> -----Original Message-----
> From: [email protected] [mailto:rsyslog-
> [email protected]] On Behalf Of [email protected]
> Sent: Wednesday, June 01, 2011 2:54 PM
> To: [email protected]
> Subject: [rsyslog] version 4.4.2 and TLS
> 
> Dear all,
> 
> as far as I know, RHEL currently still comes with version 4.4.2 of rsyslog,
which
> is a rather elderly version, even within the 4.x branch. 

To the best of my knowledge, they ship some 3.x version, but I would be
delighted to hear it has been updated.

> We encounter a few
> problems related to this version and TLS, currently, and also it seems to
me
> like this version was one of the first 4.x ones to support TLS.
> 
> That is why I would like to ask, if it is possible to build a secure (in
terms of
> system stability and in terms of encryption via TLS) syslog architecture
based
> on this version?

I strongly recommend against this. The reason is that a very serious bug [1]
is present in this code base. It can lead to clients looking up and doing
nothing but loop (until restart). Looking at the ChangeLog, there are also a
number of other bugs which have been fixed since 4.4.2 was current (roughly
18 month ago, what is a very large time for rsyslog...). 

If you insist on using that version, probably the best thing to do is use
plain tcp syslog together with stunnel. But this has its own operational
drawbacks. The proper thing to do is to use a recent and supported version,
so that we can look and fix at any issues you may experience. 

HTH
Rainer

[1] http://bugzilla.adiscon.com/show_bug.cgi?id=194
> 
> Best regards
> Ole
> _______________________________________________
> rsyslog mailing list
> http://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to