By type
Starting Stunnel with configuration: pid = /usr/local/var/run/stunnel.pid foreground = yes debug = debug sslVersion = all [zookeeper-2181] client = yes CAfile = /tmp/cluster-ca.crt cert = /etc/cluster-operator-certs/cluster-operator.crt key = /etc/cluster-operator-certs/cluster-operator.key accept = 0.0.0.0:2181 connect = onap-strimzi-zookeeper-client:2181 delay = yes verify = 2 2023.02.14 05:59:21 LOG7[1:140591268952128]: Clients allowed=512000 2023.02.14 05:59:21 LOG5[1:140591268952128]: stunnel 4.56 on x86_64-redhat-linux-gnu platform 2023.02.14 05:59:21 LOG5[1:140591268952128]: Compiled/running with OpenSSL 1.0.1e-fips 11 Feb 2013 2023.02.14 05:59:21 LOG5[1:140591268952128]: Threading:PTHREAD Sockets:POLL,IPv6 SSL:ENGINE,OCSP,FIPS Auth:LIBWRAP 2023.02.14 05:59:21 LOG5[1:140591268952128]: Reading configuration from file /tmp/stunnel.conf 2023.02.14 05:59:21 LOG5[1:140591268952128]: FIPS mode is enabled 2023.02.14 05:59:21 LOG7[1:140591268952128]: Compression not enabled 2023.02.14 05:59:21 LOG7[1:140591268952128]: PRNG seeded successfully 2023.02.14 05:59:21 LOG6[1:140591268952128]: Initializing service [zookeeper-2181] 2023.02.14 05:59:21 LOG7[1:140591268952128]: Certificate: /etc/cluster-operator-certs/cluster-operator.crt 2023.02.14 05:59:21 LOG7[1:140591268952128]: Certificate loaded 2023.02.14 05:59:21 LOG7[1:140591268952128]: Key file: /etc/cluster-operator-certs/cluster-operator.key 2023.02.14 05:59:21 LOG7[1:140591268952128]: Private key loaded 2023.02.14 05:59:21 LOG7[1:140591268952128]: Loaded verify certificates from /tmp/cluster-ca.crt 2023.02.14 05:59:21 LOG7[1:140591268952128]: Loaded /tmp/cluster-ca.crt revocation lookup file 2023.02.14 05:59:21 LOG7[1:140591268952128]: SSL options set: 0x01000004 2023.02.14 05:59:21 LOG5[1:140591268952128]: Configuration successful 2023.02.14 05:59:21 LOG7[1:140591268952128]: Service [zookeeper-2181] (FD=11) bound to 0.0.0.0:2181 2023.02.14 05:59:21 LOG7[1:140591268952128]: Created pid file /usr/local/var/run/stunnel.pid 2023.02.14 05:59:21 LOG7[1:140591268952128]: Service [zookeeper-2181] accepted (FD=3) from 127.0.0.1:52094 2023.02.14 05:59:21 LOG7[1:140591268947712]: Service [zookeeper-2181] started 2023.02.14 05:59:21 LOG7[1:140591268947712]: Waiting for a libwrap process 2023.02.14 05:59:21 LOG7[1:140591268947712]: Acquired libwrap process #0 2023.02.14 05:59:21 LOG7[1:140591268947712]: Releasing libwrap process #0 2023.02.14 05:59:21 LOG7[1:140591268947712]: Released libwrap process #0 2023.02.14 05:59:21 LOG7[1:140591268947712]: Service [zookeeper-2181] permitted by libwrap from 127.0.0.1:52094 2023.02.14 05:59:21 LOG5[1:140591268947712]: Service [zookeeper-2181] accepted connection from 127.0.0.1:52094 2023.02.14 05:59:22 LOG6[1:140591268947712]: connect_blocking: connecting 10.233.14.112:2181 2023.02.14 05:59:22 LOG7[1:140591268947712]: connect_blocking: s_poll_wait 10.233.14.112:2181: waiting 10 seconds 2023.02.14 05:59:22 LOG5[1:140591268947712]: connect_blocking: connected 10.233.14.112:2181 2023.02.14 05:59:22 LOG5[1:140591268947712]: Service [zookeeper-2181] connected remote server from 10.233.70.106:45988 2023.02.14 05:59:22 LOG7[1:140591268947712]: Remote socket (FD=12) initialized 2023.02.14 05:59:22 LOG7[1:140591268947712]: SNI: sending servername: onap-strimzi-zookeeper-client 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): before/connect initialization 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv2/v3 write client hello A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 read server hello A 2023.02.14 05:59:22 LOG7[1:140591268947712]: Starting certificate verification: depth=1, /O=io.strimzi/CN=cluster-ca v0 2023.02.14 05:59:22 LOG5[1:140591268947712]: Certificate accepted: depth=1, /O=io.strimzi/CN=cluster-ca v0 2023.02.14 05:59:22 LOG7[1:140591268947712]: Starting certificate verification: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper 2023.02.14 05:59:22 LOG5[1:140591268947712]: Certificate accepted: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 read server certificate A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 read server key exchange A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 read server certificate request A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 read server done A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 write client certificate A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 write client key exchange A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 write certificate verify A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 write change cipher spec A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 write finished A 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 flush data 2023.02.14 05:59:22 LOG7[1:140591268947712]: SSL state (connect): SSLv3 read finished A 2023.02.14 05:59:22 LOG7[1:140591268947712]: 1 items in the session cache 2023.02.14 05:59:22 LOG7[1:140591268947712]: 1 client connects (SSL_connect()) 2023.02.14 05:59:22 LOG7[1:140591268947712]: 1 client connects that finished 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 client renegotiations requested 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 server connects (SSL_accept()) 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 server connects that finished 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 server renegotiations requested 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 session cache hits 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 external session cache hits 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 session cache misses 2023.02.14 05:59:22 LOG7[1:140591268947712]: 0 session cache timeouts 2023.02.14 05:59:22 LOG6[1:140591268947712]: SSL connected: new session negotiated 2023.02.14 05:59:22 LOG6[1:140591268947712]: Negotiated protocol version: TLSv1.2 2023.02.14 05:59:22 LOG6[1:140591268947712]: Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) 2023.02.14 05:59:22 LOG6[1:140591268947712]: Compression: null, expansion: null 2023.02.14 05:59:22 LOG7[1:140591268952128]: Service [zookeeper-2181] accepted (FD=13) from 127.0.0.1:52102 2023.02.14 05:59:22 LOG7[1:140591268878080]: Service [zookeeper-2181] started 2023.02.14 05:59:22 LOG7[1:140591268878080]: Waiting for a libwrap process 2023.02.14 05:59:22 LOG7[1:140591268878080]: Acquired libwrap process #0 2023.02.14 05:59:22 LOG7[1:140591268878080]: Releasing libwrap process #0 2023.02.14 05:59:22 LOG7[1:140591268878080]: Released libwrap process #0 2023.02.14 05:59:22 LOG7[1:140591268878080]: Service [zookeeper-2181] permitted by libwrap from 127.0.0.1:52102 2023.02.14 05:59:22 LOG5[1:140591268878080]: Service [zookeeper-2181] accepted connection from 127.0.0.1:52102 2023.02.14 05:59:22 LOG6[1:140591268878080]: connect_blocking: connecting 10.233.14.112:2181 2023.02.14 05:59:22 LOG7[1:140591268878080]: connect_blocking: s_poll_wait 10.233.14.112:2181: waiting 10 seconds 2023.02.14 05:59:22 LOG5[1:140591268878080]: connect_blocking: connected 10.233.14.112:2181 2023.02.14 05:59:22 LOG5[1:140591268878080]: Service [zookeeper-2181] connected remote server from 10.233.70.106:49008 2023.02.14 05:59:22 LOG7[1:140591268878080]: Remote socket (FD=14) initialized 2023.02.14 05:59:22 LOG7[1:140591268878080]: SNI: sending servername: onap-strimzi-zookeeper-client 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): before/connect initialization 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 write client hello A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 read server hello A 2023.02.14 05:59:22 LOG7[1:140591268878080]: Starting certificate verification: depth=1, /O=io.strimzi/CN=cluster-ca v0 2023.02.14 05:59:22 LOG5[1:140591268878080]: Certificate accepted: depth=1, /O=io.strimzi/CN=cluster-ca v0 2023.02.14 05:59:22 LOG7[1:140591268878080]: Starting certificate verification: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper 2023.02.14 05:59:22 LOG5[1:140591268878080]: Certificate accepted: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 read server certificate A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 read server key exchange A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 read server certificate request A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 read server done A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 write client certificate A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 write client key exchange A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 write certificate verify A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 write change cipher spec A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 write finished A 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 flush data 2023.02.14 05:59:22 LOG7[1:140591268878080]: SSL state (connect): SSLv3 read finished A 2023.02.14 05:59:22 LOG7[1:140591268878080]: 2 items in the session cache 2023.02.14 05:59:22 LOG7[1:140591268878080]: 2 client connects (SSL_connect()) 2023.02.14 05:59:22 LOG7[1:140591268878080]: 2 client connects that finished 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 client renegotiations requested 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 server connects (SSL_accept()) 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 server connects that finished 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 server renegotiations requested 