My observation about ciphersuite:
1, TLS wg can do a better job on ciphersuite selection than a profile
developer. 
2, TLS specification will be updated if the mandatory cipher is too weak to
provide appropriate protection, but profile-specific suite may not be
updated accordingly. 
3, Before TLS mandate a stronger cipher suite, TLS_RSA_WITH_3DES_EDE_CBC_SHA
is strong enough for most syslog application. If a operator want a stronger
cipher suite for highly sensitive syslog application, he still has the
freedom to specify one, mandatory cipher suite is only MUST to implementer
rather than operator. 

So, my view is ciphersuite is not neccessary to be defined in this
specification, and it is not good to specify in this specification. 

Thanks,
Miao
> >
> > Tom and I discussed this issue on the mailing list. TLS 
> protocol has 
> > its mandatory suite (TLS_RSA_WITH_3DES_EDE_CBC_SHA), and TLS 
> > specification says that if application profile(syslog-tls in this 
> > case) does not specify a mandatory cipher suite, TLS 
> mandatory suite 
> > will apply. So, no need to specify one in this specification.
> 
> Ahh... that was the message I did not find in the archive. 
> Thanks for bringing it up again. That obiously solves the 
> interop problem. However, I am still of the view that we 
> should advise operators to use strong suites in the security 
> considerations section.
> 
> <tp>
> 
> I raised it because I wanted a cipher suite spelt out in the 
> I-D rather then leaving it as an exercise in ingenuity for 
> the reader to find where it is specified.  The pro and con of 
> not specifying it in our I-D is that as the views in the 
> security community change (and some would regard the default 
> as too weak - eg US government) so the mandatory to implement 
> is changed for us without us noticing.
> 
> Tom Petch
> 
> ___



_______________________________________________
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to