The Syslog Protocol
RFC 5424
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-12-20
|
23 | (System) | Received changes through RFC Editor sync (changed abstract to 'This document describes the syslog protocol, which is used to convey event notification messages. This protocol … Received changes through RFC Editor sync (changed abstract to 'This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way. This document has been written with the original design goals for traditional syslog in mind. The need for a new layered specification has arisen because standardization efforts for reliable and secure syslog extensions suffer from the lack of a Standards-Track and transport-independent RFC. Without this document, each other standard needs to define its own syslog packet format and transport mechanism, which over time will introduce subtle compatibility issues. This document tries to provide a foundation that syslog extensions can build on. This layered architecture approach also provides a solid basis that allows code to be written once for each syslog feature rather than once for each transport. [STANDARDS-TRACK]') |
2015-10-14
|
23 | (System) | Notify list changed from syslog-chairs@ietf.org to (None) |
2012-08-22
|
23 | (System) | post-migration administrative database adjustment to the No Objection position for Cullen Jennings |
2012-08-22
|
23 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
23 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
23 | (System) | post-migration administrative database adjustment to the No Objection position for Magnus Westerlund |
2012-08-22
|
23 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
2009-03-10
|
23 | (System) | This was part of a ballot set with: draft-ietf-syslog-transport-udp |
2009-03-10
|
23 | Cindy Morgan | [Note]: 'RFC 5426; RFC 5424' added by Cindy Morgan |
2009-03-10
|
23 | Cindy Morgan | State Changes to RFC Published from RFC Ed Queue by Cindy Morgan |
2009-03-10
|
23 | Cindy Morgan | [Note]: 'RFC 5426' added by Cindy Morgan |
2009-03-10
|
23 | (System) | RFC published |
2007-09-14
|
23 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2007-09-14
|
23 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2007-09-14
|
23 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-09-13
|
23 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-09-13
|
23 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-09-13
|
23 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-09-12
|
23 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-09-11
|
23 | (System) | IANA Action state changed to In Progress |
2007-09-11
|
23 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-09-11
|
23 | Amy Vezza | IESG has approved the document |
2007-09-11
|
23 | Amy Vezza | Closed "Approve" ballot |
2007-09-11
|
23 | Sam Hartman | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Sam Hartman |
2007-09-07
|
23 | Sam Hartman | Changes between protocol 21 and 23 appear to break utf-8 security; sent question to WG and IESG |
2007-09-07
|
23 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk |
2007-09-07
|
23 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
2007-09-06
|
23 | (System) | New version available: draft-ietf-syslog-protocol-23.txt |
2007-09-03
|
23 | Magnus Westerlund | [Ballot comment] The remaining discuss issues I have, will be handled by Lars Eggert. |
2007-09-03
|
23 | Magnus Westerlund | [Ballot Position Update] Position for Magnus Westerlund has been changed to No Objection from Discuss by Magnus Westerlund |
2007-08-24
|
23 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-08-24
|
22 | (System) | New version available: draft-ietf-syslog-protocol-22.txt |
2007-06-22
|
23 | (System) | Removed from agenda for telechat - 2007-06-21 |
2007-06-21
|
23 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2007-06-21
|
23 | Lars Eggert | [Ballot discuss] Given the issues that the UDP transport has with congestion control, security and fragmentation, I'd like the document to recommend the TLS-based transport … [Ballot discuss] Given the issues that the UDP transport has with congestion control, security and fragmentation, I'd like the document to recommend the TLS-based transport over the UDP-based one for general use, i.e., when the network is not specifically provisioned for this type of traffic. draft-ietf-syslog-protocol-21, Section 5., paragraph 2: > If a syslog application is running on a machine > that has both statically and dynamically assigned addresses, then > that value SHOULD be from the statically assigned addresses. As an > alternative, the syslog application MAY use the IP address of the > interface that is used to send the message. DISCUSS: So if a machine has only a dynamic address, it should instead use 127.0.0.1 in syslog messages, because that's statically assigned? That doesn't seem to make sense. Also, in practice, it will be difficult for the syslog sender to determine which addresses are statically or dynamically assigned (think MobileIP or even HIP). draft-ietf-syslog-transport-udp-09, Section 65535, paragraph 0: > This transport mapping supports transmission of syslog messages up to > 65535 octets in size. This limit stems from the maximum supported > UDP payload of 65535 octets specified in the RFC 768 [1]. DISCUSS: The RFC768 length field includes the UDP header, so the permitted payload size is 65535 minus the UDP header (and for IPv4, minus the IP header, because IPv4 has a 16-bit length field that also includes the header length.) |
