Thanks. I configured ca and certs for the clients and servers. I set the 
dnsName to a wildcard. e.g   *.local. in the certificates.

Both clients and servers started, and the server listens on the ports with TLS. 

However TLS connections cannot be established. This is something to do with a 
'peer' which was specified in tls.permittedpeer=  

The error on the server is :
2018-11-13T15:50:12.783315+01:00 6 rsyslogd: imrelp[10514]: authentication 
error 'no permited name found', peer is '' [v8.24.0 try 
http://www.rsyslog.com/e/2353 ]


I used this config:
Server:
input(type="imrelp" port="10514" tls="on"
tls.caCert="/etc/pki/tls/private/ca-cert.pem"
tls.myCert="/etc/pki/tls/private/collector-cert.pem"
tls.myPrivKey="/etc/pki/tls/private/collector-key.pem"
tls.authMode="name"
tls.permittedpeer=["*.local"]
)

Client: 
action(type="omrelp" target="5" port="10514" tls="on"
 tls.caCert="/etc/pki/tls/private/ca-cert.pem"
 tls.myCert="/etc/pki/tls/private/sender-cert.pem"
 tls.myPrivKey="/etc/pki/tls/private/sender-key.pem"
 tls.authmode="name"
 tls.permittedpeer=["*.local"] 
)
action(type="omrelp" target="6" port="10514" tls="on"
 tls.caCert="/etc/pki/tls/private/ca-cert.pem"
 tls.myCert="/etc/pki/tls/private/sender-cert.pem"
 tls.myPrivKey="/etc/pki/tls/private/sender-key.pem"
 tls.authmode="name"
 tls.permittedpeer=["*.local"] 
)

What should I added for the tls.permittedpeer? I don't think this is correct. 
Or my certificates are wrong.

> -----Original Message-----
> From: rsyslog [mailto:[email protected]] On Behalf Of John
> Chivian
> Sent: Tuesday, November 13, 2018 1:56 PM
> To: sophie.loewenthal--- via rsyslog
> Subject: Re: [rsyslog] TLS and rsyslog
> 
> If both client and server are willing to accept and use a valid
> certificate, and do no other verification checks, then yes you can use
> the same cert on all client systems.
> 
> Regards,
> 
> On 11/13/18 3:22 AM, sophie.loewenthal--- via rsyslog wrote:
> > Light bulb moment:  Can I use the same client cert on all of the clients?
> >
> >> -----Original Message-----
> >> From: rsyslog [mailto:[email protected]] On Behalf Of
> >> sophie.loewenthal--- via rsyslog
> >> Sent: Tuesday, November 13, 2018 10:06 AM
> >> To: rsyslog-users
> >> Cc: LOEWENTHAL Sophie
> >> Subject: [rsyslog] TLS and rsyslog
> >>
> >> Hi,
> >>
> >> I've read lots of dox on setting up TLS for sending logs and every time I 
> >> see
> one
> >> has to set up a CA and then have a certificate for every client. I'd have 
> >> to
> create
> >> 1001 certificates and then a new client cert for every new server. This is
> >> impractical and the time is not available to perform the task. For  
> >> comparison,
> >> we don't require every user's browser to have a client cert to connect 
> >> with a
> >> webserver, like Paypal, and I use self-signed certs for some internal web
> servers.
> >>
> >> In my case the objective to to encrypt the syslog data sent over the 
> >> network,
> but
> >> not to identify the sending machine.
> >> Is there a way to have rsyslog use a self-signed certificate and trust all 
> >> the
> >> clients that connect over TLS?
> >>
> >> Some examples that suggest using a self-signed CA + clients:
> >> https://access.redhat.com/solutions/519533
> >> https://waqarafridi.wordpress.com/2015/11/16/configure-ssltls-between-
> two-
> >> rsyslog-systems/
> >> And the list goes on.
> >>
> >> Best wishes,
> >> Sophie
> >>
> >> Not working on Mondays/ Travailler sauf le lundi
> >> Team mailbox : [email protected]
> >> or direct [email protected]
> >>
> >>
> >>
> >>
> >> This message and any attachments (the "message") is
> >> intended solely for the intended addressees and is confidential.
> >> If you receive this message in error,or are not the intended recipient(s),
> >> please delete it and any copies from your systems and immediately notify
> >> the sender. Any unauthorized view, use that does not comply with its 
> >> purpose,
> >> dissemination or disclosure, either whole or partial, is prohibited. Since 
> >> the
> >> internet
> >> cannot guarantee the integrity of this message which may not be reliable,
> BNP
> >> PARIBAS
> >> (and its subsidiaries) shall not be liable for the message if modified, 
> >> changed
> or
> >> falsified.
> >> Do not print this message unless it is necessary, consider the environment.
> >>
> >> ----------------------------------------------------------------------------------------------
> ----
> >> --------------------------------
> >>
> >> Ce message et toutes les pieces jointes (ci-apres le "message")
> >> sont etablis a l'intention exclusive de ses destinataires et sont 
> >> confidentiels.
> >> Si vous recevez ce message par erreur ou s'il ne vous est pas destine,
> >> merci de le detruire ainsi que toute copie de votre systeme et d'en avertir
> >> immediatement l'expediteur. Toute lecture non autorisee, toute utilisation 
> >> de
> >> ce message qui n'est pas conforme a sa destination, toute diffusion ou 
> >> toute
> >> publication, totale ou partielle, est interdite. L'Internet ne permettant 
> >> pas
> >> d'assurer
> >> l'integrite de ce message electronique susceptible d'alteration, BNP 
> >> Paribas
> >> (et ses filiales) decline(nt) toute responsabilite au titre de ce message 
> >> dans
> >> l'hypothese
> >> ou il aurait ete modifie, deforme ou falsifie.
> >> N'imprimez ce message que si necessaire, pensez a l'environnement.
> >>
> >> _______________________________________________
> >> rsyslog mailing list
> >> http://lists.adiscon.net/mailman/listinfo/rsyslog
> >> http://www.rsyslog.com/professional-services/
> >> What's up with rsyslog? Follow https://twitter.com/rgerhards
> >> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of
> >> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
> DON'T
> >> LIKE THAT.
> > _______________________________________________
> > rsyslog mailing list
> > http://lists.adiscon.net/mailman/listinfo/rsyslog
> > http://www.rsyslog.com/professional-services/
> > What's up with rsyslog? Follow https://twitter.com/rgerhards
> > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of
> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T
> LIKE THAT.
> 
> 
> _______________________________________________
> rsyslog mailing list
> http://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com/professional-services/
> What's up with rsyslog? Follow https://twitter.com/rgerhards
> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of
> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T
> LIKE THAT.
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to