I agree with Anton (both his initial comment and this one) and the
others talking in favor of SSL/TLS. In addition, I would like to mention
that in current practice, ssl/tls protected syslog solutions are
*already* being deployed. This is possible thanks to the
non-IETF-standard plain tcp syslog mode that is supported by so many of
the major implementations. On top of that run either vendor-specific
ssl/tls implementations or - most often - generic tunneling via stunnel.
It is also not uncommon to authenticate the sender and client via
certificates in ssl/tls (not only in theory, but in practice).

So, I would also like to see a ssl/tls based approach - simply because
we already see massive acceptance for it.

I also agree on Anton's idea that creating a transport mapping for it is
easy. HOWEVER, that brings us back to the issue of a "really stupid
simple" tcp transmission mode. In my point of view, that would need to
be defined first and then a ssl/tls  mapping on top of it. Of course, it
can be done in a single document, but I would prefer to have two small
ones. My reasoning is that I think that would receive easier acceptance
in the implementor community.

Obviously, putting syslog in sync with netconf by using SSH is also
desirable. I just doubt that this will become quickly implemented. If
there is demand, we could add just another transport mapping. Sure, this
means multiple choices and multiple effort required. But if we talk
about effort, we must face reality: rfc 3195 is not being implemented
that often because it is much more effort than plain tcp syslog - which
provides nearly as good reliability. Current non-standard tcp syslog is
nearly no effort to implement yet still provides close to100% of the
benefits.

Let me talk as an implementor: I like to implement things that customers
(paying or not) ask for. Being a lazy person, I prefer things that are
easy to do (which means there are libraries available and some reference
implementations). I also like to implement things in areas where others
are also implementing, so I can ask questions on interpretations and
such. I like things that work reasonable well. From that perspective, a
simple tcp transport protected by ssl/tls is *very* attractive. Granted,
it does not provide the 100% reliability that rfc 3195 provides. But it
provides 99,9% of that - at a much lower cost. And if we go for a simple
app-level ACK mechanism, we would end up very close to what rfc 3195
offers in terms of reliability. If we add ssl/tls (easily done), we end
up very close to what rfc 3195 offers in terms of authenticy and
encryption (side note: rfc 3195 uses TLS, it just uses a complicated way
of configuring it...).

Given that we try to build on existing technology, this approach could
also be very quickly implemented. That, together with the known customer
demand, would probably give a standard in that area a jump start. I
prefer to sacrify being in sync with the other network management
protocols.

Just for the records: I am saying this *after* I have implemented rfc
3195. So if we would stick with 3195, only, I would already be set for
most things.

