необходимо сделать, чтобы при
https://127.0.0.1:8888/pgz/login.jsp - отдавалась страница
https://zakupki.gov.ru/pgz/login.jsp. начинаю с простой конфигурации:
default.cnf
pid=stunnel_cli.pid
output=stunnel_cli.log
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
debug = 7
foreground = yes
verify = 0
[https]
client = yes
accept = 127.0.0.1:1500
connect = zakupki.gov.ru:443
mutual_auth = no
При открытии
https://127.0.0.1:8888/pgz/login.jsp, браузер ничего не отображает и в логах ничего криминального.
2012.08.23 13:40:37 LOG5[321:0]: stunnel 4.18 on x86_64-unknown-linux-gnu
2012.08.23 13:40:37 LOG5[321:0]: Threading:FORK Sockets:POLL,IPv4 Auth:LIBWRAP
2012.08.23 13:40:37 LOG6[321:0]: file ulimit = 1024 (can be changed with 'ulimit -n')
2012.08.23 13:40:37 LOG6[321:0]: poll() used - no FD_SETSIZE limit for file descriptors
2012.08.23 13:40:37 LOG5[321:0]: 0 clients allowed
2012.08.23 13:40:37 LOG7[321:0]: FD 5 in non-blocking mode
2012.08.23 13:40:37 LOG7[321:0]: FD 6 in non-blocking mode
2012.08.23 13:40:37 LOG7[321:0]: FD 7 in non-blocking mode
2012.08.23 13:40:37 LOG7[321:0]: SO_REUSEADDR option set on accept socket
2012.08.23 13:40:37 LOG7[321:0]: https bound to 127.0.0.1:1500
2012.08.23 13:40:37 LOG7[321:0]: Created pid file /opt/cprocsp/sbin/amd64/stunnel_cli.pid
2012.08.23 13:40:43 LOG7[321:0]: https accepted FD=8 from 127.0.0.1:59846
2012.08.23 13:40:43 LOG7[321:0]: https accepted FD=8 from 127.0.0.1:59847
2012.08.23 13:40:43 LOG7[323:0]: client start
2012.08.23 13:40:43 LOG7[323:0]: https started
2012.08.23 13:40:43 LOG7[323:0]: FD 8 in non-blocking mode
2012.08.23 13:40:43 LOG7[323:0]: TCP_NODELAY option set on local socket
2012.08.23 13:40:43 LOG7[323:0]: FD 7 in non-blocking mode
2012.08.23 13:40:43 LOG7[323:0]: FD 9 in non-blocking mode
2012.08.23 13:40:43 LOG7[324:0]: client start
2012.08.23 13:40:43 LOG7[324:0]: https started
2012.08.23 13:40:43 LOG7[324:0]: FD 8 in non-blocking mode
2012.08.23 13:40:43 LOG7[324:0]: TCP_NODELAY option set on local socket
2012.08.23 13:40:43 LOG7[324:0]: FD 7 in non-blocking mode
2012.08.23 13:40:43 LOG7[324:0]: FD 9 in non-blocking mode
2012.08.23 13:40:43 LOG7[323:0]: Connection from 127.0.0.1:59846 permitted by libwrap
2012.08.23 13:40:43 LOG5[323:0]: https connected from 127.0.0.1:59846
2012.08.23 13:40:43 LOG7[324:0]: Connection from 127.0.0.1:59847 permitted by libwrap
2012.08.23 13:40:43 LOG5[324:0]: https connected from 127.0.0.1:59847
2012.08.23 13:40:43 LOG7[323:0]: FD 11 in non-blocking mode
2012.08.23 13:40:43 LOG7[323:0]: https connecting
2012.08.23 13:40:43 LOG7[323:0]: connect_wait: waiting 10 seconds
2012.08.23 13:40:43 LOG7[324:0]: FD 11 in non-blocking mode
2012.08.23 13:40:43 LOG7[324:0]: https connecting
2012.08.23 13:40:43 LOG7[324:0]: connect_wait: waiting 10 seconds
2012.08.23 13:40:43 LOG7[323:0]: connect_wait: connected
2012.08.23 13:40:43 LOG7[323:0]: Remote FD=11 initialized
2012.08.23 13:40:43 LOG7[323:0]: TCP_NODELAY option set on remote socket
2012.08.23 13:40:43 LOG7[323:0]: start SSPI connect
2012.08.23 13:40:43 LOG7[324:0]: connect_wait: connected
2012.08.23 13:40:43 LOG7[324:0]: Remote FD=11 initialized
2012.08.23 13:40:43 LOG7[324:0]: TCP_NODELAY option set on remote socket
2012.08.23 13:40:43 LOG7[324:0]: start SSPI connect
2012.08.23 13:40:43 LOG3[323:0]: Credentials complete
2012.08.23 13:40:43 LOG7[323:0]: 130 bytes of handshake data sent
2012.08.23 13:40:43 LOG3[324:0]: Credentials complete
2012.08.23 13:40:43 LOG7[324:0]: 130 bytes of handshake data sent
2012.08.23 13:40:43 LOG5[323:0]: 1520 bytes of handshake(in handshake loop) data received.