2007-06-21
|
23 | Cullen Jennings | [Ballot discuss] . |
2007-06-21
|
23 | Cullen Jennings | [Ballot discuss] |
2007-06-21
|
23 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings |
2007-06-21
|
23 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2007-06-21
|
23 | Chris Newman | [Ballot comment] * When UTF-8 is not used, this protocol does not interoperate absent manual configuration on both client and server to align the … [Ballot comment] * When UTF-8 is not used, this protocol does not interoperate absent manual configuration on both client and server to align the charset. The document should state this clearly. I'm aware of the charset support history in Unix so I understand this is a necessary nod for backwards compatibility but the document should make it clear this * The protocol would be simpler if the UTF-8 BOM was never used. Use of the UTF-8 BOM in this protocol simply changes two cases (UTF-8 or unknown charset) into three cases (UTF-8 with BOM, UTF-8 without BOM, or unknown charset). This makes the protocol more complex than necessary, reduces interoperability and potentially reduces security. A receiver could simply apply the UTF8-octets ABNF rule to the received data and if it complies assume the data is UTF-8 unless an explicit in-band or out-of-band label states otherwise. * This text doesn't make sense: If a syslog application is processing a MSG starting with a BOM, then it MUST be interpreted as being encoded in UTF-8 for the reasons outlined in UNICODE TR36 [UNICODE-TR36], section 3.1. Correct text would say: Even when a MSG starts with a UTF-8 BOM, if it contains UTF-8 that is not shortest form it MUST NOT be interpreted as being encoded in UTF-8 for the reasons outlined in UNICODE TR36 [UNICODE-TR36], section 3.1. Note that the sense of the text in the document is exactly backwards from the security requirement, and this mistake is probably the result of the additional complexity caused by unnecessary use of the BOM. Note that UNICODE TR36 never mentions the BOM. * The ABNF for UTF-8-STRING should simply reference the UTF8-octets production from RFC 3629 which already mandates shortest form. * The ABNF would be shorter if it referenced the date-time production from RFC 3339 instead of embedding a copy of the ABNF. For example: TIMESTAMP = NILVALUE / date-time ; date-time is as defined in [RFC3339] and with ; additional restrictions discussed in section 6.2.3. |
2007-06-21
|
23 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2007-06-21
|
23 | Chris Newman | [Ballot discuss] This is a talk about on the call then clear DISCUSS. draft-ietf-syslog-protocol has a normative reference to draft-ietf-syslog-transport-tls. Should we hold approval for … [Ballot discuss] This is a talk about on the call then clear DISCUSS. draft-ietf-syslog-protocol has a normative reference to draft-ietf-syslog-transport-tls. Should we hold approval for the latter, or let the RFC editor hold publication until the latter is ready? |
2007-06-21
|
23 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2007-06-21
|
23 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-06-21
|
23 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2007-06-21
|
23 | Jari Arkko | [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko |
2007-06-21
|
23 | Jari Arkko | [Ballot comment] -udp, Section 1, 1st paragraph: Please remove the word "formally" -- it sounds like you are claiming there's a formal definition of SYSLOG, … [Ballot comment] -udp, Section 1, 1st paragraph: Please remove the word "formally" -- it sounds like you are claiming there's a formal definition of SYSLOG, whereas you only mean that the IETF has officially sanctioned this now as a Proposed Standard. Same issue in -protocol, Appendix A.1. |
2007-06-20
|
23 | Cullen Jennings | [Ballot discuss] Would there be a way to have at least the option of having some security and some congestion control? What is our bar … [Ballot discuss] Would there be a way to have at least the option of having some security and some congestion control? What is our bar for standards today? I plan to remove this discuss once we have talked about it - I think it is likely covered by other people discusses. |
2007-06-20
|
23 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
2007-06-20
|
