Results

By type

          Starting Stunnel with configuration:
pid = /usr/local/var/run/stunnel.pid
foreground = yes
debug = debug
sslVersion = all
[zookeeper-2181]
client = yes
CAfile = /tmp/cluster-ca.crt
cert = /etc/cluster-operator-certs/cluster-operator.crt
key = /etc/cluster-operator-certs/cluster-operator.key
accept = 0.0.0.0:2181
connect = onap-strimzi-zookeeper-client:2181
delay = yes
verify = 2


2023.02.02 06:01:19 LOG7[1:140068400744512]: Clients allowed=512000
2023.02.02 06:01:19 LOG5[1:140068400744512]: stunnel 4.56 on x86_64-redhat-linux-gnu platform
2023.02.02 06:01:19 LOG5[1:140068400744512]: Compiled/running with OpenSSL 1.0.1e-fips 11 Feb 2013
2023.02.02 06:01:19 LOG5[1:140068400744512]: Threading:PTHREAD Sockets:POLL,IPv6 SSL:ENGINE,OCSP,FIPS Auth:LIBWRAP
2023.02.02 06:01:19 LOG5[1:140068400744512]: Reading configuration from file /tmp/stunnel.conf
2023.02.02 06:01:19 LOG5[1:140068400744512]: FIPS mode is enabled
2023.02.02 06:01:19 LOG7[1:140068400744512]: Compression not enabled
2023.02.02 06:01:19 LOG7[1:140068400744512]: PRNG seeded successfully
2023.02.02 06:01:19 LOG6[1:140068400744512]: Initializing service [zookeeper-2181]
2023.02.02 06:01:19 LOG7[1:140068400744512]: Certificate: /etc/cluster-operator-certs/cluster-operator.crt
2023.02.02 06:01:19 LOG7[1:140068400744512]: Certificate loaded
2023.02.02 06:01:19 LOG7[1:140068400744512]: Key file: /etc/cluster-operator-certs/cluster-operator.key
2023.02.02 06:01:19 LOG7[1:140068400744512]: Private key loaded
2023.02.02 06:01:19 LOG7[1:140068400744512]: Loaded verify certificates from /tmp/cluster-ca.crt
2023.02.02 06:01:19 LOG7[1:140068400744512]: Loaded /tmp/cluster-ca.crt revocation lookup file
2023.02.02 06:01:19 LOG7[1:140068400744512]: SSL options set: 0x01000004
2023.02.02 06:01:19 LOG5[1:140068400744512]: Configuration successful
2023.02.02 06:01:19 LOG7[1:140068400744512]: Service [zookeeper-2181] (FD=11) bound to 0.0.0.0:2181
2023.02.02 06:01:19 LOG7[1:140068400744512]: Created pid file /usr/local/var/run/stunnel.pid
2023.02.02 06:01:19 LOG7[1:140068400744512]: Service [zookeeper-2181] accepted (FD=3) from 127.0.0.1:46616
2023.02.02 06:01:19 LOG7[1:140068400740096]: Service [zookeeper-2181] started
2023.02.02 06:01:19 LOG7[1:140068400740096]: Waiting for a libwrap process
2023.02.02 06:01:19 LOG7[1:140068400740096]: Acquired libwrap process #0
2023.02.02 06:01:19 LOG7[1:140068400740096]: Releasing libwrap process #0
2023.02.02 06:01:19 LOG7[1:140068400740096]: Released libwrap process #0
2023.02.02 06:01:19 LOG7[1:140068400740096]: Service [zookeeper-2181] permitted by libwrap from 127.0.0.1:46616
2023.02.02 06:01:19 LOG5[1:140068400740096]: Service [zookeeper-2181] accepted connection from 127.0.0.1:46616
2023.02.02 06:01:19 LOG6[1:140068400740096]: connect_blocking: connecting 10.233.4.119:2181
2023.02.02 06:01:19 LOG7[1:140068400740096]: connect_blocking: s_poll_wait 10.233.4.119:2181: waiting 10 seconds
2023.02.02 06:01:19 LOG5[1:140068400740096]: connect_blocking: connected 10.233.4.119:2181
2023.02.02 06:01:19 LOG5[1:140068400740096]: Service [zookeeper-2181] connected remote server from 10.233.65.83:39752
2023.02.02 06:01:19 LOG7[1:140068400740096]: Remote socket (FD=12) initialized
2023.02.02 06:01:19 LOG7[1:140068400740096]: SNI: sending servername: onap-strimzi-zookeeper-client
2023.02.02 06:01:19 LOG7[1:140068400740096]: SSL state (connect): before/connect initialization
2023.02.02 06:01:19 LOG7[1:140068400740096]: SSL state (connect): SSLv2/v3 write client hello A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 read server hello A
2023.02.02 06:01:20 LOG7[1:140068400740096]: Starting certificate verification: depth=1, /O=io.strimzi/CN=cluster-ca v0
2023.02.02 06:01:20 LOG5[1:140068400740096]: Certificate accepted: depth=1, /O=io.strimzi/CN=cluster-ca v0
2023.02.02 06:01:20 LOG7[1:140068400740096]: Starting certificate verification: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper
2023.02.02 06:01:20 LOG5[1:140068400740096]: Certificate accepted: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 read server certificate A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 read server key exchange A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 read server certificate request A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 read server done A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 write client certificate A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 write client key exchange A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 write certificate verify A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 write change cipher spec A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 write finished A
