22
Glenn Mansfield Kee ni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Embed Size (px)

Citation preview

Page 1: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Glenn Mansfield Keeni

SysLog-MIB

Cyber Solutions Inc., Japan

Syslog-WG, IETF-56

March, 2003

Page 2: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Purpose Monitoring Syslog operation :

Stats on messages, received, processed, relayed

System wide Parameters,

(Process-wise) Message selection and actions

(Process-wise) run-time parameters

Configuring/Control Syslog processes

Page 3: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Syslog

man pages- syslogd, syslog.conf, syslog

 RFC3164

Page 4: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

The MIB Design

syslog System Group

syslog Process Group

syslog Control Group

Page 5: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

System Group

DefaultTransportDefaultServiceDefaultFacilityDefaultSeverityMaxMessageSize

Page 6: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Syslog Process Group

Process Table [syslogProcessIndex]

Params Table [syslogProcessIndex]

Allowed Hosts Table [syslogProcessIndex]

Page 7: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Process Table [syslogProcessIndex]

MsgsReceivedMsgsRelayedMsgsDroppedMsgsIllFormedMsgsIgnoredMsgsRejected

LastMsgRecdTimeLastMsgDeliveredTimeStartTimeLastErrorLastErrorTime

Page 8: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Params Table [syslogProcessIndex]

ProcDescrBindAddrTypeBindAddrSendToAllAddressesCompressionConfFileNameFacilityTranslation

PIDFileNameDNSLookUpSeverityCompOpSecuritySpecsProcessStatus*ProcessStorageTypeRowStatus

*Process Start/Stop

Page 9: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Allowed Hosts Table [syslogProcessIndex]

HostsAddrTypeHostsAddrHostsMaskLenHostsTransportHostsPortRowStatus

Page 10: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutionssyslog Control Group cf. syslog.conf

Selection Action

Selection: list of facility:level

Actions: log, display, relay, pipe

Page 11: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Selection and Action

Selection

Log Action

User Action

Relay Action

Pipe Action

Page 12: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Selection Table [syslogProcessIndex, ActionIndex,

SelectionIndex]

ActionIndexSelectionIndexDescrHostNameInclHostNameProgNameIncl

ProgNamePriorityInclFacilitySeveritySeverityCompOPRowStatus

Page 13: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Action Tables

UserActionTable [ProcessIndex,ActionIndex,UserActionIndex]

FwdActionTable [ProcessIndex,ActionIndex,FwdActionIndex]

PipeActionTable [ProcessIndex,ActionIndex]

LogActionTable [ProcessIndex,ActionIndex]

Page 14: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

(ActionIndex)LogFileName,RowStatus

LogActionTable

ActionIndexSelection Parameters

selectionTable

(ActionIndex)UserActionIndexUserID,RowStatus

UserActionTable

(ActionIndex)PipeCommandName,…RowStatus

PipeActionTable(ActionIndex)FwdActionIndexSrcAddrType….,RowStatus

FwdActionTable

Page 15: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Log Action Table [syslogProcessIndex,

ActionIndex]

LogActionFileNameRowStatus

Page 16: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber SolutionsUser Action Table [syslogProcessIndex, ActionIndex,

UserActionIndex]

UserActionIndexUserIDRowStatus

Page 17: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber SolutionsFwd Action Table [syslogProcessIndex, ActionIndex,

FwdActionIndex]

FwdActionIndexActionDescrSrcAddrTypeSrcAddrDstAddrType

DstAddrTransportPortFacilitySeverityRowStatus

Page 18: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Pipe Action Table [syslogProcessIndex,

ActionIndex]

PipeActionCommandRowStatus

Page 19: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Security Considerations(SET) ParamsTable : Configure, Start/Stop AllowedHostsTable: Loss/Flood of messages AllowedHostsTable: Loss/Flood of messages Selection Table: Loss of Messaages Log Action Table: Loss of messages UserActionTable: Spam a user’s console FwdActionTable: Attack a collector PipeActionTable: Invoke “sh” commands

Page 20: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

Security Considerations (GET)

ProcTable : Counters may reveal IDS info

Page 21: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

The draft

draft-ietf-syslog-device-mib-03.txt

Page 22: Glenn Mansfield Keeni SysLog-MIB Cyber Solutions Inc., Japan Syslog-WG, IETF-56 March, 2003

Cyber Solutions

To Be Done

 DESCRIPTION clauses

 Editorial nits

 REFERENCE clauses

 Implement

 SET requirements