On Di, Aug 14, 2018 at 07:09:24 -0700, David Lang wrote:
In Rsyslog, the client is sending data to the server, don't you want to know that the client is legitimate and should be trusted?

For now this is not a requirement, even TLS is not a requirement. I was checking if I could activate TLS easily without big configuration changes.

Since most appliances (like switches or loadbalancers) only know about standard syslog logging anyway it would be a difficult job to solve this problem.

If you don't care who the client is, you can put the same client cert everywhere

This is one solution: a long-lived self-signed certificate. The other one is completely anonymous TLS.

Also, if you are only running this internally, there's no reason not to generate your own certs

If you mean one cert for every system, yes, this would be doable.

If you mean a cert for every system, then this is too much work for others as well.

Shade and sweet water!

        Stephan

--
| Public Keys: http://fsing.rootsland.net/~stse/keys.html |

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to