Related DocumentationVersion of up.time AffectedAffected Platforms
Setting the agent port or permissionsAllLinux

You can secure communication between the up.time monitoring station and the up.time Linux agent by enabling SSL encryption. Enabling SSL is a two-step process:

Enabling SSL on the Linux Agent System

To enable SSL encryption, complete the following steps on each agent system:

NOTE: Do not perform these steps on the monitoring station.

  1. Ensure Stunnel is installed on the agent server. If you do not have access to a distribution, you can download it from Stunnel.org.
  2. Edit the /etc/xinetd.d/uptmagnt file so that it includes the following configuration information:
    service uptmagnt\n{\n        disable         = no\n        flags           = REUSE\n        socket_type     = stream\n        wait            = no\n        user            = nobody\n        server          = /usr/sbin/stunnel\n        server_args     = /etc/stunnel/uptmagnt.conf\n}\n
  3. Create the certificate that will be used by Stunnel. For example: 
    openssl req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem\n
    The following is a sample stunnel.cnf for the openssl program:
    # create RSA certs - Server\n\nRANDFILE = stunnel.rnd\n\n[ req ]\ndefault_bits = 1024\nencrypt_key = yes\ndistinguished_name = req_dn\nx509_extensions = cert_type\n\n[ req_dn ]\ncountryName = Country Name (2 letter code)\ncountryName_default             = PL\ncountryName_min                 = 2\ncountryName_max                 = 2\n\nstateOrProvinceName             = State or Province Name (full name)\nstateOrProvinceName_default     = Some-State\n\nlocalityName                    = Locality Name (eg, city)\n\n0.organizationName              = Organization Name (eg, company)\n0.organizationName_default      = Stunnel Developers Ltd\n\norganizationalUnitName          = Organizational Unit Name (eg, section)\n#organizationalUnitName_default =\n\n0.commonName                    = Common Name (FQDN of your server)\n0.commonName_default            = localhost\n\n# To create a certificate for more than one name uncomment:\n# 1.commonName                  = DNS alias of your server\n# 2.commonName                  = DNS alias of your server\n# ...\n# See http://home.netscape.com/eng/security/ssl_2.0_certificate.html\n# to see how Netscape understands commonName.\n\n[ cert_type ]\nnsCertType = server\n
  4. Copy stunnel.pem to /etc/stunnel/uptmagnt.pem.