Having exchanged a few mails in the secure-BGP, SNMPv3 and syslog mailing
lists recently, I would be interested in seeing a 'common' approach where
possible.
Two main security requirements seem to shine through:
1) the ability to authenticate the level-4 information. BGP needs to know it
can trust the subnets being advertised, SNMPv3 wants to know that a user is
allowed access to a particular attribute, and syslog servers want to be able
to back-check the validity of incoming syslogs.
2) the data needs to be 'secure' over the network.
For 1), S-BGP uses PKI with certificates allocated per Autonomous system and
per address range. SNMP uses an authentication key (which may be derived
from a password). Syslog is yet to be determined.
For 2), S-BGP uses IPSEC/IKE/PKI (optionally), SNMPv3 uses the
nothing/auth-key/encryption-key/both-keys, syslog is to be determined.
Now for wire-protection, there is nothing better than IPSEC - in my view -
given the level of protection given to the entire packet, the dynamic key
management, and the availability of IPSEC on typical syslog/SNMP/BGP capable
devices, and now available with operating systems.
For Level-4 authentication, PKI is the best, but should probably be
partnered with a 'easy-start' method.
An SNMPv3 variance to this worth mentioning is that SNMPv3 supports
selecting protection per set of management objects, for example, a policy of
'passwords-sets must be authenticated and encrypted, interface-counter-gets
can be in the clear' can be specified.
This all comes down to a matter of policy. In the end, IPSEC will always
offer more for wire protection than a higher-level scheme (because of the
position in the stack), and today has the most complete
key/crypto-management scheme, and supports the most robust authentication
method (PKI). In some installation, a 'light-weight' application level
scheme may be sufficient - a matter of policy.
In the case of remote management/monitoring, an IPSEC tunnel to the target
device is possible allowing Telnet, tftp, SNMP, syslog... to be performed
securely over the Internet - probably the best reason for running
router/switch/firewall management over IPSEC.
Steve.
-----Original Message-----
From: Jon Callas [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, August 22, 2000 12:32 AM
To: Waters, Stephen; Chris Calabrese
Cc: [EMAIL PROTECTED]
Subject: RE: IPSEC usage to protect syslog
There are a couple of things I'd like to add to this discussion.
As I read our proposed charter, what we're trying to do in it is to scope
the working group -- that is to say, describe the problem we're trying to
solve rather than come up with a solution. It may very well end up that
IPsec is the solution, but we should talk about the problem before we come
up with a solution.
The obvious exception would be if the problem is so simple that simply
doing syslog over IPsec would solve the problem. Then we wouldn't need a
working group at all. I think we do need a working group, because there are
many problems we're trying to solve, few of which IPsec solve. Furthermore,
with some of those, there may be a better solution, like TLS. But again,
we're trying to describe the problem, not come up with the solution at this
stage of the game.
Nonetheless, here is my quick description of things we're considering here:
(1) Syslog is unreliable. If you send a message, you don't know that it
will get there. Furthermore, you don't know when it doesn't get there. You
don't know that the server you're talking to is the right one.
(2) Syslog is not secure. Anyone can sniff messages that go by, trivially.
Anyone can trivially conjure up bogus data. Data can be damaged in transit
(by accident or malice) without detection.
(3) Syslog data is not secure. There are no integrity checks in the data
that improve its usefulness as an audit log or evidence.
There are a number of these issues that can be solved by not using UDP.
There are a number of them that can be solved by using IPsec. There are a
number of them that can be solved by using TLS. There are still others that
none of these address, even if you mandate that you use TLS on IPsec on TCP
(yes, yes, I know that TLS implies TCP). Ironically, the ones that matter
most to me are the ones that IPsec has the least to do with. TCP and
checksums would make me much happier than lots of crypto. And I'm a crypto
guy! In fact, I'll say it now that my worries are more that we do overkill
on the crypto. This is why we're forming a working group. We want to
discuss these issues.
Now on the other hand, I'd love to hear what the BGP people decided, and if
their solutions apply to us, then I'm sure we'll be happy to use them too.
On the other hand, I suspect the problems we're trying to solve are
different problems (otherwise we could just drop syslog and use BGP
instead, eh?).
Jon
-----
Jon Callas [EMAIL PROTECTED]
Director of Engineering +1 (408) 556-2445 (voice)
Counterpane Internet Security +1 (408) 556-0889 (fax)
3031 Tisch Way, Suite 100 PGP: 42C6 AD1A 98B7 84B4 349E
San Jose CA 95128, USA 1528 EC0C ED80 D65E 3DFD