23 | Lars Eggert | [Ballot comment] draft-ietf-syslog-protocol-21, Section 1., paragraph 5: > This document obsoletes RFC3164, which is only an Informational > document describing some … [Ballot comment] draft-ietf-syslog-protocol-21, Section 1., paragraph 5: > This document obsoletes RFC3164, which is only an Informational > document describing some implementations found in the field. Some > vendors market their products as compliant to RFC3164, but RFC3164 > does not define a standard. Hopefully, declaring RFC3164 obsolete > will reduce associated bogus marketing claims. Suggest to cut the commentary, i.e., cut the last two sentences of this paragraph. draft-ietf-syslog-protocol-21, Section 8.5., paragraph 2: > It may be desirable to use a transport with guaranteed delivery to > mitigate congestion. Reliable delivery and congestion control are orthogonal features. A reliable transport will not necessarily have congestion control, and vice versa. draft-ietf-syslog-protocol-21, Section 8.5., paragraph 3: > It may also be desirable to include rate-limiting features in syslog > originators and relays. This can reduce potential congestion > problems when message bursts happen. This is too weak a statement on congestion control. See DISCUSS above. draft-ietf-syslog-protocol-21, Section 8.5., paragraph 4: > Reliable delivery may not always be desirable. Reliable delivery > means that the syslog originator or relay must block when the relay > or collector is not able to accept any more messages. In some > operating systems, namely Unix/Linux, the syslog originator or relay > runs inside a high-priority system process (syslogd). If that > process blocks, the system at large comes to a stand-still. The same > occurs if there is a deadlock situation between syslogd and e.g. the > DNS server. This paragraph is inaccurate. One, I'm not aware of any OS that doesn't offer non-blocking I/O. Two, even if "a high-priority system process (syslogd)" would block for I/O, the system does NOT come to a stand-still. It's a user space daemon, not kernel code. draft-ietf-syslog-protocol-21, Section 8.9., paragraph 1: > As shown in Diagram 2, machines may be configured to relay syslog > messages to subsequent relays before reaching a collector. In one > particular case, an administrator found that he had mistakenly > configured two relays to forward messages with certain SEVERITY > values to each other. When either of these machines either received > or generated that type of message, it would forward it to the other > relay. That relay would, in turn, forward it back. This cycle did > cause degradation to the intervening network as well as to the > processing availability on the two devices. Network administrators > must take care not to cause such a death spiral. A sequence number or - even better - a hop count in the message would allow breaking such loops. draft-ietf-syslog-protocol-21, Section 8.10., paragraph 2: > Administrators and network planners must also critically review the > network paths between the originators, the relays, and the > collectors. Generated syslog messages should not overwhelm any of > the network links. Given that syslog can generate unlimited amounts of traffic, no level of critical review will guarantee that syslog won't overload the path. draft-ietf-syslog-protocol-21, Section 8.10., paragraph 3: > In order to reduce the impact of this issue, using transports with > guaranteed delivery is recommended. Again, reliability != congestion control. draft-ietf-syslog-transport-udp-09, Section 3.6., paragraph 2: > It is RECOMMENDED that syslog senders use valid UDP checksums when > sending messages over IPv4 and IPv6. Agree with Tim's DISCUSS - this language weakens the MUST for IPv6. draft-ietf-syslog-transport-udp-09, Section 4.3., paragraph 0: > 4.3. Congestion Control Fully agree with Magnus' DISCUSS. draft-ietf-syslog-transport-udp-09, Section 4.4., paragraph 1: > The order of > syslog message arrival via this transport SHOULD NOT be used as an > authoritative guide in establishing an absolute or relative sequence > of events on the syslog sender hosts. Better make this a MUST NOT. Also, IP packets can become duplicated and delivered multiple times, which should also be discussed in this section. |
2007-06-20
|
23 | Lars Eggert | [Ballot discuss] draft-ietf-syslog-protocol-21, Section 5., paragraph 1: > The first transport is defined in [RFCXXXX] and is > consistent with the traditional … [Ballot discuss] draft-ietf-syslog-protocol-21, Section 5., paragraph 1: > The first transport is defined in [RFCXXXX] and is > consistent with the traditional UDP transport. This transport is > mandatory to implement for compliance to the standard to support > interoperability as the UDP transport has historically been used for > the transmission of syslog messages. DISCUSS: Above, the document has argued that the Informational RFC3164 wasn't really a standard. Now it argues that a UDP transport - which currently has very problematic features (see Magnus' DISCUSS) - is mandatory to implement, because UDP has historically been used to transport syslog messages. I have serious concerns with an IETF standards-track recommendation where the only mandatory-to-implement transport doesn't have any congestion control. I don't buy the argument made below that going with UDP provides a "non-disruptive