Re: [secdir] secdir review of draft-ietf-syslog-sign-27
Tina TSOU <tena@huawei.com> Wed, 16 September 2009 03:02 UTC
Return-Path: <tena@huawei.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 337643A6A62; Tue, 15 Sep 2009 20:02:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.288
X-Spam-Level:
X-Spam-Status: No, score=-98.288 tagged_above=-999 required=5 tests=[AWL=2.206, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_MESSAGE=0.001, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oxY1TDm1iiJm; Tue, 15 Sep 2009 20:02:48 -0700 (PDT)
Received: from szxga04-in.huawei.com (unknown [119.145.14.67]) by core3.amsl.com (Postfix) with ESMTP id F36323A6AC2; Tue, 15 Sep 2009 20:02:47 -0700 (PDT)
Received: from huawei.com (szxga04-in [172.24.2.12]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQ1002O0N5PUL@szxga04-in.huawei.com>; Wed, 16 Sep 2009 11:03:26 +0800 (CST)
Received: from huawei.com ([172.24.1.33]) by szxga04-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTP id <0KQ100AQ5N5PSB@szxga04-in.huawei.com>; Wed, 16 Sep 2009 11:03:25 +0800 (CST)
Received: from z24109b ([10.70.39.142]) by szxml06-in.huawei.com (iPlanet Messaging Server 5.2 HotFix 2.14 (built Aug 8 2006)) with ESMTPA id <0KQ100CXBN5PCE@szxml06-in.huawei.com>; Wed, 16 Sep 2009 11:03:25 +0800 (CST)
Date: Wed, 16 Sep 2009 11:03:25 +0800
From: Tina TSOU <tena@huawei.com>
To: secdir <secdir@ietf.org>, iesg@ietf.org
Message-id: <00a301ca367a$420da160$8e27460a@china.huawei.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.3350
X-Mailer: Microsoft Outlook Express 6.00.2900.3598
Content-type: multipart/alternative; boundary="Boundary_(ID_I281aFgZobLkGPVdFVNNog)"
X-Priority: 3
X-MSMail-priority: Normal
References: <4AAE56EF.5080002@ieca.com> <006801ca3677$25943b00$8e27460a@china.huawei.com>
Cc: draft-ietf-syslog-sign@tools.ietf.org, syslog-chairs@tools.ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-syslog-sign-27
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Sep 2009 03:02:50 -0000
Sending to draft-ietf-syslog-sign@tools.ietf.org B. R. Tina http://tinatsou.weebly.com/contact.html ----- Original Message ----- From: Tina TSOU To: iesg@ietf.org ; secdir Cc: draft-ietf-syslog-sign-27@tools.ietf.org ; syslog-chairs@tools.ietf.org Sent: Wednesday, September 16, 2009 10:41 AM Subject: [secdir] secdir review of draft-ietf-syslog-sign-27 I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. In general, from the security point of view, this draft does not specify what the loghost should do in case of packet loss, DoS attack, etc. Should the device try to retrieve the sys log information again? Section 1, third paragraph (talking about Certificate Block): not to over-complicate matters, but this is really talking about the content of a Payload Block. Rather than introduce that term, perhaps rephrase the paragraph slightly to make clear that multiple Certificate Blocks may be used. What's the key management information here? Is it Certificate information or public key information? Additionally, a signer sends Certificate Blocks to provide key management information between the signer and the collector. A Certificate Block has a field to denote the type of key material which may be such things as a PKIX certificate, an OpenPGP certificate, or even an indication that a key had been pre- distributed. In the cases of certificates being sent, the certificates may have to be split across multiple Certificate Blocks carried in separate messages. Section 1, fifth paragraph, first sentence: not clear what "previous" refers to. The phrase "of the previous messages" doesn't seem to add anything and can be dropped. Suggest adding "syslog" after "received" and "corresponding" before "Signature Block", so the sentence reads: The collector may verify that the hash of each received syslog message matches the signed hash contained in the corresponding Signature Block. Section 4.2.3: It is strongly suggested that the field currently identified as Signature Group (SG) be renamed to Signature Group Interpretation (SGI) to avoid confusion. The statement that SPRI identifies the actual signature group also comes a bit late (beginning of the fourth paragraph). It should be moved up to the first paragraph. Note that changing SG to SGI affects the tables in section 4.2 and 5.3.2 and IANA considerations. Note also that the field is called SIG instead of SG in section 5.3.2.3. In section 5.3.2, P23, what's the main difference between using Signature block and using Certificate block? It seems Certificate Block overlaps with Signature Block, e.g., Both block are digitally signed, why is only certificate block termed "certificate block", why not term certificate block as "signature block"? In section 5.3.2.9, the point is made that the timestamp of the Certificate Block message is the same as that of the Payload Block. In fact, they differ very slightly in the example. Is that intended? In section 6, near the bottom of the first paragraph, a couple of words are missing. It is suggested that the sentence be changed to read: The collector MUST ignore duplicates of Signature Blocks and Certificate ^^^^^^^^^^^^^^ Blocks it has already received and authenticated. Section 7 is informative. Perhaps it belongs in an appendix. In section 7.1, 4. Set the last message number processed to the value of the First Message Number plus the Count of the Signature Block minus 1. Why is the Last message number not defined in this document? In section 8.1, This specification uses Public Key Cryptography technologies. The proper party or parties have to control the private key portion of a public-private key pair. Any party that controls a private key can sign anything it pleases. As regarding the last sentence, Is it appropriate to use "pleases" here? How about using *favors* or *prefers* instead of *pleases*? In section 8.2, As a signer, it is advisable to avoid message lengths exceeding 2048 octets. Various problems might result if a signer were to send messages with a length greater than 2048 octets, because relays MAY truncate messages with lengths greater than 2048 octets which would make it impossible for collectors to validate a hash of the packet. To increase the chance of interoperability, it tends to be best to be conservative with what you send but liberal in what you are able to receive. From the above paragraph, we can see it is necessary to restrict the length of message, So I would like to suggest changing the last sentence as: " To increase the chance of interoperability, it tends to be best to limit the length of what you send but loose what you are able to receive. " to make it more precise. Is it reasonable to do this? In section 8.3, Syslog does not strongly associate the message with the message originator. That association is established by the collector upon verification of the Signature Block. What's the difference between associating the message with the message originator and signature? If they are the same thing, I think the association should be pre-established in collector? Is it a correct understanding? In section 8.4, Event messages might be recorded and replayed by an attacker. Using the information contained in the Signature Blocks, a reviewer can determine whether the received messages are the ones originally sent by an originator. The reviewer can also identify messages that have been replayed. I am wondering what the information is in the signature block can be used to prevent replaying? Count or sequence number, time stamp, if there is such thing, it is better to point it out which field of signature block is used for anti-replaying. B. R. Tina http://tinatsou.weebly.com/contact.html ------------------------------------------------------------------------------ _______________________________________________ secdir mailing list secdir@ietf.org https://www.ietf.org/mailman/listinfo/secdir
- [secdir] secdir review of draft-ietf-ipsecme-ikev… Sean Turner
- Re: [secdir] secdir review of draft-ietf-ipsecme-… Yaron Sheffer
- [secdir] secdir review of draft-ietf-syslog-sign-… Tina TSOU
- Re: [secdir] secdir review of draft-ietf-syslog-s… Tina TSOU
- Re: [secdir] secdir review of draft-ietf-syslog-s… Alexander Clemm (alex)