Re: [Syslog] syslog/tls policies and use cases

"David Harrington" <ietfdbh@comcast.net> Wed, 14 May 2008 12:08 UTC

Return-Path: <syslog-bounces@ietf.org>
X-Original-To: syslog-archive@megatron.ietf.org
Delivered-To: ietfarch-syslog-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 31A9C3A687F; Wed, 14 May 2008 05:08:21 -0700 (PDT)
X-Original-To: syslog@core3.amsl.com
Delivered-To: syslog@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5C3213A687F for <syslog@core3.amsl.com>; Wed, 14 May 2008 05:08:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.436
X-Spam-Level:
X-Spam-Status: No, score=-2.436 tagged_above=-999 required=5 tests=[AWL=0.163, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tFiyoCOyXY5Q for <syslog@core3.amsl.com>; Wed, 14 May 2008 05:08:18 -0700 (PDT)
Received: from QMTA06.emeryville.ca.mail.comcast.net (qmta06.emeryville.ca.mail.comcast.net [76.96.30.56]) by core3.amsl.com (Postfix) with ESMTP id E8E7D3A6867 for <syslog@ietf.org>; Wed, 14 May 2008 05:08:17 -0700 (PDT)
Received: from OMTA09.emeryville.ca.mail.comcast.net ([76.96.30.20]) by QMTA06.emeryville.ca.mail.comcast.net with comcast id RQ6J1Z00m0S2fkCA600300; Wed, 14 May 2008 12:07:03 +0000
Received: from Harrington73653 ([24.128.66.199]) by OMTA09.emeryville.ca.mail.comcast.net with comcast id RQ7Q1Z00U4HwxpC8V00000; Wed, 14 May 2008 12:07:26 +0000
X-Authority-Analysis: v=1.0 c=1 a=WWLg-UQFwiUA:10 a=hfXpDYVANRYc4cT53FwA:9 a=JAg1TsURFvh7AGnYkeUTqoxXJFEA:4 a=si9q_4b84H0A:10 a=hPjdaMEvmhQA:10 a=50e4U0PicR4A:10
From: David Harrington <ietfdbh@comcast.net>
To: Pasi.Eronen@nokia.com, clonvick@cisco.com
References: <Pine.GSO.4.63.0805120530390.16718@sjc-cde-003.cisco.com> <1696498986EFEC4D9153717DA325CB729CB573@vaebe104.NOE.Nokia.com>
Date: Wed, 14 May 2008 08:07:24 -0400
Message-ID: <070301c8b5bb$1342dd00$0600a8c0@china.huawei.com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 11
In-Reply-To: <1696498986EFEC4D9153717DA325CB729CB573@vaebe104.NOE.Nokia.com>
Thread-Index: Aci0N7lgnIHQrINwTQGnz5RzGRCwJQBfHmZgAAFdxRA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
Cc: syslog@ietf.org
Subject: Re: [Syslog] syslog/tls policies and use cases
X-BeenThere: syslog@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Issues in Network Event Logging <syslog.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/syslog>
List-Post: <mailto:syslog@ietf.org>
List-Help: <mailto:syslog-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: syslog-bounces@ietf.org
Errors-To: syslog-bounces@ietf.org

Hi,

So I go buy a Linksys or Netgear router or other consumer gear. 
I slip the CD into the drive and run software to install the
management GUI on my PC.
That software is used to perform an initial configuration of the
device, such as enabling DHCP, setting WEP keys, and so on.
This same software can presumably generate a key and "copy the
fingerprint" to the device, right?
Clueless operator needs not be involved. The Internet is secure.

right?

David Harrington
dbharrington@comcast.net
ietfdbh@comcast.net
dharrington@huawei.com



_______________________________________________
Syslog mailing list
Syslog@ietf.org
https://www.ietf.org/mailman/listinfo/syslog