Hi, Note that ISMS has a user-authenticatioin requirement for mapping to data access controls, while I do not believe that to be a requirement of syslog.
David Harrington [EMAIL PROTECTED] > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Chris Lonvick > Sent: Wednesday, January 11, 2006 9:30 AM > To: Balazs Scheidler > Cc: [EMAIL PROTECTED] > Subject: SSH - RE: [Syslog] Re: Threat model and charter > > Hi, > > I forgot to address the use of SSH for authentication. The > isms WG is > trying to use SSH to provide security for SNMPv3. This can > be done by > having the devices authenticate by having a username and credential > (password, public key, etc.). Again, this sounds to me like > it's getting > further away from the ease of deployment for syslog than we'd like. > However, Rainer mentioned that he thought some people were > already using > SSH to transport syslog. I need to ask: How many people have > implementations that use SSH, and how many are planning this? > > Thanks, > Chris > > _______________________________________________ > Syslog mailing list > [email protected] > https://www1.ietf.org/mailman/listinfo/syslog > _______________________________________________ Syslog mailing list [email protected] https://www1.ietf.org/mailman/listinfo/syslog
