> I've made some minor revisions and placed the latest here:
>
> http://www.employees.org/~lonvick/draft3.txt
>
> If I can get some reviewers to say that the Security Concerns
> section is acceptable (or to note areas that need changes as
> some of you have), then I'll start accepting proposals for
> - an authenticated syslog protocol and,
> - a protocol that can provide authentication, integrity and
> confidentiality for syslog message transport.
> Both of these are loosely defined in the Charter but they need
> to address the security concerns of the current syslog protocol.
I think section 5 is acceptable (but please note my previous mail), and I
think we owe you a big "Thank you" for writing it.
As for your request for proposals on authenticated syslog protocols: it was
mentioned previously that off-the-shelf products/packages should be used.
Let's try to sum it up what options we have available.
If I were developing a secured syslog solution in a given case, I think I
had completely different ways of doing that:
1 implement authentication, protection at the network layer (IPSec)
2 implement authentication, protection at the transport layer (SSL, SSH)
3 implement authentication, protection at the application layer, in our
protocol
#1 would work, but requires a huge infrastructure behind it, and to develop
a general enough solution, we should not depend on something like IPSec. (or
equivalent)
#2 is off-the-shelf, requires the least modification to our protocol, and
requires some CA infrastructure for authentication.
#3 is the most difficult to implement, but can be tailored to our
application.
I for one would go with #2, though it has some requirements. Any other ideas?
--
Scheidler Balázs BalaBit IT Biztonságtechnikai Kft.
tel/fax: +36-1/217-14-98 1092 Bp. Köztelek u. 4/B
http://www.balabit.hu