[Syslog] lists and meetings

2005-11-16 Thread Sam Hartman
Hi. Participants who attend the meetings are expected to also join the list. It is the consensus on the list that should be driving the working group, not what decisions are being made in meetings. --Sam ___ Syslog mailing list

[Syslog] formal Consultation prior to concluding the working group

2005-11-16 Thread Sam Hartman
Greetings. I'd like to draw yo;ur attention to section 4 of RFC 2418. This section requires area directors to consult with a working group prior to concluding that working group. At the meeting in Vancouver I started such a consultation by noting that once the next set of milestones is

[Syslog] Rechartering

2005-12-06 Thread Sam Hartman
Hi. Last week had the largest telechat schedule since I've joined the IESG. I was fairly busy working on document review. Now I'm working on a long document I need to get done by Wednesday. I hope to finish early--possibly by lunch today. Reviewing the syslog charter proposal will be high

[Syslog] Charter comments from IESG Review

2006-01-05 Thread Sam Hartman
Hi. The IESg reviewed the proposed syslog charter at today's telechat and decided that it requires revision. The main concern seems to be the lack of a mandatory to implement security mechanism. I indicated this might be the case in the Vancouver meeting. so, you definitely need to have some

Re: [Syslog] Charter comments from IESG Review

2006-01-06 Thread Sam Hartman
Chris == Chris Lonvick [EMAIL PROTECTED] writes: Chris Is Section 8 in draft-ietf-syslog-protocol-16.txt Chris sufficient? Alternatively, Section 6 in RFC 3164 is fairly Chris comprehensive. Both of these look good. My main question with them is whether you believe it is a

Re: [Syslog] Charter comments from IESG Review

2006-01-06 Thread Sam Hartman
Tom == Tom Petch [EMAIL PROTECTED] writes: Tom Sam I struggle to think what a security system would look Tom like when the protocol is purely simplex, apart from a MAC to Tom give integrity with some shared secret transmitted totally Tom out of band. By this do you mean without

Re: [Syslog] Charter comments from IESG Review

2006-01-09 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: Rainer Hi Sam WG, I understand the reasoning behind requiring a Rainer security mechanism. I just want to remind everyone that a Rainer major drawback in Vancouver was that we had lost some Rainer backwards-compatibility to

Re: [Syslog] Charter comments from IESG Review

2006-01-09 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: Rainer Tom, If so, yes, both S/MIME and OpenPGP support this model. However I'll point oun that it is not a requirement that syslog work that way; for example RFC 3195 certainly has connections. I'll look

Re: [Syslog] Charter comments from IESG Review

2006-01-09 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: Rainer Sorry, yes, I was totally wrong in my wording. What I Rainer intended to say was that the keys are exchanged on a Rainer medium different then the current session (e.g. key Rainer servers). This is not typically how

Re: [Syslog] Charter comments from IESG Review

2006-01-09 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: Rainer This looks like I misunderstood your intension. I thought Rainer that unsecured UDP should no longer be supported. That was not my intent. Rainer So what Rainer you actually said is that we can go ahead with the

Re: [Syslog] Charter comments from IESG Review

2006-01-09 Thread Sam Hartman
Tom == Tom Petch [EMAIL PROTECTED] writes: Tom without committing us to either a -sign or a secure transport Tom approach (and yes, we did start the transport wars, some time Tom ago, with SSH v TLS:-( I really think that you need to identify your deliverables in the charter.

[Syslog] Re: Threat model and charter

2006-01-10 Thread Sam Hartman
Hi. Can you explain what actions on a part of an attacker are prevented in terms of attacks on message integrity without authenticating the source of the message? In general, the security community is very suspicious of mechanisms that provide integrity without authentication. If you are going

Re: [Syslog] Re: Threat model and charter

2006-01-11 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: I'm concerned that your analysis seems to be based on what is easy to implement. Rainer Well, I have to admit that in the world of syslog people Rainer vote with their feet. If it is not easy to implement Rainer (better

Re: [Syslog] Re: Threat model and charter

2006-01-11 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: Rainer I now understand. But wouldn't it then make sense to Rainer create a separate document for it? I have the feeling that Rainer would focus us better than when the discussion is split Rainer among different

Re: [Syslog] Re: Threat model and charter

2006-01-17 Thread Sam Hartman
May I recommend TLS PSK or TLS in anonymous DH mode in preference to inventing your own transport that does not use PKI? Also, before doing something based on shared secrets carefully consider the requirements of RFC 4107. ___ Syslog mailing list

[Syslog] Charter Approved

2006-03-16 Thread Sam Hartman
Hi. I'm pleased to report that your charter has been approved. It will take a few days for official word to come out but you can move forward under this charter. --Sam ___ Syslog mailing list Syslog@lists.ietf.org

Re: [Syslog] AD Review for draft-ietf-syslog-transport-tls

2007-01-31 Thread Sam Hartman
I'll get back to you on the generic certificates issue. For now, I recommend you read RFC 4107. Also note that each device needs a unique MAC address so the manufacturing process tends to have a step for making a device unique. So, it sounds like all forms of authentication are optional in

[Syslog] An early last call comment on protocol-19

2007-01-31 Thread Sam Hartman
I failed to write this up yesterday. Your protocol document uses ISO language identifiers rather than BCP 47. Please either use BCP 47 or explain for all the language sets that BCP 47 can identify but your choice cannot why syslog implementations will not care.

