[secdir] secdir review of draft-ietf-syslog-sign-27
Tina TSOU <tena@huawei.com> Wed, 16 September 2009 02:40 UTC
Return-Path: <tena@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 39EED28C11F; Tue, 15 Sep 2009 19:40:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.237
X-Spam-Level:
X-Spam-Status: No, score=-98.237 tagged_above=-999 required=5 tests=[AWL=2.257, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_MESSAGE=0.001, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5jQXS8-QA1Er; Tue, 15 Sep 2009 19:40:32 -0700 (PDT)
Received: from szxga01-in.huawei.com (unknown [119.145.14.64]) by core3.amsl.com (Postfix) with ESMTP id 4E64228C118; Tue, 15 Sep 2009 19:40:32 -0700 (PDT)
Received: from huawei.com (szxga01-in [172.24.2.3]) by szxga01-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQ1003I7M4L86@szxga01-in.huawei.com>; Wed, 16 Sep 2009 10:41:09 +0800 (CST)
Received: from huawei.com ([172.24.1.24]) by szxga01-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQ1002IHM4LA2@szxga01-in.huawei.com>; Wed, 16 Sep 2009 10:41:09 +0800 (CST)
Received: from z24109b ([10.70.39.142]) by szxml04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQ1003Q0M4L8A@szxml04-in.huawei.com>; Wed, 16 Sep 2009 10:41:09 +0800 (CST)
Date: Wed, 16 Sep 2009 10:41:08 +0800
From: Tina TSOU <tena@huawei.com>
To: iesg@ietf.org, secdir <secdir@ietf.org>
Message-id: <006801ca3677$25943b00$8e27460a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Outlook Express 6.00.2900.3598
Content-type: multipart/alternative; boundary="Boundary_(ID_XWfkaXsoKfeIzi4JDxE8Mw)"
X-Priority: 3
X-MSMail-priority: Normal
References: <4AAE56EF.5080002@ieca.com>
Cc: draft-ietf-syslog-sign-27@tools.ietf.org, syslog-chairs@tools.ietf.org
Subject: [secdir] secdir review of draft-ietf-syslog-sign-27
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2009 02:40:34 -0000
I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written primarily for the benefit of the security
area directors. Document editors and WG chairs should treat these
comments just like any other last call comments.
In general, from the security point of view, this draft does not specify what
the loghost should do in case of packet loss, DoS attack, etc. Should the
device try to retrieve the sys log information again?
Section 1, third paragraph (talking about Certificate Block): not to
over-complicate matters, but this is really talking about the content of a
Payload Block. Rather than introduce that term, perhaps rephrase the paragraph
slightly to make clear that multiple Certificate Blocks may be used. What's the key management information here? Is it Certificate information or public key information?
Additionally, a signer sends Certificate Blocks to provide key
management information between the signer and the collector. A
Certificate Block has a field to denote the type of key material
which may be such things as a PKIX certificate, an OpenPGP
certificate, or even an indication that a key had been pre-
distributed. In the cases of certificates being sent, the
certificates may have to be split across multiple Certificate
Blocks carried in separate messages.
Section 1, fifth paragraph, first sentence: not clear what "previous" refers to.
The phrase "of the previous messages" doesn't seem to add anything and can be
dropped. Suggest adding "syslog" after "received" and "corresponding" before
"Signature Block", so the sentence reads:
The collector may verify that the hash of
each received syslog message matches the signed hash contained in the
corresponding Signature Block.
Section 4.2.3: It is strongly suggested that the field currently identified as
Signature Group (SG) be renamed to Signature Group Interpretation (SGI) to avoid
confusion. The statement that SPRI identifies the actual signature group also
comes a bit late (beginning of the fourth paragraph). It should be moved up to
the first paragraph.
Note that changing SG to SGI affects the tables in section 4.2 and 5.3.2 and IANA considerations. Note also that the field is called SIG instead of SG in section 5.3.2.3.
In section 5.3.2, P23, what's the main difference between using Signature block and using Certificate block? It seems Certificate Block overlaps with Signature Block, e.g., Both block are digitally signed, why is only certificate block termed "certificate block", why not term certificate block as "signature block"?
In section 5.3.2.9, the point is made that the timestamp of the Certificate
Block message is the same as that of the Payload Block. In fact, they differ
very slightly in the example. Is that intended?
In section 6, near the bottom of the first paragraph, a couple of words are
missing. It is suggested that the sentence be changed to read:
The
collector MUST ignore duplicates of Signature Blocks and Certificate
^^^^^^^^^^^^^^
Blocks it has already received and authenticated.
Section 7 is informative. Perhaps it belongs in an appendix.
In section 7.1,
4. Set the last message number processed to the value of the
First Message Number plus the Count of the Signature Block
minus 1.
Why is the Last message number not defined in this document?
In section 8.1,
This specification uses Public Key Cryptography technologies. The
proper party or parties have to control the private key portion of a
public-private key pair. Any party that controls a private key can
sign anything it pleases.
As regarding the last sentence, Is it appropriate to use "pleases" here? How about using *favors* or *prefers* instead of *pleases*?
In section 8.2,
As a signer, it is advisable to avoid message lengths exceeding 2048
octets. Various problems might result if a signer were to send
messages with a length greater than 2048 octets, because relays MAY
truncate messages with lengths greater than 2048 octets which would
make it impossible for collectors to validate a hash of the packet.
To increase the chance of interoperability, it tends to be best to be
conservative with what you send but liberal in what you are able to
receive.
From the above paragraph, we can see it is necessary to restrict
the length of message, So I would like to suggest changing the last
sentence as:
"
To increase the chance of interoperability, it tends to be best to
limit the length of what you send but loose what you are able to
receive.
"
to make it more precise. Is it reasonable to do this?
In section 8.3,
Syslog does not strongly associate the message with the message
originator. That association is established by the collector upon
verification of the Signature Block.
What's the difference between associating the message with the message originator
and signature? If they are the same thing, I think the association should be pre-established
in collector? Is it a correct understanding?
In section 8.4,
Event messages might be recorded and replayed by an attacker. Using
the information contained in the Signature Blocks, a reviewer can
determine whether the received messages are the ones originally sent
by an originator. The reviewer can also identify messages that have
been replayed.
I am wondering what the information is in the signature block can be used to
prevent replaying? Count or sequence number, time stamp, if there is such thing, it is better to
point it out which field of signature block is used for anti-replaying.
B. R.
Tina
http://tinatsou.weebly.com/contact.html
- [secdir] secdir review of draft-ietf-ipsecme-ikev… Sean Turner
- Re: [secdir] secdir review of draft-ietf-ipsecme-… Yaron Sheffer
- [secdir] secdir review of draft-ietf-syslog-sign-… Tina TSOU
- Re: [secdir] secdir review of draft-ietf-syslog-s… Tina TSOU
- Re: [secdir] secdir review of draft-ietf-syslog-s… Alexander Clemm (alex)