1

I am trying to send audit trails from rsyslog running on CentOS to auditdistd on FreeBSD using TLS.

auditdistd can be both sender and receiver. I would like to trick auditdistd into thinking that rsyslog is auditdistd running on a different machine.

The problem is that auditdistd requires the connecting clients to have a certificate's public key fingerprint generated with

openssl x509 -in /etc/security/auditdistd.cert.pem -noout -fingerprint -sha256 | \
    awk -F '[ =]' '{printf("%s=%s\n", $1, $3)}'

and a password. I cannot find any rsyslog documentation explaining how to provide a fingerprint and a password to the rsyslog sender.

Is it even possible? How can I achieve this?


Related

0 Answers0