encrypt 2020.02.05 16:26:22 LOG7[8340:15172]: data send to ssl_socket =126 2020.02.05 16:26:22 LOG7[8340:15172]: add ssl read socket to pool 2020.02.05 16:26:22 LOG7[8340:15172]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:22 LOG7[8340:15172]: Enter pool section on transfer 2020.02.05 16:26:22 LOG7[8340:15172]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:22 LOG7[8340:15172]: SSPI_read start 2020.02.05 16:26:22 LOG7[8340:15172]: recv ok on SSPI_read err= 1831 2020.02.05 16:26:22 LOG5[8340:15172]: Received 1831 bytes from ssl socket 2020.02.05 16:26:22 LOG7[8340:15172]: SSPI_read data in ssl_buff is HTTP 2020.02.05 16:26:22 LOG7[8340:15172]: data read from ssl_sock =1822 2020.02.05 16:26:22 LOG7[8340:15172]: add ssl read socket to pool 2020.02.05 16:26:22 LOG7[8340:15172]: ssl_rd = 1, c->ssl_ptr = 1822,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:22 LOG7[8340:15172]: add write socket to poll 2020.02.05 16:26:22 LOG7[8340:15172]: Enter pool section on transfer 2020.02.05 16:26:22 LOG7[8340:15172]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 71e c->sock_ptr=0 2020.02.05 16:26:22 LOG7[8340:15172]: data send to socket = 1822 2020.02.05 16:26:22 LOG7[8340:15172]: SSPI_read start 2020.02.05 16:26:22 LOG7[8340:15172]: recv ok on SSPI_read err= 0 2020.02.05 16:26:22 LOG3[8340:15172]: recv return 0 and ask more but there is not complete data for decrypt. Peer disconnected? 2020.02.05 16:26:22 LOG5[8340:15172]: SSPI_read: read socket closed 2020.02.05 16:26:22 LOG7[8340:15172]: Socket write shutdown 2020.02.05 16:26:22 LOG7[8340:15172]: c->ssl_ptr = 0 2020.02.05 16:26:22 LOG7[8340:15172]: Enter pool section on transfer 2020.02.05 16:26:22 LOG7[8340:15172]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:22 LOG7[8340:15172]: Socket closed on read 2020.02.05 16:26:22 LOG7[8340:15172]: SSL write shutdown 2020.02.05 16:26:22 LOG7[8340:15172]: Enter pool section on transfer 2020.02.05 16:26:22 LOG7[8340:15172]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:22 LOG7[8340:15984]: https accepted FD=1820 from ::1:52300 2020.02.05 16:26:22 LOG7[8340:15984]: Creating a new thread 2020.02.05 16:26:22 LOG7[8340:15984]: New thread created 2020.02.05 16:26:22 LOG7[8340:14100]: client start 2020.02.05 16:26:22 LOG7[8340:14100]: https started 2020.02.05 16:26:22 LOG7[8340:14100]: FD 1820 in non-blocking mode 2020.02.05 16:26:22 LOG7[8340:14100]: TCP_NODELAY option set on local socket 2020.02.05 16:26:22 LOG5[8340:14100]: https connected from ::1:52300 2020.02.05 16:26:22 LOG5[8340:15172]: 11 bytes of close_notify data sent 2020.02.05 16:26:22 LOG6[8340:15172]: SSL_shutdown successfully sent close_notify 2020.02.05 16:26:22 LOG5[8340:15172]: Connection closed: 126 bytes sent to SSL, 1822 bytes sent to socket 2020.02.05 16:26:22 LOG7[8340:15172]: free Buffers 2020.02.05 16:26:22 LOG7[8340:15172]: delete c->hContext 2020.02.05 16:26:22 LOG7[8340:15172]: delete c->hClientCreds 2020.02.05 16:26:22 LOG5[8340:15172]: incomp_mess = 2, extra_data = 1 2020.02.05 16:26:22 LOG7[8340:15172]: https finished (1 left) 2020.02.05 16:26:22 LOG7[8340:14100]: FD 1864 in non-blocking mode 2020.02.05 16:26:22 LOG7[8340:14100]: https connecting 2020.02.05 16:26:22 LOG7[8340:14100]: connect_wait: waiting 10 seconds 2020.02.05 16:26:22 LOG7[8340:14100]: connect_wait: connected 2020.02.05 16:26:22 LOG7[8340:14100]: Remote FD=1864 initialized 2020.02.05 16:26:22 LOG7[8340:14100]: TCP_NODELAY option set on remote socket 2020.02.05 16:26:22 LOG7[8340:14100]: start SSPI connect 2020.02.05 16:26:22 LOG5[8340:14100]: try to read