There are a couple of things I'd like to add to this discussion.
As I read our proposed charter, what we're trying to do in it is to scope
the working group -- that is to say, describe the problem we're trying to
solve rather than come up with a solution. It may very well end up that
IPsec is the solution, but we should talk about the problem before we come
up with a solution.
The obvious exception would be if the problem is so simple that simply
doing syslog over IPsec would solve the problem. Then we wouldn't need a
working group at all. I think we do need a working group, because there are
many problems we're trying to solve, few of which IPsec solve. Furthermore,
with some of those, there may be a better solution, like TLS. But again,
we're trying to describe the problem, not come up with the solution at this
stage of the game.
Nonetheless, here is my quick description of things we're considering here:
(1) Syslog is unreliable. If you send a message, you don't know that it
will get there. Furthermore, you don't know when it doesn't get there. You
don't know that the server you're talking to is the right one.
(2) Syslog is not secure. Anyone can sniff messages that go by, trivially.
Anyone can trivially conjure up bogus data. Data can be damaged in transit
(by accident or malice) without detection.
(3) Syslog data is not secure. There are no integrity checks in the data
that improve its usefulness as an audit log or evidence.
There are a number of these issues that can be solved by not using UDP.
There are a number of them that can be solved by using IPsec. There are a
number of them that can be solved by using TLS. There are still others that
none of these address, even if you mandate that you use TLS on IPsec on TCP
(yes, yes, I know that TLS implies TCP). Ironically, the ones that matter
most to me are the ones that IPsec has the least to do with. TCP and
checksums would make me much happier than lots of crypto. And I'm a crypto
guy! In fact, I'll say it now that my worries are more that we do overkill
on the crypto. This is why we're forming a working group. We want to
discuss these issues.
Now on the other hand, I'd love to hear what the BGP people decided, and if
their solutions apply to us, then I'm sure we'll be happy to use them too.
On the other hand, I suspect the problems we're trying to solve are
different problems (otherwise we could just drop syslog and use BGP
instead, eh?).
Jon
-----
Jon Callas [EMAIL PROTECTED]
Director of Engineering +1 (408) 556-2445 (voice)
Counterpane Internet Security +1 (408) 556-0889 (fax)
3031 Tisch Way, Suite 100 PGP: 42C6 AD1A 98B7 84B4 349E
San Jose CA 95128, USA 1528 EC0C ED80 D65E 3DFD