Tom,
> But, in all seriousness, changing from TLS to anything is a 
> charter change that
> I think needs the approval of the IESG, and should require 
> commitment, similar
> to that given at the turn of the year, to produce conformant products.

I do not agree here. We have deliberately not used the term "TLS" in the
charter. The relevant excerpts are:

###
The threats that this WG will primarily address are modification,
disclosure, and masquerading. A secondary threat is message stream
modification. Threats that will not be addressed by this WG are DoS and
traffic analysis. The primary attacks may be thwarted by a secure
transport. However, it must be remembered that a great deal of the
success of syslog has been attributed to its ease of implementation and
relatively low maintenance level. The Working Group will consider those
factors, as well as current implementations, when deciding upon a
secure transport.
###

###
- A document will be produced that requires a secure transport for the
delivery of syslog messages.
###

As far as I remember (not looked up the archive yet), we did this
intentionally so that we could change transports if need arises. At
least for now, I think this need has arisen.

The really bad thing about the IPR claim is that we do not even know
what actually has been claimed. But I do not intend to invest any of my
work into something that somebody else claims exclusive rights on. So
-tls is a dead end for me as long as the claim is not dropped. I foresee
similar harsh reaction at least of the open source commuity (*the* major
driving factor behind syslog implementation) when we standardize
something encrumbered by a patent.

