>> I was thinking of copying logs via ssh to a central storage.
>
> Note that any old syslogd can forward syslog msgs to a central log host,
> and NetBSD even supports to do that TLS-encrypted:
>
> *.err         @[my.log.collector](fingerprint="SHA1:01:02:...")

That's great to know!

However, having looked at syslog.conf(5), am I alone in thinking that
the documentation of the TLS feature in syslog / syslogd has too many
loose ends to effectively "on-board" new users of the TLS feature,
especially if this is your first encounter with x509 certs, as
contrasted by "of course everyone are already fully on-board with
using x509 cert generation stuff of openssl" which I think is quite a
stretch.  As one example: "where should I get the TLS fingerprint
value from?"  Also, the man page does not provide any pointers to
other relevant man pages or documentation, other than syslog(3) and
syslogd(8), and neither of those man pages do anything to explain
anything of the TLS feature any further.

Best regards,

- HÃ¥vard

Reply via email to