Hi Folks,

We had the BoF on Tuesday afternoon.  Below are the notes taken by Eliot
Lear.  Jeff Schiller was there and he moderately agreed with the charter.
He has taken that and will work on it a bit so that he can sell it into
the IESG with his recommendation that we form a Working Group.  

Overall, the Charter will have 2 components that must be done in order:
First:  Document the Syslog protocol and note its security weaknesses 
     and vulnerabilities.  
Second: Come up with two solutions to address those problems.  One should
    have authentication and integrity.  The other should have authentication,
    integrity and verifiable delivery.  
We agreed that the focus will be only on the protocol and not on anything
that could happen on the end systems.  We'll also not discuss the format
of the messages.  These restrictions will keep us focused on the task at
hand.

I'll keep everyone informed on the progress of the charter going through
the IESG.  I've also had some discussions with some people about writing
the first document.  Please let me know if you are interested in 
participating in writing the initial draft.  

Thanks,
Chris

--
Secure Syslog BOF 
29 March 2000 
Chaired by Chris Lonvick 
Notes by Eliot Lear 

Chris started with agenda bashing.  Went on to current state of the protocol.  
Explained vulnerabilities.  syslog has  been referenced but not documented. 

We went on to discuss the proposed charter. 

Issue as to what the first document should be- BCP, Standard, or Info?  BCP says that 
you can get there quick, but it's really for practices.  Ran commented that first goal 
would be to document what we have. 

Ran also argued that the charter is too broad.  Start by documenting existing practice 
and protocol.  Then do a requirements document. 

Barbara responded that it would be unusual to force a requirements document. 

Glenn Mansfield commented that the requirements are clear. 

Chris disagreed.  He wants the working group to review his ideas. 

Anne Anderson suggested striking the last paragraph. 

Glenn: what about retrieval for post processing purposes? 

Chris: outside the scope 

Andreas Worsley: what about lots of features aside from wire protocol? 

Chris:  Rat hole. 

Sylvian Gombault:  If IDWG had secure syslog they would have used it. 

Jeff Schiller: doesn't mind the 3rd paragraph.  Too early to make a statement on key 
management.  Glad we didn't specify whether or not we'll use a new port. 

??: don't forget integrety in the 2nd document 

Jeff: 1st document should be informational. 

Jeff:  no requirements document for now. 

Chris: mailing list exists - will be announced. 

Jeff:  next step- iteration and IESG. 
    
    


Reply via email to