StreamDriver.TlsRevocationCheck¶
Controls whether TLS certificate revocation checking via OCSP is enabled.
This parameter applies to imtcp: TCP Syslog Input Module.
- Name:
StreamDriver.TlsRevocationCheck
- Scope:
module, input
- Type:
binary
- Default:
module=off, input=module parameter
- Required?:
no
- Introduced:
8.2602.0
Warning
EXPERIMENTAL FEATURE
This feature is experimental and has known limitations that can impact rsyslog processing and security:
Blocking I/O: OCSP requests use blocking network operations during TLS handshake, which delays message processing and can cause latency of up to 5 seconds per OCSP responder.
DoS Attack Vector: Malicious certificates can contain multiple OCSP responder URLs pointing to slow or unresponsive servers, causing prolonged blocking and potential denial of service.
Thread Blocking: Under load, blocked threads waiting for OCSP responses can exhaust the thread pool and stall message processing.
Only enable this feature if you fully understand these implications and have tested the impact on your rsyslog deployment. Consider network timeout configurations and monitor for increased latency.
Description¶
Controls whether TLS certificate revocation checking is performed during the TLS handshake. When enabled, rsyslog will query OCSP (Online Certificate Status Protocol) responders to verify that certificates have not been revoked.
The revocation check is only performed for OpenSSL-based TLS connections
(StreamDriver.Name="ossl"). The feature is not available when using
GnuTLS or WolfSSL drivers.
Important considerations:
Disabled by default: Certificate revocation checking is disabled by default for backward compatibility and to avoid potential performance impacts.
Blocking I/O: OCSP checks perform blocking network operations (DNS resolution, HTTP requests) during the TLS handshake, which can introduce latency of up to 5 seconds per OCSP responder. This may impact throughput and cause connection delays.
Network requirements: OCSP checks require outbound network connectivity to OCSP responder servers specified in the certificate’s Authority Information Access extension.
Certificate requirements: Certificates must contain OCSP responder URLs. Certificates with only CRL (Certificate Revocation List) distribution points are not supported and will fail revocation checks.
When enabled ("on"), the TLS handshake will fail if:
The certificate is revoked
The OCSP responder is unreachable
The OCSP response is invalid
The certificate contains no OCSP responder information but has CRL information
The same-named input parameter can override the module setting.
Security note: OCSP checking provides additional security by verifying that certificates have not been revoked, but introduces operational complexity and potential availability risks due to external dependencies.
Module usage¶
module(load="imtcp"
streamDriver.name="ossl"
streamDriver.mode="1"
streamDriver.authMode="x509/certvalid"
streamDriver.tlsRevocationCheck="on")
Input usage¶
input(type="imtcp" port="514"
streamDriver.name="ossl"
streamDriver.mode="1"
streamDriver.authMode="x509/certvalid"
streamDriver.tlsRevocationCheck="on")
Example: Disabled (default)¶
# Explicitly disable revocation checking (same as default)
module(load="imtcp"
streamDriver.name="ossl"
streamDriver.mode="1"
streamDriver.authMode="x509/certvalid"
streamDriver.tlsRevocationCheck="off")
See also¶
See also imtcp: TCP Syslog Input Module.
Support: rsyslog Assistant | GitHub Discussions | GitHub Issues: rsyslog source project
Contributing: Source & docs: rsyslog source project
© 2008–2025 Rainer Gerhards and others. Licensed under the Apache License 2.0.