Re: [Syslog] TCP and SSH Discussion

2005-10-23 Thread Chris Lonvick

Hi Darren,

On Sat, 22 Oct 2005, Darren Reed wrote:


Hi Darren,

It's not syslog/udp/ssh nor syslog/tcp/ssh, it's going to be
syslog/ssh/tcp/ip.  syslog will be a defined subsystem for SSH much like
sftp and netconf.


Oh! Hmmm.

Do you have any links to critiques about sftp ?


The secsh wg mailing list.  ;) 
ftp://ftp.ietf.org/ietf-mail-archive/secsh/




I've spoken to at least one person recently (but I can't recall *who*)
that wasn't too impressed with sftp, so I'm curious if there is anything
substantial that discusses its drawbacks and what lessons (if any) need
to be learnt from it.


Joseph Galbriath has offered to have a bar-bof to discuss sftp.

Thanks,
Chris

___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog


RE: [Syslog] TCP and SSH Discussion - where are we heading to?

2005-10-23 Thread Chris Lonvick

Hi Rainer,

On Fri, 21 Oct 2005, Rainer Gerhards wrote:


Chris,


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Chris Lonvick



Are you volunteering to write?  :)


I think we are not yet in a position we have something to write. I know
that you probably did not mean to start anything right now, but let me
use this message as a tool to voice my concerns.

Over the past months (years), we've done some good work in evolving
syslog. However, RFC 3195 is having a very hard time among implementors
and our last efforts on protocol have received very limited feedback
from the operator/end user camp. On the other hand, I know that there
*is* vital interest in syslog. It's easy to judge this by the interest
new implementations receive from the user base and also by the number of
deployments of syslog tools. Obviously, end-users tend to be interested
more in the actual software tools than in protocols.

But the low implementor participation and end-user adoption rate is
raising a very important question to me: are we still heading into the
right direction? What does it help if we create better and better
standards (assumed they are, which is obviously arguable) but nobody
cares? In practice, mostly non-official-standard solutions are being
asked form, developed and deployed. For example, I will begin to
implement plain tcp syslog with ssl encryption shortly. Not because it
is so secure or reliable - simply because there is so much demand for
it. Current approaches typically use plain tcp syslog together with
stunnel (which, by the way, is valid solution for many needs).

May be it is just me feeling some asynchronicity between what the field
is asking for and what we are doing.

If so, I would suggest that we try to obtain some broader feedback from
operators and implementors before going any further with new standards.
If there is a sufficiently large group of operators (maybe just in
terms of purchasing power) asking for some new protocol (or protocol
versions), we can probably make the implementors implement them.
Currently, I honestly feel it very hard to provide business reasoning
for creating something new...



Very good points.  I've gotten a few separate emails asking if this is the 
right direction.  I'll raise this discussion in a new thread on the 
mailing list.


Thanks,
Chris

___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog


Re: [Syslog] TCP and SSH Discussion - where are we heading to?

2005-10-22 Thread Robert Malmgren
Darren Reed wrote:
 ..


[snip]

 I think there has been too little feedback to this group and research done
 by this group about how syslog is evolving out there.

 If someone is deploying a syslog using TCP solution, what are they likely
 to do?  My bet is pick one software bundle and use it everywhere they can.
 For the most part, this is going to be of most signifance to Linux people.
 If you're using AIX, HP-UX or Solaris, chances are you don't have the
 freedom to upgrade/replace syslogd so you're stuck using UDP.
 If you're using various pieces of network equipment, I'm willing to bet
 people use syslog/udp because that is what everyone does  understands,
 removing problem of interoperable syslog/tcp implementations.


In general, I think that you're right.

 If you were a commercial Un*x vendor, what would it take you to want to
 spend $$ on replacing your in-house syslogd?


Customer preasure?

A couple of ways of creating this customer preasure could be
* Writing some best practise documents on the topic.
* Writing an attack tree description on the different versions of the
  syslog protocols.

Tina Bird's material,
http://www.seclib.com/seclib/ids.general/syslog-attack-sigs.pdf, could
be a good starting point for a best practise material?

Another thing I think we must have in mind is the possibility that the
market for network logging might become proprietary, since it is
rumored that Microsoft is cooking some solution for enterprise logging.

 Darren


--Robert

 ___
 Syslog mailing list
 Syslog@lists.ietf.org
 https://www1.ietf.org/mailman/listinfo/syslog


signature.asc
Description: OpenPGP digital signature
___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog


RE: [Syslog] TCP and SSH Discussion

2005-10-21 Thread David B Harrington
Hi Chris,

Do you think callhome should be done in the SecSH WG, or should it
be done as part of the syslog WG transport mapping? 

It seems to me it is a type of SSH transport negotiation, not part of
syslog or snmp or netconf (although they might be affected by a
reversed asymmetry of authentication). 

David Harrington
[EMAIL PROTECTED]

 -Original Message-
 From: Chris Lonvick [mailto:[EMAIL PROTECTED] 
 Sent: Friday, October 21, 2005 8:48 AM
 To: David B Harrington
 Cc: [EMAIL PROTECTED]
 Subject: RE: [Syslog] TCP and SSH Discussion
 
 Hi David,
 
 I'd also recommend that people look at the current thoughts on call

 home.
 
 http://www.ietf.org/internet-drafts/draft-lear-callhome-descri
 ption-03.txt
 
 Thanks,
 Chris
 
 On Thu, 20 Oct 2005, David B Harrington wrote:
 
  Hi,
 
  For a discussion of syslog over SSH, I recommend people read the
  documents for other IETF network management protocols that 
 plan to run
  over SSH:
 
  
 http://www.ietf.org/internet-drafts/draft-ietf-netconf-ssh-05.txt
and
 
http://www.ietf.org/internet-drafts/draft-ietf-isms-secshell-00.txt
 
  http://www.ietf.org/internet-drafts/draft-ietf-isms-tmsm-00.txt
also
  deals with some issues related to moving a management protocol
from
  UDP to TCP and sessions (but mostly is about backwards
compatibility
  with the SNMPv3 architecture and access control).
 
  David Harrington
  [EMAIL PROTECTED]
 
  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED] On Behalf Of Chris Lonvick
  Sent: Thursday, October 20, 2005 9:51 AM
  To: [EMAIL PROTECTED]
  Subject: [Syslog] TCP and SSH Discussion
 
  Hi,
 
  Our charter says:
 
  At a minimum this group will address providing
  authenticity, integrity
  and confidentiality of Syslog messages as they traverse
  the network.
 
  If the WG feels that an SSH transport will accomplish this
  goal, and it
  will be used, then I'm open to having that discussion.  I
  don't feel that
  documenting current tcp transports works towards that goal.
  I've heard a
  few voices say that they would support an SSH transport on
  the mailing
  list.  Does anyone object or have a differing view?  (We will
  have this as
  a topic in Vancouver as well.)  If we agree to move forward
  with this then
  we will need someone to write the document.  Volunteers?
 
  We do have BEEP as a transport and I've received some email
  from a few
  people saying that they are using both the RAW and COOKED
  modes.  Can I
  get someone who has implemented it to update RFC 3195?
 
  Thanks,
  Chris
 
  ___
  Syslog mailing list
  Syslog@lists.ietf.org
  https://www1.ietf.org/mailman/listinfo/syslog
 
 
 



___
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog