>
> > I am generally in agreement with this XML-based encoding
> > approach but I think there are some known problems not
> > solved.  I would like to see some specific discussion of
> > the client-loghost authentication, at connect time.
>
>I'd rather leave that out of the specification at this
>level.  It can be dealt with at lower levels in the protocol
>stack by things like private networks (possible over
>RS-232), tunneling in SSL/TLS, tunneling in SSH, and
>tunneling in IPv6 SEC packets.  Those implementations should
>be mentioned, and the reference implementation should
>support the SSL/TLS and IPv6/sec options, and possibly the
>raw RS-232 option (the private-network link option should
>require no special implementation support if it's running
>over IP).


OK  - but the split between levels should be clarified.  I would hope to avoid 
ambiguity of whether a specification applies to data model, log message, or log file 
format -- cf. ULM. 

> > However, this looks like a workable approach for a draft
> > replacement  specification.  Could you write up a more
> > complete description of the protocol, so the following
> > security features become clear?  (Does not have to be in
> > RFC form at this time.)
>
>I'd be happy to.


I would like to see the XML transport encoding proposal discussed among the 
"Replacements" on the BOF agenda if we can get a bit more detail.  The "unalog" 
reference you noted (www.unalog.com) is really not very helpful - there's not much 
more than a general concept of XML encoding of event data there.  Would you consider 
sketching XML for the data elements identified in ULM? 


>BTW, before I get into that, I've come up with a few
>questions I think are worth addressing and would appreciate
>feedback.
>
>   1. Do we want to adhere to "strict" XML to guarantee that
>      any XML-aware app could potentially process the logs?
>      I'm not terribly familiar with XML specifics, so I
>      don't know what the implications are here.  Just from
>      what I know of HTML, I'm guessing what I've proposed is
>      fairly compliant, but there may be some things that
>      aren't "strict XML."


Neither am I.   Probably should just learn enough about XML to suggest a reasonable 
direction and leave the rest to implementation. 

>   2. Should the protocol allow cascaded messages so you can
>      express concepts like "I got this IPsec packet and when
>      I decrypted it it contained another IP packet which
>      contained..."?  This is a powerful concept, but it's
>      also kind of complex to deal with both for the app
>      generating the logs and for the app/person processing
>      the logs.


Probably should be an option, although I think this is beyond the level of detail 
needed now, unless a security need comes up that specifically requires it.  Certainly 
more complex than is desired for an embedded client. 

>Also, I was thinking that an extra tag would be nice to
>allow intermediate and/or final log hosts to stick on their
>own timestamps, etc.  Something like this:
>
>      
>
>        
>          <...>
>          
>        
>

This is clearly the kind of flexibility you get with XML.   I think a required tag 
like this would fall out of the data model, which should probably identify "mandatory" 
and "optional" elements along with extension mechanisms. 

BTW, these XML-like tags show up as HTML  tags  in the Netscape Communicator mail tool 
I'm using, and are closed icons.  Can they be quoted?  If not I think it would be 
helpful to substitute "{}" for "<>" so the text can be read easily. 



>Chris Calabrese
>Internet Infrastructure and Security
>Merck-Medco Managed Care, L.L.C.
>[EMAIL PROTECTED]

-- 
Alex Brown  v 4 323 2283
Consulting engineer - MSD software development
Marlborough MA USA
   

Reply via email to