Stunnel
Posted by firesteelrain 1 day ago
Comments
Comment by chasil 1 day ago
https://www.linuxjournal.com/content/encrypting-nfsv4-stunne...
RFC-9289: Towards Remote Procedure Call Encryption
“Special mention goes to Charles Fisher, author of ‘Encrypting NFSv4 with Stunnel TLS’ [LJNL]. His article inspired the mechanism described in this document.”
Comment by binaryturtle 1 day ago
Back when Apple's Mail on a more outdated OS X setup stopped to be able to connect to various mail servers because of Apple's own outdated SSL/TLS implementation (security.framework?) I just plugged stunnel in the middle to make things work again: Mail connects to localhost and stunnel then safely connects to the remote mail server.
While this was an important fix at that time it also provided surprisingly additional benefits. Now it was much easier to entirely block outgoing connections from Mail with Little Snitch. Instead having numerous allow directives per mailserver, just one full block. E.g. no more random config changes that break everything, because Apple decided to push some auto-config changes for well-known mail providers. No more accidental tracking pixel triggers. Also all the accounts are now just vanilla POP3/SMTP accounts rather than those with "special handling". Finally Mail became much more stable for some reason. No more long lockups when I want to open the Account settings, no more random lockups when launching the app, etc.
Now I really do not want to miss this extra layer anymore because all the bonus benefits (even if it shouldn't be needed any longer just to make SSL/TLS work again).
Over time bunch of other things (Mail unrelated) got plugged into the stunnel config too. :)
Comment by p0w3n3d 1 day ago
I know stunnel serves different purpose, but still why would you need it for your service if you can be in the vpn and speak plaintext?
Comment by YPPH 1 day ago
Comment by poemxo 1 day ago
That said, I think Wireguard is easier to analyze on the wire since it has a known binary signature from the first 4 bytes, while stunnel tunnel is indifferentiable from web browsing traffic. For a bad actor looking into exfil or C2, this means an stunnel is probably the sneakier and thus more reliable method of encryption on the wire compared to wireguard.
Comment by krylon 1 day ago
Comment by tbrownaw 1 day ago
Comment by patmcc 1 day ago
Comment by Piraty 1 day ago
Comment by danlitt 1 day ago
Comment by pixl97 1 day ago
"Everyday you get electricity, water, transportation, food, and general survival are dependant on horrifically outdated software systems that aren't going to be changed any time soon"
Comment by patmcc 1 day ago
Comment by nine_k 1 day ago
Comment by pfix 1 day ago
I always considered it the best solution to have both: VPN encryption and TLS encryption over the VPN. Different OSI Layers. Different Attack Surfaces.
Not sure if that is a recommended pratice though (see initial remark ;) )
Comment by 01HNNWZ0MV43FF 1 day ago
Comment by eps 1 day ago
POP3 over stunnel -> SPOP3.
A practical solution, both for legacy components and for the cases when you don't want to deal with implementing TLS natively.
Ultimately, it's very Unix in spirit. Does one specific thing and is composable with others.
Comment by TheFinalDraw 1 day ago
Comment by ephaeton 1 day ago
Comment by nirui 1 day ago
The security standard changes/improves over time. With software like stunnel takes care of it, your software could be practically security wise up-to-day forever as long as you or your user keeps their stunnel updated.
Comment by TheCondor 1 day ago
The most obvious issue is that if any system is compromised, then the attacker can potentially sniff traffic and they are all effectively compromised. The next one, and it’s really key to TLS, is that the app you are proxying probably has an opinion or desired behavior when things can’t be authenticated or are improper. Someone reading you blog and the cert is a day old? Probably not super risky to let them read it. Logging in to the mail server and the keys are bad? You might want the server to just block that.
For like a home lab situation or kind of toy systems? These tools are great, I’ve used stunned more than a few times to hack things together
Comment by drowsspa 1 day ago
Comment by 01HNNWZ0MV43FF 1 day ago
Comment by chasil 1 day ago
Edit: I put stunnel on port 443 and have it connect to port 80 on my Apache webservers, because I like one way of doing TLS.
This guide has been useful for many years in cipher selection:
https://hynek.me/articles/hardening-your-web-servers-ssl-cip...
Comment by ray_v 1 day ago
Comment by tingletech 1 day ago
Comment by ectospheno 1 day ago
Comment by hwj 1 day ago
Comment by creatonez 1 day ago
Comment by boneitis 1 day ago
I've found stunnel a godsend for bridging the gap. Granted, I am more of a sysadmin-ey type where a few times I've had to abruptly/quickly get something up and running.
Comment by ranger_danger 1 day ago
Comment by TZubiri 1 day ago
Just slap an HTTPS proxy on top of an pure HTTP server. It's simpler to debug and understand.
Otherwise you need to learn how to slap SSL onto 10 different HTTP things.
Comment by renewiltord 1 day ago
Comment by VerifiedReports 1 day ago
Comment by yjftsjthsd-h 1 day ago
I know I'm somewhat blind to jargon, but that seems fairly straightforward?
Comment by catoc 1 day ago
[I’ll show myself out]