Another outstanding issue is the question of NULL options in the
ciphersuites with Tim Polk suggesting something along the lines of

OLD:

 Implementations MUST support DTLS 1.1 [RFC4347] and MUST support the
 mandatory to implement cipher suite, which is
 TLS_RSA_WITH_AES_128_CBC_SHA.

NEW:

Implementations MUST support DTLS 1.1 [RFC4347] and MUST at a
minimum support the mandatory to implement cipher suite, which is
TLS_RSA_WITH_AES_128_CBC_SHA.  If additional cipher suites are
supported, then implementations MUST NOT negotiate a cipher suite
that employs NULL encryption, integrity, or authentication
algorithms.

The justification is that
"disclosure is one of the primary threats described in Section 4,"

I disagree.  The threat of disclosure comes from RFC5425 s2
"Some data in syslog messages is sensitive and may be
      useful to an attacker, such as the password of an authorized
      administrator or user."
but the fact that someone, somewhere may put a password in a syslog
message I do not see as grounds for requiring everyone else in the world
to encrypt everything.  Encryption is a pain, it costs, and we should not
require it
unless it can be justified; these are remote, low-powered network boxes
we are talking about, not enterprise servers.

So while I agree we should require authentication, I see no
justification for encryption.

In passing, there was a request for a reference for the ciphersuite,
which could be covered by adding
'as specified there' after 'cipher suite'.

Tom Petch

_______________________________________________
Syslog mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/syslog

Reply via email to