> -----Original Message-----
> From: Juergen Schoenwaelder [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, November 22, 2006 9:09 AM
> To: Miao Fuyou
> Cc: [EMAIL PROTECTED]
> Subject: Re: [Syslog] Updated Syslog-tls Document
>
> On Wed, Nov 22, 2006 at 09:12:38AM +0800, Miao Fuyou wrote:
>
> > There are two major changes since last update.
> > 1, Section 3 is removed. It is an introductory text on TLS,
> and is neccesary
> > because TLS is already a normative reference.
> > 2, Updated the section 4.3.2 (original 5.3.2), removed the
> text about TLS
> > layer alert to signal a syslog-transport event
>
> I questioned the need for a version number for the TLS transport in
> private conversation and now I bring this up again here.
Was that private? I thought it was on-list. Anyhow... I concur with your
initial recommendation of removing the version number from the transport
header. The point at that time was that a version in transport specs is
unusual. If there is need to revise a transport header, a new port is
assigend. Sure, ports are a scarce ressource, but how likely is an
incompatible change to the transport header?
> I believe we
> should agree on a single solution scheme and not introduce any options
> here since signalling of a version mismatch is difficult in a fire and
> forget situation. The current text says:
>
> > If a receiver does not support the version in the messages it
> > received, it MAY just save the APPLICATION-DATA in local
> storage or
> > send a close_notify to signal the closure of the
> connection. If a
> > sender/relay finds connections are closed just after
> successful TLS
> > handshake for three times with same transport mapping version, it
> > SHOULD not connect the receiver again with the same
> transport mapping
> > version.
>
> This does not at all sound very convincing to me (and I assume what
> the author wanted to say is not well said because I believe the
> trigger for not trying again would be a close after sending the first
> syslog message and not after the successful TLS handshake).
I, too, assume this was meant...
> Is there
> not a potential attack possible here by successfully "killing" a TCP
> connection three times in a row?
... and I am not happy with it either. There may be different reasons
for tearing down the session, especially in a troubleshooting scenario.
We should keep in mind that one important application for syslog is
troubleshooting failing networks, which increases the likelyhood of
unexpected session terminations.
I object the ultimate "non-delivery" SHOULD. If we use this clause, we
should at least recommend a retry after a specified period.
But my suggestion is to remove the version as well as this text.
Rainer
>
> /js
>
> --
> Juergen Schoenwaelder {International|Jacobs}
> University Bremen
> <http://www.eecs.iu-bremen.de/> P.O. Box 750 561,
> 28725 Bremen, Germany
>
> _______________________________________________
> Syslog mailing list
> [email protected]
> https://www1.ietf.org/mailman/listinfo/syslog
>
_______________________________________________
Syslog mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/syslog