summaryrefslogtreecommitdiff
path: root/doc/ns_gtls.html
diff options
context:
space:
mode:
Diffstat (limited to 'doc/ns_gtls.html')
-rw-r--r--doc/ns_gtls.html59
1 files changed, 0 insertions, 59 deletions
diff --git a/doc/ns_gtls.html b/doc/ns_gtls.html
deleted file mode 100644
index 0d02ad0..0000000
--- a/doc/ns_gtls.html
+++ /dev/null
@@ -1,59 +0,0 @@
-<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
-<html><head><title>gtls Network Stream Driver</title>
-
-</head>
-<body>
-<h1>gtls Network Stream Driver</h1>
-<p>This <a href="netstream.html">network stream
-driver</a> implements a TLS protected transport via the <a href="http://www.gnu.org/software/gnutls/" target="_blank">GnuTLS
-library</a>.</p>
-<p><b>Available since:</b> 3.19.0 (suggested minimum 3.19.8 and above)</p>
-<p style="font-weight: bold;">Supported Driver Modes</p>
-<ul>
-<li>0 - unencrypted trasmission (just like <a href="ns_ptcp.html">ptcp</a> driver)</li>
-<li>1 - TLS-protected operation</li>
-</ul>
-Note: mode 0 does not provide any benefit over the ptcp driver. This
-mode exists for technical reasons, but should not be used. It may be
-removed in the future.<br>
-<span style="font-weight: bold;">Supported Authentication
-Modes</span><br>
-<ul>
-<li><span style="font-weight: bold;">anon</span>
-- anonymous authentication as
-described in IETF's draft-ietf-syslog-transport-tls-12 Internet draft</li>
-<li><span style="font-weight: bold;">x509/fingerprint</span>
-- certificate fingerprint authentication as
-described in IETF's draft-ietf-syslog-transport-tls-12 Internet draft</li>
-<li><span style="font-weight: bold;">x509/certvalid</span>
-- certificate validation only</li>
-<li><span style="font-weight: bold;">x509/name</span>
-- certificate validation and subject name authentication as
-described in IETF's draft-ietf-syslog-transport-tls-12 Internet draft
-</li>
-</ul>
-Note: "anon" does not permit to authenticate the remote peer. As such,
-this mode is vulnerable to man in the middle attacks as well as
-unauthorized access. It is recommended NOT to use this mode.</p>
-<p>x509/certvalid is a nonstandard mode. It validates the remote
-peers certificate, but does not check the subject name. This is
-weak authentication that may be useful in scenarios where multiple
-devices are deployed and it is sufficient proof of authenticy when
-their certificates are signed by the CA the server trusts. This is
-better than anon authentication, but still not recommended.
-<b>Known Problems</b><br>
-<p>Even in x509/fingerprint mode, both the client and sever
-certificate currently must be signed by the same root CA. This is an
-artifact of the underlying GnuTLS library and the way we use it. It is
-expected that we can resolve this issue in the future.</p>
-<p>[<a href="rsyslog_conf.html">rsyslog.conf overview</a>]
-[<a href="manual.html">manual index</a>] [<a href="http://www.rsyslog.com/">rsyslog site</a>]
-</p>
-<p><font size="2">This documentation is part of the
-<a href="http://www.rsyslog.com/">rsyslog</a>
-project.<br>
-Copyright © 2008 by <a href="http://www.gerhards.net/rainer">Rainer
-Gerhards</a> and
-<a href="http://www.adiscon.com/">Adiscon</a>.
-Released under the GNU GPL version 3 or higher.</font></p>
-</body></html>