Using ObjectiveFS with Stunnel

NOTE: Starting in version 7.0, ObjectiveFS has built-in TLS/SSL support. stunnel is not needed anymore. For TLS details, see here.

This guide covers how to set up stunnel for endpoints that support only SSL. If you prefer to use ghostunnel, see this ghostunnel setup doc.

Since ObjectiveFS has built-in client side encryption and always encrypts your data at rest and in transit, you don’t need to use stunnel for most cases. Common uses for stunnel are when using an on-premise object store that supports only SSL or when using the AWS server side encryption feature.

Note: This document uses port 8086 on the localhost for the stunnel connection. You can replace 8086 below with the port you prefer.

Steps

  1. Install stunnel
$ yum install stunnel
  1. Edit /etc/stunnel/stunnel.conf with the following 5 lines:
[s3]
client=yes
delay=yes
accept=127.0.0.1:8086
connect=<endpoint>:443

For list of endpoints, see here. For example, for us-west-1 buckets, replace endpoint above with s3.us-west-1.amazonaws.com.

  1. Run stunnel on your command line (or using your init tools)
$ stunnel
  1. To use ObjectiveFS with stunnel, set the http_proxy environment variable to http://127.0.0.1:8086.

    Example: Running the list command using stunnel
$ http_proxy=http://127.0.0.1:8086 mount.objectivefs list

Last updated by ObjectiveFS staff, April 20, 2022
ObjectiveFS is a shared file system for Linux and macOS that automatically scales and gives you scalable cloud storage. If you have questions or article idea suggestions, please email us at support@objectivefs.com