<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html><head><title>TLS-protected syslog: scenario</title>
</head>
<body>
<h1>Encrypting Syslog Traffic with TLS (SSL)</h1>
<p><small><i>Written by <a href="http://www.adiscon.com/en/people/rainer-gerhards.php">Rainer
Gerhards</a> (2008-06-17)</i></small></p>
<ul>
<li><a href="rsyslog_secure_tls.html">Overview</a>
<li><a href="tls_cert_scenario.html">Sample Scenario</a>
<li><a href="tls_cert_ca.html">Setting up the CA</a>
<li><a href="tls_cert_machine.html">Generating Machine Certificates</a>
<li><a href="tls_cert_server.html">Setting up the Central Server</a>
<li><a href="tls_cert_client.html">Setting up syslog Clients</a>
<li><a href="tls_cert_udp_relay.html">Setting up the UDP syslog relay</a>
<li><a href="tls_cert_summary.html">Wrapping it all up</a>
<li><a href="tls_cert_errmsgs.html">Frequently seen Error Messages</a>
</ul>
<h3>Sample Scenario</h3>
<p>We have a quite simple scenario. There is one central syslog server,
<span style="float: left">
<script type="text/javascript"><!--
google_ad_client = "pub-3204610807458280";
/* rsyslog doc inline */
google_ad_slot = "5958614527";
google_ad_width = 125;
google_ad_height = 125;
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
</span>
named central.example.net. These server is being reported to by two Linux
machines with name zuse.example.net and turing.example.net. Also, there is a
third client - ada.example.net - which send both its own messages to the central
server but also forwards messages receive from an UDP-only capable router. We
hav decided to use ada.example.net because it is in the same local network
segment as the router and so we enjoy TLS' security benefits for forwarding the
router messages inside the corporate network. All systems (except the router) use
<a href="http://www.rsyslog.com/">rsyslog</a> as the syslog software.</p>
<p><center><img src="tls_cert_100.jpg"></center>
<p>Please note that the CA must not necessarily be connected to the rest of the
network. Actually, it may be considered a security plus if it is not. If the CA
is reachable via the regular network, it should be sufficiently secured (firewal
rules et al). Keep in mind that if the CA's security is breached, your overall
system security is breached.
<p>In case the CA is compromised, you need to regenerate the CA's certificate as well
as all individual machines certificates.
<h2>Copyright</h2>
<p>Copyright (c) 2008 <a href="http://www.adiscon.com/en/people/rainer-gerhards.php">Rainer
Gerhards</a> and
<a href="http://www.adiscon.com/en/">Adiscon</a>.</p>
<p> Permission is granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation License, Version
1.2 or any later version published by the Free Software Foundation;
with no Invariant Sections, no Front-Cover Texts, and no Back-Cover
Texts. A copy of the license can be viewed at
<a href="http://www.gnu.org/copyleft/fdl.html">http://www.gnu.org/copyleft/fdl.html</a>.</p>
</body></html>
Copyright 2K16 - 2K18 Indonesian Hacker Rulez