| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
trusted CAs (gtls)
|
|
|
|
| |
must match hostname in send action
|
| |
|
|
|
|
|
|
|
| |
The TLS server now checks the client fingerprint. This works, but
is highly experimental. Needs to be refined for practice. Also:
- implemented permittedPeers helper construct to store names
- changed omfwd implementation to use new permittedPeers
|
| |
|
|
|
|
|
|
|
|
|
|
| |
This is very experimental and needs some more work. It probably even
segfaults - but the base code is there and running. The rest is
refinement.
While working on this, I did these two bugfixes:
- bugfix: small mem leak in omfwd on exit (strmdriver name was not freed)
- bugfix: $ActionSendStreamDriver had no effect
|
|
|
|
|
|
|
|
|
|
| |
- bugfix: TCP input modules did incorrectly set fromhost property
(always blank)
- bugfix: imklog did not set fromhost property
- added "fromhost-ip" property
- added "RSYSLOG_DebugFormat" canned template
- bugfix: hostname and fromhost were swapped when a persisted message
(in queued mode) was read in
|
| |
|
|
|
|
| |
... but so far only in blocking mode
|
|
|
|
|
| |
implemented a first working version of a TLS-enabled plain TCP
sender (but, of course, the implementation is insecure as it is)
|
|
|