In this section:
Security analytics is dependent on centralized Syslog aggregation, with the expectation that the Syslog communication is secured. The primary Syslog security threats to address are:
To eliminate these threats, RFC 5425 defines a TLS Transport Mapping for Syslog. This feature supports the RFC 5425-compliant transport option in addition to the existing UDP, TCP, and RELP Syslog remote protocols.
The SBC is enhanced to:
The
/var/log/
files to transfer over Syslog. It captures the Linux session console logs and transfers it through the Syslog.: /var/log/session/session.*
files and pushes it to the Syslog Server.platformAuditLog
- Platform Linux Audit log messages consoleLog
- Console activity messagessftpLog
- internal-sftp messageskernLog
- kernel messagesuserLog
- user-level messagesdaemonLog
- system daemon messagesauthLog
-
auth and authpriv
- security/authorization messagessyslogLog
- internally generated by syslog messagesntpLog
- NTP subsystem messagescronLog
- clock daemon messagesfipsLog
- fips messagesThe TLS is a new transport medium that uses Rsyslog service and ensures secure communication between the
The
Rsyslog process logs very quickly and has enriched security features. It accepts inputs and delivers the results to the desired destinations.
To support this service, the
The
The
rsyslog.conf
file to allow communication through TLS over TCP or RELP.The
The configuration of Rsyslog service to use TLS on each server requires three certificates: the CA certificate, the server certificate and the server key set in rsyslog.conf
The
Alternatively, the
The
To generate the PKI certificate, refer to Generating PKI Certificates
This interface simplifies the certificates and keys managing process and provides more security since the private key never leaves the SBC system.
To enable Rsyslog communication over TLS:
syslogRemoteProtocol
as tls-tcp.
To generate the certificate using Rsyslog for TLS:
Create a configuration object to store the locally generated RSA Key Pair:
set system security pki certificate <certName> type local-internal
Generate Key pair and CSR for submission to a Certificate Authority (CA):
request system security pki certificate <certName> generateCSR csrSub <csrSub> keySize <keySize>
csrToBeSigned.csr
localCert.pem
and the remote Certificate as rootCA.der
. Using openssl
commands on the CA run the following:Generate the rootCA.key
openssl genrsa -out rootCA.key 2048
Generate RSA private key for rootCA.key
openssl genrsa -des3 -out rootCA.key 2048
Generate rootCA.pem
file:
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1024 -out rootCA.pem
Generate the localCert.pem
file:
openssl x509 -req -in csrToBeSigned.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out localCert.pem -days <no_days> -sha256
Generate the rootCA.der
file from the localCert.pem
file
openssl x509 -outform der -in localCert.pem -out rootCA.der
Once Certificate Authority issues the certificates, place the certificate in the SBC directory: /opt/sonus/external
and install the certificates on the
set system security pki certificate <loal_cert_name> fileName <local_pem_filename> state enabled set system security pki certificate <remote_cert_name> fileName <remote_der_filename> type remote state enabled
The following three Certificates are added to the rsyslog.conf
file to support TLS communication, these are generated from the existing local and remote Certificates already copied to the SBC:
<machine-cert>.pem
<machine-key>.key
<ca-cert>.pem
Externally-provisioned certificates follows the same steps as mentioned in the SBC-provisioned Certificates. The only difference being that Step one is configured on an external Server to the
The ACL rules support the number of acknowledged messages received to the
The following example describes the worst case Credit Rate required, on an SBC7000 which supports 1350 cps
1350 cps * 2 call detail records (start/stop) * 3 Servers = 8100 pkt/sec + additional logs.
This results in an approximate credit rate of up to 10,000 pkts/sec in the worst case scenario.
The credit rate is calculated as: Calculated SBCs CPS * 2 (start/stop record) * 3 (remote servers) + approx. 25% for all other logs types.
The
The
rsyslog.conf
file is updated appropriately to support spooling for all log types./home/log/spool
. Spooling does not use the DRBD partition, and there is no need to replicate the data using DRBD as Syslog service is always running to send out logs even when the Spooling reduces message loss but does not guarantee the server receives all the messages. However, when re-establishing the connection to the server, the SBC sends some duplicate messages to the server when the spooling is configured.
For Spooling, the
The
For spooling, the
The
Spooling is not supported for UDP because the Rsyslog service cannot detect, if the connection is down.
To keep the amount of message loss to a minimum, use the Spooling feature to configure the latest version of Rsyslog on the SBC. The
New/Updated packages are:
rsyslog_8.40.0-1~bpo9+1_amd64.deb
rsyslog-gnutls_8.40.0-1~bpo9+1_amd64.deb
rsyslog-relp_8.40.0-1~bpo9+1_amd64.deb
The Rsyslog service sends its messages to the Syslog servers on the management interface. With the introduction of three servers for the Rsyslog service, the amount of data the
The worst case scenario message size that can be sent on an SBC 52x0:
450 cps * 2 call detail records (start/stop) * approx. 2k per record * 3 Servers = 5.4 MB/sec + additional logs
This does not include the additional ACKs received for TCP and RELP.
The following table indicates for each