Hi Folks,

We've been officially recognized as a Working Group. :-)

Thanks,
Chris


>From: The IESG <[EMAIL PROTECTED]>
>To: IETF-Announce:;
>Subject: WG ACTION: Security Issues in Network Event Logging (syslog)
>Date: Wed, 31 May 2000 07:05:06 -0400
>Sender: [EMAIL PROTECTED]
>X-SPAM: Yes
>X-SPAM-REASON: Suspicious TO Address
>X-SPAM-INFO: http://wwwin.cisco.com/CustAdv/InfoSys/spam
>X-SMTP-HELO: loki.ietf.org
>X-SMTP-MAIL-FROM: [EMAIL PROTECTED]
>X-SMAP-Received-From: outside
>X-SMTP-PEER-INFO: loki.ietf.org [132.151.1.177]
>
>A new working group has been formed in the Security Area of the IETF.
>For additional information, contact the Area Directors
>or the WG Chair.
>
>
>Security Issues in Network Event Logging (syslog)
>-------------------------------------------------
> 
> Current Status: Active Working Group
> 
> Chair(s):
>     Chris Lonvick <[EMAIL PROTECTED]>
> 
> Security Area Director(s): 
>     Jeffrey Schiller  <[EMAIL PROTECTED]>
>     Marcus Leech  <[EMAIL PROTECTED]>
> 
> Security Area Advisor: 
>     Jeffrey Schiller  <[EMAIL PROTECTED]>
> 
> Mailing Lists: 
>     General Discussion:[EMAIL PROTECTED]
>     To Subscribe:      [EMAIL PROTECTED]
>         In Body:       subscribe syslog-sec your_email_address
>     Archive:           http://www.mail-archive.com/[email protected]/
> 
>Description of Working Group:
> 
>Syslog is a de-facto standard for logging system events. However, the
>protocol component of this event logging system has not been formally
>documented. While the protocol has been very useful and scalable, it
>has some known but undocumented security problems. For instance, the
>messages are unauthenticated and there is no mechanism to provide
>verified delivery and message integrity.
>
>The goal of this working group is to document and address the security
>and integrity problems of the existing Syslog mechanism. In order to
>accomplish this task we will document the existing protocol. The 
>working
>group will also explore and develop a standard to address the security
>problems.
>
>Beyond documenting the Syslog protocol and its problems, the working
>group will work on ways to secure the Syslog protocol. At a minimum
>this group will address providing authenticity, integrity and
>confidentiality of Syslog messages as they traverse the network. The
>belief being that we can provide mechanisms that can be utilized in
>existing programs with few modifications to the protocol while
>providing significant security enhancements.
> 
> Goals and Milestones: 
>
>   May 00       Post as an Internet Draft the observed behavior of the Syslog 
>                protocol for consideration as an Informational Document.       
>
>   Jun 00       Submit Syslog protocol document to IESG for consideration as an
>                INFORMATIONAL RFC.                                             
>
>   Jul 00       Post as an Internet Draft the specification for an 
>                authenticated Syslog for consideration as a Standards Track 
>                RFC.                                                           
>
>   Aug 00       Submit Syslog Authentication Protocol to IESG for consideration
>                as a PROPOSED STANDARD.                                        
>
>   Sep 00       Post an Internet Draft describing enhancements to the Syslog 
>                authentication protocol to add verification of delivery and 
>                other security services.                                       
>
>   Oct 00       Submit Syslog Authentication Protocol Enhancement to IESG for 
>                consideration as a PROPOSED STANDARD.                          
>
>   Dec 00       Revise drafts as necessary to advance these Internet-Drafts to 
>                Standards Track RFCs.                                          

Reply via email to