[logs] Re: FW: [Syslog] WG Review: Recharter of Security Issues in Network Event Logging (syslog)

From: ross.patterson@private
Date: Fri Mar 10 2006 - 12:06:40 PST


For comparison purposes, the current charter is more focused on the 
existing Syslog protocol:

Description of Working Group:
Syslog is a de-facto standard for logging system events. However, the
protocol component of this event logging system has not been formally
documented. While the protocol has been very useful and scalable, it
has some known but undocumented security problems. For instance, the
messages are unauthenticated and there is no mechanism to provide
verified delivery and message integrity.

The goal of this working group is to document and address the security
and integrity problems of the existing Syslog mechanism. In order to
accomplish this task we will document the existing protocol. The 
working
group will also explore and develop a standard to address the security
problems.

Beyond documenting the Syslog protocol and its problems, the working
group will work on ways to secure the Syslog protocol. At a minimum
this group will address providing authenticity, integrity and
confidentiality of Syslog messages as they traverse the network. The
belief being that we can provide mechanisms that can be utilized in
existing programs with few modifications to the protocol while
providing significant security enhancements.

Goals and Milestones:
Done            Post as an Internet Draft the observed behavior of the 
Syslog protocol for consideration as an Informational Document. 
Done            Submit Syslog protocol document to IESG for consideration 
as an INFORMATIONAL RFC. 
Done            Post as an Internet Draft the specification for an 
authenticated Syslog for consideration as a Standards Track RFC. 
Done            Post an Internet Draft describing enhancements to the 
Syslog authentication protocol to add verification of delivery and other 
security services. 
Done            Submit Syslog Authentication Protocol Enhancement to IESG 
for consideration as a PROPOSED STANDARD. 
Oct 2004                Submit Syslog Internationalization to IESG for 
consideration as a PROPOSED STANDARD. 
Mar 2005                Submit Syslog Protocol to IESG for consideration 
as a PROPOSEDSTANDARD 
Mar 2005                Submit Syslog Transport Mapping to IESG for 
consideration as a PROPOSED STANDARD. 
Jun 2005                Submit Syslog Device MIB to IESG for consideration 
as a PROPOSED STANDARD 
Jul 2005                Submit Syslog Authentication Protocol to IESG for 
consideration as a PROPOSED STANDARD. 
Apr 2006                Revise drafts as necessary to advance these 
Internet-Drafts to Standards Track RFCs. 

Internet-Drafts:
Signed syslog Messages (64948 bytes)
Syslog Management Information Base (51076 bytes)
The syslog Protocol (82950 bytes)
Transmission of syslog messages over UDP (21705 bytes)

Request For Comments:
The BSD Syslog Protocol (RFC 3164) (72951 bytes) 
Reliable Delivery for Syslog (RFC 3195) (60960 bytes)

(http://www.ietf.org/html.charters/syslog-charter.html)
--
Ross A. Patterson
Manager of Engineering
phone: +1 703-547-3581
email: Ross.Patterson@private
Consul risk management
http://www.consul.com
2121 Cooperative Way, Suite 250
Herndon, VA  20171
USA



"Rainer Gerhards" <rgerhards@private> 
Sent by: loganalysis-bounces+ross.patterson=consul.com@private
03/10/2006 01:56

To
<loganalysis@private>
cc

Subject
[logs] FW: [Syslog] WG Review: Recharter of Security Issues in  Network 
Event Logging (syslog)






Hi all,

I am forwarding a syslog-related message from the IETF to this group. I
am doing so because I assume there is some interest in the evolution of
syslog. Please note that you can comment to the IESG (IETF) if you have
an opinion on the topic. For details, please see below.

