Greetings.  Other than the issue I pointed out today, it looks like
we're done with protocol and transport-udp.  Once that issue is
resolved I can approve both of these documents and send them to the
rfc-editor.

However, in your discussions with the transport area directors you
made some changes to the protocol document that have implications for
the tls document.  Curently, the tls document is awaiting revisions to
address my latest round of comments.  I'd like the working group to
think about the implications of changes to protocol when revising the
tls document.

In particular, you are now recommending that the tls transport be used
in most situations in preference to the udp transport.  As a
consequence, that means the tls transport is no longer just for
security sensitive applications.  So, the TLS document needs to
reflect this wider applicability.

In particular, I definitely expect it to work in cases where senders
do not have certificates.  The working group also needs to think about
delployment issues surrounding trust anchors.  You need to either
convince yourselves that getting appropriate trust anchors onto
devices will not be a problem in these situations or provide
mandatory-to-implmenet semantics when trust anchors cannot be
provided.

One possible solution would be a mandatory-to-implement mode where the
tls transport does not protect against active attackers and
certificates are not checked on either side.  If explicit security
configuration is available then certificates can be checked providing
defense against active attack.


there are other possible solutions as well, depending on what the
working group believes is appropriate leves of configuration.  I just
want you to actually produce a protocol that will be easy to deploy
because that will be important given its expanded applicability.


_______________________________________________
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to