Has anyone else in the mailing list had success with rsyslog gnutls? This has been an ongoing goal that can drone on about the experiences. It was a challenge to setup rsyslog v8.x with gnutls, as the config declarations are abnormally spread between globals and inputs.
It was confusing how to set ciphers along with some experimenting but successful to a point, and also probably not right, but we know the use of client library needs work, and so had to substitute with NSS configs to harden tls for rsyslog, but would be better if the application supported it native. http://www.gnutls.org/manual/gnutls.html#How-to-use-GnuTLS-in-applications https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Security_Guide/sec-Hardening_TLS_Configuration.html The rsyslog configs were not normal compared to typical v8 syntax that have used for tcp or ptcp, plus used debugging rsyslogd -N2 to find where parameters load. It seemed to have half working parameters for using internal certs with many clients, so tried using validation with common CA and wildcards appeared to be the solution, *.domain - although probably not as secure as it could be. Although can't recall exactly from memory what was required, but for the ciphers, had used gnutls-cli and gnutls certtool commands to generate certificates and verify what allowed ciphers are setup, also remember checking with openssl commands, to make sure everything in the nsswitch.conf or nss.conf set to only allow tls1.2 without the ciphers that have known vulnerabilities. Also did some experiments with tls and relp, but overall it was way too slow and didnt seem to work right. The tls alone setup was far from ideal and believe would not make it into prod environment until better supported and consistent config are available in rsyslog. Overall, looking back, it was kind of a hack anyway, especially odd with httpd for nss ciphers but seemed to do the trick although webserver was otherwise not used, and possibly be too strong for browsers ... webservers log clients might have needed to redo vhost configs or something, and I'm guessing would be the case if servers receiving logs actually need to host sites too. The rsyslog docs weren't very easy to traverse and find details as several reiterated info and left gaps, also some good older docs seemed to disappear with site changes over the years. As a side note, had ran into heartbleed when first attempting to compile libs for using gnutls on rsyslog v7 in prior years. After seeing the encrypted logs work on v8, had planned to contribute info back to the project after figuring out the configs, but will need to go back through on private lab from scratch and see what comes of it, hoping it will be less wacky the next time. I hope this rant is helpful to anyone, and will keep an eye on the topic since Rsyslog gnutls is something I'm interested in working on as time permits, or at least to test updated packages while am at it. Until then, stunnels or ssh forwarding might be a better alternative, but looking forward to others gnutls rsyslog success stories. Thanks! On May 24, 2016 4:16 PM, "David Lang" <[email protected]> wrote: > On Tue, 24 May 2016, Micah Yoder wrote: > > We have a PCI requirement to disable the RC4 cipher on our rsyslog TLS >> setup. I for the life of me can not find a configuration option to set the >> cipher suite. What am I missing? >> > > Unfortunantly, rsyslog's use of gnutls is very basic. It has very few > options. If there is anyone who is a guru in this area, we could use a lot > of knowlegeable help. > > Rsyslog trats the tls config as a black box providing the minimum config > items needed to make things work. > > It's possible that the library honors environment veriables for some of > these settings, if so you can work around the limits that way. > > Before rsyslog starting using gnutls, the work-around was to use stunnel > and run the logging traffic through stunnel. This still works. > > Patches to improve the control over gnutls would be very much welcome, but > the trouble if that there is already far too much confusion over getting it > to work, so just adding all the possible config options with good > explinations over what's what and when it should be used would only > increase the confusion. > > Someone who really knows this library could probably identify a smallish > subset of the options that we really should support and provide some sort > of explination as to what they mean pretty easily. > > > Unfortunatly this is why so many TLS related questions go unanswered for a > while here on the list. > > David Lang > _______________________________________________ > rsyslog mailing list > http://lists.adiscon.net/mailman/listinfo/rsyslog > http://www.rsyslog.com/professional-services/ > What's up with rsyslog? Follow https://twitter.com/rgerhards > NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad > of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you > DON'T LIKE THAT. > _______________________________________________ rsyslog mailing list http://lists.adiscon.net/mailman/listinfo/rsyslog http://www.rsyslog.com/professional-services/ What's up with rsyslog? Follow https://twitter.com/rgerhards NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE THAT.