[Syslog] Re: Last Call: draft-ietf-syslog-protocol (The syslog Protocol) to Proposed Standard

2007-02-01 Thread Sam Hartman
Mark == Mark Andrews [EMAIL PROTECTED] writes: - 'The syslog Protocol ' draft-ietf-syslog-protocol-19.txt as a Proposed Standard Mark draft-ietf-syslog-protocol-19.txt recommends using a Mark reliable protocol. Existing implementations of syslog do Mark this and

Re: [Syslog] An early last call comment on protocol-19

2007-02-01 Thread Sam Hartman
As I said before if you are not going to use BCP 47, you need to clearly explain for each class of languages BCP 47 supports and your application does not support why it is OK to be unable to label those applications. ___ Syslog mailing list

Re: [Syslog] AD Review for draft-ietf-syslog-transport-tls

2007-02-01 Thread Sam Hartman
Miao == Miao Fuyou [EMAIL PROTECTED] writes: Miao Section 2 identifies masquerade as a major security threat Miao for syslog. In the draft, client authentication and server Miao authentication are SHOULDs(server authenticaiton may be not Miao spelled out explicitly). After

Re: Relays was Re: [Syslog] AD Review fordraft-ietf-syslog-transport-tls

2007-02-05 Thread Sam Hartman
Moehrke, == Moehrke, John (GE Healthcare) [EMAIL PROTECTED] writes: Moehrke, I would recommend against constraining the key Moehrke, management in -tls-. This is a POLICY decision, not a Moehrke, protocol decision. (as highlighted by RFC4107) I'm not sure I disagree with your

Re: Relays was Re: [Syslog] AD Reviewfordraft-ietf-syslog-transport-tls

2007-02-05 Thread Sam Hartman
Rainer == Rainer Gerhards [EMAIL PROTECTED] writes: I wonder why an operator would choose to use a TLS transport without authentication, rather than simply using a non-secure transport. Rainer To prevent casual observation. In my experience, this is Rainer the primary

Re: [Syslog] An early last call comment on protocol-19

2007-02-05 Thread Sam Hartman
What part of 4646 allows non-ASCII characters? How is encoding an issue? ___ Syslog mailing list Syslog@lists.ietf.org https://www1.ietf.org/mailman/listinfo/syslog

Re: [Syslog] An early last call comment on protocol-19

2007-02-06 Thread Sam Hartman
The description of non-ascii characters in the registry refers to non-ascii characters in the description field, etc. The subtags are ascii. ___ Syslog mailing list Syslog@lists.ietf.org https://www1.ietf.org/mailman/listinfo/syslog

Re: Relays was Re: [Syslog] AD Review fordraft-ietf-syslog-transport-tls

2007-02-06 Thread Sam Hartman
So, I shouldn't have asked my question and tom shouldn't have replied: the answer is in the charter. The threats that this WG will primarily address are modification, disclosure, and masquerading. A secondary threat is message stream modification. Threats that will not be addressed by

Re: [Syslog] AD Review for draft-ietf-syslog-transport-tls

2007-02-06 Thread Sam Hartman
I recommend that you drop message stream modification if my analysis [At this point, we're still figuring out what we want to say. I'm speaking as an individual not an AD.] of the charter is a correct analysis and we meant for that to apply to syslog-sign. I recommend you split out peer entity

Re: [Syslog] AD Review for draft-ietf-syslog-transport-tls

2007-02-07 Thread Sam Hartman
It sounds like trust anchor selection (what security people talk about when the rest of the world talks about set of root CAs) is actually very important to you. It's just that you don't actually consider the traditional root CAs part of your trust anchor set; you have a much smaller trust anchor

[Syslog] Why we're doing TLS

2007-02-08 Thread Sam Hartman
Eliot == Eliot Lear [EMAIL PROTECTED] writes: Eliot And that leads to my other question. Why are we Eliot implementing a separate TLS protocol when 3195 and its Eliot successor both exists and has been implemented? That seems Eliot to me rather redundant, and violates a tenant

[Syslog] Comments on draft-ietf-syslog-protocol-20

2007-05-13 Thread Sam Hartman
Hi. Thanks for the new draft. There are a lot of changes in this version; it will definitely require a new ietf last call. I'd recommend that the WG evaluate the changes and ask whether at this stage in the process they are actually required. Perhaps they are. 1) You cannot use originator

[Syslog] Change between syslog-protocol 21 and 23 breaks UTF-8 security

2007-09-07 Thread Sam Hartman
Hi, folks. I think the WG made a mistake trying to address Chris Newman's comment about Unicode TR36 and made the situation worse. My understanding of what the WG was trying to do is to require that if a BOM is present in a string, then the implementation can enforce strict checks because it

[Syslog] Implications of protocol draft changes for tls draft

2007-09-07 Thread Sam Hartman
Greetings. Other than the issue I pointed out today, it looks like we're done with protocol and transport-udp. Once that issue is resolved I can approve both of these documents and send them to the rfc-editor. However, in your discussions with the transport area directors you made some

Re: [Syslog] Change between syslog-protocol 21 and 23 breaks UTF-8 security

2007-09-10 Thread Sam Hartman
If the WG is OK with my proposed text, I'll handle it in an rfc editor note ___ Syslog mailing list Syslog@lists.ietf.org https://www1.ietf.org/mailman/listinfo/syslog