2022.06.21 11:31:17 LOG6[main]: Initializing inetd mode configuration
2022.06.21 11:31:17 LOG5[main]: stunnel 5.64 on x64-pc-mingw32-gnu platform
2022.06.21 11:31:17 LOG5[main]: Compiled/running with OpenSSL 3.0.3 3 May 2022
2022.06.21 11:31:17 LOG5[main]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
2022.06.21 11:31:17 LOG6[main]: Initializing inetd mode configuration
2022.06.21 11:31:17 LOG5[main]: Reading configuration from file D:\stunnel\config\stunnel.conf
2022.06.21 11:31:17 LOG5[main]: UTF-8 byte order mark detected
2022.06.21 11:31:17 LOG5[main]: FIPS mode disabled
2022.06.21 11:31:17 LOG6[main]: Compression enabled: 0 methods
2022.06.21 11:31:17 LOG6[main]: Initializing service [server4]
2022.06.21 11:31:17 LOG6[main]: stunnel default security level set: 2
2022.06.21 11:31:17 LOG6[main]: Session resumption enabled
2022.06.21 11:31:17 LOG6[main]: Loading certificate from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Certificate loaded from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Loading private key from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Private key loaded from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: DH initialization skipped: client section
2022.06.21 11:31:17 LOG6[main]: Initializing service [server7]
2022.06.21 11:31:17 LOG6[main]: PSKsecrets line 1: 30-byte ASCII key configured for identity "test1"
2022.06.21 11:31:17 LOG6[main]: PSK identities: 1 retrieved
2022.06.21 11:31:17 LOG6[main]: stunnel default security level set: 2
2022.06.21 11:31:17 LOG6[main]: Session resumption enabled
2022.06.21 11:31:17 LOG6[main]: Loading certificate from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Certificate loaded from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Loading private key from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Private key loaded from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: DH initialization skipped: client section
2022.06.21 11:31:17 LOG6[main]: Initializing service [gmail-smtp]
2022.06.21 11:31:17 LOG6[main]: stunnel default security level set: 2
2022.06.21 11:31:17 LOG6[main]: Session resumption enabled
2022.06.21 11:31:17 LOG6[main]: Loading certificate from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Certificate loaded from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Loading private key from file: 1.pem
2022.06.21 11:31:17 LOG6[main]: Private key loaded from file: 1.pem
2022.06.21 11:31:18 LOG6[main]: DH initialization skipped: client section
2022.06.21 11:31:18 LOG5[main]: Configuration successful
2022.06.21 11:31:18 LOG6[main]: Service [server4] (FD=712) bound to 127.0.0.1:1084
2022.06.21 11:31:18 LOG6[main]: Service [server7] (FD=716) bound to 127.0.0.1:1087
2022.06.21 11:31:18 LOG6[main]: Service [gmail-smtp] (FD=720) bound to 127.0.0.1:10025
2022.06.21 11:31:18 LOG6[cron]: Executing cron jobs
2022.06.21 11:31:18 LOG6[cron]: Cron jobs completed in 0 seconds
2022.06.21 11:31:22 LOG5[0]: Service [server4] accepted connection from 127.0.0.1:62451
2022.06.21 11:31:22 LOG6[0]: failover: priority, starting at entry #0
2022.06.21 11:31:22 LOG6[0]: s_connect: connecting ip.ip.ip.ip:80
2022.06.21 11:31:23 LOG5[0]: s_connect: connected ip.ip.ip.ip:80
2022.06.21 11:31:23 LOG5[0]: Service [server4] connected remote server from 192.168.1.100:62452
