Hi,

Note that ISMS has a user-authenticatioin requirement for mapping to
data access controls, while I do not believe that to be a requirement
of syslog.

David Harrington
[EMAIL PROTECTED]



> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of Chris Lonvick
> Sent: Wednesday, January 11, 2006 9:30 AM
> To: Balazs Scheidler
> Cc: [EMAIL PROTECTED]
> Subject: SSH - RE: [Syslog] Re: Threat model and charter
> 
> Hi,
> 
> I forgot to address the use of SSH for authentication.  The 
> isms WG is 
> trying to use SSH to provide security for SNMPv3.  This can 
> be done by 
> having the devices authenticate by having a username and credential 
> (password, public key, etc.).  Again, this sounds to me like 
> it's getting 
> further away from the ease of deployment for syslog than we'd like. 
> However, Rainer mentioned that he thought some people were 
> already using 
> SSH to transport syslog.  I need to ask:  How many people have 
> implementations that use SSH, and how many are planning this?
> 
> Thanks,
> Chris
> 
> _______________________________________________
> Syslog mailing list
> [email protected]
> https://www1.ietf.org/mailman/listinfo/syslog
> 



_______________________________________________
Syslog mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to