On 13/01/2023 20:05, Gary Jackson wrote:

2023.01.13 14:03:42 LOG6[16572]: TLS accepted: new session negotiated
2023.01.13 14:03:42 LOG6[16572]: TLSv1.2 ciphersuite: 
ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
2023.01.13 14:03:42 LOG6[16572]: SSL_read: Socket is closed
2023.01.13 14:03:42 LOG6[16572]: TLS socket closed (SSL_read)

The log says that your stunnel server has successfully negotiated TLS 1.2, and 
then your TLS client has closed the underlying socket without sending any alert 
required by RFC 5246.

https://www.rfc-editor.org/rfc/rfc5246#section-7.2

It's hard to guess *why* your client has closed the socket.  For example, a 
prematurely terminated (possibly crashed) client could cause such behavior.

Best regards,
    Mike

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
stunnel-users mailing list -- stunnel-users@stunnel.org
To unsubscribe send an email to stunnel-users-le...@stunnel.org

Reply via email to