RE: [Syslog] Syslog-tls-09 draft - suggested change

2007-04-25 Thread Miao Fuyou

I think the working group had discussed the issue and actually the draft is
written with:
trusted mechanism such as a preconfigured hosts table or DNSSEC 

Regards,
Miao

 -Original Message-
 From: Carson Gaspar [mailto:[EMAIL PROTECTED] 
 Sent: Wednesday, April 25, 2007 3:47 PM
 To: [EMAIL PROTECTED]
 Subject: Re: [Syslog] Syslog-tls-09 draft - suggested change
 
 [ re: DNS reverse mapping ]
 
 DNS is not secure, and isn't likely to be any time soon. 
 Using DNS as any sort of security measure is just plain stupid.
 
 Either the other party possesses the private key material 
 that matches their public key or they don't. If they don't, 
 SSL will fail. If they do, then they're exactly who they say 
 they are (or the private key material has leaked, at which 
 point it's game over anyway). DNS should have nothing 
 whatsoever to do with it. Any modern RFC that makes 
 references to doing reverse lookups in a security context 
 should be laughed out of the IETF.
 
 --
 Carson
 
 ___
 Syslog mailing list
 Syslog@lists.ietf.org
 https://www1.ietf.org/mailman/listinfo/syslog
 



___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog


RE: [Syslog] Syslog-tls-09 draft - suggested change

2007-04-25 Thread Miao Fuyou
 
  There is also a matter of what an application is supposed 
 to do when 
  logging fails.  Some applications should proceed uninterrupted.  
  Others may need to block.  I don't know whether text is 
 appropriate.  
  It's not part of the protocol, but it does fall under 
 common modes of 
  failure.  The reason this would be an issue with TLS (or 
 BEEP for that 
  matter) and not with UDP is that one doesn't block with UDP.
 
 I think Eliot is on the right track.  However, I wouldn't 
 differentiate between the actions that a sender or receiver 
 is to take when authentication fails - both cases should have 
 a recommendation that the device log the failure _and_ 
 attempt to inform the administrator of the problem.  This 
 might be pop-ups to the unsuspecting user who won't know what 
 to do about it, it might be messages printed on the console, 
 it might be a blinky light on the printer, etc.  (Most 
 networked printers that I'm seeing these days have nice 
 displays that are starting to give informative
 messages.)

My perception is logging does not necesarily mean send events over network
to syslog server,. Webopedia says log is to record an action. If there is
no syslog connection available, it is still possible to log the message in
local storage. 

I just checked the printer in my office, it does log events locally. It is
reckoned the buffer for log is very small because there are only 50 records,
acutally the printer fails from time to time:-(

Thanks,
Miao


 



___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog


Re: [Syslog] Syslog-tls-09 draft - suggested change

2007-04-25 Thread Eliot Lear

Miao Fuyou wrote:

My perception is logging does not necesarily mean send events over network
to syslog server,. Webopedia says log is to record an action. If there is
no syslog connection available, it is still possible to log the message in
local storage. 
  
Right.  The issue here, however, is that you've configured an 
application or a system to use the network and that has failed.  What 
you do next requires a bit of care.  That's all I'm saying.


Eliot

___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog