summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5676.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5676.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5676.txt')
-rw-r--r--doc/rfc/rfc5676.txt1235
1 files changed, 1235 insertions, 0 deletions
diff --git a/doc/rfc/rfc5676.txt b/doc/rfc/rfc5676.txt
new file mode 100644
index 0000000..cbd3641
--- /dev/null
+++ b/doc/rfc/rfc5676.txt
@@ -0,0 +1,1235 @@
+
+
+
+
+
+
+Network Working Group J. Schoenwaelder
+Request for Comments: 5676 Jacobs University Bremen
+Category: Standards Track A. Clemm
+ Cisco Systems
+ A. Karmakar
+ Cisco Systems India Pvt Ltd
+ October 2009
+
+
+ Definitions of Managed Objects for Mapping SYSLOG Messages to
+ Simple Network Management Protocol (SNMP) Notifications
+
+Abstract
+
+ This memo defines a portion of the Management Information Base (MIB)
+ for use with network management protocols in the Internet community.
+ In particular, it defines a mapping of SYSLOG messages to Simple
+ Network Management Protocol (SNMP) notifications.
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (c) 2009 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (http://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document. Code Components extracted from this document must
+ include Simplified BSD License text as described in Section 4.e of
+ the Trust Legal Provisions and are provided without warranty as
+ described in the BSD License.
+
+
+
+
+
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 1]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. The Internet-Standard Management Framework . . . . . . . . . . 2
+ 3. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 4. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 5. Relationship to Other MIB Modules . . . . . . . . . . . . . . 4
+ 6. Relationship to the SNMP Notification to SYSLOG Mapping . . . 6
+ 7. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 8. Usage Example . . . . . . . . . . . . . . . . . . . . . . . . 18
+ 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18
+ 10. Security Considerations . . . . . . . . . . . . . . . . . . . 19
+ 11. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 20
+ 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 20
+ 12.1. Normative References . . . . . . . . . . . . . . . . . . 20
+ 12.2. Informative References . . . . . . . . . . . . . . . . . 21
+
+1. Introduction
+
+ SNMP ([RFC3410], [RFC3411]) and SYSLOG [RFC5424] are two widely used
+ protocols to communicate event notifications. Although co-existence
+ of several management protocols in one operational environment is
+ possible, certain environments require that all event notifications
+ be collected by a single system daemon, such as a SYSLOG collector or
+ an SNMP notification receiver, via a single management protocol. In
+ such environments, it is necessary to translate event notifications
+ between management protocols.
+
+ This document defines an SNMP MIB module to represent SYSLOG messages
+ and to send SYSLOG messages as SNMP notifications to SNMP
+ notification receivers.
+
+2. The Internet-Standard Management Framework
+
+ For a detailed overview of the documents that describe the current
+ Internet-Standard Management Framework, please refer to section 7 of
+ RFC 3410 [RFC3410].
+
+ Managed objects are accessed via a virtual information store, termed
+ the Management Information Base or MIB. MIB objects are generally
+ accessed through the Simple Network Management Protocol (SNMP).
+ Objects in the MIB are defined using the mechanisms defined in the
+ Structure of Management Information (SMI). This memo specifies a MIB
+ module that is compliant to the SMIv2, which is described in STD 58,
+ RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580
+ [RFC2580].
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 2]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+3. Conventions
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+4. Overview
+
+ SYSLOG messages are translated to SNMP by a SYSLOG-to-SNMP
+ translator. Such a translator acts as a SYSLOG collector [RFC5424]
+ and implements a MIB module according to the SNMP architecture
+ [RFC3411]. The translator might be tightly coupled to an SNMP agent
+ or it might interface with an SNMP agent via a subagent protocol.
+
+ After initialization, the SYSLOG-to-SNMP translator will listen for
+ SYSLOG messages. On receiving a message, the message will be parsed
+ to extract information as described in the MIB module. A conceptual
+ table is populated with information extracted from the SYSLOG
+ message, and finally a notification may be generated.
+
+ The MIB module is organized into a group of scalars and two tables.
+ The syslogMsgControl group contains two scalars controlling the
+ maximum size of SYSLOG messages recorded in the tables and also
+ controlling whether SNMP notifications are generated for SYSLOG
+ messages.
+
+ --syslogMsgObjects(1)
+ |
+ +--syslogMsgControl(1)
+ |
+ +-- Unsigned32 syslogMsgTableMaxSize(1)
+ +-- TruthValue syslogMsgEnableNotifications(2)
+
+ The syslogMsgTable contains one entry for each recorded SYSLOG
+ message. The basic fields of SYSLOG messages as well as message
+ properties are represented in different columns of the conceptual
+ table.
+
+ --syslogMsgObjects(1)
+ |
+ +--syslogMsgTable(2)
+ |
+ +--syslogMsgEntry(1) [syslogMsgIndex]
+ |
+ +-- Unsigned32 syslogMsgIndex(1)
+ +-- SyslogFacility syslogMsgFacility(2)
+ +-- SyslogSeverity syslogMsgSeverity(3)
+ +-- Unsigned32 syslogMsgVersion(4)
+
+
+
+Schoenwaelder, et al. Standards Track [Page 3]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ +-- SyslogTimeStamp syslogMsgTimeStamp(5)
+ +-- DisplayString syslogMsgHostName(6)
+ +-- DisplayString syslogMsgAppName(7)
+ +-- DisplayString syslogMsgProcID(8)
+ +-- DisplayString syslogMsgMsgID(9)
+ +-- Unsigned32 syslogMsgSDParams(10)
+ +-- OctetString syslogMsgMsg(11)
+
+ The syslogMsgSDTable contains one entry for each structured data
+ element parameter contained in a SYSLOG message. Since structured
+ data elements are optional, the relationship between the
+ syslogMsgTable and the syslogMsgSDTable ranges from one-to-zero to
+ one-to-many.
+
+ --syslogMsgObjects(1)
+ |
+ +--syslogMsgSDTable(3)
+ |
+ +--syslogMsgSDEntry(1) [syslogMsgIndex,
+ | syslogMsgSDParamIndex,
+ | syslogMsgSDID,
+ | syslogMsgSDParamName]
+ |
+ +-- Unsigned32 syslogMsgSDParamIndex(1)
+ +-- DisplayString syslogMsgSDID(2)
+ +-- DisplayString syslogMsgSDParamName(3)
+ +-- SyslogParamValueString syslogMsgSDParamValue(4)
+
+5. Relationship to Other MIB Modules
+
+ The NOTIFICATION-LOG-MIB [RFC3014] provides a generic mechanism for
+ logging SNMP notifications in order to deal with lost SNMP
+ notifications, e.g., due to transient communication problems.
+ Applications can poll the notification log to verify that they have
+ not missed important SNMP notifications.
+
+ The MIB module defined in this memo provides a mechanism for logging
+ SYSLOG notifications. This additional SYSLOG notification log is
+ provided because (a) SYSLOG messages might not lead to SNMP
+ notification (this is configurable) and (b) SNMP notifications might
+ not carry all information associated with a SYSLOG notification.
+
+ The MIB module IMPORTS objects from SNMPv2-SMI [RFC2578], SNMPv2-TC
+ [RFC2579], SNMPv2-CONF [RFC2580], SNMP-FRAMEWORK-MIB [RFC3411], and
+ SYSLOG-TC-MIB [RFC5427].
+
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 4]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ The textual convention SyslogParamValueString uses the UTF-8
+ transformation format of the ISO/IEC IS 10646-1 character set defined
+ in [RFC3629].
+
+6. Relationship to the SNMP Notification to SYSLOG Mapping
+
+ A companion document [RFC5675] defines a mapping of SNMP
+ notifications to SYSLOG messages. This section discusses the
+ possibilities of using both specifications in combination.
+
+ A SYSLOG collector implementing the SYSLOG-MSG-MIB module and the
+ mapping of SNMP notifications to SYSLOG messages may be configured to
+ translate received SYSLOG messages containing SNMP notifications back
+ into the original SNMP notification. In this case, the relevant
+ tables of the SYSLOG-MSG-MIB will not be populated for SYSLOG
+ messages carrying SNMP notifications. This configuration allows
+ operators to build a forwarding chain where SNMP notifications are
+ "tunneled" through SYSLOG messages. Due to size restrictions of the
+ SYSLOG transports and the more verbose textual encoding used by
+ SYSLOG, there is a possibility that SNMP notification content will
+ get truncated when tunneled through SYSLOG, and thus the resulting
+ SNMP notification may be incomplete.
+
+ An SNMP management application supporting the SYSLOG-MSG-MIB and the
+ mapping of SNMP notifications to SYSLOG messages may process
+ information from the SYSLOG-MSG-MIB in order to emit a SYSLOG message
+ representing the SYSLOG message recorded in the SYSLOG-MSG-MIB
+ module. This configuration allows operators to build a forwarding
+ chain where SYSLOG messages are "tunneled" through SNMP messages. A
+ notification receiver can determine whether a syslogMsgNotification
+ contained all structured data element parameters of a SYSLOG message.
+ In case parameters are missing, a forwarding application MUST
+ retrieve the missing parameters from the SYSLOG-MSG-MIB. Regular
+ polling of the SYSLOG-MSG-MIB can be used to take care of any lost
+ SNMP notifications.
+
+7. Definitions
+
+ SYSLOG-MSG-MIB DEFINITIONS ::= BEGIN
+
+ IMPORTS
+ MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE, Unsigned32, mib-2
+ FROM SNMPv2-SMI
+ TEXTUAL-CONVENTION, DisplayString, TruthValue
+ FROM SNMPv2-TC
+ OBJECT-GROUP, NOTIFICATION-GROUP, MODULE-COMPLIANCE
+ FROM SNMPv2-CONF
+ SyslogFacility, SyslogSeverity
+
+
+
+Schoenwaelder, et al. Standards Track [Page 5]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ FROM SYSLOG-TC-MIB;
+
+ syslogMsgMib MODULE-IDENTITY
+ LAST-UPDATED "200908130800Z"
+ ORGANIZATION "IETF OPSAWG Working Group"
+ CONTACT-INFO
+ "Juergen Schoenwaelder
+ <j.schoenwaelder@jacobs-university.de>
+ Jacobs University Bremen
+ Campus Ring 1
+ 28757 Bremen
+ Germany
+
+ Alexander Clemm
+ <alex@cisco.com>
+ Cisco Systems
+ 170 West Tasman Drive
+ San Jose, CA 95134-1706
+ USA
+
+ Anirban Karmakar
+ <akarmaka@cisco.com>
+ Cisco Systems India Pvt Ltd
+ SEZ Unit, Cessna Business Park,
+ Sarjapur Marathahalli ORR,
+ Bangalore, Karnataka 560103
+ India"
+
+ DESCRIPTION
+ "This MIB module represents SYSLOG messages as SNMP objects.
+
+ Copyright (c) 2009 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Simplified BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (http://trustee.ietf.org/license-info).
+
+ This version of this MIB module is part of RFC 5676; see
+ the RFC itself for full legal notices."
+
+ REVISION "200908130800Z"
+ DESCRIPTION
+ "Initial version issued as part of RFC 5676."
+ ::= { mib-2 192 }
+
+
+
+Schoenwaelder, et al. Standards Track [Page 6]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ -- textual convention definitions
+
+ SyslogTimeStamp ::= TEXTUAL-CONVENTION
+ DISPLAY-HINT "2d-1d-1d,1d:1d:1d.3d,1a1d:1d"
+ STATUS current
+ DESCRIPTION
+ "A date-time specification. This type is similar to the
+ DateAndTime type defined in the SNMPv2-TC, except the
+ subsecond granulation is microseconds instead of
+ deciseconds and a zero-length string can be used
+ to indicate a missing value.
+
+ field octets contents range
+ ----- ------ -------- -----
+ 1 1-2 year* 0..65536
+ 2 3 month 1..12
+ 3 4 day 1..31
+ 4 5 hour 0..23
+ 5 6 minutes 0..59
+ 6 7 seconds 0..60
+ (use 60 for leap-second)
+ 7 8-10 microseconds* 0..999999
+ 8 11 direction from UTC '+' / '-'
+ 9 12 hours from UTC* 0..13
+ 10 13 minutes from UTC 0..59
+
+ * Notes:
+ - the value of year is in network-byte order
+ - the value of microseconds is in network-byte order
+ - daylight saving time in New Zealand is +13
+
+ For example, Tuesday May 26, 1992 at 1:30:15 PM EDT would be
+ displayed as:
+
+ 1992-5-26,13:30:15.0,-4:0
+
+ Note that if only local time is known, then timezone
+ information (fields 11-13) is not present."
+ SYNTAX OCTET STRING (SIZE (0 | 10 | 13))
+
+ SyslogParamValueString ::= TEXTUAL-CONVENTION
+ DISPLAY-HINT "65535t"
+ STATUS current
+ DESCRIPTION
+ "The value of a SYSLOG SD-PARAM is represented using the
+ ISO/IEC IS 10646-1 character set, encoded as an octet string
+ using the UTF-8 transformation format described in RFC 3629.
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 7]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ Since additional code points are added by amendments to the
+ 10646 standard from time to time, implementations must be
+ prepared to encounter any code point from 0x00000000 to
+ 0x7fffffff. Byte sequences that do not correspond to the
+ valid UTF-8 encoding of a code point or that are outside this
+ range are prohibited. Similarly, overlong UTF-8 sequences
+ are prohibited.
+
+ UTF-8 may require multiple bytes to represent a single
+ character / code point; thus, the length of this object in
+ octets may be different from the number of characters
+ encoded. Similarly, size constraints refer to the number of
+ encoded octets, not the number of characters represented by
+ an encoding."
+ REFERENCE
+ "RFC 3629: UTF-8, a transformation format of ISO 10646"
+ SYNTAX OCTET STRING
+
+ -- object definitions
+
+ syslogMsgNotifications OBJECT IDENTIFIER ::= { syslogMsgMib 0 }
+ syslogMsgObjects OBJECT IDENTIFIER ::= { syslogMsgMib 1 }
+ syslogMsgConformance OBJECT IDENTIFIER ::= { syslogMsgMib 2 }
+
+ syslogMsgControl OBJECT IDENTIFIER ::= { syslogMsgObjects 1 }
+
+ syslogMsgTableMaxSize OBJECT-TYPE
+ SYNTAX Unsigned32
+ MAX-ACCESS read-write
+ STATUS current
+ DESCRIPTION
+ "The maximum number of SYSLOG messages that may be held in
+ syslogMsgTable. A particular setting does not guarantee that
+ there is sufficient memory available for the maximum number
+ of table entries indicated by this object. A value of 0 means
+ no fixed limit.
+
+ If an application reduces the limit while there are SYSLOG
+ messages in the syslogMsgTable, the SYSLOG messages that are
+ in the syslogMsgTable for the longest time MUST be discarded
+ to bring the table down to the new limit.
+
+ The value of this object should be kept in nonvolatile
+ memory."
+ DEFVAL { 0 }
+ ::= { syslogMsgControl 1 }
+
+ syslogMsgEnableNotifications OBJECT-TYPE
+
+
+
+Schoenwaelder, et al. Standards Track [Page 8]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ SYNTAX TruthValue
+ MAX-ACCESS read-write
+ STATUS current
+ DESCRIPTION
+ "Indicates whether syslogMsgNotification notifications are
+ generated.
+
+ The value of this object should be kept in nonvolatile
+ memory."
+ DEFVAL { false }
+ ::= { syslogMsgControl 2 }
+
+ syslogMsgTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SyslogMsgEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "A table containing recent SYSLOG messages. The size of the
+ table is controlled by the syslogMsgTableMaxSize object."
+ ::= { syslogMsgObjects 2 }
+
+ syslogMsgEntry OBJECT-TYPE
+ SYNTAX SyslogMsgEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry of the syslogMsgTable."
+ INDEX { syslogMsgIndex }
+ ::= { syslogMsgTable 1 }
+
+ SyslogMsgEntry ::= SEQUENCE {
+ syslogMsgIndex Unsigned32,
+ syslogMsgFacility SyslogFacility,
+ syslogMsgSeverity SyslogSeverity,
+ syslogMsgVersion Unsigned32,
+ syslogMsgTimeStamp SyslogTimeStamp,
+ syslogMsgHostName DisplayString,
+ syslogMsgAppName DisplayString,
+ syslogMsgProcID DisplayString,
+ syslogMsgMsgID DisplayString,
+ syslogMsgSDParams Unsigned32,
+ syslogMsgMsg OCTET STRING
+ }
+
+ syslogMsgIndex OBJECT-TYPE
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+
+
+
+Schoenwaelder, et al. Standards Track [Page 9]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ DESCRIPTION
+ "A monotonically increasing number used to identify entries in
+ the syslogMsgTable. When syslogMsgIndex reaches the maximum
+ value (4294967295), the value wraps back to 1.
+
+ Applications periodically polling the syslogMsgTable for new
+ entries should take into account that a complete rollover of
+ syslogMsgIndex will happen if more than 4294967294 messages
+ are received during a poll interval."
+ ::= { syslogMsgEntry 1 }
+
+ syslogMsgFacility OBJECT-TYPE
+ SYNTAX SyslogFacility
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The facility of the SYSLOG message."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.1)
+ RFC 5427: Textual Conventions for Syslog Management"
+ ::= { syslogMsgEntry 2 }
+
+ syslogMsgSeverity OBJECT-TYPE
+ SYNTAX SyslogSeverity
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The severity of the SYSLOG message"
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.1)
+ RFC 5427: Textual Conventions for Syslog Management"
+ ::= { syslogMsgEntry 3 }
+
+ syslogMsgVersion OBJECT-TYPE
+ SYNTAX Unsigned32 (0..999)
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The version of the SYSLOG message. A value of 0 indicates
+ that the version is unknown."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.2)"
+ ::= { syslogMsgEntry 4 }
+
+ syslogMsgTimeStamp OBJECT-TYPE
+ SYNTAX SyslogTimeStamp
+ MAX-ACCESS read-only
+ STATUS current
+
+
+
+Schoenwaelder, et al. Standards Track [Page 10]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ DESCRIPTION
+ "The timestamp of the SYSLOG message. A zero-length
+ string is returned if the timestamp is unknown."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.3)"
+ ::= { syslogMsgEntry 5 }
+
+ syslogMsgHostName OBJECT-TYPE
+ SYNTAX DisplayString (SIZE (0..255))
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The hostname and the (optional) domain name of the SYSLOG
+ message. A zero-length string indicates an unknown hostname.
+ The SYSLOG protocol specification constrains this string to
+ printable US-ASCII code points."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.4)"
+ ::= { syslogMsgEntry 6 }
+
+ syslogMsgAppName OBJECT-TYPE
+ SYNTAX DisplayString (SIZE (0..48))
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The app-name of the SYSLOG message. A zero-length string
+ indicates an unknown app-name. The SYSLOG protocol
+ specification constrains this string to printable US-ASCII
+ code points."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.5)"
+ ::= { syslogMsgEntry 7 }
+
+ syslogMsgProcID OBJECT-TYPE
+ SYNTAX DisplayString (SIZE (0..128))
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The procid of the SYSLOG message. A zero-length string
+ indicates an unknown procid. The SYSLOG protocol
+ specification constrains this string to printable
+ US-ASCII code points."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.6)"
+ ::= { syslogMsgEntry 8 }
+
+ syslogMsgMsgID OBJECT-TYPE
+ SYNTAX DisplayString (SIZE (0..32))
+
+
+
+Schoenwaelder, et al. Standards Track [Page 11]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The msgid of the SYSLOG message. A zero-length string
+ indicates an unknown msgid. The SYSLOG protocol specification
+ constrains this string to printable US-ASCII code points."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.2.7)"
+ ::= { syslogMsgEntry 9 }
+
+ syslogMsgSDParams OBJECT-TYPE
+ SYNTAX Unsigned32
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The total number of structured data element parameters
+ carried in the SYSLOG message. This number effectively
+ indicates the number of entries in the syslogMsgSDTable.
+ It can be used, for example, by a notification receiver
+ to determine whether a notification carried all
+ structured data element parameters of a SYSLOG message."
+ ::= { syslogMsgEntry 10 }
+
+ syslogMsgMsg OBJECT-TYPE
+ SYNTAX OCTET STRING
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The message part of the SYSLOG message. The syntax does not
+ impose a size restriction. Implementations of this MIB module
+ may truncate the message part of the SYSLOG message such that
+ it fits into the size constraints imposed by the implementation
+ environment. Such truncations can also happen elsewhere in the
+ SYSLOG forwarding chain.
+
+ If the first octets contain the value 'EFBBBF'h, then the rest
+ of the message is a UTF-8 string. Since SYSLOG messages may be
+ truncated at arbitrary octet boundaries during forwarding, the
+ message may contain invalid UTF-8 encodings at the end."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Sections 6.1 and 6.4)"
+ ::= { syslogMsgEntry 11 }
+
+ syslogMsgSDTable OBJECT-TYPE
+ SYNTAX SEQUENCE OF SyslogMsgSDEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+
+
+
+Schoenwaelder, et al. Standards Track [Page 12]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ "A table containing structured data elements of SYSLOG
+ messages."
+ ::= { syslogMsgObjects 3 }
+
+ syslogMsgSDEntry OBJECT-TYPE
+ SYNTAX SyslogMsgSDEntry
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "An entry of the syslogMsgSDTable."
+ INDEX { syslogMsgIndex, syslogMsgSDParamIndex,
+ syslogMsgSDID, syslogMsgSDParamName }
+ ::= { syslogMsgSDTable 1 }
+
+ SyslogMsgSDEntry ::= SEQUENCE {
+ syslogMsgSDParamIndex Unsigned32,
+ syslogMsgSDID DisplayString,
+ syslogMsgSDParamName DisplayString,
+ syslogMsgSDParamValue SyslogParamValueString
+ }
+
+ syslogMsgSDParamIndex OBJECT-TYPE
+ SYNTAX Unsigned32 (1..4294967295)
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "This object indexes the structured data element parameters
+ contained in a SYSLOG message. The first structured data
+ element parameter has the index value 1, and subsequent
+ parameters are indexed by incrementing the index of the
+ previous parameter. The index increases across structured
+ data element boundaries so that the value reflects the
+ position of a structured data element parameter in a
+ SYSLOG message."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.3.3)"
+ ::= { syslogMsgSDEntry 1 }
+
+ syslogMsgSDID OBJECT-TYPE
+ SYNTAX DisplayString (SIZE (1..32))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The name (SD-ID) of a structured data element. The SYSLOG
+ protocol specification constrains this string to printable
+ US-ASCII code points."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.3.2)"
+
+
+
+Schoenwaelder, et al. Standards Track [Page 13]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ ::= { syslogMsgSDEntry 2 }
+
+ syslogMsgSDParamName OBJECT-TYPE
+ SYNTAX DisplayString (SIZE (1..32))
+ MAX-ACCESS not-accessible
+ STATUS current
+ DESCRIPTION
+ "The name of a parameter of the structured data element. The
+ SYSLOG protocol specification constrains this string to
+ printable US-ASCII code points."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.3.3)"
+ ::= { syslogMsgSDEntry 3 }
+
+ syslogMsgSDParamValue OBJECT-TYPE
+ SYNTAX SyslogParamValueString
+ MAX-ACCESS read-only
+ STATUS current
+ DESCRIPTION
+ "The value of the parameter of a SYSLOG message identified by
+ the index of this table. The value is stored in the unescaped
+ format."
+ REFERENCE
+ "RFC 5424: The Syslog Protocol (Section 6.3.3)"
+ ::= { syslogMsgSDEntry 4 }
+
+ -- notification definitions
+
+ syslogMsgNotification NOTIFICATION-TYPE
+ OBJECTS { syslogMsgFacility, syslogMsgSeverity,
+ syslogMsgVersion, syslogMsgTimeStamp,
+ syslogMsgHostName, syslogMsgAppName,
+ syslogMsgProcID, syslogMsgMsgID,
+ syslogMsgSDParams, syslogMsgMsg }
+ STATUS current
+ DESCRIPTION
+ "The syslogMsgNotification is generated when a new SYSLOG
+ message is received and the value of
+ syslogMsgGenerateNotifications is true.
+
+ Implementations may add syslogMsgSDParamValue objects as long
+ as the resulting notification fits into the size constraints
+ imposed by the implementation environment and the notification
+ message size constraints imposed by maxMessageSize [RFC3412]
+ and SNMP transport mappings."
+ ::= { syslogMsgNotifications 1 }
+
+ -- conformance statements
+
+
+
+Schoenwaelder, et al. Standards Track [Page 14]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ syslogMsgGroups OBJECT IDENTIFIER ::= { syslogMsgConformance 1 }
+ syslogMsgCompliances OBJECT IDENTIFIER ::= { syslogMsgConformance 2 }
+
+ syslogMsgFullCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for implementations of the
+ SYSLOG-MSG-MIB."
+ MODULE -- this module
+ MANDATORY-GROUPS {
+ syslogMsgGroup,
+ syslogMsgSDGroup,
+ syslogMsgControlGroup,
+ syslogMsgNotificationGroup
+ }
+ ::= { syslogMsgCompliances 1 }
+
+ syslogMsgReadOnlyCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for implementations of the
+ SYSLOG-MSG-MIB that do not support read-write access."
+ MODULE -- this module
+ MANDATORY-GROUPS {
+ syslogMsgGroup,
+ syslogMsgSDGroup,
+ syslogMsgControlGroup,
+ syslogMsgNotificationGroup
+ }
+ OBJECT syslogMsgTableMaxSize
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+ OBJECT syslogMsgEnableNotifications
+ MIN-ACCESS read-only
+ DESCRIPTION
+ "Write access is not required."
+ ::= { syslogMsgCompliances 2 }
+
+ syslogMsgNotificationCompliance MODULE-COMPLIANCE
+ STATUS current
+ DESCRIPTION
+ "The compliance statement for implementations of the
+ SYSLOG-MSG-MIB that do only generate notifications and do not
+ provide a table to allow read access to SYSLOG message
+ details."
+ MODULE -- this module
+ MANDATORY-GROUPS {
+
+
+
+Schoenwaelder, et al. Standards Track [Page 15]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ syslogMsgGroup,
+ syslogMsgSDGroup,
+ syslogMsgNotificationGroup
+ }
+ OBJECT syslogMsgFacility
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgSeverity
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgVersion
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgTimeStamp
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgHostName
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgAppName
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgProcID
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgMsgID
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgSDParams
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgMsg
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+ OBJECT syslogMsgSDParamValue
+ MIN-ACCESS accessible-for-notify
+ DESCRIPTION
+ "Read access is not required."
+
+
+
+Schoenwaelder, et al. Standards Track [Page 16]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ ::= { syslogMsgCompliances 3 }
+
+ syslogMsgNotificationGroup NOTIFICATION-GROUP
+ NOTIFICATIONS {
+ syslogMsgNotification
+ }
+ STATUS current
+ DESCRIPTION
+ "The notifications emitted by this MIB module."
+ ::= { syslogMsgGroups 1 }
+
+ syslogMsgGroup OBJECT-GROUP
+ OBJECTS {
+ -- syslogMsgIndex,
+ syslogMsgFacility,
+ syslogMsgSeverity,
+ syslogMsgVersion,
+ syslogMsgTimeStamp,
+ syslogMsgHostName,
+ syslogMsgAppName,
+ syslogMsgProcID,
+ syslogMsgMsgID,
+ syslogMsgSDParams,
+ syslogMsgMsg
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects representing a SYSLOG message,
+ excluding structured data elements."
