At 04:27 PM 3/3/00 -0500, Chris Calabrese wrote: 
 >
 > Hey folks,
 >
 > This list got awfully quiet since the holidays.
 > Anybody still out there?
 >
 > I've got a very rough draft of an Internet Draft
 > for the stuff we were working on towards the end
 > of last year, and I'm looking for co-authors to finish
 > it off.  See the attached.
 >
 > Also, I was browsing around the IETF web site today
 > looking at the drafts from the Intrusion Detection
 > Working Group.  Some interesting stuff in there,
 > though they've glossed over some of the security
 > issues IMO.  You can check it out for yourself at
 > http://www.ietf.org/ids.by.wg/idwg.html
 >
 > --
 > Chris Calabrese
 > Internet Infrastructure and Security
 > Merck-Medco Managed Care, L.L.C.
 > [EMAIL PROTECTED]




Hi Chris & Everyone,

Things did get quiet, but that doesn't mean things weren't happening.  :-)

I've been working with the ADs and have obtained permission to hold another
BoF in Adelaide.  Below is the proposed agenda and charter for the WG.  This
has not been scheduled yet but I'll get the information out to everyone just
as soon as I get something back.

I'll comment some more on Chris' draft in another email.

Thanks,
Chris


--------------------------------------------------------------------------
Hello Secretariat,

I am requesting a 1 hour BOF to discuss the formation of a new
Working Group in the Security Area for Secure Syslog.  

Many thanks,
Chris Lonvick
+1.512.378.1182

---Syslog BOF Agenda

Agenda:

Introduction and Level Setting   -30 minutes

o   Syslog as de facto network event logging standard although the 
     protocol has never been described in an Internet Draft.  There
     are security weaknesses in the protocol.  At a high layer, these
     include
       - no authentication of the sender or receiver
       - no verification of delivery of the messages
     On the other hand, it does have a widespread implementation and 
     most users understand its scalability charactersitics.

o   Although machine authentication can be delivered through SSL/TLS or 
     IPSec, a simpler mechanism may be considered for syslog, such as 
     something similar to authenticated RIP or BGP.  Along with this, a
     lightweight integrity check would be desireable.

o   A feedback mechanism between the message sender and the message
     receiver should be considered for verifiable delivery of the 
     messages.  This mechanism should also have a mechanism for message 
     authentication and integrity.

o   Because an important component of any solution will be the ease of 
     transition from the existing mechanism, we will initially explore the 
     use of shared secrets within the existing protocol with the intent of 
     not impacting non-participants. 

o   IPSec or TLS may be used for confidentiality.


Goals of a Secure Syslog Working Group  -20 minutes

o   Post as an Internet Draft the observed behavior of the Syslog 
            protocol for consideration as a Standards Track RFC.
o   Post as an Internet Draft the specification for an 
            authenticated Syslog for consideration as a Standards Track 
            RFC.
o   Post as an Internet Draft the specification for an 
            authenticated Syslog with verifiable delivery and message 
            integrity for consideration as a Standards Track RFC.
o   Revise drafts as necessary and advance these Internet Drafts 
            to Standards Track RFCs.



POSSIBLE BOF/WORKING GROUP CHARTER

Description of Working Group: 

Syslog is a de facto standard for logging system events. However, the 
protocol component of this event logging system has not been formerly 
documented. While the protocol has been very useful and scaleable, it 
has some known but undocumented security problems. For instance, the 
messages are unauthenticated and there is no mechanism to provide verified 
delivery and message integrity. 

The goal of this working group is to document and address the security and 
integrity problems of the existing Syslog mechanism. In order to accomplish 
this task we will document the existing protocol. The working group will 
also explore and develop a standard to address the security problems.

Message authentication can be addressed in well-known ways using shared 
secrets or public keys. Because an important component of any solution will 
be the ease of transition from the existing mechanism, we will initially 
explore the use of shared secrets within the existing protocol with the 
intent of not impacting non-participants. Verifiable delivery, message 
integrity and authentication can also be explored in a tcp-based message 
delivery protocol.

Goals and Milestones:

  May 2000  Post as an Internet Draft the observed behavior of 
            the Syslog protocol for consideration as a Standards Track RFC.
  Jul 2000  Post as an Internet Draft the specification for an 
            authenticated Syslog for consideration as a Standards Track RFC.
  Aug 2000  Post as an Internet Draft the specification for an authenticated 
            Syslog with verifiable delivery and message integrity for 
            consideration as a Standards Track RFC.
  Dec 2000  Revise drafts as necessary and advance these Internet Drafts to 
            Standards Track RFCs.


---end


Reply via email to