One document matched: draft-lear-ietf-syslog-uri-00.txt
Network Working Group E. Lear
Internet-Draft Cisco Systems GmbH
Intended status: Standards Track May 2, 2007
Expires: November 3, 2007
syslog URIs
draft-lear-ietf-syslog-uri-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on November 3, 2007.
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
syslog specifies both a logging format and a set of protocols to
communicate that format over. This memo specifies a set of URIs that
administrators and configuration systems may use to inform syslog
senders of their collectors or relays and protocols.
Lear Expires November 3, 2007 [Page 1]
Internet-Draft URIs for syslog May 2007
1. Introduction
The syslog protocol [1] has been used as a logging mechanism for
close to three decades, in one form or another. Its reach has
extended from UNIX mail systems to printers to routers to many
different devices. In many cases the logging configuration is as
simple as an IP address. This configuration may be in a file,
specified by an administrator on a device console, or perhaps
retrieved by a device through a configuration protocol, such as DHCP
[8].
With the formal specification of the syslog transport protocols for
UDP [3], TLS [2], and BEEP [4], a simple means is needed to provide a
concise way to tell systems which host and which protocol to use as
either a collector or relay. Universal Resource Identifiers (URIs)
[5] provide a flexible and concise means to accomplish this task.
This memo specifies three such URIs. They are "syslog.udp",
"syslog.tls", and "syslog.beep;". A description of each URI scheme
follows in the next section. It is recommended that future syslog
transports include an appropriate URI scheme that begins with
"syslog.".
syslog terminology used in this draft is taken from [1].
2. syslog URI Scheme Registrations and Description
Each section below consists of a completed template from RFC 4395
[6].
2.1. syslog.udp Schema Registration
URI scheme name
syslog.udp
Status
Permanent
Syntax
The following syntax makes use of Augmented BNF (ABNF) [7] and the
definitions found in RFC 3986.
syslog-udp-uri = "syslog.udp:" host [ ":" port ]
Lear Expires November 3, 2007 [Page 2]
Internet-Draft URIs for syslog May 2007
URI semantics
This URI is used to specify a syslog collector or relay running
over a specific UDP port. syslog senders will make a connection to
the host and transmit any appropriate logging as prescribed by the
sender's configuration.
Encoding Considerations
As only a host and a port number are provided, encoding of these
portions of the URI are specified in [5].
Applications/protocols that use this URI scheme name
syslog senders will primarily make use of this URI to configure
themselves. The syslog protocol is specified in [1]. UDP
transport of syslog is specified in [3].
Interoperability considerations
None
Security Considerations
[3] discusses the underlying concerns of syslog over udp.
Additionally, as URIs tend to be portable, some additional concern
should be given to protecting the host in a syslog.udp URI from
unauthorized access.
Contact
The author section of this document.
Author/Change Control
The author of this scheme is the same as in the author section of
this document. Change control is vested with the IESG.
References
Please see the References section of this document.
2.2. syslog.tls Schema Registration
Lear Expires November 3, 2007 [Page 3]
Internet-Draft URIs for syslog May 2007
URI scheme name
syslog.tls
Status
Permanent
Syntax
The following syntax makes use of ABNF and the definitions found
in RFC 3986.
syslog-tls-uri = "syslog.tls:" host [ ":" port ]
URI semantics
This URI is used to specify a syslog collector or relay running
over TLS. syslog senders will make a connection to the host,
initiate TLS, and transmit any appropriate logging as prescribed
by the sender's configuration over the encrypted channel.
Encoding Considerations
As only a host and a port number are provided, encoding of these
portions of the URI are specified in [5].
Applications/protocols that use this URI scheme name
syslog senders will primarily make use of this URI to configure
themselves. The syslog protocol is specified in [1]. TLS
transport of syslog is specified in [2].
Interoperability considerations
None
Security Considerations
[2] discusses issues and concerns of using syslog over TLS.
Additionally, as URIs tend to be portable, some additional concern
should be given to protecting the host in a syslog.tls URI from
unauthorized access.
Lear Expires November 3, 2007 [Page 4]
Internet-Draft URIs for syslog May 2007
Contact
The author section of this document.
