分类: LINUX
2008-03-03 21:37:00
This section describes how to configure TLS encryption in syslog-ng Premium Edition. For the concepts of using TLS in syslog-ng, see Section 2.7, “Secure logging using TLS”.
Create an X.509 certificate for the syslog-ng server. The subject_alt_name
parameter (or the Common Name
parameter if the subject_alt_name
parameter is empty) must
contain the hostname or the IP address (as resolved from the syslog-ng clients
and relays) of the server. Complete the following steps on every syslog-ng
client host:
Procedure 3.1. Configuring TLS on the syslog-ng clients
Copy the CA certificate (e.g., cacert.pem
) of the
Certificate Authority that issued the certificate of the syslog-ng server to the
syslog-ng client hosts, for example into the /etc/syslog-ng/ca.d
directory.
Issue the following command on the certificate: openssl x509 -noout -hash -in cacert.pem The
result is a hash (e.g., 6d2962a8
), a
series of alphanumeric characters based on the Distinguished Name of the
certificate.
Issue the following command to create a symbolic link to the certificate that
uses the hash returned by the previous command and the .0
suffix.
ln -s cacert.pem 6d2962a8.0
Add a destination statement to the syslog-ng configuration file that uses the
tls( ca_dir(path_to_ca_directory) )
option
and specify the directory using the CA certificate. The destination must use the
tcp()
or tcpv6()
destination driver, and the IP address
and port parameters of the driver must point to the syslog-ng server.
Example 3.11. A destination statement using TLS | |
---|---|
The following destination encrypts the log messages using TLS and sends them
to the destination demo_tls_destination { |
Include the destination created in Step 2 in a log statement.
Warning | |
---|---|
The encrypted connection between the server and the client fails if the Do not forget to update the certificate files when they expire. |
Complete the following steps on the syslog-ng server:
Procedure 3.2. Configuring TLS on the syslog-ng server
Copy the certificate (e.g., syslog-ng.cert
) of
the syslog-ng server to the syslog-ng server host, for example into the /etc/syslog-ng/cert.d
directory. The certificate must be a
valid X.509 certificate in PEM format.
Copy the private key (e.g., syslog-ng.key
)
matching the certificate of the syslog-ng server to the syslog-ng server host,
for example into the /etc/syslog-ng/key.d
directory.
The key must be in PEM format, and must not be password-protected.
Add a source statement to the syslog-ng configuration file that uses the tls( key_file(key_file_fullpathname)
cert_file(cert_file_fullpathname) )
option and specify the key and
certificate files. The source must use the source driver (tcp()
or tcpv6()
) matching the destination driver used
by the syslog-ng client.
Example 3.12. A source statement using TLS | |
---|---|
The following source receives log messages encrypted using TLS, arriving to
the source demo_tls_source { |
Disable mutual authentication for the source by setting the following TLS
option in the source statement: tls(
peer_verify(optional-untrusted);
To configure mutual authentication, see .
Example 3.13. Disabling mutual authentication | |
---|---|
The following source receives log messages encrypted using TLS, arriving to
the source demo_tls_source { |
Warning | |
---|---|
Do not forget to update the certificate and key files when they expire. |
For the details of the available tls()
options, see .