If the related error message bugs, you can also simply filter it out via the regular rules, e.g
if $msg contains "blub" then stop at a place towards the top of rsyslog.conf (before any files are written). Rainer El mié., 17 abr. 2019 a las 16:49, Flo Rance via rsyslog (<[email protected]>) escribió: > > Yes, I did the same as John. And of course, using some iptables rules to > avoid any unwanted packets might help as well. > > Regards, > Flo > > On Wed, Apr 17, 2019 at 3:50 PM John Chivian via rsyslog < > [email protected]> wrote: > > > As I understand your situation I don't think there's much you can do. > > The port scans and connection attempts will come, thousands of them > > every day. Your best option is to hide your listener on a port no one > > uses, and instruct your clients to use that port number. This doesn't > > eliminate the scans and connection attempts, it only reduces the number > > because most attacks and probes are against known and high reward targets. > > > > As an example I moved a publicly facing SSH server to listen on a port > > other than 22 and the attack load dropped by several orders of magnitude. > > > > Regards, > > > > > > On 4/17/19 8:15 AM, Alan Martinovic via rsyslog wrote: > > > Hey Rainer, > > > thanks for the feedback. > > > The IP layer filtering isn't applicable in my case. > > > Don't know what IPs the clients might end up having. > > > > > > > > > On Wed, Apr 17, 2019 at 2:50 PM Rainer Gerhards > > > <[email protected]> wrote: > > >> If you expose the host to the Internet, you should at least install > > >> iptables or similar solution. There is some access control directly in > > >> rsyslog, but using ip layer firewall is much more robust (by design). > > >> > > >> Rainer > > >> > > >> El mié., 17 abr. 2019 a las 14:14, Alan Martinovic via rsyslog > > >> (<[email protected]>) escribió: > > >>> Hey, > > >>> I have a rsyslog server which will accept everything that want's to > > log TLS > > >>> encrypted data to it. (Server - anon, Client - x509/name) > > >>> > > >>> It turned out the Internet is much more interested in spamming my > > logging server > > >>> then I thought when doing the implementation. > > >>> So now I'm getting a lot of: > > >>> > > >>> ``` > > >>> gnutls returned error on handshake: An unexpected TLS packet was > > received. > > >>> unexpected GnuTLS error -110 in nsdsel_gtls.c:178: The TLS connection > > >>> was non-properly terminated. > > >>> unexpected GnuTLS error -15 in nsdsel_gtls.c:178: An unexpected TLS > > >>> packet was received. > > >>> gnutls returned error on handshake: Error in the pull function. > > >>> ``` > > >>> > > >>> At some point I couldn't send any more logs before restarting rsyslog. > > >>> The service was still running and there were no exceptional logs to > > relate > > >>> to that, besides the upper ones which occur in working conditions also. > > >>> > > >>> Even if I introduce client authentication on the server side, that > > >>> wouldn't help much against bad TLS packets from unexpected clients. > > >>> > > >>> Anyways, would like to hear your thoughts on how to harden an anon > > server. > > >>> Is it possible to drop connections by log content? > > >>> Or perhaps install some kind of an application layer firewall to > > >>> protect rsyslog? > > >>> > > >>> Be Well, > > >>> Alan > > >>> _______________________________________________ > > >>> rsyslog mailing list > > >>> http://lists.adiscon.net/mailman/listinfo/rsyslog > > >>> http://www.rsyslog.com/professional-services/ > > >>> What's up with rsyslog? Follow https://twitter.com/rgerhards > > >>> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a > > myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if > > you DON'T LIKE THAT. > > > _______________________________________________ > > > rsyslog mailing list > > > http://lists.adiscon.net/mailman/listinfo/rsyslog > > > http://www.rsyslog.com/professional-services/ > > > What's up with rsyslog? Follow https://twitter.com/rgerhards > > > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > > DON'T LIKE THAT. > > > > > > _______________________________________________ > > rsyslog mailing list > > http://lists.adiscon.net/mailman/listinfo/rsyslog > > http://www.rsyslog.com/professional-services/ > > What's up with rsyslog? Follow https://twitter.com/rgerhards > > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > > DON'T LIKE THAT. > _______________________________________________ > rsyslog mailing list > http://lists.adiscon.net/mailman/listinfo/rsyslog > http://www.rsyslog.com/professional-services/ > What's up with rsyslog? Follow https://twitter.com/rgerhards > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of > sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T > LIKE THAT. _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