Best regards,
Rainer 

> -----Original Message-----
> From: IESG Secretary [mailto:iesg-secretary@private] 
> Sent: Friday, March 10, 2006 12:58 AM
> To: IETF Announcement list
> Cc: syslog@private
> Subject: [Syslog] WG Review: Recharter of Security Issues in 
> Network Event Logging (syslog) 
> 
> A modified charter has been submitted for the Security Issues 
> in Network Event
> Logging (syslog)working group in the Security Area of the IETF. 
> The IESG has not made any determination as yet. The modified 
> charter is provided
> below for informational purposes only. Please send your 
> comments to the IESG
> mailing list (iesg@private) by March 15th.
> 
> The IESG solicits feedback from those considering 
> implementing or deploying
> syslog on the following charter. In particular, the concern 
> has been raised that
> insufficient vendors will implement a new syslog protocol and 
> insufficient
> operators will deploy it. The IESG requests those who support 
> this effort to
> explicitly indicate their support.
> If significant community support is not indicated, this work 
> will not be
> chartered.
> 
> +++
> 
> Security Issues in Network Event Logging (syslog) 
> ====================================
> 
> Current Status: Active Working Group
> 
> Chair(s):
> Chris Lonvick <clonvick@private>
> 
> Security Area Director(s):
> Russ Housley <housley@private>
> Sam Hartman <hartmans-ietf@private>
> 
> Security Area Advisor:
> Sam Hartman <hartmans-ietf@private>
> 
> Mailing Lists:
> 
> General Discussion: syslog@private
> To Subscribe: syslog-request@private
> In Body: in body: (un)subscribe
> Archive: ftp://ftp.ietf.org/ietf-mail-archive/syslog/
> 
> Description of Working Group:
> 
> Syslog is a de-facto standard for logging system events. 
> However, the protocol
> component of this event logging system has not been formally 
> documented. While
> the protocol has been very useful and scalable, it has some 
> known security
> problems which were documented in the INFORMATIONAL RFC 3164.
> 
> The goal of this working group is to address the security and 
> integrity
> problems, and to standardize the syslog protocol, transport, 
> and a select set of
> mechanisms in a manner that considers the ease of migration 
> between and the
> co-existence of existing versions and the standard.
> 
> Reviews have shown that there are very few similarities 
> between the message
> formats generated by heterogeneous systems. In fact, the only 
> consistent
> commonality between messages is that all of them contain the 
> <PRI> at the start.
> Additional testing has shown that as long as the <PRI> is 
> present in a syslog
> message, all tested receivers will accept any generated 
> message as a valid
> syslog message. In designing a standard syslog message 
> format, this Working
> Group will retain the <PRI> at the start of the message and 
> will introduce
> protocol versioning. Along these same lines, many different 
> charsets have been
> used in syslog messages observed in the wild but no 
> indication of the charset
> has been given in any message. The Working Group also feels 
> that multiple
> charsets will not be beneficial to the community; much code 
> would be needed to
> distinguish and interpret different charsets.
> For compatibility with existing implementations, the Working 
> Group will allow
> that messages may still be sent that do not indicate the charset used.
> However, the Working Group will recommend that messages 
> contain a way to
> identify the charset used for the message, and will also 
> recommend a single
> default charset.
> 
> syslog has traditionally been transported over UDP and this 
> WG has already
> defined RFC 3195 for the reliable transport for the syslog 
> messages. The WG will
> separate the UDP transport from the protocol so that others may define
> additional transports in the future.
> 
> The threats that this WG will primarily address are 
> modification, disclosure,
> and masquerading. A secondary threat is message stream 
> modification. Threats
> that will not be addressed by this WG are DoS and traffic 
> analysis. The primary
> attacks may be thwarted by a secure transport. However, it 
> must be remembered
> that a great deal of the success of syslog has been 
> attributed to its ease of
> implementation and relatively low maintenance level. The 
> Working Group will
> consider those factors, as well as current implementations, 
> when deciding upon a
> secure transport. The secondary threat of message stream 
> modification can be
> addressed by a mechanism that will verify the end-to-end 
> integrity and sequence
> of messages. The Working Group feels that these aspects may 
> be addressed by a
> dissociated signature upon sent messages.
> 
> - A document will be produced that describes a standardized 
> syslog protocol.
> A mechanism will also be defined in this document that will 
> provide a means to
> convey structured data.
> 
> - A document will be produced that describes a standardized 
> UDP transport for
> syslog.
> 
> - A document will be produced that requires a secure 
> transport for the delivery
> of syslog messages.
> 
> - A document will be produced to describe the MIB for syslog entities.
> 
> - A document will be produced that describes a standardized 
> mechanism to sign
> syslog messages to provide integrity checking and source 
> authentication.
> 
> 
> Milestones:
> 
> Nov 2006 Submit Syslog Protocol to the IESG for consideration 
> as a PROPOSED
> STANDARD.
> Nov 2006 Submit Syslog UDP Transport Mapping to the IESG for 
> consideration as a
> PROPOSED STANDARD.
> Nov 2006 Submit Syslog TLS Transport Mapping to the IESG for 
> consideration as a
> PROPOSED STANDARD.
> Nov 2006 Submit Syslog Device MIB to IESG for consideration 
> as a PROPOSED
> STANDARD.
> Nov 2006 Submit a document that defines a message signing and 
> ordering mechanism
> to the IESG for consideration as a PROPOSED STANDARD
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> Syslog mailing list
> Syslog@private
> https://www1.ietf.org/mailman/listinfo/syslog
> 
_______________________________________________
LogAnalysis mailing list
LogAnalysis@private
http://lists.shmoo.com/mailman/listinfo/loganalysis




_______________________________________________
LogAnalysis mailing list
LogAnalysis@private
http://lists.shmoo.com/mailman/listinfo/loganalysis



This archive was generated by hypermail 2.1.3 : Fri Mar 10 2006 - 22:42:53 PST