[Syslog] Syslog Threat Modeling

2006-01-06 Thread Eric Hibbard
If a threat model for Syslog is required, I would be very interested in helping out. Let me know. -Eric Eric A. Hibbard, CISSP, ISSAP, ISSMP, ISSEPSenior Director, Data Networking TechnologyChair, SNIA Security Technical Work Group Office of the CTOHITACHI DATA SYSTEMS750 Central

Re: [Syslog] Charter comments from IESG Review

2006-01-06 Thread Chris Lonvick
Hi Sam, On Thu, 5 Jan 2006, Sam Hartman wrote: Hi. The IESg reviewed the proposed syslog charter at today's telechat and decided that it requires revision. The main concern seems to be the lack of a mandatory to implement security mechanism. I indicated this might be the case in the

[Syslog] I-D ACTION:draft-ietf-syslog-protocol-16.txt (fwd)

2006-01-06 Thread Chris Lonvick
Hi Folks, This is it. We need people to review this and get back to the WG. When you reivew it, either send in notes about issues, or respond by saying that you have reviewed it. (We DO need me too's.) Thanks, Chris -- Forwarded message -- Date: Tue, 03 Jan 2006 15:50:02

Re: [Syslog] Charter comments from IESG Review

2006-01-06 Thread Sam Hartman
Chris == Chris Lonvick [EMAIL PROTECTED] writes: Chris Is Section 8 in draft-ietf-syslog-protocol-16.txt Chris sufficient? Alternatively, Section 6 in RFC 3164 is fairly Chris comprehensive. Both of these look good. My main question with them is whether you believe it is a

[Syslog] Sec 6.1: Truncation

2006-01-06 Thread Anton Okmianski \(aokmians\)
Rainer and all: I started reading draft #16. Since we are revisiting everything... I am not very comfortable with the current truncation rules. Receivers SHOULD follow this order of preference when it comes to truncation: 1) No truncation 2) Truncation by dropping SD-ELEMENTs 3) If 2) not

Re: [Syslog] Charter comments from IESG Review

2006-01-06 Thread Tom Petch
Sam I struggle to think what a security system would look like when the protocol is purely simplex, apart from a MAC to give integrity with some shared secret transmitted totally out of band. Are there any examples of simplex security elsewhere in the IETF? Tom Petch - Original Message

Re: [Syslog] Charter comments from IESG Review

2006-01-06 Thread Sam Hartman
Tom == Tom Petch [EMAIL PROTECTED] writes: Tom Sam I struggle to think what a security system would look Tom like when the protocol is purely simplex, apart from a MAC to Tom give integrity with some shared secret transmitted totally Tom out of band. By this do you mean without