Transport Layer Security (TLS) Transport Mapping for Syslog
draft-ietf-syslog-transport-tls-14
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
14 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
14 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2008-10-13
|
14 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2008-10-10
|
14 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2008-10-10
|
14 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-10-10
|
14 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-10-10
|
14 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-10-09
|
14 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-10-09
|
14 | (System) | IANA Action state changed to In Progress |
2008-10-08
|
14 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2008-10-08
|
14 | Amy Vezza | IESG state changed to Approved-announcement sent |
2008-10-08
|
14 | Amy Vezza | IESG has approved the document |
2008-10-08
|
14 | Amy Vezza | Closed "Approve" ballot |
2008-10-08
|
14 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2008-10-06
|
14 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2008-10-02
|
14 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2008-10-01
|
14 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-10-01
|
14 | (System) | New version available: draft-ietf-syslog-transport-tls-14.txt |
2008-08-15
|
14 | (System) | Removed from agenda for telechat - 2008-08-14 |
2008-08-14
|
14 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
2008-08-14
|
14 | Chris Newman | [Ballot discuss] This document does not discuss how to support IDN in domain names for identity checking as required by BCP 18. I recommend … [Ballot discuss] This document does not discuss how to support IDN in domain names for identity checking as required by BCP 18. I recommend copying or referencing: draft-hodges-server-ident-check-00 for text on that topic. The current text related to wildcards could create interopreability problems. It is not clear if wildcards are permitted in the middle of domain names and what their meaning would be in that context. I also believe system operators who spend the money to purchase a wildcard certificate (which some CAs charge extra to produce) would be extremely unhappy if they could not use their purchase with syslog software. For interoperability and least astonishment purposes, shouldn't wildcard matching be mandatory-to-implement? (It's fine if it can be disabled by policy or is off-by-default). The current text does not discuss how to compare IP addresses in an interoperable fashion. I recommend referencing or copying text from: draft-hodges-server-ident-check-00 Question: did the WG consider creating (or reusing) an IANA registry for hash function ASCII names? In the event fingerprints algorithms other than "SHA1" become useful in the future it would be helpful to have such a registry for interoperability. Proxy Discuss from Lars (since he's going on vacation): Section 7.1., paragraph 1: > IANA is requested to assign a TCP port number in the range 1..1023 > in > the http://www.iana.org/assignments/port-numbers registry which will > be the default port for syslog over TLS, as defined in this document. DISCUSS: What is the justification for allocating a system port? Why wouldn't a registered port suffice? (Note that IANA is changing procedures such that system ports are becoming more difficult to obtain, because we're running out of them.) |
2008-08-14
|
14 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2008-08-14
|
14 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2008-08-14
|
14 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko |
2008-08-13
|
14 | Chris Newman | [Ballot comment] I find it to be bad design that every time we bind TLS to a particular protocol we have to duplicate lots of … [Ballot comment] I find it to be bad design that every time we bind TLS to a particular protocol we have to duplicate lots of text about server identity checks, domain name matching, etc. Often these texts vary slightly in ways that are unimportant to the underlying problem but will cause operator/administrator consternation for no technical benefit. This particular instantiation has some very good text about certificate handling that probably belongs in all the other instances of this problem, so I would strongly encourage the authors to contribute to draft-hodges-server-ident-check One thing that could be added to the certificate handling text to improve it further is a requirement to support importing new trust anchors and/or removing or disabling any built-in trust anchors. |
2008-08-13
|
14 | Chris Newman | [Ballot discuss] This document does not discuss how to support IDN in domain names for identity checking as required by BCP 18. I recommend … [Ballot discuss] This document does not discuss how to support IDN in domain names for identity checking as required by BCP 18. I recommend copying or referencing: draft-hodges-server-ident-check-00 for text on that topic. The current text related to wildcards could create interopreability problems. It is not clear if wildcards are permitted in the middle of domain names and what their meaning would be in that context. I also believe system operators who spend the money to purchase a wildcard certificate (which some CAs charge extra to produce) would be extremely unhappy if they could not use their purchase with syslog software. For interoperability and least astonishment purposes, shouldn't wildcard matching be mandatory-to-implement? (It's fine if it can be disabled by policy or is off-by-default). The current text does not discuss how to compare IP addresses in an interoperable fashion. I recommend referencing or copying text from: draft-hodges-server-ident-check-00 Question: did the WG consider creating (or reusing) an IANA registry for hash function ASCII names? In the event fingerprints algorithms other than "SHA1" become useful in the future it would be helpful to have such a registry for interoperability. |
