article SSL with Solaris agent

How to use SSL with the Solaris agent:

  1. Install Stunnel on Solaris.
  2. Install the agent on Solaris.
  3. Run the command to see the executed script: inetadm -l /network/uptimeagent/tcp | fgrep exec
  4. Run the command to update the executed script for the agent: inetadm -m /network/uptimeagent/tcp exec="/usr/sbin/stunnel /usr/local/etc/stunnel/uptimeagent.conf" where /usr/sbin/stunnel is the path to the stunnel executable and /usr/local/etc/stunnel/uptimeagent.conf is the path to the uptimeagent.conf built for stunnel to use.
  5. Run the command to see that the executed script has been changed: inetadm -l /network/uptimeagent/tcp | fgrep exec
  6. Create the certificate that will be used by Stunnel.  For example:
openssl req -new -x509 -days 365 -nodes -config stunnel.cnf -out stunnel.pem -keyout stunnel.pem

The following is a sample stunnel.cnf for the openssl program:

# create RSA certs - Server

RANDFILE = stunnel.rnd

[ req ]
default_bits = 1024
encrypt_key = yes
distinguished_name = req_dn
x509_extensions = cert_type

[ req_dn ]
countryName = Country Name (2 letter code)
countryName_default             = PL
countryName_min                 = 2
countryName_max                 = 2

stateOrProvinceName             = State or Province Name (full name)
stateOrProvinceName_default     = Some-State

localityName                    = Locality Name (eg, city)

0.organizationName              = Organization Name (eg, company)
0.organizationName_default      = Stunnel Developers Ltd

organizationalUnitName          = Organizational Unit Name (eg, section)
#organizationalUnitName_default =

0.commonName                    = Common Name (FQDN of your server)
0.commonName_default            = localhost

# To create a certificate for more than one name uncomment:
# 1.commonName                  = DNS alias of your server
# 2.commonName                  = DNS alias of your server
# ...
# See http://home.netscape.com/eng/security/ssl_2.0_certificate.html
# to see how Netscape understands commonName.

[ cert_type ]
nsCertType = server

7.  Copy stunnel.pem to <stunnel install directory>/uptimeagent.pem

8.  Create the uptimeagent.conf  with the following lines in the stunnel install directory:
cert=/etc/stunnel/uptimeagent.pem
exec=/opt/uptime-agent/bin/uptimeagent

Related Articles


Installing / Uninstalling the up.time agent on Solaris

RatingViews
article

The up.time Solaris agent is based on the Solaris package format and installation follows the same steps as adding or removing a standard Solaris package.

By: uptime Support | Date Created: 7-13-2006 | Last Modified: 4-2-2014 | Index: 085

  9012

Installing / Uninstalling the up.time agent on AIX / HP-UX

RatingViews
article

This article explains how to install an agent on AIX and HP-UX systems.

By: uptime Support | Date Created: 10-25-2005 | Last Modified: 2-11-2013 | Index: 032

  12830

Solaris Performance Metrics

RatingViews
article

This article outlines the performance metrics that are gathered by the up.time Solaris agent.

By: uptime Support | Date Created: 1-26-2007 | Last Modified: 5-22-2013 | Index: 127

  12002

Solaris Agent Timeout

RatingViews
article

If a Solaris agent is not collecting data because it is timing out, increase the timeout from the default 30 seconds with the following steps: 1. Run: inetadm -l /network/uptimeagent/tcp | fgrep...

By: uptime Support | Date Created: 5-24-2013 | Last Modified: 5-25-2013 | Index: 595

  1484

Solaris 10 Agent Commands

RatingViews
article

This article outlines the commands that you can use to control the up.time agent on Solaris 10.

By: uptime Support | Date Created: 3-20-2007 | Last Modified: 10-25-2013 | Index: 152

  5935

User Comments



No comments have been posted.

Copyright © 2021 IDERA, Inc.   Legal   Privacy Statement