[aclug-L] FW: Stunnel 4.00 Builds on Prior Success
[Top] [All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index] [Thread Index]
-----Original Message-----
From: Linux_Security@xxxxxxxxxxxxxxx
[mailto:Linux_Security@xxxxxxxxxxxxxxx]
Sent: Tuesday, September 10, 2002 2:22 AM
LINUX SECURITY --- September 10, 2002
Published by ITworld.com -- changing the way you view IT
http://www.itworld.com/newsletters
___________________________________________________________________
HIGHLIGHTS
* The recent release of Stunnel version 4.00 picks up where previous
versions left off by improving encryptions capabilities and
simplifying installation and configuration.
___________________________________________________________________
Stunnel 4.00 Builds on Prior Success
By Brian Hatch
Late last week, the newest version of Stunnel[1], the secure SSL
wrapper, was released. Stunnel encapsulates cleartext protocols within
strong SSL encryption and can be used to protect pretty much any
standard[2] TCP connection, from your mail protocol (POP, IMAP, SMTP) to
your own customized application. Stunnel runs on many different
operating systems from Linux and other Unix-like systems (*BSD, Solaris,
etc) to Windows.
The newest version of Stunnel addresses some of the most oft cited
requests:
1) Stunnel Configuration files instead of command line options;
2) A GUI for Windows users;
3) Ability to run as a native Windows service;
4) Ability to handle multiple simultaneous connections;
5) Stunnel can now chroot for added security;
6) X509 cert and key now can be stored in separate files;
7) Confusing certificate verification source defaults removed[3];
8) Ability to work well even with the buggy and SSL spec-violating
Microsoft software;
9) Ability to delay DNS lookups until connection time. (Good for
daemons on dialup machines.)
This version was in the works for some time and if you've been turned
off by Stunnel before, then now's the time to take a look at it again.
Now that it uses a configuration file instead of (excessive) command
line options, it is much easier to create and understand the
configuration. So, let's see a few example.
Say your ISP supports IMAP over SSL, but you are not using a mail client
that has SSL support. The mailserver is probably listening on two ports,
143 (IMAP) and 993 (IMAP+SSL). You simply set up Stunnel on your local
machine to listen on a local port, say 1143. Stunnel will accept the
cleartext IMAP connection on this port, SSL encrypt it, and send it to
port 993 on the mail server. The connection is in the clear only from
your mail client to the local Stunnel process - everywhere across the
Internet it is encrypted, meaning your mail and your password is
protected from prying eyes.
Here's what the syntax would have been using Stunnel-3.x:
$ stunnel -d 1143 -c -r mailserver.my_isp.com:993 -N imaps
That translates to:
-d ... Listen on port 1143 for inbound connections.
-c Act as an SSL client.
-r ... Connect to mailserver:993
-N ... Use 'imaps' as the service name for TCP Wrapper rules[4].
Using the new Stunnel configuration file syntax you'd have the
following:
$ cat stunnel.conf
client = yes
[imaps]
accept = 1143
connect = mailserver.my_isp.com:143
And then simply run stunnel:
$ stunnel /path/to/stunnel.conf
You will need to configure your mail client to connect to the new port
(1143) on localhost. Your mail program will think it's talking to
localhost, but Stunnel will be transparently encrypting your data to the
server.
Conversely, if you ran an IMAP server and wanted to support SSL clients,
you'd run stunnel with the following stunnel.conf:
$ cat stunnel.conf
client = no
cert = /path/to/stunnel.pem
[imaps]
accept = 993
connect = 143
That tells Stunnel to act as an SSL server. It will accept SSL
connections on port 993 and redirect them after decryption to the local
port 143. If your IMAP server is normally run by inetd/xinetd, you can
even optimize this a bit more. Instead of shuttling the decrypted
packets to port 143 launch the IMAP server from Stunnel directly:
$ cat stunnel.conf
client = no
cert = /path/to/stunnel.pem
[imaps]
accept = 993
exec = /usr/sbin/imapd
This way imapd is launched directly from Stunnel - no wasted cpu cycles
and network activity by talking to imapd through inetd/xinetd. If you
wanted to support encryption for other protocols too, you just add new
service entries to the file. (I'll include some other sample Stunnel
configuration options above to make the example more realistic.)