+ ::= { syslogMsgGroups 2 }
+
+ syslogMsgSDGroup OBJECT-GROUP
+ OBJECTS {
+ -- syslogMsgSDParamIndex,
+ -- syslogMsgSDID,
+ -- syslogMsgSDParamName,
+ syslogMsgSDParamValue
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of objects representing the structured data
+ elements of a SYSLOG message."
+ ::= { syslogMsgGroups 3 }
+
+ syslogMsgControlGroup OBJECT-GROUP
+ OBJECTS {
+ syslogMsgTableMaxSize,
+ syslogMsgEnableNotifications
+
+
+
+Schoenwaelder, et al. Standards Track [Page 17]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ }
+ STATUS current
+ DESCRIPTION
+ "A collection of control objects to control the size of the
+ syslogMsgTable and to enable/disable notifications."
+ ::= { syslogMsgGroups 4 }
+
+ END
+
+8. Usage Example
+
+ The following example shows a valid SYSLOG message including
+ structured data. The otherwise-unprintable Unicode byte order mark
+ (BOM) is represented as "BOM" in the example.
+
+ <165>1 2003-10-11T22:14:15.003Z mymachine.example.com
+ evntslog - ID47 [exampleSDID@32473 iut="3" eventSource="Application"
+ eventID="1011"] BOMAn application event log entry...
+
+ This SYSLOG message leads to the following entries in the
+ syslogMsgTable and the syslogMsgSDTable (note that string indexes are
+ written as strings for readability reasons):
+
+ syslogMsgIndex.1 = 1
+ syslogMsgFacility.1 = 20
+ syslogMsgSeverity.1 = 5
+ syslogMsgVersion.1 = 1
+ syslogMsgTimeStamp.1 = 2003-10-11,22:14:15.003,+0:0
+ syslogMsgHostName.1 = "mymachine.example.com"
+ syslogMsgAppName.1 = "evntslog"
+ syslogMsgProcID.1 = "-"
+ syslogMsgMsgID.1 = "ID47"
+ syslogMsgMsg.1 = "BOMAn application event log entry..."
+ syslogMsgSDParamValue.1.1."exampleSDID@32473"."iut"
+ = "3"
+ syslogMsgSDParamValue.1.2."exampleSDID@32473"."eventSource"
+ = "Application"
+ syslogMsgSDParamValue.1.3."exampleSDID@32473"."eventID"
+ = "1011"
+
+9. IANA Considerations
+
+ The IANA has assigned value "192" under the 'mib-2' subtree and
+ recorded the assignment in the SMI Numbers registry.
+
+
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 18]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+10. Security Considerations
+
+ There are a number of management objects defined in this MIB module
+ with a MAX-ACCESS clause of read-write and/or read-create. Such
+ objects may be considered sensitive or vulnerable in some network
+ environments. The support for SET operations in a non-secure
+ environment without proper protection can have a negative effect on
+ network operations. These are the tables and objects and their
+ sensitivity/vulnerability:
+
+ o syslogMsgTableMaxSize: This object controls how many entries are
+ kept in the syslogMsgTable. Unauthorized modifications may either
+ cause increased memory consumption (by setting this object to a
+ large value) or turn off the capability to retrieve notifications
+ using GET class operations (by setting this object to zero). This
+ might be used to hide traces of an attack.
+
+ o syslogMsgEnableNotifications: This object enables notifications.
+ Unauthorized modifications to disable notification generation can
+ be used to hide an attack by preventing management applications
+ that use SNMP from receiving real-time notifications about events
+ carried in SYSLOG messages. Unauthorized modifications to enable
+ notification generation may be used as part of a denial-of-service
+ attack against a network management system if, for example, the
+ SYSLOG-to-SNMP translator accepts unauthorized SYSLOG messages.
+
+ Some of the readable objects in this MIB module (i.e., objects with a
+ MAX-ACCESS other than not-accessible) may be considered sensitive or
+ vulnerable in some network environments. It is thus important to
+ control even GET and/or NOTIFY access to these objects and possibly
+ to even encrypt the values of these objects when sending them over
+ the network via SNMP. These are the tables and objects and their
+ sensitivity/vulnerability:
+
+ o syslogMsgTableMaxSize, syslogMsgEnableNotifications: These objects
+ provide information regarding whether SYSLOG messages are
+ forwarded as SNMP notifications and how many messages will be
+ maintained in the syslogMsgTable. This information might be
+ exploited by an attacker in order to plan actions with the goal of
+ hiding attack activities.
+
+ o syslogMsgFacility, syslogMsgSeverity, syslogMsgVersion,
+ syslogMsgTimeStamp, syslogMsgHostName, syslogMsgAppName,
+ syslogMsgProcID, syslogMsgMsgID, syslogMsgSDParams, syslogMsgMsg,
+ syslogMsgSDParamValue: These objects carry the content of SYSLOG
+ messages and the SYSLOG-message-oriented security considerations
+ of [RFC5424] apply. In particular, an attacker who gains access
+ to SYSLOG messages via SNMP may use the knowledge gained from
+
+
+
+Schoenwaelder, et al. Standards Track [Page 19]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ SYSLOG messages to compromise a machine or do other damage. It is
+ therefore desirable to configure SNMP access control rules,
+ enforcing a consistent security policy for SYSLOG messages.