2008-08-13
|
14 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2008-08-13
|
14 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2008-08-13
|
14 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2008-08-13
|
14 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2008-08-12
|
14 | Tim Polk | [Ballot comment] In section 5.5: s/(as described in Sections 5.2 and 5.3)/(as described in Sections 5.3 and 5.4)/ |
2008-08-12
|
14 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2008-08-11
|
14 | Lars Eggert | [Ballot discuss] Section 7.1., paragraph 1: > IANA is requested to assign a TCP port number in the range 1..1023 in > the … [Ballot discuss] Section 7.1., paragraph 1: > IANA is requested to assign a TCP port number in the range 1..1023 in > the http://www.iana.org/assignments/port-numbers registry which will > be the default port for syslog over TLS, as defined in this document. DISCUSS: What is the justification for allocating a system port? Why wouldn't a registered port suffice? (Note that IANA is changing procedures such that system ports are becoming more difficult to obtain, because we're running out of them.) |
2008-08-11
|
14 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2008-08-08
|
14 | Pasi Eronen | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Pasi Eronen |
2008-08-06
|
14 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Jürgen Schönwälder. |
2008-08-05
|
14 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-07-31
|
14 | Amanda Baber | IANA Last Call comments: Upon approval of this document, the IANA will make the following assignments in the "PORT NUMBERS" registry located at http://www.iana.org/assignments/port-numbers sub-registry … IANA Last Call comments: Upon approval of this document, the IANA will make the following assignments in the "PORT NUMBERS" registry located at http://www.iana.org/assignments/port-numbers sub-registry "WELL KNOWN PORT NUMBERS" Keyword Decimal Description References ------- ------- ----------- ---------- syslogs TBD/tcp syslog over TLS [RFC-syslog-transport-tls-13] We understand the above to be the only IANA Action for this document. |
2008-07-25
|
14 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jürgen Schönwälder |
2008-07-25
|
14 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jürgen Schönwälder |
2008-07-22
|
14 | Amy Vezza | Last call sent |
2008-07-22
|
14 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2008-07-22
|
14 | Pasi Eronen | Placed on agenda for telechat - 2008-08-14 by Pasi Eronen |
2008-07-22
|
14 | Pasi Eronen | [Ballot Position Update] New position, Yes, has been recorded for Pasi Eronen |
2008-07-22
|
14 | Pasi Eronen | Ballot has been issued by Pasi Eronen |
2008-07-22
|
14 | Pasi Eronen | Created "Approve" ballot |
2008-07-22
|
14 | Pasi Eronen | State Changes to Last Call Requested from AD Evaluation::AD Followup by Pasi Eronen |
2008-07-22
|
14 | Pasi Eronen | Last Call was requested by Pasi Eronen |
2008-07-22
|
14 | (System) | Ballot writeup text was added |
2008-07-22
|
14 | (System) | Last call text was added |
2008-07-22
|
14 | (System) | Ballot approval text was added |
2008-06-18
|
14 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2008-06-18
|
13 | (System) | New version available: draft-ietf-syslog-transport-tls-13.txt |
2008-05-28
|
14 | Pasi Eronen | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Pasi Eronen |
2008-05-07
|
12 | (System) | New version available: draft-ietf-syslog-transport-tls-12.txt |
2008-03-18
|
14 | Pasi Eronen | Responsible AD has been changed to Pasi Eronen from Sam Hartman |
2007-11-17
|
14 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-11-17
|
11 | (System) | New version available: draft-ietf-syslog-transport-tls-11.txt |
2007-07-05
|
14 | Sam Hartman | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup by Sam Hartman |
2007-05-14
|
10 | (System) | New version available: draft-ietf-syslog-transport-tls-10.txt |
2007-04-23
|
09 | (System) | New version available: draft-ietf-syslog-transport-tls-09.txt |
2007-04-20
|
08 | (System) | New version available: draft-ietf-syslog-transport-tls-08.txt |
2007-04-02
|
14 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-04-02
|
07 | (System) | New version available: draft-ietf-syslog-transport-tls-07.txt |
2007-02-13
|
14 | Sam Hartman | State Changes to AD Evaluation::Revised ID Needed from Publication Requested by Sam Hartman |
2006-12-06
|
