Date: Wed, 31 May 2000 11:11:43 -0400 (EDT) From: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> To: security@FreeBSD.org Subject: [The IESG: WG ACTION: Security Issues in Network Ev] Message-ID: <200005311511.LAA33903@khavrinen.lcs.mit.edu>
next in thread | raw e-mail | index | archive | help
------- start of forwarded message (RFC 934 encapsulation) -------
Message-Id: <200005311105.HAA03289@ietf.org>
From: The IESG <iesg-secretary@ietf.org>
Sender: scoya@cnri.reston.va.us
To: IETF-Announce: ;
Subject: WG ACTION: Security Issues in Network Event Logging (syslog)
Date: Wed, 31 May 2000 07:05:06 -0400
A new working group has been formed in the Security Area of the IETF.
For additional information, contact the Area Directors
or the WG Chair.
Security Issues in Network Event Logging (syslog)
- -------------------------------------------------
Current Status: Active Working Group
Chair(s):
Chris Lonvick <clonvick@cisco.com>
Security Area Director(s):
Jeffrey Schiller <jis@mit.edu>
Marcus Leech <mleech@nortelnetworks.com>
Security Area Advisor:
Jeffrey Schiller <jis@mit.edu>
Mailing Lists:
General Discussion:syslog-sec@employees.org
To Subscribe: majordomo@employees.org
In Body: subscribe syslog-sec your_email_address
Archive: http://www.mail-archive.com/syslog-sec@employees.org/
Description of Working Group:
Syslog is a de-facto standard for logging system events. However, the
protocol component of this event logging system has not been formally
documented. While the protocol has been very useful and scalable, it
has some known but undocumented security problems. For instance, the
messages are unauthenticated and there is no mechanism to provide
verified delivery and message integrity.
The goal of this working group is to document and address the security
and integrity problems of the existing Syslog mechanism. In order to
accomplish this task we will document the existing protocol. The
working
group will also explore and develop a standard to address the security
problems.
Beyond documenting the Syslog protocol and its problems, the working
group will work on ways to secure the Syslog protocol. At a minimum
this group will address providing authenticity, integrity and
confidentiality of Syslog messages as they traverse the network. The
belief being that we can provide mechanisms that can be utilized in
existing programs with few modifications to the protocol while
providing significant security enhancements.
Goals and Milestones:
May 00 Post as an Internet Draft the observed behavior of the Syslog
protocol for consideration as an Informational Document.
Jun 00 Submit Syslog protocol document to IESG for consideration as an
INFORMATIONAL RFC.
Jul 00 Post as an Internet Draft the specification for an
authenticated Syslog for consideration as a Standards Track
RFC.
Aug 00 Submit Syslog Authentication Protocol to IESG for consideration
as a PROPOSED STANDARD.
Sep 00 Post an Internet Draft describing enhancements to the Syslog
authentication protocol to add verification of delivery and
other security services.
Oct 00 Submit Syslog Authentication Protocol Enhancement to IESG for
consideration as a PROPOSED STANDARD.
Dec 00 Revise drafts as necessary to advance these Internet-Drafts to
Standards Track RFCs.
------- end -------
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200005311511.LAA33903>
