Originally posted by: Tin_Cup
As i understand server uses "Syslog-ng", but does not make use of gnutls.
server manager sent below Openssl output of the setup of an connection from another server to the logcollector to prove that TLSv1.2 is supported:
---
Server certificate
subject=/C=NL/ST=Utrecht/L=Utrecht/O=Northwave/OU=SOC/CN=141.176.39.3/emailAddress=soc@northwave.nl
issuer=/C=NL/ST=Utrecht/L=Utrecht/O=NW/OU=SOC/CN=Northwave/emailAddress=soc@northwave.nl
---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 2679 bytes and written 269 bytes
Verification error: self signed certificate in certificate chain
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES128-GCM-SHA256
When he tries to connect with TLSv1.1, it doesn't work:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1
Cipher : 0000
Server does explicitly NOT accept versions lower than TLSv1.2. This means that all other log sources use TLSv1.2+ to connect to server.
Server does allow this very well.