Setup SSL Tunnel Using Stunnel on Ubuntu

The Stunnel program is designed to work as an SSL encryption wrapper between remote client and server. It can be used to add SSL functionality.

What Stunnel basically does is that it turns any insecure TCP port into a secure encrypted port using OpenSSL package for cryptography.

1.Update & Upgrade Ubuntu

apt-get update && apt-get upgrade

2.Install Stunnel on VPS

apt-get install stunnel4 -y

3.Create SSL Certificate

openssl genrsa -out key.pem 2048
openssl req -new -x509 -key key.pem -out cert.pem -days 1095
cat key.pem cert.pem >> /etc/stunnel/stunnel.pem

4.configure Stunnel on VPS

vim /etc/stunnel/stunnel.conf

So overall the stunnel.conf file must contain the lines below:

client = no
[squid]
accept = 8888
connect = 127.0.0.1:3128
cert = /etc/stunnel/stunnel.pem

Note: The client = no part isn’t necessary, Stunnel by default is set to server mode.

Also, enable Stunnel automatic startup by configuring the “/etc/default/stunnel4” file

ENABLED=1

Finally, restart Stunnel for configuration to take effect, using this command:

/etc/init.d/stunnel4 restart

5.Install Squid Proxy

apt-get install squid3 -y

Configure Stunnel in Client

Using a SFTP client such as Filezilla, connect to your server and download the stunnel.pem file located in “/etc/stunnel/” directory to the client.

Install Stunnel on your choice of OS. Then go to the Stunnel folder and move the downloaded certificate stunnel.pem to Stunnel folder.

So stunnel.conf file in the client should look like this:

cert = stunnel.pem
client = yes
[squid]
accept = 127.0.0.1:8080
connect = [Server’s Public IP]:8888

Save and close the file and run stunnel.exe.

That’s it. Now when we want to connect to Squid proxy on our cloud server, we must configure our client to connect to 127.0.0.1:8080, and Stunnel automatically connects us through a secure tunnel to the service specified for that port.

0 (0)
Article Rating (No Votes)
Rate this article
Attachments
There are no attachments for this article.
Comments
There are no comments for this article. Be the first to post a comment.
Full Name
Email Address
Security Code Security Code
Related Articles RSS Feed
What Is /dev/shm And Its Practical Usage
Viewed 5709 times since Tue, Mar 12, 2019
10 Linux cryptsetup Examples for LUKS Key Management (How to Add, Remove, Change, Reset LUKS encryption Key)
Viewed 2547 times since Tue, Jul 31, 2018
Linux Chage Command to Set Password Aging for User
Viewed 886 times since Tue, Sep 11, 2018
Install Security Patches or Updates Automatically on CentOS and RHEL
Viewed 773 times since Fri, Oct 26, 2018
RHCS: Configure an active/backup pacemaker cluster
Viewed 6041 times since Sun, Jun 3, 2018
How to clear swap memory in Linux
Viewed 640 times since Mon, Nov 23, 2020
Secure Secure Shell
Viewed 7986 times since Fri, Aug 21, 2020
LVM: Reduce root PV/VG
Viewed 3414 times since Sat, Jun 2, 2018
systemctl Use systemd to Start a Linux Service at Boot
Viewed 3993 times since Mon, Dec 7, 2020
How to use yum-cron to automatically update RHEL/CentOS Linux
Viewed 1069 times since Wed, Oct 17, 2018