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 session cache hits 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 external session cache hits 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 session cache misses 2023.02.14 05:59:22 LOG7[1:140591268878080]: 0 session cache timeouts 2023.02.14 05:59:22 LOG6[1:140591268878080]: SSL connected: new session negotiated 2023.02.14 05:59:22 LOG6[1:140591268878080]: Negotiated protocol version: TLSv1.2 2023.02.14 05:59:22 LOG6[1:140591268878080]: Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) 2023.02.14 05:59:22 LOG6[1:140591268878080]: Compression: null, expansion: null 2023.02.14 05:59:24 LOG7[1:140591268952128]: Service [zookeeper-2181] accepted (FD=15) from 127.0.0.1:52144 2023.02.14 05:59:24 LOG7[1:140591268767488]: Service [zookeeper-2181] started 2023.02.14 05:59:24 LOG7[1:140591268767488]: Waiting for a libwrap process 2023.02.14 05:59:24 LOG7[1:140591268767488]: Acquired libwrap process #0 2023.02.14 05:59:24 LOG7[1:140591268767488]: Releasing libwrap process #0 2023.02.14 05:59:24 LOG7[1:140591268767488]: Released libwrap process #0 2023.02.14 05:59:24 LOG7[1:140591268767488]: Service [zookeeper-2181] permitted by libwrap from 127.0.0.1:52144 2023.02.14 05:59:24 LOG5[1:140591268767488]: Service [zookeeper-2181] accepted connection from 127.0.0.1:52144 2023.02.14 05:59:24 LOG6[1:140591268767488]: connect_blocking: connecting 10.233.14.112:2181 2023.02.14 05:59:24 LOG7[1:140591268767488]: connect_blocking: s_poll_wait 10.233.14.112:2181: waiting 10 seconds 2023.02.14 05:59:24 LOG5[1:140591268767488]: connect_blocking: connected 10.233.14.112:2181 2023.02.14 05:59:24 LOG5[1:140591268767488]: Service [zookeeper-2181] connected remote server from 10.233.70.106:49050 2023.02.14 05:59:24 LOG7[1:140591268767488]: Remote socket (FD=16) initialized 2023.02.14 05:59:24 LOG7[1:140591268767488]: SNI: sending servername: onap-strimzi-zookeeper-client 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): before/connect initialization 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 write client hello A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 read server hello A 2023.02.14 05:59:24 LOG7[1:140591268767488]: Starting certificate verification: depth=1, /O=io.strimzi/CN=cluster-ca v0 2023.02.14 05:59:24 LOG5[1:140591268767488]: Certificate accepted: depth=1, /O=io.strimzi/CN=cluster-ca v0 2023.02.14 05:59:24 LOG7[1:140591268767488]: Starting certificate verification: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper 2023.02.14 05:59:24 LOG5[1:140591268767488]: Certificate accepted: depth=0, /O=io.strimzi/CN=onap-strimzi-zookeeper 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 read server certificate A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 read server key exchange A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 read server certificate request A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 read server done A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 write client certificate A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 write client key exchange A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 write certificate verify A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 write change cipher spec A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 write finished A 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 flush data 2023.02.14 05:59:24 LOG7[1:140591268767488]: SSL state (connect): SSLv3 read finished A 2023.02.14 05:59:24 LOG7[1:140591268767488]: 3 items in the session cache 2023.02.14 05:59:24 LOG7[1:140591268767488]: 3 client connects (SSL_connect()) 2023.02.14 05:59:24 LOG7[1:140591268767488]: 3 client connects that finished 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 client renegotiations requested 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 server connects (SSL_accept()) 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 server connects that finished 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 server renegotiations requested 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 session cache hits 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 external session cache hits 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 session cache misses 2023.02.14 05:59:24 LOG7[1:140591268767488]: 0 session cache timeouts 2023.02.14 05:59:24 LOG6[1:140591268767488]: SSL connected: new session negotiated 2023.02.14 05:59:24 LOG6[1:140591268767488]: Negotiated protocol version: TLSv1.2 2023.02.14 05:59:24 LOG6[1:140591268767488]: Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption) 2023.02.14 05:59:24 LOG6[1:140591268767488]: Compression: null, expansion: null