Author/Change Control
The author of this scheme is the same as in the author section of
this document. Change control is vested with the IESG.
References
Please see the References section of this document.
2.3. syslog.beep Schema Registration
URI scheme name
syslog.beep
Status
Permanent
Syntax
The following syntax makes use of ABNF and the definitions found
in RFC 3986.
syslog-beep-uri = "syslog.beep:" host [ ":" port ]
URI semantics
This URI is used to specify a syslog collector or relay running
over BEEP. syslog senders will make a TCP connection to the host,
utilize an appropriate BEEP profile for syslog, and transmit any
appropriate logging as prescribed by the sender's configuration
over the BEEP channel.
Encoding Considerations
As only a host and a port number are provided, encoding of these
portions of the URI are specified in [5].
Lear Expires November 3, 2007 [Page 5]
Internet-Draft URIs for syslog May 2007
Applications/protocols that use this URI scheme name
syslog senders will primarily make use of this URI to configure
themselves. The syslog protocol is specified in [4]. BEEP
transport of syslog is specified in [4].
Interoperability considerations
None
Security Considerations
[4] discusses issues and concerns of using syslog over BEEP.
Additionally, as URIs tend to be portable, some additional concern
should be given to protecting the host in a syslog.beep URI from
unauthorized access.
Contact
The author section of this document.
Author/Change Control
The author of this scheme is the same as in the author section of
this document. Change control is vested with the IESG.
References
Please see the References section of this document.
3. Operational Considerations
Use of a URI to configure the syslog service requires some thought
about potential circular dependencies. For instance, if a domain
name is used to configure the service, the URI cannot be resolved if
name service is unavailable. Implementers are reminded to obey the
rules set forth in Section 3.2.2 of [5]. Administrators must balance
the requirements of flexible management against the need for logging
resiliency, when making use of these URIs. In some cases devices may
be able to store messages locally until they are able to resolve the
address of a collector or relay. In other cases, logging information
may be time critical.
Lear Expires November 3, 2007 [Page 6]
Internet-Draft URIs for syslog May 2007
4. Security Considerations
Please see the above sections as well as the underlying protocol
documents for security considerations. Use of this URI to configure
devices should be considered in the same light as other potentially
sensitive configuration information. The underlying content being
logged may or may not warrant additional protections, depending on
environment and circumstances.
5. IANA Considerations
The IANA is requested to register the profiles in Section 2.
6. References
6.1. Normative References
[1] Gerhards, R., "The syslog Protocol",
draft-ietf-syslog-protocol-19 (work in progress), November 2006.
[2] Miao, F. and M. Yuzhi, "TLS Transport Mapping for Syslog",
draft-ietf-syslog-transport-tls-07 (work in progress),
April 2007.
[3] Okmianski, A., "Transmission of syslog messages over UDP",
draft-ietf-syslog-transport-udp-09 (work in progress),
March 2007.
[4] Lear, E., "Reliable Delivery for syslog",
draft-lear-ietf-syslog-rfc3195bis-00 (work in progress),
February 2007.
[5] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66, RFC 3986,
January 2005.
[6] Hansen, T., Hardie, T., and L. Masinter, "Guidelines and
Registration Procedures for New URI Schemes", BCP 115, RFC 4395,
February 2006.
[7] Crocker, D., Ed. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", RFC 4234, October 2005.
Lear Expires November 3, 2007 [Page 7]
Internet-Draft URIs for syslog May 2007
6.2. Informational References
[8] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131,
March 1997.
Appendix A. Changes
This seciton to be removed prior to publication.
o 00 Initial Revision.
Author's Address
Eliot Lear
Cisco Systems GmbH
Glatt-com
Glattzentrum, ZH CH-8301
Switzerland
Phone: +41 1 878 7525
Email: lear@cisco.com
Lear Expires November 3, 2007 [Page 8]
Internet-Draft URIs for syslog May 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgments
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA). This document was produced
using xml2rfc v1.32 (of http://xml.resource.org/) from a source in
RFC-2629 XML format.
Lear Expires November 3, 2007 [Page 9]
| PAFTECH AB 2003-2026 | 2026-04-23 03:22:33 |