Руслан Даянов,
Мой конфиг stunnel.conf (centos 7), openssl+gost_engine и stunnel - собирал из исходников,
cafile = /CA/ca.crt
cert = /CA/server.crt
key = /CA/server.key
engine=gost
socket = l:TCP_NODELAY=1
socket = r:TCP_NODELAY=1
debug = 7
output = /opt/stunnel/var/log/stunnel.log
client = no
[RDP-TLS-GOST]
ciphers = GOST2012-GOST8912-GOST8912
accept = 1494
connect = IP.RDP.host:3389
клиент win7 stunnel 5.56:
CAFile=c:\CA\ca.crt
engine=rtengine
debug = 7
output = C:\CA\stunnel.log
client = yes
sslVersion=TLSv1
taskbar=yes
[RDP]
engineNum=1
key=pkcs11:model=Rutoken%20ECP;token=Rutoken%20ECP%20%3cno%20label%3e;manufacturer=Aktiv%20Co.;serial=346abfb;id=2020
cert = c:\CA\user.crt
accept = 127.0.0.1:33033
connect = IP.host:1494
TIMEOUTclose = 1
и в openssl.cnf, который в комплекте с stunnel, в начало забросил
openssl_conf = openssl_def
[openssl_def]
engines = engine_section
[engine_section]
rtengine = rtengine_section
[rtengine_section]
engine_id = rtengine
dynamic_path = c:/rtengine.dll
MODULE_PATH = c:/windows/system32/rtpkcs11ecp.dll
default_algorithms = ALL
идентификатор ключа смотрю через openvpn
C:\Program Files\OpenVPN\bin>openvpn.exe --show-pkcs11-ids rtPKCS11ECP.dll
...
Serialized id: pkcs11:model=Rutoken%20ECP;token=Rutoken%20ECP%20%3cno%20label%3e;manufacturer=Aktiv%20Co.;serial=346abfb;id=2020
Свисток Рутокен 2.0 ЭЦП с неэкспортируемой ключевой парой