In the context of isms, ie SNMP, the choice was SSH v TLS + SASL; TLS provides
the security but not the authentication while SSH does both.  And SSH is a
well-established protocol.

I agree that TLS/SSL is the most widely used but that is because more people
access websites (securely) than access network devices.  If you limit yourself
to network operations of network devices, then it appears to be
SSH a significant number
TLS so small as to be invisible

Tom Petch

----- Original Message -----
From: "Anton Okmianski (aokmians)" <[EMAIL PROTECTED]>
To: "Chris Lonvick (clonvick)" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, October 25, 2005 5:10 PM
Subject: RE: [Syslog] Secure substrate - need your input


> Hi Folks,
>
> I'll be asking this in Vancouver but would like to get some
> input from the mailing list.
>
> Our charter says that we will develop a secure method to
> transport syslog messages.  We have BEEP (RFC 3195) but it
> has a low implementation record.
> Other groups have specified BEEP as well but are also moving
> along towards using SSH or SSL.
>
>
> 1) What secure substrate should the WG look towards:
>
> __  ssl
>
> __  ssh
>
> __  dtls
> http://www.ietf.org/internet-drafts/draft-rescorla-dtls-05.txt
>
> __  other

I believe it should be SSL 3.0 / TLS 1.0.  At least in web-server farm
environments, you got SSL everywhere with a bunch of SSL accelerator hardware
already in place.

I also think several mappings can be defined. I am not a fan of options when it
comes to standards, but allowing syslog over any kind of secure transport is a
good thing. This was the whole idea of separating syslog-protocol from
syslog-transport.  Frankly, I don't think it will be a lot of work to define
those transport mappings.

> 2) Why?

SSL/TLS is the most widely deployed network security protocol today. All
e-commerce happens over it. Dozens of companies provide all shapes and forms of
SSL accelerators. Many routers now have SSL accelartor modules.

If I need to manage a large environment of servers where distributed logging
really makes sense, being able to re-use existing infrastructure for scaling
really helps.  A search for "SSH accelerator" on google does not reveal anything
interesting, but "SSL accelarator" shows up with a bunch of listings, several of
which claim thousands of new SSL sessions per second. This confirms my
experience. BTW, with SSL session caching, accelerators (ie. load balancers) can
do 100,000 connections per second and more. So, to scale syslog over SSH would I
have to wait for SSH accelerators to come to market?

I see that there is a lot of work around SSH connection protocol and its
potential use in new protocols. I have not followed these developments. There
must have been a good reason for it. I would like to understand why people
object to SSL, which is a well established technology. Any pointers?

Thanks,
Anton.

>


_______________________________________________
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to