Re: [Syslog] I-D Action:draft-ietf-syslog-transport-tls-12.txt

"David Harrington" <ietfdbh@comcast.net> Fri, 09 May 2008 19:47 UTC

Return-Path: <syslog-bounces@ietf.org>
X-Original-To: syslog-archive@megatron.ietf.org
Delivered-To: ietfarch-syslog-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 516063A6838; Fri, 9 May 2008 12:47:00 -0700 (PDT)
X-Original-To: syslog@core3.amsl.com
Delivered-To: syslog@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53CFD3A68CC for <syslog@core3.amsl.com>; Fri, 9 May 2008 12:46:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.48
X-Spam-Level:
X-Spam-Status: No, score=-2.48 tagged_above=-999 required=5 tests=[AWL=0.119, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B0CFOvEfo0+o for <syslog@core3.amsl.com>; Fri, 9 May 2008 12:46:57 -0700 (PDT)
Received: from QMTA05.emeryville.ca.mail.comcast.net (qmta05.emeryville.ca.mail.comcast.net [76.96.30.48]) by core3.amsl.com (Postfix) with ESMTP id E54F23A6838 for <syslog@ietf.org>; Fri, 9 May 2008 12:46:52 -0700 (PDT)
Received: from OMTA08.emeryville.ca.mail.comcast.net ([76.96.30.12]) by QMTA05.emeryville.ca.mail.comcast.net with comcast id PUw21Z0050FhH24A50Dc00; Fri, 09 May 2008 19:37:58 +0000
Received: from Harrington73653 ([24.128.66.199]) by OMTA08.emeryville.ca.mail.comcast.net with comcast id PXds1Z00L4HwxpC8U00000; Fri, 09 May 2008 19:38:06 +0000
X-Authority-Analysis: v=1.0 c=1 a=aAD4C1mW_iYA:10 a=BHdMu9g2WwQA:10 a=48vgC7mUAAAA:8 a=FAd-VYlxXpiGCaEpZRQA:9 a=H8T257vIQxW6rrqHXLoA:7 a=C6fuXRvHv-BdArMgKjM01wVi1nUA:4 a=si9q_4b84H0A:10 a=hPjdaMEvmhQA:10 a=lZB815dzVvQA:10 a=84tl6Pyz8z4A:10 a=50e4U0PicR4A:10
From: David Harrington <ietfdbh@comcast.net>
To: 'Rainer Gerhards' <rgerhards@hq.adiscon.com>, "'Moehrke, John (GE Healthcare)'" <John.Moehrke@med.ge.com>, robert.horn@agfa.com, "'Joseph Salowey (jsalowey)'" <jsalowey@cisco.com>, syslog@ietf.org
References: <20080507150001.D3CB428C65B@core3.amsl.com><OF13490747.F0126D34-ON85257443.00540976-85257443.00574A09@agfa.com><577465F99B41C842AAFBE9ED71E70ABA308FB3@grfint2.intern.adiscon.com><124CF5A7D55D6F43A4FD9437F28254D8C28025@ALPMLVEM05.e2k.ad.ge.com> <577465F99B41C842AAFBE9ED71E70ABA308FBC@grfint2.intern.adiscon.com>
Date: Fri, 09 May 2008 15:37:52 -0400
Message-ID: <049301c8b20c$33dd1e20$0600a8c0@china.huawei.com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 11
In-Reply-To: <577465F99B41C842AAFBE9ED71E70ABA308FBC@grfint2.intern.adiscon.com>
Thread-Index: AcixJ3ChaVnUq5oITfGwAnnHJ7WqPwAfO5owABLMh4AAAMFzcAAExWgw
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
Subject: Re: [Syslog] I-D Action:draft-ietf-syslog-transport-tls-12.txt
X-BeenThere: syslog@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Issues in Network Event Logging <syslog.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/syslog>
List-Post: <mailto:syslog@ietf.org>
List-Help: <mailto:syslog-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: syslog-bounces@ietf.org
Errors-To: syslog-bounces@ietf.org

Hi,

Acting as co-chair, I request that everybody please read BCP61, found
in RFC 3365 - "Strong Security Requirements for Internet Engineering
Task Force Standard Protocols". It's short. ;-)

If the IESG required strong security features for syslog, then the
IESG was probably enforcing the IETF consensus documented in this RFC.
This BCP has not been updated or obsoleted to my knowledge. BUT -  the
IESG **may** be working off a newer consensus, so we may need to see
what was said, or get input from our responsible AD.