the client certificate 2020.02.05 16:26:22 LOG7[8340:14100]: open file C:\stunnel\NelubinMY_20112019-24112020.cer with certificate 2020.02.05 16:26:23 LOG3[8340:14100]: Credentials complete 2020.02.05 16:26:23 LOG7[8340:14100]: 112 bytes of handshake data sent 2020.02.05 16:26:23 LOG5[8340:14100]: 1380 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:23 LOG5[8340:14100]: 1526 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:24 LOG5[8340:14100]: 5129 bytes of handshake data sent 2020.02.05 16:26:24 LOG5[8340:14100]: 2974 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:24 LOG5[8340:14100]: Handshake was successful 2020.02.05 16:26:24 LOG5[8340:14100]: PerformClientHandshake finish 2020.02.05 16:26:24 LOG5[8340:14100]: Server subject: C 2020.02.05 16:26:24 LOG5[8340:14100]: Server issuer: C 2020.02.05 16:26:24 LOG5[8340:14100]: No error on CertGetCertificateChain 2020.02.05 16:26:24 LOG5[8340:14100]: Protocol: 0x800 2020.02.05 16:26:24 LOG5[8340:14100]: Cipher: Gost 28147-89 2020.02.05 16:26:24 LOG5[8340:14100]: Cipher strength: 256 2020.02.05 16:26:24 LOG5[8340:14100]: Hash: 0x8021 2020.02.05 16:26:24 LOG5[8340:14100]: Hash strength: 256 2020.02.05 16:26:24 LOG5[8340:14100]: Key exchange: 0xaa47 2020.02.05 16:26:24 LOG5[8340:14100]: Key exchange strength: 512 2020.02.05 16:26:24 LOG7[8340:14100]: Handshake_done 2020.02.05 16:26:24 LOG7[8340:14100]: add ssl read socket to pool 2020.02.05 16:26:24 LOG7[8340:14100]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:24 LOG7[8340:14100]: Enter pool section on transfer 2020.02.05 16:26:24 LOG7[8340:14100]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:24 LOG7[8340:14100]: data reciev from socket = 126 2020.02.05 16:26:24 LOG7[8340:14100]: add ssl read socket to pool 2020.02.05 16:26:24 LOG7[8340:14100]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=126,want_rd = 0 2020.02.05 16:26:24 LOG7[8340:14100]: Enter pool section on transfer 2020.02.05 16:26:24 LOG7[8340:14100]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=7e 2020.02.05 16:26:24 LOG5[8340:14100]: SSPI_write start 2020.02.05 16:26:24 LOG7[8340:14100]: SSPI_write data is 2020.02.05 16:26:24 LOG7[8340:14100]: send all data after encrypt 2020.02.05 16:26:24 LOG7[8340:14100]: data send to ssl_socket =126 2020.02.05 16:26:24 LOG7[8340:14100]: add ssl read socket to pool 2020.02.05 16:26:24 LOG7[8340:14100]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:24 LOG7[8340:14100]: Enter pool section on transfer 2020.02.05 16:26:24 LOG7[8340:14100]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:24 LOG7[8340:14100]: SSPI_read start 2020.02.05 16:26:24 LOG7[8340:14100]: recv ok on SSPI_read err= 1831 2020.02.05 16:26:24 LOG5[8340:14100]: Received 1831 bytes from ssl socket 2020.02.05 16:26:24 LOG7[8340:14100]: SSPI_read data in ssl_buff is HTTP 2020.02.05 16:26:24 LOG7[8340:14100]: data read from ssl_sock =1822 2020.02.05 16:26:24 LOG7[8340:14100]: add ssl read socket to pool 2020.02.05 16:26:24 LOG7[8340:14100]: ssl_rd = 1, c->ssl_ptr = 1822,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:24 LOG7[8340:14100]: add write socket to poll 2020.02.05 16:26:24 LOG7[8340:14100]: Enter pool section on transfer 2020.02.05 16:26:24 LOG7[8340:14100]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 71e c->sock_ptr=0 2020.02.05 16:26:24 LOG7[8340:14100]: data send to socket = 1822 2020.02.05 16:26:24 LOG7[8340:14100]: SSPI_read start 2020.02.05 16:26:24 LOG7[8340:14100]: recv ok on SSPI_read err= 0 2020.02.05 16:26:24 LOG3[8340:14100]: recv return 0 and ask more but there is not complete data for decrypt. Peer disconnected? 