Rainer

On Tue, 2005-10-25 at 23:04, Anton Okmianski (aokmians) wrote:
> Tom:
> 
> TLS provides for asymmetric authentication. RFC 2264 Section 1:
> 
> "The peer's identity can be authenticated using asymmetric, or public key, 
> cryptography (e.g., RSA [RSA], DSS [DSS], etc.). This authentication can be 
> made optional, but is generally required for at least one of the peers."
> 
> SSL/TLS with server-side certs is pretty much a norm for all HTTPS 
> deployments. SSL/TLS with client-side certs are used less frequently, but 
> some organizations use those in mail clients. SMTP, IMAP, POP3 and ACAP all 
> have mappings to TLS transport (RFC2487, RFC 2595) with commercial 
> deployments.  
> 
> I think the reason SASL comes into the picture with certain protocols (like 
> RFC 2595) is that TLS provides asymmetric authentication, and SASL symmetric 
> (based on passwords), which is preferred in some protocol like mail for 
> legacy reasons.  
> 
> Not sure if SSH provides for symmetric auth for server (vs. user) 
> authentication. As far as I can tell from quick scan only asymmetric key 
> support is required in SSH draft (sec 4.1):
> http://www.employees.org/~lonvick/secsh-wg/2005-sep-07/draft-ietf-secsh-architecture-23.txt
> 
> I am not sure if support for symmetric keys (passwords) should be a 
> requirement, anyway.  Maintaining a database of passwords instead of public 
> keys (in form of certs or other way) sounds like a security threat, not to 
> mention a choir when one could just maintain single root CA (plus revocation 
> lists if needed).  Thoughts?
> 
> Finally, I suspect mapping to SSH will take longer to develop and longer to 
> deploy because it will be dependent on SSH drafts (see above).    
> 
> Thanks,
> Anton.
>  
> 
> > -----Original Message-----
> > From: Tom Petch [mailto:[EMAIL PROTECTED] 
> > Sent: Tuesday, October 25, 2005 12:39 PM
> > To: Anton Okmianski (aokmians); Chris Lonvick (clonvick); 
> > [EMAIL PROTECTED]
> > Subject: Why not TLS was Re: [Syslog] Secure substrate - need 
> > your input
> > 
> > In the context of isms, ie SNMP, the choice was SSH v TLS + 
> > SASL; TLS provides the security but not the authentication 
> > while SSH does both.  And SSH is a well-established protocol.
> > 
> > I agree that TLS/SSL is the most widely used but that is 
> > because more people access websites (securely) than access 
> > network devices.  If you limit yourself to network operations 
> > of network devices, then it appears to be SSH a significant 
> > number TLS so small as to be invisible
> > 
> > Tom Petch
> > 
> > ----- Original Message -----
> > From: "Anton Okmianski (aokmians)" <[EMAIL PROTECTED]>
> > To: "Chris Lonvick (clonvick)" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
> > Sent: Tuesday, October 25, 2005 5:10 PM
> > Subject: RE: [Syslog] Secure substrate - need your input
> > 
> > 
> > > Hi Folks,
> > >
> > > I'll be asking this in Vancouver but would like to get some 
> > input from 
> > > the mailing list.
> > >
> > > Our charter says that we will develop a secure method to transport 
> > > syslog messages.  We have BEEP (RFC 3195) but it has a low 
> > > implementation record.
> > > Other groups have specified BEEP as well but are also moving along 
> > > towards using SSH or SSL.
> > >
> > >
> > > 1) What secure substrate should the WG look towards:
> > >
> > > __  ssl
> > >
> > > __  ssh
> > >
> > > __  dtls
> > > http://www.ietf.org/internet-drafts/draft-rescorla-dtls-05.txt
> > >
> > > __  other
> > 
> > I believe it should be SSL 3.0 / TLS 1.0.  At least in 
> > web-server farm environments, you got SSL everywhere with a 
> > bunch of SSL accelerator hardware already in place.
> > 
> > I also think several mappings can be defined. I am not a fan 
> > of options when it comes to standards, but allowing syslog 
> > over any kind of secure transport is a good thing. This was 
> > the whole idea of separating syslog-protocol from 
> > syslog-transport.  Frankly, I don't think it will be a lot of 
> > work to define those transport mappings.
> > 
> > > 2) Why?
> > 
> > SSL/TLS is the most widely deployed network security protocol 
> > today. All e-commerce happens over it. Dozens of companies 
> > provide all shapes and forms of SSL accelerators. Many 
> > routers now have SSL accelartor modules.
> > 
> > If I need to manage a large environment of servers where 
> > distributed logging really makes sense, being able to re-use 
> > existing infrastructure for scaling really helps.  A search 
> > for "SSH accelerator" on google does not reveal anything 
> > interesting, but "SSL accelarator" shows up with a bunch of 
> > listings, several of which claim thousands of new SSL 
> > sessions per second. This confirms my experience. BTW, with 
> > SSL session caching, accelerators (ie. load balancers) can do 
> > 100,000 connections per second and more. So, to scale syslog 
> > over SSH would I have to wait for SSH accelerators to come to market?
> > 
> > I see that there is a lot of work around SSH connection 
> > protocol and its potential use in new protocols. I have not 
> > followed these developments. There must have been a good 
> > reason for it. I would like to understand why people object 
> > to SSL, which is a well established technology. Any pointers?
> > 
> > Thanks,
> > Anton.
> > 
> > >
> > 
> 
> _______________________________________________
> Syslog mailing list
> Syslog@lists.ietf.org
> https://www1.ietf.org/mailman/listinfo/syslog


_______________________________________________
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to