Hi, "Supported values are either “*fingerprint*” or “*name”*."
https://www.rsyslog.com/doc/v8-stable/configuration/modules/imrelp.html#tls-authmode Flo On Thu, Nov 15, 2018 at 3:31 PM sophie.loewenthal--- via rsyslog < [email protected]> wrote: > Hi Carsten, > > I added this but got an error in the logs. > 2018-11-15T15:25:44.803514+01:00 3msl rsyslogd: imrelp: invalid auth mode > 'anon' [v8.39.0 try http://www.rsyslog.com/e/2291 ] > > I tried this config with : > tls.authMode="anon" > and then with, > tls.authMode=anon > > > # Input Modules > input(type="imrelp" port="10514" tls="on" > tls.caCert="/etc/pki/tls/private/ca-cert.pem" > tls.myCert="/etc/pki/tls/private/collector-cert.pem" > tls.myPrivKey="/etc/pki/tls/private/collector-key.pem" > tls.authMode="anon" > tls.permittedpeer=["*.local"] > ) > > I'm running rsyslogd 8.39.0 > > > Best wishes, > Sophie > > > > > -----Original Message----- > > From: [email protected] [mailto:[email protected]] > > Sent: Tuesday, November 13, 2018 5:08 PM > > To: [email protected] > > Cc: LOEWENTHAL Sophie > > Subject: RE: [rsyslog] TLS and rsyslog > > > > Hi Sophie, > > > > To get rid of the cert verification I used the following config parameter > > > > $InputTCPServerStreamDriverAuthMode anon # client is NOT > authenticated > > > > So in your case I would think it's the following: > > tls.authMode=anon > > > > for anonymous authentication. > > > > This was set on the server site. > > > > My whole config looked like this: > > > > :::::::::::::: > > /etc/rsyslog.d/tls.conf > > :::::::::::::: > > # syslog via tls configuration > > $ModLoad imtcp # TCP listener > > > > # make gtls driver the default > > $DefaultNetstreamDriver gtls > > > > # certificate files > > $DefaultNetstreamDriverCAFile /etc/rsyslog.d/certs/ca.pem > > $DefaultNetstreamDriverCertFile /etc/rsyslog.d/certs/cert.pem > > $DefaultNetstreamDriverKeyFile /etc/rsyslog.d/certs/key.pem > > > > #Ruleset > > $Ruleset TLS > > *.* /apps/log/tls.log > > action( > > name="rsyslog-debug-local" > > template="RSYSLOG_DebugFormat" > > type="omfile" > > file="/apps/log/rsyslog-debug-tls.log" > > ) > > $Ruleset RSYSLOG_DefaultRuleset > > > > $InputTCPServerStreamDriverAuthMode anon # client is NOT authenticated > > $InputTCPServerStreamDriverMode 1 # run driver in TLS-only mode > > $InputTCPServerBindRuleset TLS > > $InputTCPServerRun 6514 # start up listener at port 6514 > > > > Regards > > > > carsten > > > > > > Carsten Lange | Security Specialist | CISSP | E: [email protected] > > > > -----Original Message----- > > From: rsyslog [mailto:[email protected]] On Behalf Of > > sophie.loewenthal--- via rsyslog > > Sent: Dienstag, 13. November 2018 16:27 > > To: rsyslog-users <[email protected]> > > Cc: [email protected] > > Subject: Re: [rsyslog] TLS and rsyslog > > > > Hi, > > > > New error message after removing the tls.permittedpeer=["*.local"] and > the > > tls.authmode I saw this, > > > > 2018-11-13T16:19:22.691302+01:00 6 rsyslogd: imrelp[10514]: error 'TLS > record > > write failed [gnutls error -10: The specified session has been > invalidated for > > some reason.]', object 'lstn 10514: conn to clt 10.1.1.8/a2.local ' - > input may > > not work as intended [v8.24.0 try http://www.rsyslog.com/e/2353 ] > > > > > > > > > -----Original Message----- > > > From: rsyslog [mailto:[email protected]] On Behalf Of > > > sophie.loewenthal--- via rsyslog > > > Sent: Tuesday, November 13, 2018 4:03 PM > > > To: rsyslog-users > > > Cc: LOEWENTHAL Sophie > > > Subject: Re: [rsyslog] TLS and rsyslog > > > > > > Thanks. I configured ca and certs for the clients and servers. I set > the dnsName > > > to a wildcard. e.g *.local. in the certificates. > > > > > > Both clients and servers started, and the server listens on the ports > with TLS. > > > > > > However TLS connections cannot be established. This is something to do > > > with a 'peer' which was specified in tls.permittedpeer= > > > > > > The error on the server is : > > > 2018-11-13T15:50:12.783315+01:00 6 rsyslogd: imrelp[10514]: > > > authentication error 'no permited name found', peer is '' [v8.24.0 try > > > http://www.rsyslog.com/e/2353 ] > > > > > > > > > I used this config: > > > Server: > > > input(type="imrelp" port="10514" tls="on" > > > tls.caCert="/etc/pki/tls/private/ca-cert.pem" > > > tls.myCert="/etc/pki/tls/private/collector-cert.pem" > > > tls.myPrivKey="/etc/pki/tls/private/collector-key.pem" > > > tls.authMode="name" > > > tls.permittedpeer=["*.local"] > > > ) > > > > > > Client: > > > action(type="omrelp" target="5" port="10514" tls="on" > > > tls.caCert="/etc/pki/tls/private/ca-cert.pem" > > > tls.myCert="/etc/pki/tls/private/sender-cert.pem" > > > tls.myPrivKey="/etc/pki/tls/private/sender-key.pem" > > > tls.authmode="name" > > > tls.permittedpeer=["*.local"] > > > ) > > > action(type="omrelp" target="6" port="10514" tls="on" > > > tls.caCert="/etc/pki/tls/private/ca-cert.pem" > > > tls.myCert="/etc/pki/tls/private/sender-cert.pem" > > > tls.myPrivKey="/etc/pki/tls/private/sender-key.pem" > > > tls.authmode="name" > > > tls.permittedpeer=["*.local"] > > > ) > > > > > > What should I added for the tls.permittedpeer? I don't think this is > > > correct. Or my certificates are wrong. > > > > > > > -----Original Message----- > > > > From: rsyslog [mailto:[email protected]] On Behalf > > > > Of John Chivian > > > > Sent: Tuesday, November 13, 2018 1:56 PM > > > > To: sophie.loewenthal--- via rsyslog > > > > Subject: Re: [rsyslog] TLS and rsyslog > > > > > > > > If both client and server are willing to accept and use a valid > > > > certificate, and do no other verification checks, then yes you can > > > > use the same cert on all client systems. > > > > > > > > Regards, > > > > > > > > On 11/13/18 3:22 AM, sophie.loewenthal--- via rsyslog wrote: > > > > > Light bulb moment: Can I use the same client cert on all of the > clients? > > > > > > > > > >> -----Original Message----- > > > > >> From: rsyslog [mailto:[email protected]] On > > > > >> Behalf Of > > > > >> sophie.loewenthal--- via rsyslog > > > > >> Sent: Tuesday, November 13, 2018 10:06 AM > > > > >> To: rsyslog-users > > > > >> Cc: LOEWENTHAL Sophie > > > > >> Subject: [rsyslog] TLS and rsyslog > > > > >> > > > > >> Hi, > > > > >> > > > > >> I've read lots of dox on setting up TLS for sending logs and > > > > >> every time I see > > > > one > > > > >> has to set up a CA and then have a certificate for every client. > > > > >> I'd have to > > > > create > > > > >> 1001 certificates and then a new client cert for every new > > > > >> server. This is impractical and the time is not available to > > > > >> perform the task. For > > > comparison, > > > > >> we don't require every user's browser to have a client cert to > > > > >> connect with > > > a > > > > >> webserver, like Paypal, and I use self-signed certs for some > > > > >> internal web > > > > servers. > > > > >> > > > > >> In my case the objective to to encrypt the syslog data sent over > > > > >> the > > > network, > > > > but > > > > >> not to identify the sending machine. > > > > >> Is there a way to have rsyslog use a self-signed certificate and > > > > >> trust all the clients that connect over TLS? > > > > >> > > > > >> Some examples that suggest using a self-signed CA + clients: > > > > >> https://access.redhat.com/solutions/519533 > > > > >> https://waqarafridi.wordpress.com/2015/11/16/configure-ssltls-bet > > > > >> ween- > > > > two- > > > > >> rsyslog-systems/ > > > > >> And the list goes on. > > > > >> > > > > >> Best wishes, > > > > >> Sophie > > > > >> > > > > >> Not working on Mondays/ Travailler sauf le lundi Team mailbox : > > > > >> [email protected] or direct > > > > >> [email protected] > > > > >> > > > > >> > > > > >> > > > > >> > > > > >> This message and any attachments (the "message") is intended > > > > >> solely for the intended addressees and is confidential. > > > > >> If you receive this message in error,or are not the intended > > > > >> recipient(s), please delete it and any copies from your systems > > > > >> and immediately notify the sender. Any unauthorized view, use > > > > >> that does not comply with its > > > purpose, > > > > >> dissemination or disclosure, either whole or partial, is > > > > >> prohibited. Since the internet cannot guarantee the integrity of > > > > >> this message which may not be reliable, > > > > BNP > > > > >> PARIBAS > > > > >> (and its subsidiaries) shall not be liable for the message if > > > > >> modified, changed > > > > or > > > > >> falsified. > > > > >> Do not print this message unless it is necessary, consider the > environment. > > > > >> > > > > >> ----------------------------------------------------------------- > > > > >> --------------------------- > > > -- > > > > ---- > > > > >> -------------------------------- > > > > >> > > > > >> Ce message et toutes les pieces jointes (ci-apres le "message") > > > > >> sont etablis a l'intention exclusive de ses destinataires et sont > > confidentiels. > > > > >> Si vous recevez ce message par erreur ou s'il ne vous est pas > > > > >> destine, merci de le detruire ainsi que toute copie de votre > > > > >> systeme et d'en avertir immediatement l'expediteur. Toute lecture > > > > >> non autorisee, toute utilisation > > > de > > > > >> ce message qui n'est pas conforme a sa destination, toute > > > > >> diffusion ou > > > toute > > > > >> publication, totale ou partielle, est interdite. L'Internet ne > > > > >> permettant pas d'assurer l'integrite de ce message electronique > > > > >> susceptible d'alteration, BNP Paribas (et ses filiales) > > > > >> decline(nt) toute responsabilite au titre de ce message dans > > > > >> l'hypothese ou il aurait ete modifie, deforme ou falsifie. > > > > >> N'imprimez ce message que si necessaire, pensez a l'environnement. > > > > >> > > > > >> _______________________________________________ > > > > >> rsyslog mailing list > > > > >> http://lists.adiscon.net/mailman/listinfo/rsyslog > > > > >> http://www.rsyslog.com/professional-services/ > > > > >> What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE > > > > >> WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a > > > > >> myriad > > > of > > > > >> sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if > > > > >> you > > > > DON'T > > > > >> LIKE THAT. > > > > > _______________________________________________ > > > > > rsyslog mailing list > > > > > http://lists.adiscon.net/mailman/listinfo/rsyslog > > > > > http://www.rsyslog.com/professional-services/ > > > > > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE > > > > > WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a > > > > > myriad of > > > > sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > > > DON'T > > > > LIKE THAT. > > > > > > > > > > > > _______________________________________________ > > > > rsyslog mailing list > > > > http://lists.adiscon.net/mailman/listinfo/rsyslog > > > > http://www.rsyslog.com/professional-services/ > > > > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE > > > > WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > > > > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if > > > > you > > > DON'T > > > > LIKE THAT. > > > _______________________________________________ > > > rsyslog mailing list > > > http://lists.adiscon.net/mailman/listinfo/rsyslog > > > http://www.rsyslog.com/professional-services/ > > > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE > > > WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of > > > sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > > > DON'T LIKE THAT. > > _______________________________________________ > > rsyslog mailing list > > http://lists.adiscon.net/mailman/listinfo/rsyslog > > http://www.rsyslog.com/professional-services/ > > What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: > This > > is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond > our > > control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT. > _______________________________________________ > rsyslog mailing list > http://lists.adiscon.net/mailman/listinfo/rsyslog > http://www.rsyslog.com/professional-services/ > What's up with rsyslog? Follow https://twitter.com/rgerhards > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > DON'T LIKE THAT. > _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