14 | Dinara Suleymanova | PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Chris Lonvick Yes; I believe that the document is ready for publication. === (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Adequate review has occurred from WG members, and it has been reviewed by others. The reviews of the WG Last Call for this document (-03 version) may be found here: Bert Wijnen's review (not a member of the WG mailing list) http://www1.ietf.org/mail-archive/web/syslog/current/msg01244.html John Calcote's review http://www1.ietf.org/mail-archive/web/syslog/current/msg01199.html Other reviews of particular sections and concepts fill the WG mailing list. Of note is Eric Rescorla's review (of -02) http://www1.ietf.org/mail-archive/web/syslog/current/msg01100.html The issues raised in these reviews have been discussed on the mailing list and most of them were fixed in version -04. A very few minor issues were also addressed from that which resulted in version -05. A final editorial nit was corrected which resulted in version -06. I am satisfied about the level of review. === (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? I have no concerns. === (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no concerns about the technical merit of the document. === (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is strong consensus to publish this document. === (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No appeals have been threatened. === (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? === (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. There are no informational references. The document is dependant upon draft-ietf-syslog-protocol-19.txt which is being submitted along with this document. === (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggested a reasonable name for the new registry? See [I-D.narten-iana-considerations-rfc2434bis]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document IANA section is complete. No registries are requested. === (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The ABNF in the document has been verified through http://www.apps.ietf.org/abnf.html === (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Writeup? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This document describes the use of Transport Layer Security (TLS) to provide a secure connection for the transport of syslog messages. This document describes the security threats to Syslog and how TLS can be used to counter such threats. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? There was controversy around the IPR statement from Huawei from this document. The Working Group examined the issue and came to consensus that the statement would be accepted. There was some controversy around the use of a special character to denote the end of the payload, or a counter at the start of the payload to indicate the length of the payload. The Working Group has consent that a counter is the best mechanism. There was also some controversy about the use of a dedicated port for this initial version of syslog over TLS. The consensus was that a dedicated port should be requested and that there should be no indication of version. The consequence of this is that any future change to the mapping of syslog over TLS, which is considered very unlikely, might require a different port number. This lack of a version number in the mapping of the application protocol to a transport is consistent in how syslog is mapped to UDP, and is also consistent with similar mappings of ISMS and netconf. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This protocol has very similar characteristics to implementations of syslog over ssl that are available at this time. Members of the Working Group have noted that it should be a very small change to bring those implementations in line with this specification. No vendors have announced that they will utilize this protocol. Some vendors have indicated interest in supporting this document. A group of university researchers have implemented this protocol and found that it is practicable. Another member of the WG has indicated that he is currently implementing the protocol as well. The above named reviewers did an outstanding and thorough job. Personnel Who is the Document Shepherd for this document? Who is the Responsible Area Director? [Area] SECURITY [WG] syslog [I-D] draft-ietf-syslog-transport-tls-06.txt [Qver] draft-ietf-proto-wgchair-doc-shepherding-08.txt [Shep] Chris Lonvick [AD] Sam Hartman === |
2006-12-06
|
14 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2006-12-04
|
06 | (System) | New version available: draft-ietf-syslog-transport-tls-06.txt |
2006-11-29
|
05 | (System) | New version available: draft-ietf-syslog-transport-tls-05.txt |
2006-11-26
|
04 | (System) | New version available: draft-ietf-syslog-transport-tls-04.txt |
2006-11-21
|
(System) | Posted related IPR disclosure: HUAWEI TECHNOLOGIES CO.,LTD's statement about IPR claimed in draft-ietf-syslog-transport-tls-03.txt | |
2006-08-29
|
03 | (System) | New version available: draft-ietf-syslog-transport-tls-03.txt |
2006-06-20
|
(System) | Posted related IPR disclosure: HUAWEI TECHNOLOGIES CO.,LTD's statement about IPR claimed in draft-ietf-syslog-transport-tls-02.txt | |
2006-06-07
|
02 | (System) | New version available: draft-ietf-syslog-transport-tls-02.txt |
2006-06-06
|
(System) | Posted related IPR disclosure: HUAWEI TECHNOLOGIES CO.,LTD's statement about IPR claimed in draft-ietf-syslog-transport-tls-01.txt | |
2006-05-24
|
(System) | Posted related IPR disclosure: HUAWEI TECHNOLOGIES CO.,LTD's statement about IPR claimed in draft-ietf-syslog-transport-tls-01.txt | |
2006-05-08
|
01 | (System) | New version available: draft-ietf-syslog-transport-tls-01.txt |
2006-03-27
|
00 | (System) | New version available: draft-ietf-syslog-transport-tls-00.txt |