transition path" for existing implementations, because they need to be modified anyway to implement the new message format. Switching to a different transport protocol should be a comparatively small change. There are several ways forward: One, add some congestion control to the UDP-based transport (I think Magnus' DISCUSS has some pointers.) Two, define a second mandatory-to-implement transport that has congestion control (ideally, I'd like to see that one being recommended and the UDP-based transport being recommended against.) draft-ietf-syslog-protocol-21, Section 5., paragraph 2: > If a syslog application is running on a machine > that has both statically and dynamically assigned addresses, then > that value SHOULD be from the statically assigned addresses. As an > alternative, the syslog application MAY use the IP address of the > interface that is used to send the message. DISCUSS: So if a machine has only a dynamic address, it should instead use 127.0.0.1 in syslog messages, because that's statically assigned? That doesn't seem to make sense. Also, in practice, it will be difficult for the syslog sender to determine which addresses are statically or dynamically assigned (think MobileIP or even HIP). draft-ietf-syslog-transport-udp-09, Section 65535, paragraph 0: > This transport mapping supports transmission of syslog messages up to > 65535 octets in size. This limit stems from the maximum supported > UDP payload of 65535 octets specified in the RFC 768 [1]. DISCUSS: The RFC768 length field includes the UDP header, so the permitted payload size is 65535 minus the UDP header (and for IPv4, minus the IP header, because IPv4 has a 16-bit length field that also includes the header length.) |
2007-06-20
|
23 | Lars Eggert | [Ballot discuss] draft-ietf-syslog-protocol-21, Section 5., paragraph 1: > This document does not specify any transport layer protocol. > Instead, it describes the … [Ballot discuss] draft-ietf-syslog-protocol-21, Section 5., paragraph 1: > This document does not specify any transport layer protocol. > Instead, it describes the format of a syslog message in a transport > layer independent way. Syslog transports are defined in other > documents. The first transport is defined in [RFCXXXX] and is > consistent with the traditional UDP transport. This transport is > mandatory to implement for compliance to the standard to support > interoperability as the UDP transport has historically been used for > the transmission of syslog messages. DISCUSS: Above, the document has argued that the Informational RFC3164 wasn't really a standard. Now it argues that a UDP transport - which currently has very problematic features (see Magnus' DISCUSS) - is mandatory to implement, because UDP has historically been used to transport syslog messages. I have serious concerns with an IETF standards-track recommendation where the only mandatory-to-implement transport doesn't have any congestion control. I don't buy the argument made below that going with UDP provides a "non-disruptive transition path" for existing implementations, because they need to be modified anyway to implement the new message format. Switching to a different transport protocol should be a comparatively small change. There are several ways forward: One, add some congestion control to the UDP-based transport (I think Magnus' DISCUSS has some pointers.) Two, define a second mandatory-to-implement transport that has congestion control (ideally, I'd like to see that one being recommended and the UDP-based transport being recommended against.) draft-ietf-syslog-protocol-21, Section 5., paragraph 2: > If a syslog application is running on a machine > that has both statically and dynamically assigned addresses, then > that value SHOULD be from the statically assigned addresses. As an > alternative, the syslog application MAY use the IP address of the > interface that is used to send the message. DISCUSS: So if a machine has only a dynamic address, it should instead use 127.0.0.1 in syslog messages, because that's statically assigned? That doesn't seem to make sense. Also, in practice, it will be difficult for the syslog sender to determine which addresses are statically or dynamically assigned (think MobileIP or even HIP). draft-ietf-syslog-transport-udp-09, Section 65535, paragraph 0: > This transport mapping supports transmission of syslog messages up to > 65535 octets in size. This limit stems from the maximum supported > UDP payload of 65535 octets specified in the RFC 768 [1]. DISCUSS: The RFC768 length field includes the UDP header, so the permitted payload size is 65535 minus the UDP header (and for IPv4, minus the IP header, because IPv4 has a 16-bit length field that also includes the header length.) |
2007-06-20
|
23 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
2007-06-19
|
23 | Ron Bonica | [Ballot comment] In Section 6.2.3, wouldn't it be better to record the time as number of units from the beginning of an epoch. This would … [Ballot comment] In Section 6.2.3, wouldn't it be better to record the time as number of units from the beginning of an epoch. This would make timezones irrelevant to the sender. |