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 flush data
2023.02.02 06:01:20 LOG7[1:140068400740096]: SSL state (connect): SSLv3 read finished A
2023.02.02 06:01:20 LOG7[1:140068400740096]:    1 items in the session cache
2023.02.02 06:01:20 LOG7[1:140068400740096]:    1 client connects (SSL_connect())
2023.02.02 06:01:20 LOG7[1:140068400740096]:    1 client connects that finished
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 client renegotiations requested
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 server connects (SSL_accept())
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 server connects that finished
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 server renegotiations requested
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 session cache hits
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 external session cache hits
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 session cache misses
2023.02.02 06:01:20 LOG7[1:140068400740096]:    0 session cache timeouts
2023.02.02 06:01:20 LOG6[1:140068400740096]: SSL connected: new session negotiated
2023.02.02 06:01:20 LOG6[1:140068400740096]: Negotiated protocol version: TLSv1.2
2023.02.02 06:01:20 LOG6[1:140068400740096]: Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
2023.02.02 06:01:20 LOG6[1:140068400740096]: Compression: null, expansion: null
2023.02.02 06:01:20 LOG7[1:140068400744512]: Service [zookeeper-2181] accepted (FD=13) from 127.0.0.1:46624
2023.02.02 06:01:20 LOG7[1:140068400670464]: Service [zookeeper-2181] started
2023.02.02 06:01:20 LOG7[1:140068400670464]: Waiting for a libwrap process
2023.02.02 06:01:20 LOG7[1:140068400670464]: Acquired libwrap process #0
2023.02.02 06:01:20 LOG7[1:140068400670464]: Releasing libwrap process #0
2023.02.02 06:01:20 LOG7[1:140068400670464]: Released libwrap process #0
2023.02.02 06:01:20 LOG7[1:140068400670464]: Service [zookeeper-2181] permitted by libwrap from 127.0.0.1:46624
2023.02.02 06:01:20 LOG5[1:140068400670464]: Service [zookeeper-2181] accepted connection from 127.0.0.1:46624
2023.02.02 06:01:20 LOG6[1:140068400670464]: connect_blocking: connecting 10.233.4.119:2181
2023.02.02 06:01:20 LOG7[1:140068400670464]: connect_blocking: s_poll_wait 10.233.4.119:2181: waiting 10 seconds
2023.02.02 06:01:20 LOG5[1:140068400670464]: connect_blocking: connected 10.233.4.119:2181
2023.02.02 06:01:20 LOG5[1:140068400670464]: Service [zookeeper-2181] connected remote server from 10.233.65.83:39760
2023.02.02 06:01:20 LOG7[1:140068400670464]: Remote socket (FD=14) initialized
2023.02.02 06:01:20 LOG7[1:140068400670464]: SNI: sending servername: onap-strimzi-zookeeper-client
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): before/connect initialization
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 write client hello A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 read server hello A
2023.02.02 06:01:20 LOG7[1:140068400670464]: Starting certificate verification: depth=1, /O=io.strimzi/CN=cluster-ca v0
2023.02.02 06:01:20 LOG5[1:140068400670464]: Certificate accepted: depth=1, /O=io.strimzi/CN=cluster-ca v0
2023.02.02 06:01:20 LOG7[1:140068400670464]: Starting certificate verification: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper
2023.02.02 06:01:20 LOG5[1:140068400670464]: Certificate accepted: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 read server certificate A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 read server key exchange A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 read server certificate request A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 read server done A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 write client certificate A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 write client key exchange A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 write certificate verify A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 write change cipher spec A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 write finished A
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 flush data
2023.02.02 06:01:20 LOG7[1:140068400670464]: SSL state (connect): SSLv3 read finished A
2023.02.02 06:01:20 LOG7[1:140068400670464]:    2 items in the session cache
2023.02.02 06:01:20 LOG7[1:140068400670464]:    2 client connects (SSL_connect())
2023.02.02 06:01:20 LOG7[1:140068400670464]:    2 client connects that finished
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 client renegotiations requested
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 server connects (SSL_accept())
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 server connects that finished
