David,

Thank you for bringing this draft (back) to my attention. I want to congratulate the authors on a generally well written document. DTLS is an important missing component from the SYSLOG framework. I agree 110% with the introduction, and perhaps would go further, that sometimes in the worst of circumstances, it is important simply to try to get the message out and hope someone hears it. What you will find from me below are suggestions to simplify some text, most of which is non-normative.

I believe Section 5.1 is serving two masters, and in my experience, this generally doesn't work well. Your first master is rationale behind choice of transport. What you are reaching for here is a protocol applicability statement. If you have the discussion about protocol applicability, and nothing says that you even need to go there at this stage, my suggestion would be to include it in your introduction and do away with all of the sub-sub-headings in Section 5.1.

By way of example, I believe you are striving for relatively simple statements a'la this:
In those circumstances where reliability or ordering is important, SYSLOG over TLS is appropriate. As the Internet best runs on the basis of appropriate resource sharing, SYSLOG over DTLS over DCCP is defined in this document. For systems where DCCP is either not available or not usable (such as the afformentioned situation), DTLS over UDP is also defined.

Editorial:

s/has state such problems/has discussed (or addressed) this problem

Section 5.3:

1st para, 2nd sentence:

Why only RECOMMENDED?

2nd para, last sentence:
This document is assumed to apply to
   future versions of DTLS, in which case the mandatory to implement
   cipher suite for the implemented version MUST be supported.

Why do you need to say this at all?

3rd paragraph:

   Both transport receiver and transport sender implementations MUST
   provide means to generate a key pair and self-signed certificate in
   the case that a key pair and certificate are not available through
   another mechanism.

Why is this necessary? Isn't it sufficient to import and make use of a self-signed certificate? Isn't it easy enough to run OpenSSL on a Mac or linux box and import the stuff? I could see an argument for usability concerns, but that's not sufficient grounds for a MUST.

An aside about your 2119 language: I haven't reviewed all of it, nor am I an 2119 expert, but I can say that you will confuse people when you use MUST, SHALL, and REQUIRED.

Section 5.3.2, 2nd para, last sentence:

The security parameters SHOULD be checked against the
   security requirements of the requested session to make sure that the
   resumed session provides proper security.

I think what you are aiming at here is a downgrade attack. First, isn't this covered in DTLS? Otherwise, here I would argue for a MUST, and I would be more clear about what you are protecting against, such as the following:

In order to avoid downgrade attacks, an exiting session MUST NOT be reused if its protection does not match the minimum policy requirements of the new SYSLOG over DTLS session request.
Editorial:

Same section ABNF: is it not customary to use lower case, particularly for non-terminals?

Again, thanks to the authors for putting this out there.

Eliot
_______________________________________________
Syslog mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/syslog

Reply via email to