[Info-vax] VSI STunnel question

Duncan Morris duncanjmmorris at gmail.com
Wed Apr 12 15:52:27 EDT 2023


On Wednesday, 12 April 2023 at 17:02:47 UTC+1, Rich Jordan wrote:
> On Tuesday, April 11, 2023 at 2:49:08 PM UTC-5, Duncan Morris wrote: 
> > On Tuesday, 11 April 2023 at 15:33:55 UTC+1, Rich Jordan wrote: 
> > > Got a customer moving from HP VMS (Integrity) to VSI. They currently use STunnel-4_20 from HP with SSL1 V1.0.20 (OpenSSL 1.0.2o), and a test upgrade to VSI VMS without updating SSL1 has it working in the same environment. This is using self signed certs (CA on VMS) and strictly within the company's networks. 
> > > 
> > > The VSI STunnel V5.56 says it was built with OpenSSL V1.1.1g and statically linked. The package does NOT list SSL/SSL1 as a prereq in the release notes; does that mean it should work as a standalone package without regard to the version of SSL/SSL1 installed (or if SSL/SSL1 is even installed at all)? 
> > > 
> > > I'm waiting on the customer to provide their VSI support info, so asking here first. Thanks! 
> > As it is statically linked, there is no call out to the SSL shareable images. Rather all the required SSL modules are already included in the image, leaving no pre-requisites. 
> > I understand that the next VSI stunnel release will be statically linked with SSL 3.0.x. 
> > 
> > I personally maintain a port of stunnel for OpenVMS for our customers. i used to link the image dynamically against the shareable SSLx images. However, as the clients vary widely in their installed levels of SSLSSL1/SSL3, I now link our image statically with SSL3 and am able to implement it regardless of the client's patch levels.
> Thanks for replying. 
> 
> We installed it on the test server and aimed it at the existing certs, and it looks like we'll have to build a new CA and generate new certs. The new Stunnel won't start with what we have, complaining about 
> ":SSL routines:SSL_CTX_use_certificate:ca md too weak". 
> 
> The existing server certs are only good for 4 more months and are the only ones using this in-house CA so its not a major issue, just an additional to-do. Hopefully the SSL1 on VMS procedures haven't changed too much so the docs we wrote up last time are still valid. 
> 
> Thanks

Rich, I would recommend checking out the stunnel manual for several new parameters relating to security.
https://www.stunnel.org/static/stunnel.html

Particularly look at the new securityLevel = LEVEL option. The default setting is probably responsible for complaining out the existing CA and certs.



More information about the Info-vax mailing list