2007-06-19
|
23 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2007-06-19
|
23 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2007-06-19
|
23 | Ron Bonica | [Ballot Position Update] New position, Yes, has been recorded by Ron Bonica |
2007-06-19
|
23 | Magnus Westerlund | [Ballot discuss] UDP transport: Section 3.6: It is RECOMMENDED that syslog senders use valid UDP checksums when sending messages over IPv4 and IPv6. … [Ballot discuss] UDP transport: Section 3.6: It is RECOMMENDED that syslog senders use valid UDP checksums when sending messages over IPv4 and IPv6. It is RECOMMENDED that syslog receivers check the checksums whenever they are present (i.e. the UDP header checksum field value is not 0) and discard messages with incorrect checksums. Note that this is typically accomplished by the UDP layer implementation, and some UDP implementations allow for checksum validation to be enabled or disabled. Why isn't these MUST? For IPv6 it is an MUST and for IPv4 does there exist a single reason not to use the UDP checksum? Section 4.3: 4.3. Congestion Control The UDP does not provide for congestion control. Any network host or router can discard UDP packets when it is overloaded. One or multiple syslog senders can maliciously or inadvertently overload the receiver or the network infrastructure and cause loss of syslog messages. If the potentially unrestricted use of syslog data being transferred over UDP in a particular deployment can saturate the link, then the network path should be provisioned so the offered load (including syslog packets) does not exceed the path capacity. Otherwise, some of the syslog packets could be lost, or cause the loss of other UDP packets. The language in this section needs some corrections. First of all a SYSLOG sender over utilizing the network may cause congestion events. These affect any IP packet sharing the path with the SYSLOG traffic. But what I think is needed here is some clear and normative requirement on how to avoid and limit congestion. First of all I would like to see a restriction on the applicability of this transport to within a controlled environment unless the rate is capped to a level that is TCP friendly or the full path is provisioned to handle the traffic. There should also be a discussion on how one rate limits SYSLOG traffic. If any higher rates of packets are to be sent over best effort networks then a feedback mechanism is needed. That would probably need to include forward path UDP packetization layer with sequence number to enable loss detection. Complemented with feedback traffic to enable rate control of outgoing traffic. That could also resolve the PMTUD issue. |
2007-06-19
|
23 | Magnus Westerlund | [Ballot Position Update] New position, Discuss, has been recorded by Magnus Westerlund |
2007-06-19
|
23 | Tim Polk | [Ballot discuss] In syslog-transport-udp-09, Section 3.6 (UDP Checksums): The second and third paragraphs could be read as relaxing the requirements (specified in RFC 2460) … [Ballot discuss] In syslog-transport-udp-09, Section 3.6 (UDP Checksums): The second and third paragraphs could be read as relaxing the requirements (specified in RFC 2460) for IPv6 nodes to generate and verify UDP checksums. It would be clearer if the text described the recommendations for IPv4 independently, and then noted the requirements inherited from RFC 2460 with respect to IPv6. |
2007-06-19
|
23 | Tim Polk | [Ballot discuss] Section 3.6. UDP Checksums: The second and third paragraphs could be read as relaxing the requirements (specified in RFC 2460) for IPv6 … [Ballot discuss] Section 3.6. UDP Checksums: The second and third paragraphs could be read as relaxing the requirements (specified in RFC 2460) for IPv6 nodes to generate and verify UDP checksums. It would be clearer if the text described the recommendations for IPv4 independently, and then noted the requirements inherited from RFC 2460 with respect to IPv6. |
2007-06-19
|
23 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2007-06-17
|
23 | Lisa Dusseault | [Ballot comment] This will have to be fixed I'm sure: The character set used in MSG SHOULD be UNICODE, encoded using UTF-8 as … [Ballot comment] This will have to be fixed I'm sure: The character set used in MSG SHOULD be UNICODE, encoded using UTF-8 as specified in [RFC3629]. If the syslog application can not encode the MSG in Unicode, it MAY use any other encoding. Is the second sentence supposed to read "If the syslog application can not encode the MSG in UTF-8, it MAY use any other encoding." ? if so, is that really intentional? There would have to be a way of specifying the encoding otherwise the recipient cannot interoperably interpret the message. If other encodings are indeed allowed, the sections on looking for ASCII control characters will have to be re-examined. |
2007-06-15
|
23 | Sam Hartman | State Changes to IESG Evaluation from AD Evaluation::AD Followup by Sam Hartman |