2020.02.05 16:26:24 LOG5[8340:14100]: SSPI_read: read socket closed 2020.02.05 16:26:24 LOG7[8340:14100]: Socket write shutdown 2020.02.05 16:26:24 LOG7[8340:14100]: c->ssl_ptr = 0 2020.02.05 16:26:24 LOG7[8340:14100]: Enter pool section on transfer 2020.02.05 16:26:24 LOG7[8340:14100]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:24 LOG7[8340:14100]: Socket closed on read 2020.02.05 16:26:24 LOG7[8340:14100]: SSL write shutdown 2020.02.05 16:26:24 LOG7[8340:14100]: Enter pool section on transfer 2020.02.05 16:26:24 LOG7[8340:14100]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:24 LOG7[8340:15984]: https accepted FD=1884 from ::1:52302 2020.02.05 16:26:24 LOG7[8340:15984]: Creating a new thread 2020.02.05 16:26:24 LOG7[8340:15984]: New thread created 2020.02.05 16:26:24 LOG7[8340:13012]: client start 2020.02.05 16:26:24 LOG7[8340:13012]: https started 2020.02.05 16:26:24 LOG7[8340:13012]: FD 1884 in non-blocking mode 2020.02.05 16:26:24 LOG7[8340:13012]: TCP_NODELAY option set on local socket 2020.02.05 16:26:24 LOG5[8340:13012]: https connected from ::1:52302 2020.02.05 16:26:24 LOG5[8340:14100]: 11 bytes of close_notify data sent 2020.02.05 16:26:24 LOG6[8340:14100]: SSL_shutdown successfully sent close_notify 2020.02.05 16:26:24 LOG5[8340:14100]: Connection closed: 126 bytes sent to SSL, 1822 bytes sent to socket 2020.02.05 16:26:24 LOG7[8340:14100]: free Buffers 2020.02.05 16:26:24 LOG7[8340:14100]: delete c->hContext 2020.02.05 16:26:24 LOG7[8340:14100]: delete c->hClientCreds 2020.02.05 16:26:24 LOG5[8340:14100]: incomp_mess = 2, extra_data = 1 2020.02.05 16:26:24 LOG7[8340:14100]: https finished (1 left) 2020.02.05 16:26:24 LOG7[8340:13012]: FD 1752 in non-blocking mode 2020.02.05 16:26:24 LOG7[8340:13012]: https connecting 2020.02.05 16:26:24 LOG7[8340:13012]: connect_wait: waiting 10 seconds 2020.02.05 16:26:25 LOG7[8340:13012]: connect_wait: connected 2020.02.05 16:26:25 LOG7[8340:13012]: Remote FD=1752 initialized 2020.02.05 16:26:25 LOG7[8340:13012]: TCP_NODELAY option set on remote socket 2020.02.05 16:26:25 LOG7[8340:13012]: start SSPI connect 2020.02.05 16:26:25 LOG5[8340:13012]: try to read the client certificate 2020.02.05 16:26:25 LOG7[8340:13012]: open file C:\stunnel\NelubinMY_20112019-24112020.cer with certificate 2020.02.05 16:26:26 LOG3[8340:13012]: Credentials complete 2020.02.05 16:26:26 LOG7[8340:13012]: 112 bytes of handshake data sent 2020.02.05 16:26:26 LOG5[8340:13012]: 1380 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:26 LOG5[8340:13012]: 1526 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:30 LOG5[8340:13012]: 5129 bytes of handshake data sent 2020.02.05 16:26:30 LOG5[8340:13012]: 1380 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:30 LOG5[8340:13012]: 1594 bytes of handshake(in handshake loop) data received. 2020.02.05 16:26:30 LOG5[8340:13012]: Handshake was successful 2020.02.05 16:26:30 LOG5[8340:13012]: PerformClientHandshake finish 2020.02.05 16:26:30 LOG5[8340:13012]: Server subject: C 2020.02.05 16:26:30 LOG5[8340:13012]: Server issuer: C 2020.02.05 16:26:30 LOG5[8340:13012]: No error on CertGetCertificateChain 2020.02.05 16:26:30 LOG5[8340:13012]: Protocol: 0x800 2020.02.05 16:26:30 LOG5[8340:13012]: Cipher: Gost 28147-89 2020.02.05 16:26:30 LOG5[8340:13012]: Cipher strength: 256 2020.02.05 16:26:30 LOG5[8340:13012]: Hash: 0x8021 2020.02.05 16:26:30 LOG5[8340:13012]: Hash strength: 256 2020.02.05 16:26:30 LOG5[8340:13012]: Key exchange: 0xaa47 2020.02.05 16:26:30 LOG5[8340:13012]: Key exchange