2022.06.21 11:31:23 LOG6[0]: SNI: sending servername: ip.ip.ip.ip
2022.06.21 11:31:23 LOG6[0]: Peer certificate required
2022.06.21 11:31:23 LOG6[0]: No client CA list
2022.06.21 11:31:23 LOG6[0]: Certificate accepted at depth=1: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 EV SSL CA - G3
2022.06.21 11:31:23 LOG6[0]: CERT: Host name "
www.symantec.com" matched with "
www.symantec.com"
2022.06.21 11:31:23 LOG5[0]: Certificate accepted at depth=0: C=US, ST=California, L=Mountain View, O=Symantec Corporation, OU=Corp Mktg & Comms - Online Exp, CN=
www.symantec.com, SN=20220621
2022.06.21 11:31:23 LOG6[0]: TLS connected: new session negotiated
2022.06.21 11:31:23 LOG6[0]: TLSv1.3 ciphersuite: TLS_AES_256_GCM_SHA384 (256-bit encryption)
2022.06.21 11:31:23 LOG6[0]: Peer temporary key: X25519, 253 bits
2022.06.21 11:31:23 LOG6[0]: Session id: F098A4AEC33D35EE3571665029E41457BE5493D5C129C8F0F544248A68A66B47
2022.06.21 11:31:23 LOG6[0]: Session id: E1907AABD1160855B124CD2639E371277A504FD2292EA01CB4AB9EE6F414DDE8
2022.06.21 11:31:23 LOG5[1]: Service [server4] accepted connection from 127.0.0.1:62453
2022.06.21 11:31:23 LOG6[1]: failover: priority, starting at entry #0
2022.06.21 11:31:23 LOG6[1]: s_connect: connecting ip.ip.ip.ip:80
2022.06.21 11:31:23 LOG5[2]: Service [server4] accepted connection from 127.0.0.1:62455
2022.06.21 11:31:23 LOG6[2]: failover: priority, starting at entry #0
2022.06.21 11:31:23 LOG6[2]: s_connect: connecting ip.ip.ip.ip:80
2022.06.21 11:31:23 LOG5[1]: s_connect: connected ip.ip.ip.ip:80
2022.06.21 11:31:23 LOG5[1]: Service [server4] connected remote server from 192.168.1.100:62454
2022.06.21 11:31:23 LOG6[1]: SNI: sending servername: ip.ip.ip.ip
2022.06.21 11:31:23 LOG6[1]: Peer certificate required
2022.06.21 11:31:24 LOG5[2]: s_connect: connected ip.ip.ip.ip:80
2022.06.21 11:31:24 LOG5[2]: Service [server4] connected remote server from 192.168.1.100:62456
2022.06.21 11:31:24 LOG6[2]: SNI: sending servername: ip.ip.ip.ip
2022.06.21 11:31:24 LOG6[2]: Peer certificate required
2022.06.21 11:31:24 LOG6[1]: TLS connected: previous session reused
2022.06.21 11:31:24 LOG6[1]: TLSv1.3 ciphersuite: TLS_AES_256_GCM_SHA384 (256-bit encryption)
2022.06.21 11:31:24 LOG6[1]: Peer temporary key: X25519, 253 bits
2022.06.21 11:31:24 LOG6[1]: Session id: E1907AABD1160855B124CD2639E371277A504FD2292EA01CB4AB9EE6F414DDE8
2022.06.21 11:31:24 LOG6[1]: Read socket closed (readsocket)
2022.06.21 11:31:24 LOG6[1]: SSL_shutdown successfully sent close_notify alert
2022.06.21 11:31:24 LOG6[2]: TLS connected: previous session reused
2022.06.21 11:31:24 LOG6[2]: TLSv1.3 ciphersuite: TLS_AES_256_GCM_SHA384 (256-bit encryption)
2022.06.21 11:31:24 LOG6[2]: Peer temporary key: X25519, 253 bits
2022.06.21 11:31:24 LOG6[2]: Session id: E1907AABD1160855B124CD2639E371277A504FD2292EA01CB4AB9EE6F414DDE8
2022.06.21 11:31:24 LOG6[1]: Session id: 662356847A6AC360543E6B85687A11984354CD08CCD4945D0126775FEE5A786F
2022.06.21 11:31:24 LOG3[1]: SSL_read: ssl/record/rec_layer_s3.c:308: error:0A000126:SSL routines::unexpected eof while reading
2022.06.21 11:31:24 LOG5[1]: Connection reset: 3 byte(s) sent to TLS, 2 byte(s) sent to socket
2022.06.21 11:31:24 LOG6[2]: Session id: C669039CF828A7087E3AE5DFD9F84FBABEB39E89D0BE8F2B1313F5B478C3E003
2022.06.21 11:31:34 LOG6[2]: TLS closed (SSL_read)