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 server renegotiations requested
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 session cache hits
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 external session cache hits
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 session cache misses
2023.02.02 06:01:20 LOG7[1:140068400670464]:    0 session cache timeouts
2023.02.02 06:01:20 LOG6[1:140068400670464]: SSL connected: new session negotiated
2023.02.02 06:01:20 LOG6[1:140068400670464]: Negotiated protocol version: TLSv1.2
2023.02.02 06:01:20 LOG6[1:140068400670464]: Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
2023.02.02 06:01:20 LOG6[1:140068400670464]: Compression: null, expansion: null
2023.02.02 06:01:22 LOG7[1:140068400744512]: Service [zookeeper-2181] accepted (FD=15) from 127.0.0.1:46666
2023.02.02 06:01:22 LOG7[1:140068400559872]: Service [zookeeper-2181] started
2023.02.02 06:01:22 LOG7[1:140068400559872]: Waiting for a libwrap process
2023.02.02 06:01:22 LOG7[1:140068400559872]: Acquired libwrap process #0
2023.02.02 06:01:22 LOG7[1:140068400559872]: Releasing libwrap process #0
2023.02.02 06:01:22 LOG7[1:140068400559872]: Released libwrap process #0
2023.02.02 06:01:22 LOG7[1:140068400559872]: Service [zookeeper-2181] permitted by libwrap from 127.0.0.1:46666
2023.02.02 06:01:22 LOG5[1:140068400559872]: Service [zookeeper-2181] accepted connection from 127.0.0.1:46666
2023.02.02 06:01:22 LOG6[1:140068400559872]: connect_blocking: connecting 10.233.4.119:2181
2023.02.02 06:01:22 LOG7[1:140068400559872]: connect_blocking: s_poll_wait 10.233.4.119:2181: waiting 10 seconds
2023.02.02 06:01:22 LOG5[1:140068400559872]: connect_blocking: connected 10.233.4.119:2181
2023.02.02 06:01:22 LOG5[1:140068400559872]: Service [zookeeper-2181] connected remote server from 10.233.65.83:39802
2023.02.02 06:01:22 LOG7[1:140068400559872]: Remote socket (FD=16) initialized
2023.02.02 06:01:22 LOG7[1:140068400559872]: SNI: sending servername: onap-strimzi-zookeeper-client
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): before/connect initialization
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 write client hello A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 read server hello A
2023.02.02 06:01:22 LOG7[1:140068400559872]: Starting certificate verification: depth=1, /O=io.strimzi/CN=cluster-ca v0
2023.02.02 06:01:22 LOG5[1:140068400559872]: Certificate accepted: depth=1, /O=io.strimzi/CN=cluster-ca v0
2023.02.02 06:01:22 LOG7[1:140068400559872]: Starting certificate verification: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper
2023.02.02 06:01:22 LOG5[1:140068400559872]: Certificate accepted: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 read server certificate A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 read server key exchange A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 read server certificate request A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 read server done A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 write client certificate A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 write client key exchange A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 write certificate verify A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 write change cipher spec A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 write finished A
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 flush data
2023.02.02 06:01:22 LOG7[1:140068400559872]: SSL state (connect): SSLv3 read finished A
2023.02.02 06:01:22 LOG7[1:140068400559872]:    3 items in the session cache
2023.02.02 06:01:22 LOG7[1:140068400559872]:    3 client connects (SSL_connect())
2023.02.02 06:01:22 LOG7[1:140068400559872]:    3 client connects that finished
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 client renegotiations requested
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 server connects (SSL_accept())
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 server connects that finished
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 server renegotiations requested
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 session cache hits
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 external session cache hits
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 session cache misses
2023.02.02 06:01:22 LOG7[1:140068400559872]:    0 session cache timeouts
2023.02.02 06:01:22 LOG6[1:140068400559872]: SSL connected: new session negotiated
2023.02.02 06:01:22 LOG6[1:140068400559872]: Negotiated protocol version: TLSv1.2
2023.02.02 06:01:22 LOG6[1:140068400559872]: Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
2023.02.02 06:01:22 LOG6[1:140068400559872]: Compression: null, expansion: null