tls.permittedPeer¶
Restricts DTLS clients to the listed certificate fingerprints or names. .. summary-end
This parameter applies to imdtls: Input Module for DTLS Protocol over UDP.
- Name:
tls.permittedPeer
- Scope:
input
- Type:
array
- Default:
none
- Required?:
no
- Introduced:
v8.2402.0
Description¶
tls.permittedPeer
places access restrictions on this listener. Only peers
whose certificate fingerprint or name is listed in this array parameter may
connect. The certificate presented by the remote peer is used for its
validation.
When a non-permitted peer connects, the refusal is logged together with its
fingerprint. If the administrator knows this was a valid request, they can
simply add the fingerprint by copy and paste from the logfile to
rsyslog.conf
.
To specify multiple fingerprints, enclose them in braces like this:
tls.permittedPeer=["SHA1:...1", "SHA1:....2"]
To specify just a single peer, you can either specify the string directly or
enclose it in braces. You may also use wildcards to match a larger number of
permitted peers, e.g. *.example.com
.
When using wildcards to match a larger number of permitted peers, the
implementation is similar to Syslog RFC5425. This wildcard matches any
left-most DNS label in the server name. That is, the subject *.example.com
matches the server names a.example.com
and b.example.com
, but does not
match example.com
or a.b.example.com
.
Input usage¶
module(load="imdtls")
input(type="imdtls"
tls.permittedPeer=["SHA1:11223344556677889900AABBCCDDEEFF00112233"])
See also¶
See also imdtls: Input Module for DTLS Protocol over UDP.
Support: rsyslog Assistant | GitHub Discussions | GitHub Issues: rsyslog source project
Contributing: Source & docs: rsyslog source project
© 2008–2025 Rainer Gerhards and others. Licensed under the Apache License 2.0.