Hi David,

Am 07.06.10 16:19, schrieb [email protected]:
> On Mon, 7 Jun 2010, Dirk H. Schulz wrote:
>
>    
>> Hi folks,
>>
>> I have stumbled over a difficult question.
>>
>> In a developed security environment where you run several network zones
>> with the most important data/servers in the inner zones and "outside
>> contact servers" like web proxies in the outer zone - in such an
>> environment a central syslog server should be positioned somewhere in
>> the inner zones, but the servers in the outer zones must not be allowed
>> to push messages into the inner zones - these messages have to be
>> fetched by the central servers from the outside zones' servers.
>>      
> Yes and No.
>
> The reason for not wanting to push data in is that the data originating
> from the less secure zones may be corrupt and/or an attack.
>
> Pulling the same data in doesn't help protect against this.
>
> On the other hand, one of the big reasons for getting the logs from the
> less secure zone is for forensic purposes. In this case you want the logs
> to not sit on the outside (where they can be tampered with) if you can
> avoid it. Pushing the data into the central server as each log is
> generated is far better than polling to get the accumulated messages would
> be.
>    
Thanks for your elaborated answer. There is a phenomenon you did not 
address: enterprise management. :-)
We have to implement policies defining the rules I described, be they 
technically sensible or not.

> The syslog protocol is a fairly nice combination of some strictly defined
> elements and loosely defined content. As a result, things accepting and
> processing the messages have to accpet a lot of strange stuff and deal
> with it sanely, but at the same time you can setup fairly simple systems
> to detect strange things being sent to you.
>
> What I do is to have dedicated relay boxes that are hardened and monitored
> to receive the messages from the untrusted zones, they then perform any
> fixups needed to the logs (including escaping binary characters in log
> messages), and then sending the santitized messages on to the central log
> server.
>    
That sounds like a promising compromise I could offer the policy guys. 
Could you please post an example of how you escape binary characters?
> There are many schemes out there to have systems write logs locally and
> then poll to retrieve the files. rsyslog supports reading log messages
> from files to you could easily insert the logs back into a normal syslog
> stream, but I always try to avoid such schemes. They tend to be fragile,
> and they leave the logs on untrusted systems where they can be tampered
> with for a window of time.
>    
That is why I instinctively did not want to explore that kind of solution.

Thanks a lot, David!

Dirk
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com

Reply via email to