2007-06-15
|
23 | Sam Hartman | Note field has been cleared by Sam Hartman |
2007-06-15
|
23 | Sam Hartman | [Ballot Position Update] New position, Yes, has been recorded for Sam Hartman |
2007-06-15
|
23 | Sam Hartman | Ballot has been issued by Sam Hartman |
2007-06-15
|
23 | Sam Hartman | Created "Approve" ballot |
2007-06-14
|
23 | Sam Hartman | State Change Notice email list have been change to syslog-chairs@tools.ietf.org from clonvick@cisco.com |
2007-06-14
|
23 | Sam Hartman | Placed on agenda for telechat - 2007-06-21 by Sam Hartman |
2007-06-14
|
23 | Sam Hartman | [Note]: 'The WG chairs believe they may have backed out enough changes that this no longer requires an second IETF last call. In the hopes … [Note]: 'The WG chairs believe they may have backed out enough changes that this no longer requires an second IETF last call. In the hopes that I will get a chance to review this weekend and issue a ballot I''m placining it on the agenda. If I fail to issue a ballot by Monday I will remove.' added by Sam Hartman |
2007-06-11
|
23 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-06-11
|
21 | (System) | New version available: draft-ietf-syslog-protocol-21.txt |
2007-05-13
|
23 | Sam Hartman | State Changes to AD Evaluation::Revised ID Needed from Waiting for Writeup::AD Followup by Sam Hartman |
2007-05-13
|
23 | Sam Hartman | A new last call will be required; changes too extensive. First I need the WG to address another round of comments |
2007-05-02
|
23 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-05-02
|
20 | (System) | New version available: draft-ietf-syslog-protocol-20.txt |
2007-03-08
|
23 | Sam Hartman | State Changes to Waiting for Writeup::Revised ID Needed from Waiting for Writeup by Sam Hartman |
2007-03-08
|
23 | Sam Hartman | Note field has been cleared by Sam Hartman |
2007-02-14
|
23 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2007-02-13
|
23 | Yoshiko Fong | IANA Additional Comment: IETF consensus is only used for 9.2 (SD-IDs), not for 9.1 (Version). I do not see any text that implies ietf consensus … IANA Additional Comment: IETF consensus is only used for 9.2 (SD-IDs), not for 9.1 (Version). I do not see any text that implies ietf consensus for 9.1. |
2007-02-12
|
23 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Jürgen Schönwälder. |
2007-02-06
|
23 | Yoshiko Fong | IANA Last Call Comments: As described in the IANA Considerations section of this document, IANA will complete two actions upon approval of the document. First, … IANA Last Call Comments: As described in the IANA Considerations section of this document, IANA will complete two actions upon approval of the document. First, in the syslog parameters registry located at: http://www.iana.org/assignments/syslog-parameters IANA will create a new subregisty entitled "syslog version values." The initial registration for this registry will be: Version Format Reference ------- ---------------------------------------- ----------------------------- 1 Defined in [RFC-ietf-syslog-protocol-19] [RFC-ietf-syslog-protocol-19] Future registrations in the "syslog version values" registry require IETF Consensus. Second, also in the syslog parameters registry located at: http://www.iana.org/assignments/syslog-parameters IANA will create a new subregisty entitled "syslog structured data id values" The initial registrations for this registry will be: Structured Structured Required or Data ID Data Parameter Optional ------------ ----------------------- ----------- timeQuality OPTIONAL tzKnown OPTIONAL isSynced OPTIONAL syncAccuracy OPTIONAL origin OPTIONAL ip OPTIONAL enterpriseId OPTIONAL software OPTIONAL swVersion OPTIONAL meta OPTIONAL sequenceId OPTIONAL sysUpTime OPTIONAL language OPTIONAL The registration rules for this registry will be that new Structured Data ID values and new Parameter Name values must be registered via IETF Consensus. In addition, once SD-IDs and SD-PARAMs are defined, the syntax and semantics of these registrations must not be altered. In the event that modifications of existing registry items are required, a new SD-ID or SD-PARAM must be created, leaving the older one unchanged. Finally, the IANA does not register, and will not control SD-IDs or SD-PARAMs \with an "@" sign (ABNF %d64) in them. IANA understands that these are the only actions required upon approval of this document. |
2007-02-01
|
23 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jürgen Schönwälder |
2007-02-01
|
23 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jürgen Schönwälder |
2007-01-31
|
23 | Amy Vezza | Last call sent |
2007-01-31
|
23 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-01-30
|
23 | Sam Hartman | State Changes to Last Call Requested from AD Evaluation by Sam Hartman |
2007-01-30
|
23 | Sam Hartman | Last Call was requested by Sam Hartman |
2007-01-30
|
23 | (System) | Ballot writeup text was added |
2007-01-30
|
23 | (System) | Last call text was added |
2007-01-30
|
23 | (System) | Ballot approval text was added |
2007-01-30
|
