Note that disabling this is not any less secure, but keeping it enabled (as it is by default) would require some extra configuration. Setting this to no disables this feature. In this mode, stunnel will validate that the connection meets the Federal Information Processing Standard. fips: Enables or disables stunnel’s FIPS 140-2 mode.The first five lines in the file are global options, meaning they will apply to every service you include in this file: It will be set to 0 by default, but change this to 1 to enable stunnel to start at boot:Ĭonnect = managed_redis_hostname_or_ip: managed_redis_port Here, we’ll use nano:įind the ENABLED option near the top of the file. Open this file with your preferred text editor. You’ll need to modify the /etc/default/stunnel4 file to enable this init script. However, stunnel uses a SysV-style init script, which is based on the older UNIX System V init system, for startup. Modern Linux systems rely on systemd for initializing and managing services and daemons. ![]() This tells us that stunnel is running, but it isn’t able to actually do anything since we haven’t yet configured it. Here, you can see that the stunnel service is active, though the process immediately exited. ![]() Sep 12 14:34:05 stunnel systemd: Started LSB: Start or stop stunnel 4.x (TLS tunnel for network daemons). Sep 12 14:34:05 stunnel stunnel4: TLS tunnels disabled, see /etc/default/stunnel4 Sep 12 14:34:05 stunnel systemd: Starting LSB: Start or stop stunnel 4.x (TLS tunnel for network daemons). Loaded: loaded (/etc/init.d/stunnel4 generated)Īctive: active (exited) since Thu 14:34:05 UTC 8s ago
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |