Hi Carsten,

I added this but got an error in the logs.
2018-11-15T15:25:44.803514+01:00  3msl rsyslogd: imrelp: invalid auth mode 
'anon' [v8.39.0 try http://www.rsyslog.com/e/2291 ]

I tried this config with :
tls.authMode="anon"
and then with,
tls.authMode=anon


#  Input Modules
input(type="imrelp" port="10514" tls="on"
 tls.caCert="/etc/pki/tls/private/ca-cert.pem"
 tls.myCert="/etc/pki/tls/private/collector-cert.pem"
 tls.myPrivKey="/etc/pki/tls/private/collector-key.pem"
 tls.authMode="anon"
 tls.permittedpeer=["*.local"]
)

I'm running rsyslogd 8.39.0


Best wishes,
Sophie



> -----Original Message-----
> From: [email protected] [mailto:[email protected]]
> Sent: Tuesday, November 13, 2018 5:08 PM
> To: [email protected]
> Cc: LOEWENTHAL Sophie
> Subject: RE: [rsyslog] TLS and rsyslog
> 
> Hi Sophie,
> 
> To get rid of the cert verification I used the following config parameter
> 
> $InputTCPServerStreamDriverAuthMode anon       # client is NOT authenticated
> 
> So in your case I would think it's the following:
>  tls.authMode=anon
> 
> for anonymous authentication.
> 
> This was set on the server site.
> 
> My whole config looked like this:
> 
> ::::::::::::::
> /etc/rsyslog.d/tls.conf
> ::::::::::::::
> # syslog via tls configuration
> $ModLoad imtcp # TCP listener
> 
> # make gtls driver the default
> $DefaultNetstreamDriver gtls
> 
> # certificate files
> $DefaultNetstreamDriverCAFile /etc/rsyslog.d/certs/ca.pem
> $DefaultNetstreamDriverCertFile /etc/rsyslog.d/certs/cert.pem
> $DefaultNetstreamDriverKeyFile /etc/rsyslog.d/certs/key.pem
> 
> #Ruleset
> $Ruleset TLS
> *.* /apps/log/tls.log
> action(
>         name="rsyslog-debug-local"
>         template="RSYSLOG_DebugFormat"
>         type="omfile"
>         file="/apps/log/rsyslog-debug-tls.log"
> )
> $Ruleset RSYSLOG_DefaultRuleset
> 
> $InputTCPServerStreamDriverAuthMode anon # client is NOT authenticated
> $InputTCPServerStreamDriverMode 1 # run driver in TLS-only mode
> $InputTCPServerBindRuleset TLS
> $InputTCPServerRun 6514 # start up listener at port 6514
> 
> Regards
> 
> carsten
> 
> 
> Carsten Lange | Security Specialist | CISSP | E: [email protected]
> 
> -----Original Message-----
> From: rsyslog [mailto:[email protected]] On Behalf Of
> sophie.loewenthal--- via rsyslog
> Sent: Dienstag, 13. November 2018 16:27
> To: rsyslog-users <[email protected]>
> Cc: [email protected]
> Subject: Re: [rsyslog] TLS and rsyslog
> 
> Hi,
> 
> New error message after removing the tls.permittedpeer=["*.local"] and the
> tls.authmode  I saw this,
> 
> 2018-11-13T16:19:22.691302+01:00 6 rsyslogd: imrelp[10514]: error 'TLS record
> write failed [gnutls error -10: The specified session has been invalidated for
> some reason.]', object  'lstn 10514: conn to clt 10.1.1.8/a2.local ' - input 
> may
> not work as intended [v8.24.0 try http://www.rsyslog.com/e/2353 ]
> 
> 
> 
> > -----Original Message-----
> > From: rsyslog [mailto:[email protected]] On Behalf Of
> > sophie.loewenthal--- via rsyslog
> > Sent: Tuesday, November 13, 2018 4:03 PM
> > To: rsyslog-users
> > Cc: LOEWENTHAL Sophie
> > Subject: Re: [rsyslog] TLS and rsyslog
> >
> > Thanks. I configured ca and certs for the clients and servers. I set the 
> > dnsName
> > to a wildcard. e.g   *.local. in the certificates.
> >
> > Both clients and servers started, and the server listens on the ports with 
> > TLS.
> >
> > However TLS connections cannot be established. This is something to do
> > with a 'peer' which was specified in tls.permittedpeer=
> >
> > The error on the server is :
> > 2018-11-13T15:50:12.783315+01:00 6 rsyslogd: imrelp[10514]:
> > authentication error 'no permited name found', peer is '' [v8.24.0 try
> > http://www.rsyslog.com/e/2353 ]