2012.08.23 13:40:43 LOG5[324:0]: 1520 bytes of handshake(in handshake loop) data received.
2012.08.23 13:40:43 LOG5[323:0]: 210 bytes of handshake data sent
2012.08.23 13:40:43 LOG5[323:0]: 31 bytes of handshake(in handshake loop) data received.
2012.08.23 13:40:43 LOG5[323:0]: Handshake was successful
2012.08.23 13:40:43 LOG5[323:0]: PerformClientHandshake finish
2012.08.23 13:40:43 LOG5[324:0]: 210 bytes of handshake data sent
2012.08.23 13:40:43 LOG5[323:0]: Server subject: E=info@onlanta.ru, C=RU, S=г. Москва, L=Москва, O="ООО ""ОНЛАНТА""", OU=Служба информационной безопасности, G=Фролова С.В, SN=zakupki.gov.ru, T=Руководитель СИБ, CN=zakupki.gov.ru
2012.08.23 13:40:43 LOG5[323:0]: Server issuer: E=uuc_fk@roskazna.ru, STREET=ул. Ильинка д.7, L=г. Москва, 1.2.840.113549.1.9.2="#0C8191D094D0B0D0BDD0BDD18BD0B920D181D0B5D180D182D0B8D184D0B8D0BAD0B0D18220D0BED182D0BAD180D18BD182D0BED0B3D0BE20D0BAD0BBD18ED187D0B020D0B8D181D0BFD0BED0BBD18CD0B7D183D0B5D182D181D18F20D181D0BE20D181D180D0B5D0B4D181D182D0B2D0BED0BC20D0A1D09AD097D09820D09AD180D0B8D0BFD182D0BE20D09FD180D0BE20435350", C=RU, OU=Управление режима секретности и безопасности информации, O=Федеральное казначейство, CN=Уполномоченный удостоверяющий центр Федерального казначейства
2012.08.23 13:40:43 LOG5[324:0]: 31 bytes of handshake(in handshake loop) data received.
2012.08.23 13:40:43 LOG5[324:0]: Handshake was successful
2012.08.23 13:40:43 LOG5[324:0]: PerformClientHandshake finish
2012.08.23 13:40:43 LOG5[324:0]: Server subject: E=info@onlanta.ru, C=RU, S=г. Москва, L=Москва, O="ООО ""ОНЛАНТА""", OU=Служба информационной безопасности, G=Фролова С.В, SN=zakupki.gov.ru, T=Руководитель СИБ, CN=zakupki.gov.ru
2012.08.23 13:40:43 LOG5[324:0]: Server issuer: E=uuc_fk@roskazna.ru, STREET=ул. Ильинка д.7, L=г. Москва, 1.2.840.113549.1.9.2="#0C8191D094D0B0D0BDD0BDD18BD0B920D181D0B5D180D182D0B8D184D0B8D0BAD0B0D18220D0BED182D0BAD180D18BD182D0BED0B3D0BE20D0BAD0BBD18ED187D0B020D0B8D181D0BFD0BED0BBD18CD0B7D183D0B5D182D181D18F20D181D0BE20D181D180D0B5D0B4D181D182D0B2D0BED0BC20D0A1D09AD097D09820D09AD180D0B8D0BFD182D0BE20D09FD180D0BE20435350", C=RU, OU=Управление режима секретности и безопасности информации, O=Федеральное казначейство, CN=Уполномоченный удостоверяющий центр Федерального казначейства
2012.08.23 13:40:43 LOG7[321:0]: Cleaning up the signal pipe
2012.08.23 13:40:43 LOG7[321:0]: Process 323 terminated on signal 11 (1 left)
2012.08.23 13:40:43 LOG7[321:0]: Cleaning up the signal pipe
2012.08.23 13:40:43 LOG7[321:0]: Process 324 terminated on signal 11 (0 left)