On Fri, 12 Dec 2014, Muhammad Asif wrote:

OK. Client is on private address (so its FQDN or name is not visible on
internet) and behind firewall and server is on public IP (on registered
domain) and on cloud. Permittedpeer on client side will be IP or name of
server it is clear. But what will be on server side, IP or name of external
address of firewall or what. If external address of firewall then then how
it will pass packets to client.

I don't know TLS setup very well, so let me talk in terms of the underlying protocols to explain what's happening, hopefully that will cover the options (as opposed to just blindly trying things)

you have client -> NAT (firewall) -> server

to give these IP addresses and names

client 192.168.1.2

inside (firewall inside) 192.168.1.1

firewall (firewall outside) 1.1.1.1

server 2.2.2.2 with RELP configured on TCP 1514

The client initiates a TCP connection to the server. It sees the connection as 192.168.1.2:40000 (random high port) -> 2.2.2.2:1514

the packets hit the firewall, and NAT changes the TCP connection to 1.1.1.1:50000 (random high port)-> 2.2.2.2:1514. This is what the server sees.

So any limits on the server that are IP based need to allow connections from 1.1.1.1

The server responds by sending packets back to 1.1.1.1:50000 (packet shows 2.2.2.2:1514 -> 1.1.1.1:50000) and the firewall NAT changes this to 2.2.2.2:1514 -> 192.168.1.2:40000 and the packet arrives at the client. Note that this is not a separate firewall rule, it's automatic as part of the rule that allowed the TCP connection out from 192.168.1.2 to 2.2.2.2:1514

The client then sends it's cert over the connection to the server, and the server sends it's cert over the connection to the client

so anything that is based on the name in the cert has to use the name of the client (because the server is not tampering with the contents of the connection, only the IP headers)


If there is a requirement that the DNS name match the cert name, then things get messy for the client, but since NAT is so common, I don't know of anyone who requires that the reverse DNS name matches the name in the client cert. It is common to have this sort of requirement in the other direction. Specifically, if the client is connecting to a server by name and the cert that the server responds with doesn't match that name, the client will complain or refuse to start because there could be a man-in-the-middle attack going on.

according to http://www.rsyslog.com/doc/v8-stable/configuration/modules/imrelp.html the PermittedPeer parameter is listing the fingerprint of the certificate that the client provides, so this isn't the name or the IP address, but rather info from the client certificate.

Does this explain what's going on well enough? if not, let me know what part's not clear and I'll try to clarify.

David Lang


On Thu, Dec 11, 2014 at 10:50 PM, David Lang <[email protected]> wrote:

you don't need to open an inbound connection. The NAT that allows you to
connect out also allows the responses back in.

David Lang


On Thu, 11 Dec 2014, Muhammad Asif wrote:

 Hi Rsyslog Users

My Rsyslog server is on cloud and rsyslog client in my organization on
private IP.
I want my rsyslog client to receive logs from internal devices and send to
rsyslog server on cloud. My client is behind firewall. I want RELP on TLS
between client and server. My client can access server but question is on
what port rsyslog client receive acknowledgment from server so that I
could
do destination NAT of my firewall to reach reply from server to client.

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad
of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
DON'T LIKE THAT.

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to