[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: draft-ietf-opsec-logging-caps-03
Comments inline.
On Jul 3, 2007, at 10:32 AM, patrick cain wrote:
Ron,
When George and I wrote the logging caps doc, we specifically
stayed away
from the log message 'collector' as opposed to the log message
'generator'.
We had some, um, disagreements, but George convinced me that was
the right
thing to do. I expected some of the log processing things, like "what
happens when a component send a million messages" would fall into the
collector category. But I guess one of the router interfaces could be
considered a 'component' so we should address the issue.
So...
1. I will craft some capabilities for the million message scenario.
I'm not
sure that there are 'bcps' for these actions, though.
- I will add a capability to efficiently handle rapidly generating
significant numbers of log messages to not overwhelm the delivery
mechanism.
Example is syslog's "last message received XX times". I'm not sure
than SNMP
has an equivalent mechanism, unless rate limiting outbound SNMP
counts. :(
One possible concern with rate-limiting syslog / SNMP / whatever is
that people will then try and generate non-critical events that cause
alerts to be generated in the hope that they can then slip a more
nefarious event in and have it also be caught by the rate-limiter.
What would be great would be, if there were a rate-limiter it would
prioritize high severity messages over lower severity ones (whee! QoS
for logs!). I am suspecting that this isn't feasible, more of a
"wouldn't it be cool if..." idea and not worth putting in the doc...
- for the 'log is full' case:
"The device should be configurable to either: a) stop
logging to all devices, b) drop the oldest log messages, or c) stop
logging
to the local device, when the local logging device is full."
For devices that have the concept of multiple severities I would also
like to see a pruning method that drops the oldest message *of the
lowest severity* (I'd rather keep old "failed login" messages than
old "Whoo! Look, A CRC!" messages...)
2. I will add words to 2.16 for "sensitive configuration information".
3. The original goal of the document and the WG was to make the three
capability documents BCPs. Otherwise we could have saved lots of
time just
spewing words, not trying to figure out what ISPs and vendors
actually do or
want.
:-)
W
Pat
-----Original Message-----
From: owner-opsec@psg.com [mailto:owner-opsec@psg.com] On Behalf Of
Ron
Bonica
Sent: Thursday, June 28, 2007 4:55 PM
To: opsec@ops.ietf.org
Subject: draft-ietf-opsec-logging-caps-03
Folks,
The following are a few comments from AD review:
- In Section 2.16, all sensitive configuration information needs to be
protected. This includes thinks like cryptographic keys as well as
passwords.
- Do we need another requirement that says that it should be
difficult, if
not impossible, to alter the local copy of a log?
- How should the system behave if some components spews 1,000,000
instances
of the same log message in a 5 second period?
- How should the system behave if some component spews 1,000,000
different
messages in a 5 second period.
- How should the system behave when all of the space for local
logging is
exhausted. Drop oldest messages? Tail drop?
- We will probably have to decide if this doc is BCP or INFO.
Ron
--
She'd even given herself a middle initial - X - which stood for
"someone who has a cool and exciting middle name".
-- (Terry Pratchett, Maskerade)