stunnel.conf 1.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. ; Drop privileges
  2. setuid = nobody
  3. setgid = nogroup
  4. ; When running under procd, stay in foreground
  5. foreground = yes
  6. ; Don't log to stderr, use syslog
  7. syslog = yes
  8. ; 1-7. Use 7 for greatest verbosity
  9. ;debug = 5
  10. ; Starting here, enter your services or uncomment the examples
  11. ; Example:
  12. ; If your local httpd does not support HTTPS, use stunnel in remote
  13. ; mode to forward TLS connections coming in on port 443 to non-TLS
  14. ; on port 80.
  15. ; Make sure that the cert is available.
  16. ;[httpd]
  17. ;accept = 443
  18. ;connect = 127.0.0.1:80
  19. ;cert = /etc/stunnel/stunnel.pem
  20. ; Example:
  21. ; If your local email client does not support TLS,
  22. ; use stunnel in client mode to forward non-TLS connections on
  23. ; port 143 to TLS-enabled servername:993.
  24. ;[imap]
  25. ;client = yes
  26. ;accept = 143
  27. ;connect = servername:993
  28. ; Disable peer verification - be sure to understand the limitations of peer
  29. ; verification in stunnel when enabling.
  30. ;verify = 0
  31. ; Default client section:
  32. ; stunnel requires at least one section to start successfully.
  33. ; You can safely remove this section once you have configured
  34. ; your own. We use client mode here as server requires a certificate.
  35. [dummy]
  36. client = yes
  37. accept = localhost:6000
  38. connect = localhost:6001