> >
> >
> > I used this config:
> > Server:
> > input(type="imrelp" port="10514" tls="on"
> > tls.caCert="/etc/pki/tls/private/ca-cert.pem"
> > tls.myCert="/etc/pki/tls/private/collector-cert.pem"
> > tls.myPrivKey="/etc/pki/tls/private/collector-key.pem"
> > tls.authMode="name"
> > tls.permittedpeer=["*.local"]
> > )
> >
> > Client:
> > action(type="omrelp" target="5" port="10514" tls="on"
> >  tls.caCert="/etc/pki/tls/private/ca-cert.pem"
> >  tls.myCert="/etc/pki/tls/private/sender-cert.pem"
> >  tls.myPrivKey="/etc/pki/tls/private/sender-key.pem"
> >  tls.authmode="name"
> >  tls.permittedpeer=["*.local"]
> > )
> > action(type="omrelp" target="6" port="10514" tls="on"
> >  tls.caCert="/etc/pki/tls/private/ca-cert.pem"
> >  tls.myCert="/etc/pki/tls/private/sender-cert.pem"
> >  tls.myPrivKey="/etc/pki/tls/private/sender-key.pem"
> >  tls.authmode="name"
> >  tls.permittedpeer=["*.local"]
> > )
> >
> > What should I added for the tls.permittedpeer? I don't think this is
> > correct. Or my certificates are wrong.
> >
> > > -----Original Message-----
> > > From: rsyslog [mailto:[email protected]] On Behalf
> > > Of John Chivian
> > > Sent: Tuesday, November 13, 2018 1:56 PM
> > > To: sophie.loewenthal--- via rsyslog
> > > Subject: Re: [rsyslog] TLS and rsyslog
> > >
> > > If both client and server are willing to accept and use a valid
> > > certificate, and do no other verification checks, then yes you can
> > > use the same cert on all client systems.
> > >
> > > Regards,
> > >
> > > On 11/13/18 3:22 AM, sophie.loewenthal--- via rsyslog wrote:
> > > > Light bulb moment:  Can I use the same client cert on all of the 
> > > > clients?
> > > >
> > > >> -----Original Message-----
> > > >> From: rsyslog [mailto:[email protected]] On
> > > >> Behalf Of
> > > >> sophie.loewenthal--- via rsyslog
> > > >> Sent: Tuesday, November 13, 2018 10:06 AM
> > > >> To: rsyslog-users
> > > >> Cc: LOEWENTHAL Sophie
> > > >> Subject: [rsyslog] TLS and rsyslog
> > > >>
> > > >> Hi,
> > > >>
> > > >> I've read lots of dox on setting up TLS for sending logs and
> > > >> every time I see
> > > one
> > > >> has to set up a CA and then have a certificate for every client.
> > > >> I'd have to
> > > create
> > > >> 1001 certificates and then a new client cert for every new
> > > >> server. This is impractical and the time is not available to
> > > >> perform the task. For
> > comparison,
> > > >> we don't require every user's browser to have a client cert to
> > > >> connect with
> > a
> > > >> webserver, like Paypal, and I use self-signed certs for some
> > > >> internal web
> > > servers.
> > > >>
> > > >> In my case the objective to to encrypt the syslog data sent over
> > > >> the
> > network,
> > > but
> > > >> not to identify the sending machine.
> > > >> Is there a way to have rsyslog use a self-signed certificate and
> > > >> trust all the clients that connect over TLS?
> > > >>
> > > >> Some examples that suggest using a self-signed CA + clients:
> > > >> https://access.redhat.com/solutions/519533
> > > >> https://waqarafridi.wordpress.com/2015/11/16/configure-ssltls-bet
> > > >> ween-
> > > two-
> > > >> rsyslog-systems/
> > > >> And the list goes on.
> > > >>
> > > >> Best wishes,
> > > >> Sophie
> > > >>
> > > >> Not working on Mondays/ Travailler sauf le lundi Team mailbox :
> > > >> [email protected] or direct
> > > >> [email protected]
> > > >>
> > > >>
> > > >>
> > > >>
> > > >> This message and any attachments (the "message") is intended
> > > >> solely for the intended addressees and is confidential.
> > > >> If you receive this message in error,or are not the intended
> > > >> recipient(s), please delete it and any copies from your systems
