In his/her message, Balazs Scheidler wrote:
>From [EMAIL PROTECTED]  Tue Jul 18 19:15:54 2000
>Subject: Re: Updated Draft - Security Considerations comments solicited

[Charset iso-8859-2 unsupported, skipping...]

> 1 implement authentication, protection at the network layer (IPSec)
> 2 implement authentication, protection at the transport layer (SSL, SSH)
> 3 implement authentication, protection at the application layer, in our
>   protocol

     Logging is handling datas. We need integrity and authentication.
 So I think that the right place to implement authentication and protection
 is at the data layer. An XML data format and XML signatures is the obvious
 candidate : http://njlug.rutgers.edu/projects/syslog/xml-log-1.txt.

     The working charter does not allow us to standardize the data format.
 I believe that this is a mistake to standardize a new syslog protocol
 without standardizing the data format, because the key purpose of
 logging is the logging information.

     Use of #1 or #2 for another security purpose and for confidentiality,
 network or transport layer, is complementary.

         HERVE

Reply via email to