23 | Sam Hartman | State Change Notice email list have been change to syslog-chairs@tools.ietf.org from clonvick@cisco.com |
2007-01-30
|
23 | Sam Hartman | State Changes to AD Evaluation from Publication Requested by Sam Hartman |
2006-12-07
|
23 | Dinara Suleymanova | State Changes to Publication Requested from AD is watching by Dinara Suleymanova |
2006-12-07
|
23 | Dinara Suleymanova | PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO Write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Chris Lonvick Yes; I believe that the document is ready for publication. === (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Adequate review has occurred from WG members, and it has been reviewed by others. The reviews of the WG Last Call for this document (-17 version) may be found here: Bert Wijnen's review (not a member of the WG mailing list) http://www1.ietf.org/mail-archive/web/syslog/current/msg01243.html Richard Graveman's review http://www1.ietf.org/mail-archive/web/syslog/current/msg01240.html Sharon Chisolm's review http://www1.ietf.org/mail-archive/web/syslog/current/msg01232.html Tom Petch's review http://www1.ietf.org/mail-archive/web/syslog/current/msg01167.html David Harrington's review http://www1.ietf.org/mail-archive/web/syslog/current/msg01144.html The issues raised in these reviews have been discussed on the mailing list and most of them were fixed in version -18. A very few minor issues were also addressed from that which resulted in vresion -19. I am satisfied about the level of review. === (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. === (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. None. === (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? There is strong consensus to publish this document. === (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No appeals have been threatened. === (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? The document was generated using xml2rfc, has passed automated checking using idnits 1.118 with the two notes below, and has passed a manual check of idnits by the shepherd. I have reviewed the document. Section 12 is a Note to the RFC Editor to say that other documents are dependent upon this one. This will be dropped by the RFC Editor. Reference [10] is unused and will be removed by the RFC Editor or during Auth48. === (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. The references are split into normative and informational references. The document is dependant upon draft-ietf-syslog-transport-udp-08.txt and draft-ietf-syslog-transport-tls-06.txt which are being submitted along with this document. This document REQUIRES the UDP transport for compatability and interoperability and also REQUIRES the TLS transport for security. All other references are to other documents in good standing. === (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggested a reasonable name for the new registry? See [I-D.narten-iana-considerations-rfc2434bis]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The document IANA section is complete and the requested registries are clearly marked. === (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The ABNF in the document has been verified through http://www.apps.ietf.org/abnf.html === (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Writeup? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. This document describes the syslog protocol, which is used to convey event notification messages. This protocol utilizes a layered architecture, which allows the use of any number of transport protocols for transmission of syslog messages. It also provides a message format that allows vendor-specific extensions to be provided in a structured way. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Nothing worth noting. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? One implementation of the protocol has been produced. No vendors have announced that they will utilize this protocol. Some vendors have indicated interest in supporting this document. The above named reviewers did an outstanding and thorough job. Personnel Who is the Document Shepherd for this document? Who is the Responsible Area Director? [Area] SECURITY [WG] syslog [I-D] draft-ietf-syslog-protocol-19.txt [Qver] draft-ietf-proto-wgchair-doc-shepherding-08.txt [Shep] Chris Lonvick [AD] Sam Hartman === Thanks, Chris |
2006-11-30
|
19 | (System) | New version available: draft-ietf-syslog-protocol-19.txt |
2006-11-22
|
18 | (System) | New version available: draft-ietf-syslog-protocol-18.txt |
2006-06-15
|
17 | (System) | New version available: draft-ietf-syslog-protocol-17.txt |
2006-01-03
|
16 | (System) | New version available: draft-ietf-syslog-protocol-16.txt |
2005-11-08
|
23 | Sam Hartman | [Note]: 'returned to wg until they have consensus to publish' added by Sam Hartman |
2005-11-08
|
23 | Sam Hartman | Status date has been changed to 2005-11-08 from 2005-09-19 |
2005-11-08
|
23 | Sam Hartman | State Changes to AD is watching from AD Evaluation by Sam Hartman |
2005-10-21
|