Rainer

> 
> Tom Petch
> 
> 
> ----- Original Message -----
> From: "David Harrington" <[EMAIL PROTECTED]>
> To: "'Rainer Gerhards'" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
> Sent: Wednesday, June 21, 2006 7:58 PM
> Subject: [Syslog] Secure transport alternatives
> 
> 
> > Hi,
> >
> > [Posting as a contributor]
> >
> > I am involved in a number of NM and Security WGs, and I can 
> make these
> > observations:
> >
> > Running an NM protocol over SSH has been done in both netconf and
> > ISMS. I suspect it would be fairly easy to adapt the 
> netconf-over-SSH
> > draft to work for syslog-over-SSH. I suspect it would take a week or
> > so to write a syslog-over-SSH draft since most could be 
> cut-and-paste
> > from the netconf-over-SSH draft.
> >
> > I am the author of the ISMS drafts, and I adapted the netconf/SSH
> > draft for ISMS purposes. Syslog and netconf seem to be 
> closer in their
> > requirements than syslog and ISMS. ISMS has this whole 
> model of access
> > control to deal with that is not part of the threat model for syslog
> > or for netconf at this time.
> >
> > There is a parallel discussion of running syslog messages over
> > netconf. As Rainer has pointed out to Phil, having a consistent
> > terminology would be very helpful. I think having a consistent
> > security solution would probably be helpful in that 
> situation as well.
> >
> > I have concerns about 3195bis as the only alternative we consider,
> > because I have not seen much interest in RFC3195 yet, nor has there
> > been much expresseed interest in netconf over BEEP.
> >
> > Since there may be delay involved in this WG no matter what, would
> > somebody be willing to volunteer to write a syslog-over-SSH 
> draft, so
> > the WG can compare the three approaches?
> >
> > There are other possibilities as well (and I am being serious here,
> > not "let's make this absurd by proposing a whole slew of alteratives
> > documents").
> > 1) Tom mentioned DTLS, which might be a viable alternative given
> > syslog's UDP roots. Tom would you, or somebody else, be willing to
> > write a proposal for syslog/DTLS?
> > 2) Andy Bierman observed that if syslog messages are going to be
> > transported over netconf, then why not simply use syslog/netconf and
> > let netconf deal with the security issues. That could be an
> > alternative proposal. Is anybody willing to write a draft proposing
> > that as a syslog secure transport solution?
> >
> > My $.02 as a contributor,
> >
> > David Harrington
> > [EMAIL PROTECTED]
> > [EMAIL PROTECTED]
> > [EMAIL PROTECTED]
> >
> >
> > > -----Original Message-----
> > > From: Rainer Gerhards [mailto:[EMAIL PROTECTED]
> > > Sent: Tuesday, June 20, 2006 9:44 AM
> > > To: [EMAIL PROTECTED]
> > > Subject: [Syslog] IESG secure transport requirement can be
> > > quickly solved...
> > >
> > > Hi all,
> > >
> > > I propose to update RFC 3195 in the spirit of syslog-protocol
> > > to satisfy
> > > the IESG secure transport requirement (I will call this
> > > derivative work
> > > RFC3195bis below). I sincerely believe that this option would
> > > enable us
> > > to submit syslog-protocol, -transport-UDP and RFC3195bis within a
> > few
> > > weeks.
> > >
> > > My reasoning for this proposal is as follows:
> > >
> > > We all know that 3195 has limited acceptance in the community and
> > very
> > > few implementations. However, it satisfies all IESG criteria
> > > we have in
> > > our charter. Also, it *is* something that can be used in practice
> > and
> > > implementing it becomes easier as support libraries 
> become visible.
> > I
> > > know it is not an optimal choice. On the other hand, we have
> > > syslog-transport-tls, which has been encrumbered by a 
> patent claim.
> > As
> > > it looks, this will need months to solve. RFC3195bis can not be
> > taken
> > > hostage by any patent claims, because there is well-defined
> > > prior art in
> > > RFC 3195. Focussing on RFC 3195bis would enable us to complete our
> > > mission and finsh work that is in the queue for many years
> > > now. I think
> > > this is urgently needed. We might even put the netconf WG 
> with their
> > > syslog gateway on hold (because syslog-protocol can not 
> be published
> > > without resolving the secure transport). Or netconf might
> > > choose to drop
> > > syslog-protocol in order to publish.
> > >
> > > And the good news is that 3195bis can definitely very quickly
> > > be done. I
> > > am saying this on the assumption that we do not revisit the basics
> > of
> > > 3195 but just adopt it to syslog-protocol. I've gone through
> > > 3195 today
> > > and the changes are absolutely minimal:
> > >
> > > Section 2:
> > > Most of it simply needs to be removed because the entity roles are
> > > defined in syslog-protocol.
> > >
> > > Section 3:
> > > - the message samples must be upgraded to -protocol-format
> > > - syslog-framing in section 3.3 must be changed (could be
> > > octet-counting
> > > or disallow of multiple messages per ANS, what I recommend)
> > >
> > > Section 4:
> > > 4.4.2
> > >  - needs to be updated with the new HEADER fields and
> > STRUCTURED-DATA
> > >  - some work on "deviceFQDN" and "deviceIP" needed
> > >  - some transformation rules (page 15) need to be removed
> > >  - handling of invalid message formatting must be removed 
> (no longer
> > a
> > > concern)
> > >  - samples must be adjusted
> > >
> > > 4.4.3
> > >  - sample on page 24 (top) must be checked and/or adjusted
> > >
> > > Section 7:
> > > - DTD needs to be adjusted
> > >
> > > Section 9:
> > > - new URIs for 3195bis (also in some other places)
> > > [we can reuse well-known port 601 for -protocol]
> > >
> > > Overall
> > > References to 3164 must be changed to -syslog-protocol. This
> > > seems quite
> > > trivial, because the  references are easy to spot and do not touch
> > any
> > > substance (except outlined above).
> > >
> > > Other than these minor things, there are *NO* other changes
> > necessary.
> > > I'd expect that an initial version of 3195bis can be 
> created within
> > a
> > > single working day. Add some quick review and a very 
> limited number
> > of
> > > edits to change discovered nits - and we have something to publish
> > by
> > > summer.
> > >
> > > I find this extremely tempting. It breaks the deadlock
> > > situation we are
> > > currently in. Especially as we have planned to do 3195bis 
> some time
> > > later anyhow. I don't know if the authors of 3195 would
> > > volunteer to do
> > > the edit. But I hope so.
> > >
> > > I would appreciate if the chairs could try to reach 
> consensus on my
> > > proposal.
> > >
> > > Comments are appreciated.
> > > Thanks,
> > > Rainer
> > >
> > > _______________________________________________
> > > Syslog mailing list
> > > Syslog@lists.ietf.org
> > > https://www1.ietf.org/mailman/listinfo/syslog
> > >
> >
> >
> > _______________________________________________
> > Syslog mailing list
> > Syslog@lists.ietf.org
> > https://www1.ietf.org/mailman/listinfo/syslog
> 
> 
> _______________________________________________
> Syslog mailing list
> Syslog@lists.ietf.org
> https://www1.ietf.org/mailman/listinfo/syslog
> 

_______________________________________________
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to