strength: 512 2020.02.05 16:26:30 LOG7[8340:13012]: Handshake_done 2020.02.05 16:26:30 LOG7[8340:13012]: add ssl read socket to pool 2020.02.05 16:26:30 LOG7[8340:13012]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:30 LOG7[8340:13012]: Enter pool section on transfer 2020.02.05 16:26:30 LOG7[8340:13012]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:30 LOG7[8340:13012]: data reciev from socket = 52 2020.02.05 16:26:30 LOG7[8340:13012]: add ssl read socket to pool 2020.02.05 16:26:30 LOG7[8340:13012]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=52,want_rd = 0 2020.02.05 16:26:30 LOG7[8340:13012]: Enter pool section on transfer 2020.02.05 16:26:30 LOG7[8340:13012]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=34 2020.02.05 16:26:30 LOG5[8340:13012]: SSPI_write start 2020.02.05 16:26:30 LOG7[8340:13012]: SSPI_write data is 2020.02.05 16:26:30 LOG7[8340:13012]: send all data after encrypt 2020.02.05 16:26:30 LOG7[8340:13012]: data send to ssl_socket =52 2020.02.05 16:26:30 LOG7[8340:13012]: add ssl read socket to pool 2020.02.05 16:26:30 LOG7[8340:13012]: ssl_rd = 1, c->ssl_ptr = 0,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:30 LOG7[8340:13012]: Enter pool section on transfer 2020.02.05 16:26:30 LOG7[8340:13012]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:30 LOG7[8340:13012]: SSPI_read start 2020.02.05 16:26:30 LOG7[8340:13012]: recv ok on SSPI_read err= 1831 2020.02.05 16:26:30 LOG5[8340:13012]: Received 1831 bytes from ssl socket 2020.02.05 16:26:30 LOG7[8340:13012]: SSPI_read data in ssl_buff is HTTP 2020.02.05 16:26:30 LOG7[8340:13012]: data read from ssl_sock =1822 2020.02.05 16:26:30 LOG7[8340:13012]: add ssl read socket to pool 2020.02.05 16:26:30 LOG7[8340:13012]: ssl_rd = 1, c->ssl_ptr = 1822,c->sock_ptr=0,want_rd = 0 2020.02.05 16:26:30 LOG7[8340:13012]: add write socket to poll 2020.02.05 16:26:30 LOG7[8340:13012]: Enter pool section on transfer 2020.02.05 16:26:30 LOG7[8340:13012]: !!!!!Call s_poll_wait with timeout = -1 ((sock_rd && ssl_rd)=1) c->ssl_ptr = 71e c->sock_ptr=0 2020.02.05 16:26:30 LOG7[8340:13012]: data send to socket = 1822 2020.02.05 16:26:30 LOG7[8340:13012]: SSPI_read start 2020.02.05 16:26:30 LOG7[8340:13012]: recv ok on SSPI_read err= 0 2020.02.05 16:26:30 LOG3[8340:13012]: recv return 0 and ask more but there is not complete data for decrypt. Peer disconnected? 2020.02.05 16:26:30 LOG5[8340:13012]: SSPI_read: read socket closed 2020.02.05 16:26:30 LOG7[8340:13012]: Socket write shutdown 2020.02.05 16:26:30 LOG7[8340:13012]: c->ssl_ptr = 0 2020.02.05 16:26:30 LOG7[8340:13012]: Enter pool section on transfer 2020.02.05 16:26:30 LOG7[8340:13012]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:30 LOG7[8340:13012]: Socket closed on read 2020.02.05 16:26:30 LOG7[8340:13012]: SSL write shutdown 2020.02.05 16:26:30 LOG7[8340:13012]: Enter pool section on transfer 2020.02.05 16:26:30 LOG7[8340:13012]: !!!!!Call s_poll_wait with timeout = 60 ((sock_rd && ssl_rd)=0) c->ssl_ptr = 0 c->sock_ptr=0 2020.02.05 16:26:30 LOG5[8340:13012]: 11 bytes of close_notify data sent 2020.02.05 16:26:30 LOG6[8340:13012]: SSL_shutdown successfully sent close_notify 2020.02.05 16:26:30 LOG5[8340:13012]: Connection closed: 52 bytes sent to SSL, 1822 bytes sent to socket 2020.02.05 16:26:30 LOG7[8340:13012]: free Buffers 2020.02.05 16:26:30 LOG7[8340:13012]: delete c->hContext 2020.02.05 16:26:30 LOG7[8340:13012]: delete c->hClientCreds 2020.02.05 16:26:30 LOG5[8340:13012]: incomp_mess = 2, extra_data = 1 2020.02.05 16:26:30 LOG7[8340:13012]: https finished (0 left)
|