$ cat stunnel.conf
# Global Options
client = no
cert = /path/to/stunnel.cert
key = /path/to/stunnel.key
debug = daemon.info
pid = /var/run/stunnel.pid
socket = l:SO_LINGER=1:60
# Service specific configurations
[imaps]
accept = 993
exec = /usr/sbin/imapd
execargs = imapd
[pop3s]
accept = 995
exec = /usr/sbin/qpopper
execargs = qpopper
[nntps]
accept = 563
connect = 119
Previously you'd need to run several Stunnel daemons, each with a rather
hideous set of command line options in order to support the three
protocols here (IMAP, POP, and NNTP).
If you've been looking for an easy way to add encryption to your daily
life, doing it with Stunnel has gotten even easier. And you can even
tell your friends who use Windows[6] that Stunnel now has a GUI and they
can be secure[7] as well.
Many thanks go out to Maximus[8] who sponsored the new features. It's
always good to see a company helping Open Source products flourish.
NOTES
[1] http://itw.itworld.com/GoNow/a14724a64050a76028222a6 and
http://itw.itworld.com/GoNow/a14724a64050a76028222a8
[2] The main requirements are that the protocol is TCP (not UDP, for
example) and does not rely on out-of-band data (OOB) and does
not have dynamic channels. FTP, for example, creates and
destroys data channels for each transfer, and is not easily
protectable with Stunnel.
[3] Said yours introduced confusing defaults truly, and I sincerely
apologize. Endless thanks to Mike for destroying that overly
'helpful' logic...
[4] TCP Wrappers use /etc/hosts.allow and /etc/hosts.deny to
determine if a connection should be allowed. See the tcpd and
hosts_access man pages for more information.
[5] Another option would be to run Stunnel on the local IMAP port
(143) and point your mail client to 'localhost'. On Unix,
Stunnel would need to be run by root to bind this port, on
Windows this is not required.
[6] Wait: if they're using Windows, why are you friends?
[7] Well, as secure as you can be given the platform.
[8] http://itw.itworld.com/GoNow/a14724a64050a76028222a7
About the author(s)
-------------------
Brian Hatch is Chief Hacker at Onsight, Inc. and author of Hacking
Linux Exposed and Building Linux VPNs. He has used cryptographic
protocols exclusively since 1992. He changes his passwords daily, and
never uses anything less than fifty characters. His ATM pin, however,
is 123. Brian can be reached at brian@xxxxxxxxxxxxxxxxxxxxxxx.
____________________________________________________________________
ADDITIONAL RESOURCES
Stunnel -- Universal SSL Wrapper
http://www.stunnel.org/
stunnel - multiplatform SSL tunneling proxy
http://stunnel.mirt.net/
Stunnel Frequently Asked Questions
http://itw.itworld.com/GoNow/a14724a64050a76028222a4
Trying to Hack SSL into Certain Services
http://itw.itworld.com/GoNow/a14724a64050a76028222a1
___________________________________________________________________
ITWORLD.COM NEWSLETTER ARCHIVE
Index of Linux Security
http://itw.itworld.com/GoNow/a14724a64050a76028222a5
Security with Obscurity is Great
http://itw.itworld.com/GoNow/a14724a64050a76028222a2
No Reboot Necessary
http://itw.itworld.com/GoNow/a14724a64050a76028222a3
___________________________________________________________________
CUSTOMER SERVICE
SUBSCRIBE/UNSUBSCRIBE:
- Go to: http://www.itworld.com/newsletters
- Click on "View my newsletters" to log in and manage your account
- To subscribe, check the box next to the newsletter
- To unsubscribe, uncheck the box next to the newsletter
- When finished, click submit
Questions? Please e-mail customer service at: mailto:support@xxxxxxxxxxx
______________________________________________________________________
CONTACTS
* Editorial: Andrew Santosusso, Newsletter Editor,
andrew_santosusso@xxxxxxxxxxx
* Advertising: Clare O'Brien, Vice President of Sales,
clare_obrien@xxxxxxxxxxx
* Career Corner: Janis Crowley, Vice President/General Manager, IDG
Recruitment Solutions, janis_crowley@xxxxxxxxxxxxx
* Other inquiries: Jodie Naze, Senior Product Marketing Manager,
jodie_naze@xxxxxxxxxxx
_____________________________________________________________________
PRIVACY POLICY
ITworld.com has been TRUSTe certified
http://www.itworld.com/Privacy/
Copyright 2002 ITworld.com, Inc., All Rights Reserved.
http://www.itworld.com
-- This is the discussion@xxxxxxxxx list. To unsubscribe,
visit http://www.complete.org/cgi-bin/listargate-aclug.cgi
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- [aclug-L] FW: Stunnel 4.00 Builds on Prior Success,
Dale W Hodge <=
|
|