15 | (System) | New version available: draft-ietf-syslog-protocol-15.txt |
2005-09-19
|
23 | Sam Hartman | [Note]: 'waiting for wg responses' added by Sam Hartman |
2005-09-19
|
23 | Sam Hartman | Hi. A few weeks ago you submitted draft-ietf-syslog-protocol-14 for publication as a proposed standard. The first step in that process is review by the responsible … Hi. A few weeks ago you submitted draft-ietf-syslog-protocol-14 for publication as a proposed standard. The first step in that process is review by the responsible AD, me. here are my comments. The working group needs to respond to these comments; responses can come in the form of answers to questions, disagreement, proposed changes, etc. 1) Has the ABNF been validated? Which parser was used? I'm particularly concerned about the handling of escaping in sd-values. If the ABNF is used directly to generate a parser, will it correctly handle the escaped text? Is the handling of the escaping issue in this spec consistent with handling in other specs? 2) You do not discuss Unicode security at all. I suggest that people in the working group read Unicode TR 36 and also consider the implications of the Unicode security presentation given at the last SAAG presentation. particularly consider comments from operators concerned about Unicode characters interacting with existing scripts. Then write up a security considerations section. You need to at least explain the security risks associated with your choice to support all Unicode characters. It would be a good idea to discuss other alternatives that were considered and to explain why this choice was made. 3) Backward compatibility and versioning are not really discussed. You define semantics of the version field but these semantics require the sender to be configured with the version that the receiver will support. Is this extensibility model acceptable to people who will deploy this protocol? Also, it seems that this extensibility model means that making a change that requires a version number bump is very costly. Structured data seems like the major extensibility mechanism that does not require a version number bump. Is this mechanism sufficient to make sure version bumps will be infrequent? 4) The working group has adopted the very restrictive standards action IANA policy for structured data. Why is such a restrictive policy chosen? 5) I don't think x- as a prefix is such a good idea for vendor use SD. It seems like that some way of identifying the vendor would be better; possibly something based on OIDs, enterprise numbers, or domain names. The problem with a flat namespace for vendors is what do you do about collisions. 6) I'm concerned about the use of x- param names in sd-ids that are not experimental. As I read the spec, any x- param name can be used in any sd-id regardless of whether the specification for that sd-id permits the param-name. However the specification of an sd-id must define the non-x-param names valid with that sd-id. It seems like this will be used as a way to extend sd-ids after the fact rather than defining a new sd-id as required elsewhere in the text. Is this really desirable? 7) What sort of review has this spec received from the vendor community that generates syslog messages and the operator community that consumes them? Will this specification actually be useful to the Internet community? Has the review been wide enough that we believe we are headed in the right direction? thanks for your responses, --Sam |
2005-09-19
|
23 | Sam Hartman | Status date has been changed to 2005-09-19 from |
2005-09-02
|
23 | Sam Hartman | State Changes to AD Evaluation from Publication Requested by Sam Hartman |
2005-08-08
|
23 | Sam Hartman | Draft Added by Sam Hartman in state Publication Requested |
2005-07-14
|
14 | (System) | New version available: draft-ietf-syslog-protocol-14.txt |
2005-06-29
|
13 | (System) | New version available: draft-ietf-syslog-protocol-13.txt |
2005-06-01
|
12 | (System) | New version available: draft-ietf-syslog-protocol-12.txt |
2005-04-18
|
11 | (System) | New version available: draft-ietf-syslog-protocol-11.txt |
2005-02-18
|
10 | (System) | New version available: draft-ietf-syslog-protocol-10.txt |
2005-01-14
|
09 | (System) | New version available: draft-ietf-syslog-protocol-09.txt |
2004-11-18
|
08 | (System) | New version available: draft-ietf-syslog-protocol-08.txt |
2004-10-22
|
07 | (System) | New version available: draft-ietf-syslog-protocol-07.txt |
2004-09-24
|
06 | (System) | New version available: draft-ietf-syslog-protocol-06.txt |
2004-07-15
|
05 | (System) | New version available: draft-ietf-syslog-protocol-05.txt |
2004-04-29
|
04 | (System) | New version available: draft-ietf-syslog-protocol-04.txt |
2004-02-17
|
03 | (System) | New version available: draft-ietf-syslog-protocol-03.txt |
2004-02-03
|
02 | (System) | New version available: draft-ietf-syslog-protocol-02.txt |
2004-01-20
|
01 | (System) | New version available: draft-ietf-syslog-protocol-01.txt |
2003-12-03
|
00 | (System) | New version available: draft-ietf-syslog-protocol-00.txt |