Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

To enable SSL encryption, complete the following steps on each agent system:

...

Note
titleNote
Do not perform these steps on the monitoring station.
  1. Ensure Stunnel is installed on the agent server. If you do not have access to a distribution, you can download it from Stunnel.org.

  2. Edit the /etc/xinetd.d/uptmagnt file so that it includes the following configuration information:

    Code Block
    languagetext
    service uptmagnt
    \n
     
    {
    \n disable
     
    disable = no
    \n flags
     
    flags = REUSE
    \n
     
    socket_type
     = stream
    \n wait
     
    wait = no
    \n user
     
    user = nobody
    \n server
     
    server = /usr/sbin/stunnel
    \n
     
    server_args
     = /etc/stunnel/uptmagnt.conf
    \n
     
    }
    \n
  3. Create the certificate that will be used by Stunnel. For example: 

    Code Block
    languagetext
    openssl req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem
  4. \n
  5. The following is a sample stunnel.cnf for the openssl program:

    Code Block
    languagetext
    # create RSA certs - Server
  6. \n\nRANDFILE
  7. 
    RANDFILE = stunnel.rnd
  8. \n\n
  9. 
    [ req ]
  10. \ndefault
  11. 
    default_bits = 1024
  12. \nencrypt
  13. 
    encrypt_key = yes
  14. \ndistinguished
  15. 
    distinguished_name = req_dn
  16. \nx509
  17. 
    x509_extensions = cert_type
  18. \n\n
  19. 
    [ req_dn ]
  20. \ncountryName
  21. 
    countryName = Country Name (2 letter code)
  22. \ncountryName
  23. 
    countryName_default
  24.  = PL
  25. \ncountryName
  26. 
    countryName_min 
  27. = 2
  28. \ncountryName
  29. 
    countryName_max
  30.  = 2
  31. \n\nstateOrProvinceName
  32. 
    stateOrProvinceName = State or Province Name (full name)
  33. \nstateOrProvinceName
  34. 
    stateOrProvinceName_default
  35.  = Some-State
  36. \n\nlocalityName
  37. 
    localityName = Locality Name (eg, city)
  38. \n\n0.organizationName
  39. 
    0.organizationName = Organization Name (eg, company)
  40. \n0
  41. 
    0.organizationName_default
  42.  = Stunnel Developers Ltd
  43. \n\norganizationalUnitName
  44. 
    organizationalUnitName = Organizational Unit Name (eg, section)
  45. \n#organizationalUnitName
  46. 
    #organizationalUnitName_default =
  47. \n\n0.commonName
  48. 
    0.commonName = Common Name (FQDN of your server)
  49. \n0
  50. 
    0.commonName_default
  51.  = localhost
  52. \n\n#
  53. 
    # To create a certificate for more than one name uncomment:
  54. \n#
  55. 
    # 1.commonName
  56.  
  57. = DNS alias of your server
  58. \n#
  59. 
    # 2.commonName
  60.  = DNS alias of your server
  61. \n#
  62. 
    # ...
  63. \n#
  64. 
    # See http://home.netscape.com/eng/security/ssl_2.0_certificate.html
  65. \n#
  66. 
    # to see how Netscape understands commonName.
  67. \n\n
  68. 
    [ cert_type ]
  69. \nnsCertType
  70. 
    nsCertType = server
  71. \n
  72. Copy stunnel.pem to /etc/stunnel/uptmagnt.pem.

...


  1. Create the /etc/stunnel/uptmagnt.conf file and add the following lines:

    Code Block
    languagetext
    cert=/etc/stunnel/uptmagnt.

...

  1. pem 
    exec=/opt/uptime-agent/bin/uptmagnt

...

  1. Restart the xinetd service. After doing this, your agent should now be in SSL mode.

    You can verify that your agent is communicating securely by running the following command on your monitoring station:

    Code Block
    languagetext
    agentcmd +s -p 9998 <hostname> df-k

...

...

Note
titleNote
  1. You can change the port on which to enable SSL to any value. To change the default agent port to something other than 9998, edit the /etc/services file, and restart xinetd. You can also use the agent-configure.sh script (see Setting the agent port or permissions for more information). 

Enabling SSL in the up.time UI

If the Linux agent has already been added to up.time, complete the following steps in the up.time Web interface for each agent system that you want to configure to use SSL.

      1. Click My Enterprise.
      2. Click the name of the agent system for which you want to enable SSL.
      3. On the system information page, click the Edit Performance Monitor link in the System Profile section.
      4. In the new Edit Service Monitor window that appears, select the Use SSL (HTTPS) option.
      5. Click Save.

        Once saved, your monitoring station Monitoring Station and agent system will be communicating via SSL.

...