Hi Folks,

These minutes are consistent with my recollection of the meeting.  Are
there any objections to accepting them as the official minutes?  I had
incorrectly noted the Syslog MIB ID in my slides and Marshall used that in
his notes below.  I've edited that (it was -03 rather than -02) in the
notes below but have left everything else as written by Marshall.

Our thanks to Marshall for taking such good notes.  I'll get the
presentations posted as soon as I can.

Thanks,
Chris

---------- Forwarded message ----------
Date: Tue, 18 Mar 2003 15:16:46 -0800
From: Marshall Rose <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: draft minutes

please review and comment.

/mtr


[ syslog-minutes.txt - Tue Mar 18 11:24:33 2003 - 56th IETF - /mtr ]


WG: Security Issues in Network Event Logging (syslog)

Chairs: Chris Lonvick

Monday, March 18th, 2003 14:15-15:15 US/Pacific

Minutes by: Marshall T. Rose


Chris: Agenda

    Agenda Bashing - no changes

    Review of Charter and Status Update

    Review of Syslog MIB

    Wrap Up


Chris: Review of Charter

    - Recall that our focus is about reliable delivery and authentication

    - RFC 3164: How syslog works

    - RFC 3195: Reliable Delivery: 3 implementations out there

    - draft-ietf-syslog-sign-09: looking solid, still lacking "Security"
      and "IANA" considerations, one implementor has surfaced

    - draft-ietf-syslog-device-mib-03: to be discussed today


Glenn: draft-ietf-syslog-device-mib

    - Questions to ask:
        1. Are the right knobs there?
        2. Are the knobs adequately defined?

    - Purpose of the MIB
        - monitoring syslog operation (stats on messages in/out)
        - system-wide parameters: read-write
        - process run-time parameters: read-write
        - process rules for message selection and actions: read-write
        - read-write objects move us from monitoring to configuration

    - MIB Design mimics this architecture
        - system group: models generic information for the service
        - parameters group: models processes that implement the daemon
        - control group: models the syslog.conf file

    - Security Considerations
        - insecure access can allow mis-configuration, start/stop it, etc.
          (e.g., a bad idea given that syslog logs things like intruder
          detection...)
        - mis-configuring tables may result in loss/flood of messages,
          console spamming, attacking collectors, remove shell
          invocation, etc.
        - even R/O access is sensitive, e.g., reading counters.

    - TBD
        - DESCRIPTION/REFERENCE clauses
        - Is the MIB module set-consistent?
        - Editorial nits
        - Implemnet

    Mic: Security considerations can be addressed by access control in SNMPv3

    David: Even with v3, only certain personnel should have access

    Tim: Why is the MIB so close to the BSD syslog implementation?

    Chris: There's no requirement to do so, we just have a lot of info
           on the BSD side of things. We'd certainly like to get info
           from non-BSD folks

    Mike: There may be a lot of duplication with the Host Resources MIB?
          Also, what about SNMP notifications?

    Glenn: I've tried to avoid duplicating HR MIB functionality in the
           SYSLOG MIB module.  I need to document this more.

    Mic: There needs to be a "no DNS lookup"

    Marshall: Can we talk about the decision to do configuration stuff?

    Mic: Often times, simply having the MIB modelling is useful
         independent of actual SNMP implementation (e.g., encouraging
         syslog implementors to have the same feature set, independent
         of the management).

    Glenn: Even having just R/O access to the configuration information is
           good. The design still remains consistent, regardless.

    Mic: Many of the objects can probably be implemented without an
         intrusive approach. We should take note of this in the
         conformance statements.

    Bert: Many operators aren't comfortable doing configuration via
          SNMP, and there's interest in doing configuration other ways
          (cf., netconf). So, there's a risk that even if you define the
          objects, they won't get implemented for setting....

    Mic: Well, it may be used outside the operator community.

    David: I'm familiar with SNMP-manageable syslog stuff.

    Chris: How many people think we should be doing configurable stuff?
               many hands
           How many people think we should be doing monitoring stuff?
               one hand

    Glenn: is there an impact on the MIB module if we just make
           everything R/O?

    Bert: well, you can remove RowStatus objects, etc., so it would make
          things simpler. but, we'll still review the mib in case
          someone chooses to implement objects read-write.

    Steve: i look for what needs to be protected for both a read-only
           for privacy, and read-write for other threats.

    Mic: i haven't had any customers ask for syslog configuration, they
         want to use cli... so, i'd rather see a simpler mib, that's
         faster to implement.

    Mic: it's important that standard protocols have standard knobs

    Steve: netconf uses 3195 for notifications, and we're interested in
           finding out what interest there is in opening up 3195 for our
           needs.  is there interest in this wg?

                   some hands go up, none opposed

Chris: Wrapup

    Internationalization? Characters are currently us-ascii

    syslog-sign needs review
        - using rfc 3164 (timestamp, hostname, etc.)
        - need to update rfc3195 to reflect this

    Continue work on syslog-mib

    Folks may want to take a look at the [EMAIL PROTECTED]
    list, many out of scope for us, but lots of syslog stuff...


Chris: Adjourn.


Reply via email to