Re: [Syslog] I-D Action:draft-ietf-syslog-transport-tls-12.txt

"tom.petch" <cfinss@dial.pipex.com> Wed, 14 May 2008 08:22 UTC

Return-Path: <syslog-bounces@ietf.org>
X-Original-To: syslog-archive@megatron.ietf.org
Delivered-To: ietfarch-syslog-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A6B693A682A; Wed, 14 May 2008 01:22:49 -0700 (PDT)
X-Original-To: syslog@core3.amsl.com
Delivered-To: syslog@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 81F953A682A for <syslog@core3.amsl.com>; Wed, 14 May 2008 01:22:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.499
X-Spam-Level:
X-Spam-Status: No, score=-2.499 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dPkukL47Z706 for <syslog@core3.amsl.com>; Wed, 14 May 2008 01:22:45 -0700 (PDT)
Received: from mk-outboundfilter-5.mail.uk.tiscali.com (mk-outboundfilter-5.mail.uk.tiscali.com [212.74.114.1]) by core3.amsl.com (Postfix) with ESMTP id 4F5DE3A6823 for <syslog@ietf.org>; Wed, 14 May 2008 01:22:44 -0700 (PDT)
X-Trace: 26928105/mk-outboundfilter-5.mail.uk.tiscali.com/PIPEX/$ACCEPTED/pipex-customers/62.188.143.35
X-SBRS: None
X-RemoteIP: 62.188.143.35
X-IP-MAIL-FROM: cfinss@dial.pipex.com
X-IP-BHB: Once
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: ApsEAEM+Kkg+vI8j/2dsb2JhbACLU6IiBA
X-IP-Direction: IN
Received: from 1cust35.tnt14.lnd4.gbr.da.uu.net (HELO allison) ([62.188.143.35]) by smtp.pipex.tiscali.co.uk with SMTP; 14 May 2008 09:21:48 +0100
Message-ID: <003801c8b592$8f963e20$0601a8c0@allison>
From: "tom.petch" <cfinss@dial.pipex.com>
To: "Joseph Salowey (jsalowey)" <jsalowey@cisco.com>, syslog <syslog@ietf.org>
References: <20080507150001.D3CB428C65B@core3.amsl.com><OF13490747.F0126D34-ON85257443.00540976-85257443.00574A09@agfa.com><577465F99B41C842AAFBE9ED71E70ABA308FB3@grfint2.intern.adiscon.com><AC1CFD94F59A264488DC2BEC3E890DE505C95869@xmb-sjc-225.amer.cisco.com><577465F99B41C842AAFBE9ED71E70ABA308FC3@grfint2.intern.adiscon.com> <AC1CFD94F59A264488DC2BEC3E890DE505C95BEA@xmb-sjc-225.amer.cisco.com>
Date: Wed, 14 May 2008 09:14:00 +0200
MIME-Version: 1.0
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Subject: Re: [Syslog] I-D Action:draft-ietf-syslog-transport-tls-12.txt
X-BeenThere: syslog@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: "tom.petch" <cfinss@dial.pipex.com>
List-Id: Security Issues in Network Event Logging <syslog.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/syslog>
List-Post: <mailto:syslog@ietf.org>
List-Help: <mailto:syslog-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: syslog-bounces@ietf.org
Errors-To: syslog-bounces@ietf.org

<inline>
Tom Petch

----- Original Message -----
From: "Joseph Salowey (jsalowey)" <jsalowey@cisco.com>
To: "Rainer Gerhards" <rgerhards@hq.adiscon.com>; <robert.horn@agfa.com>;
<syslog@ietf.org>
Sent: Tuesday, May 13, 2008 12:17 AM
Subject: Re: [Syslog] I-D Action:draft-ietf-syslog-transport-tls-12.txt

> Hi Rainer,
>
> Comments below:
>
> <snip>

> [Joe] We are not talking about HTTPS we are talking about syslog.  What
> applies to one may not necessarily apply to the other (HTTP provides
> other ways to authenticate the client etc.).  In addition HTTPS
> authenticates the server in most cases.  In any case, I don't think you
> can claim confidentiality if you do not take care of masquerade or
> man-in-the-middle as either will result in a breach of confidentiality,
> you are still vulnerable to active attackers.
>
> I believe that implementations need to support mutual authentication and
> authorization with certificates.  The recommended mechanisms for this
> probably still need some discussion, however I think it is important to
> provide this capability.  I think what is more to the point in the
> current discussion is what is required by default.  I would like to
> suggest that server authentication, certificate path validation and
> authorization be required by default, because I without this I don't
> think any security goals are met.  I would also suggest that by default
> clients should present and authenticate with a certificate, however a
> server does not necessarily need to perform path validation or
> authorization, it can just record the certificate (or fingerprint) that
> carries the public key used in the authentication so it can be validated
> at a later time.

Joe

I am concerned, as I think Robert is, about the mixing of protocol and policy;
the former we should define, the latter I am dubious about, seeing it as a
moving target as practices change (one day we may have widespread PKI - or maybe
not:-); at least we should separate it out, section 5 not section 4.

I remain concerned about the number of changes proposed in -12.  Reviewing -11,
last November, we did discuss whether or not the I-D
should give guidance on certificate management and the views I saw then said
not. In fact, dbh asked what IESG-raised issues are we responding to, that is,
given the status of the I-D, the only issues should be IESG ones.  Then, I could
answer that question, now I cannot and so wonder what drives these changes

Historically, the November 2005 IETF meeting led to a proposed charter which was
rejected by the IESG for lacking a mandatory-to-implement security mechanism.
Our AD then guided us through developing a threat model, the rough consensus on
which I believe this I-D accurately records.  This led to a charter which was
acceptable to the IESG.  So that threat model - section 2 - for me is a given.
Change that and you change the charter:-)

During the discussions on threats, rough consensus emerged for TLS.  There was
no discussion about how authentication would be done, no discussion of how
strong the security should be.  The first draft of this I-D took certificates
for granted but did debate the need for client-side authentication. By -11, I
thought that we had a reasonable consensus and should only change what the IESG
wants us to; and that I do not see.

Tom Petch

.

>
> This requires configuration on the client, but not necessarily on the
> server.
>
> _______________________________________________
> Syslog mailing list
> Syslog@ietf.org
> https://www.ietf.org/mailman/listinfo/syslog

_______________________________________________
Syslog mailing list
Syslog@ietf.org
https://www.ietf.org/mailman/listinfo/syslog