Package: stunnel4 Version: 3:5.38-1 Severity: important Hi,
I use stunnel4 to tunnel SSH over SSL, and I experience daily failures triggered by shadowserver.org port scanning [1][2]. Here is the pattern from journalctl: janv. 04 14:53:55 maison stunnel[13384]: LOG5[6]: Service [ssh] accepted connection from 216.218.206.66:17748 janv. 04 14:53:56 maison stunnel[13384]: LOG3[6]: SSL_accept: 1417D18C: error:1417D18C:SSL routines:tls_process_client_hello:version too low janv. 04 14:53:56 maison stunnel[13384]: LOG5[6]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket janv. 04 14:54:51 maison stunnel[13384]: LOG5[7]: Service [ssh] accepted connection from 216.218.206.66:6922 janv. 04 14:54:51 maison stunnel[13384]: LOG3[7]: SSL_accept: 1417A0C1: error:1417A0C1:SSL routines:tls_post_process_client_hello:no shared cipher janv. 04 14:54:51 maison stunnel[13384]: LOG5[7]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket janv. 04 14:54:51 maison kernel: traps: stunnel4[12705] trap stack segment ip:7f310cea5c4a sp:7f310d65bb20 error:0 in libcrypto.so.1.1[7f310cdff000+26 ... janv. 05 13:03:35 maison stunnel[342]: LOG5[8]: Service [ssh] accepted connection from 184.105.139.68:52520 janv. 05 13:03:36 maison stunnel[342]: LOG3[8]: SSL_accept: 1417D18C: error:1417D18C:SSL routines:tls_process_client_hello:version too low janv. 05 13:03:36 maison stunnel[342]: LOG5[8]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket janv. 05 13:04:30 maison stunnel[342]: LOG5[9]: Service [ssh] accepted connection from 184.105.139.68:38530 janv. 05 13:04:30 maison stunnel[342]: LOG3[9]: SSL_accept: 1417A0C1: error:1417A0C1:SSL routines:tls_post_process_client_hello:no shared cipher janv. 05 13:04:30 maison stunnel[342]: LOG5[9]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket janv. 05 13:04:30 maison kernel: traps: stunnel4[28471] trap stack segment ip:7f76c2c01c4a sp:7f76c33b7b20 error:0 in libcrypto.so.1.1[7f76c2b5b000+26 216.218.206.66 is scan-05.shadowserver.org 184.105.139.68 is scan-02.shadowserver.org After each of these failures stunnel isn't running anymore and systemd doesn't know it has to restart it, because 'systemctl status' says: 'active (exited)'. But this one is related to #826883. My stunnel config file is: $ cat /etc/stunnel/stunnel.conf pid = /var/run/stunnel.pid cert = /etc/stunnel/stunnel.pem [ssh] accept = 443 connect = 127.0.0.1:22 Thanks in advance for any hint. [1] https://poodlescan.shadowserver.org/ [2] https://freakscan.shadowserver.org/ _g. -- System Information: Debian Release: stretch/sid APT prefers testing APT policy: (500, 'testing'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.8.0-1-amd64 (SMP w/8 CPU cores) Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages stunnel4 depends on: ii adduser 3.115 ii libc6 2.24-8 ii libssl1.1 1.1.0c-2 ii libsystemd0 232-8 ii libwrap0 7.6.q-25 ii lsb-base 9.20161125 ii netbase 5.3 ii openssl 1.1.0c-2 pn perl:any <none> stunnel4 recommends no packages. Versions of packages stunnel4 suggests: pn logcheck-database <none> -- no debconf information