I don't think it says the security features must be enabled by
default, or that policy decisions should be included in the protocool
specification. It reports IETF rough consensus that "all IETF
protocols should operate securely". However, RFC 3365 is also clear
that "MUST is for implementers", not users - "it is completely
reasonable for security features to be an option that the end user of
the protocol may choose to disable."

RFC 3365 does not use the word default, nor the word enabled, and in
my reading of the document, I see nothing that states that strong
security MUST be enabled by default.

But please continue checking what was said by the IESG when we
rechartered (or whenever it was).

David Harrington
dbharrington@comcast.net
ietfdbh@comcast.net
dharrington@huawei.com



> -----Original Message-----
> From: syslog-bounces@ietf.org 
> [mailto:syslog-bounces@ietf.org] On Behalf Of Rainer Gerhards
> Sent: Friday, May 09, 2008 12:36 PM
> To: Moehrke, John (GE Healthcare); robert.horn@agfa.com; 
> Joseph Salowey (jsalowey); syslog@ietf.org
> Subject: Re: [Syslog] I-D 
> Action:draft-ietf-syslog-transport-tls-12.txt
> 
> John,
> 
> I need to find it inside the mailing list archive. If I remember, it
> came up during rechartering (2? 3? Years ago). It was along the
lines
> that a secure transport AND secure default for that transport are
> required. This is the primary reason that -syslog-protocol and
> -transport-udp can not advance to RFC before -transport-tls is done.
> 
> Rainer
> 
> > -----Original Message-----
> > From: Moehrke, John (GE Healthcare)
[mailto:John.Moehrke@med.ge.com]
> > Sent: Friday, May 09, 2008 6:18 PM
> > To: Rainer Gerhards; robert.horn@agfa.com; Joseph Salowey 
> (jsalowey);
> > syslog@ietf.org
> > Subject: RE: [Syslog] I-D
> Action:draft-ietf-syslog-transport-tls-12.txt
> > 
> > 
> > Could someone please point me at the mentioned IESG requirement to
> > include policy decisions? This is a very unusual position. 
> And as your
> > own assessment shows is something that simply will not scale.
> > 
> > For example, there are healthcare systems installed on 
> military ships
> > where all network wiring is inside compressed nitrogen casings
with
> > sensors. This is clearly a sensitive environment, but they have
> already
> > managed many of the risks.
> > 
> > John
> > 
> > > -----Original Message-----
> > > From: syslog-bounces@ietf.org [mailto:syslog-bounces@ietf.org]
On
> > Behalf
> > > Of Rainer Gerhards
> > > Sent: Friday, May 09, 2008 3:36 AM
> > > To: robert.horn@agfa.com; Joseph Salowey (jsalowey); 
> syslog@ietf.org
> > > Subject: Re: [Syslog] I-D
> > Action:draft-ietf-syslog-transport-tls-12.txt
> > >
> > > Hi all,
> > >
> > > I agree to Robert, policy decisions need to be separated. 
> I CC Pasi
> > > because my comment is directly related to IESG requirements,
which
> > IMHO
> > > cannot be delivered by *any* syslog TLS document without 
> compromise
> > > [comments directly related to IESG are somewhat later, I need to
> > level
> > > ground first].
> _______________________________________________
> Syslog mailing list
> Syslog@ietf.org
> https://www.ietf.org/mailman/listinfo/syslog
> 

_______________________________________________
Syslog mailing list
Syslog@ietf.org
https://www.ietf.org/mailman/listinfo/syslog