1
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
2
<html><head><title>TLS-protected syslog: scenario</title>
6
<h1>Encrypting Syslog Traffic with TLS (SSL)</h1>
7
<p><small><i>Written by <a href="http://www.adiscon.com/en/people/rainer-gerhards.php">Rainer
8
Gerhards</a> (2008-06-17)</i></small></p>
11
<li><a href="rsyslog_secure_tls.html">Overview</a>
12
<li><a href="tls_cert_scenario.html">Sample Scenario</a>
13
<li><a href="tls_cert_ca.html">Setting up the CA</a>
14
<li><a href="tls_cert_machine.html">Generating Machine Certificates</a>
15
<li><a href="tls_cert_server.html">Setting up the Central Server</a>
16
<li><a href="tls_cert_client.html">Setting up syslog Clients</a>
17
<li><a href="tls_cert_udp_relay.html">Setting up the UDP syslog relay</a>
18
<li><a href="tls_cert_summary.html">Wrapping it all up</a>
19
<li><a href="tls_cert_errmsgs.html">Frequently seen Error Messages</a>
22
<h3>Sample Scenario</h3>
23
<p>We have a quite simple scenario. There is one central syslog server,
24
<span style="float: left">
25
<script type="text/javascript"><!--
26
google_ad_client = "pub-3204610807458280";
27
/* rsyslog doc inline */
28
google_ad_slot = "5958614527";
29
google_ad_width = 125;
30
google_ad_height = 125;
33
<script type="text/javascript"
34
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
37
named central.example.net. These server is being reported to by two Linux
38
machines with name zuse.example.net and turing.example.net. Also, there is a
39
third client - ada.example.net - which send both its own messages to the central
40
server but also forwards messages receive from an UDP-only capable router. We
41
hav decided to use ada.example.net because it is in the same local network
42
segment as the router and so we enjoy TLS' security benefits for forwarding the
43
router messages inside the corporate network. All systems (except the router) use
44
<a href="http://www.rsyslog.com/">rsyslog</a> as the syslog software.</p>
45
<p><center><img src="tls_cert_100.jpg"></center>
46
<p>Please note that the CA must not necessarily be connected to the rest of the
47
network. Actually, it may be considered a security plus if it is not. If the CA
48
is reachable via the regular network, it should be sufficiently secured (firewal
49
rules et al). Keep in mind that if the CA's security is breached, your overall
50
system security is breached.
51
<p>In case the CA is compromised, you need to regenerate the CA's certificate as well
52
as all individual machines certificates.
54
<p>Copyright (c) 2008 <a href="http://www.adiscon.com/en/people/rainer-gerhards.php">Rainer
56
<a href="http://www.adiscon.com/en/">Adiscon</a>.</p>
57
<p> Permission is granted to copy, distribute and/or modify this
58
document under the terms of the GNU Free Documentation License, Version
59
1.2 or any later version published by the Free Software Foundation;
60
with no Invariant Sections, no Front-Cover Texts, and no Back-Cover
61
Texts. A copy of the license can be viewed at
62
<a href="http://www.gnu.org/copyleft/fdl.html">http://www.gnu.org/copyleft/fdl.html</a>.</p>