Skip to content
This repository has been archived by the owner on Sep 27, 2023. It is now read-only.

Encrypted log transport #13

Closed
adamely opened this issue May 14, 2012 · 5 comments
Closed

Encrypted log transport #13

adamely opened this issue May 14, 2012 · 5 comments

Comments

@adamely
Copy link

adamely commented May 14, 2012

Ability for customers to receive logs via syslog over encrypted transport via stunnel or simliar. Mentioned by Facebook InfoSec and a feature I'd personally like to see.

@archaelus
Copy link
Contributor

Yup. We're on this one. We're currently building in support for http(s) drains, and that work will enable other drain types like syslog/tls to be added more easily in future.

Could you guys give us some guidance on how the SSL Cert side of things would work?

  • Would the logplex cluster use one cert as a client for all drains, or would we want to let people give us custom client certs to use?
  • What kind of verification settings would we require to accepting a server cert on connection?
  • How would we roll a cert - for expiry or other reasons?

@jon-millett-sm
Copy link

Any progress on this?

@archaelus
Copy link
Contributor

Yes indeed. Logplex now has a framework for URL based drains and now supports https:// drains.

The protocol is documented in doc/README.http_drains.md and could be described as rfc5424 over HTTP POST.

If you're a Heroku customer and want early access to this feature, send me an email - geoff@heroku.com.

@archaelus
Copy link
Contributor

We haven't implemented Syslog/TLS as we couldn't come up with a reasonable design that would a) let you verify that logplex was the client to your syslog server and b) would prevent other logplex users from connecting to you as a drain destination. https+basic auth does provide these features without a complicated client certificate scheme.

@archaelus
Copy link
Contributor

HTTP drains seems to be the most reasonable answer here.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants