Greetings list, I was hoping you could offer a small piece of advice, re:
TLS certificates and rsyslog;

I have a farm of ubuntu instances in the Amazon EC2 cloud, and am
implementing encrypted remote syslogging.  In the gssapi documentation, it
states that it is a bad idea to "use these [host certificates] on more than
one instance, [because] doing so would prevent [me] from distinguising
between the instances and thus would disable useful authentication."

This would mean that not only do I have to create over 50 client certs to
start with, but because of the way in which we currently backup & provision
EC2 cloud server instances, I would have to generate a new host cert on
every instance reboot.  Besides the obvious security concerns, what effects
would there be from sharing a cert as it is explicitly stated to not do?
How indistinguishable does the log traffic become?  Don't remote syslog
messages come with a hostname in plaintext anyway?  (Besides, rsyslog has
templated output too !)  Would time-stamp collisions cause logging failures?


If the issues are not unresolvable, my plan is to generate a unique client
certificate per machine TYPE,  (webserver, DB & slaves, load-balancer, api
proxy, etc.) thus allowing me to continue with our current method of
single-image instance provisioning, while gaining (mostly) secure
centralized logging.  I'd appreciate some experienced insight into the
matter, of course, hence this email.

Regards,
-G

Gavin McDonald
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to