• We value your experience with Plesk during 2025
    Plesk strives to perform even better in 2026. To help us improve further, please answer a few questions about your experience with Plesk Obsidian 2025.
    Please take this short survey:

    https://survey.webpros.com/
  • On Plesk for Linux mod_status is disabled on upgrades to improve Apache security.
    This is a one-time operation that occurs during an upgrade. You can manually enable mod_status later if needed.

var/log/ cat secure

N

net64

Guest
Looking through my secure file I have a few new entries that look like this?? what is this??

from Mar 13 00:18:40 admin stunnel[15753]: stunnel 4.04 on i386-redhat-linux-gnu PTHREAD+LIBWRAP with OpenSSL 0.9.7a Feb 19 2003
Mar 13 00:18:40 admin stunnel[15753]: stunnel connected from 127.0.0.1:55090
Mar 13 00:18:40 admin stunnel[15753]: Connection closed: 46 bytes sent to SSL, 6 bytes sent to socket
Mar 13 00:18:40 admin stunnel[15758]: stunnel 4.04 on i386-redhat-linux-gnu PTHREAD+LIBWRAP with OpenSSL 0.9.7a Feb 19 2003
Mar 13 00:18:40 admin stunnel[15758]: stunnel connected from 127.0.0.1:55094
Mar 13 00:18:40 admin stunnel[15758]: Connection closed: 299 bytes sent to SSL, 12 bytes sent to socket
 
I have a number of the same type of stunnel log entries. I've heard webmail uses stunnel but I don't know this to be fact. It was an assumption made in another post.

I too would like to know what calls stunnel and should I be worried about this entries?

Art
 
Back
Top