> > > >> and immediately notify the sender. Any unauthorized view, use
> > > >> that does not comply with its
> > purpose,
> > > >> dissemination or disclosure, either whole or partial, is
> > > >> prohibited. Since the internet cannot guarantee the integrity of
> > > >> this message which may not be reliable,
> > > BNP
> > > >> PARIBAS
> > > >> (and its subsidiaries) shall not be liable for the message if
> > > >> modified, changed
> > > or
> > > >> falsified.
> > > >> Do not print this message unless it is necessary, consider the 
> > > >> environment.
> > > >>
> > > >> -----------------------------------------------------------------
> > > >> ---------------------------
> > --
> > > ----
> > > >> --------------------------------
> > > >>
> > > >> Ce message et toutes les pieces jointes (ci-apres le "message")
> > > >> sont etablis a l'intention exclusive de ses destinataires et sont
> confidentiels.
> > > >> Si vous recevez ce message par erreur ou s'il ne vous est pas
> > > >> destine, merci de le detruire ainsi que toute copie de votre
> > > >> systeme et d'en avertir immediatement l'expediteur. Toute lecture
> > > >> non autorisee, toute utilisation
> > de
> > > >> ce message qui n'est pas conforme a sa destination, toute
> > > >> diffusion ou
> > toute
> > > >> publication, totale ou partielle, est interdite. L'Internet ne
> > > >> permettant pas d'assurer l'integrite de ce message electronique
> > > >> susceptible d'alteration, BNP Paribas (et ses filiales)
> > > >> decline(nt) toute responsabilite au titre de ce message dans
> > > >> l'hypothese ou il aurait ete modifie, deforme ou falsifie.
> > > >> N'imprimez ce message que si necessaire, pensez a l'environnement.
> > > >>
> > > >> _______________________________________________
> > > >> rsyslog mailing list
> > > >> http://lists.adiscon.net/mailman/listinfo/rsyslog
> > > >> http://www.rsyslog.com/professional-services/
> > > >> What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE
> > > >> WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a
> > > >> myriad
> > of
> > > >> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if
> > > >> you
> > > DON'T
> > > >> LIKE THAT.
> > > > _______________________________________________
> > > > rsyslog mailing list
> > > > http://lists.adiscon.net/mailman/listinfo/rsyslog
> > > > http://www.rsyslog.com/professional-services/
> > > > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE
> > > > WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a
> > > > myriad of
> > > sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
> > DON'T
> > > LIKE THAT.
> > >
> > >
> > > _______________________________________________
> > > rsyslog mailing list
> > > http://lists.adiscon.net/mailman/listinfo/rsyslog
> > > http://www.rsyslog.com/professional-services/
> > > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE
> > > WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad
> > > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if
> > > you
> > DON'T
> > > LIKE THAT.
> > _______________________________________________
> > rsyslog mailing list
> > http://lists.adiscon.net/mailman/listinfo/rsyslog
> > http://www.rsyslog.com/professional-services/
> > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE
> > WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of
> > sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
> > DON'T LIKE THAT.
> _______________________________________________
> rsyslog mailing list
> http://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com/professional-services/
> What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This
> is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our
> control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to