+
+ SNMP versions prior to SNMPv3 did not include adequate security.
+ Even if the network itself is secure (for example by using IPsec),
+ even then, there is no control as to who on the secure network is
+ allowed to access and GET/SET (read/change/create/delete) the objects
+ in this MIB module.
+
+ It is RECOMMENDED that implementers consider the security features as
+ provided by the SNMPv3 framework (see [RFC3410], section 8),
+ including full support for the SNMPv3 cryptographic mechanisms (for
+ authentication and privacy).
+
+ Further, deployment of SNMP versions prior to SNMPv3 is NOT
+ RECOMMENDED. Instead, it is RECOMMENDED to deploy SNMPv3 and to
+ enable cryptographic security. It is then a customer/operator
+ responsibility to ensure that the SNMP entity giving access to an
+ instance of this MIB module is properly configured to give access to
+ the objects only to those principals (users) that have legitimate
+ rights to indeed GET or SET (change/create/delete) them.
+
+ Using the security features of the SNMPv3 framework secures the
+ transport of SYSLOG data via SNMP only. It is therefore RECOMMENDED
+ that deployments use SYSLOG security mechanisms in order to prevent
+ attackers from adding malicious SYSLOG data to the MIB tables.
+
+11. Acknowledgments
+
+ The editors wish to thank the following individuals for providing
+ helpful comments on various versions of this document: Martin
+ Bjorklund, Washam Fan, Rainer Gerhards, Wes Hardacker, David
+ Harrington, Tom Petch, Juergen Quittek, Dan Romascanu, and Bert
+ Wijnen.
+
+12. References
+
+12.1. Normative References
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC2578] McCloghrie, K., Perkins, D., and J. Schoenwaelder,
+ "Structure of Management Information Version 2 (SMIv2)",
+ RFC 2578, STD 58, April 1999.
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 20]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+ [RFC2579] McCloghrie, K., Perkins, D., and J. Schoenwaelder,
+ "Textual Conventions for SMIv2", RFC 2579, STD 58,
+ April 1999.
+
+ [RFC2580] McCloghrie, K., Perkins, D., and J. Schoenwaelder,
+ "Conformance Statements for SMIv2", RFC 2580, STD 58,
+ April 1999.
+
+ [RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An
+ Architecture for Describing Simple Network Management
+ Protocol (SNMP) Management Frameworks", STD 62, RFC 3411,
+ December 2002.
+
+ [RFC3412] Case, J., Harrington, D., Presuhn, R., and B. Wijnen,
+ "Message Processing and Dispatching for the Simple Network
+ Management Protocol (SNMP)", STD 62, RFC 3412,
+ December 2002.
+
+ [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
+ 10646", STD 63, RFC 3629, November 2003.
+
+ [RFC5424] Gerhards, R., "The Syslog Protocol", RFC 5424, March 2009.
+
+ [RFC5427] Keeni, G., "Textual Conventions for Syslog Management",
+ RFC 5427, March 2009.
+
+ [RFC5675] Marinov, V. and J. Schoenwaelder, "Mapping Simple Network
+ Management Protocol (SNMP) Notifications to SYSLOG
+ Messages", RFC 5675, October 2009.
+
+12.2. Informative References
+
+ [RFC3014] Kavasseri, R., Ed., "Notification Log MIB", RFC 3014,
+ November 2002.
+
+ [RFC3410] Case, J., Mundy, R., Partain, D., and B. Stewart,
+ "Introduction and Applicability Statements for Internet-
+ Standard Management Framework", RFC 3410, December 2002.
+
+
+
+
+
+
+
+
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 21]
+
+RFC 5676 SYSLOG-MSG-MIB October 2009
+
+
+Authors' Addresses
+
+ Juergen Schoenwaelder
+ Jacobs University Bremen
+ Campus Ring 1
+ 28725 Bremen
+ Germany
+
+ EMail: j.schoenwaelder@jacobs-university.de
+
+
+ Alexander Clemm
+ Cisco Systems
+ 170 West Tasman Drive
+ San Jose, CA 95134-1706
+ USA
+
+ EMail: alex@cisco.com
+
+
+ Anirban Karmakar
+ Cisco Systems India Pvt Ltd
+ SEZ Unit, Cessna Business Park,
+ Sarjapur Marathahalli ORR,
+ Bangalore, Karnataka 560103
+ India
+
+ EMail: akarmaka@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Schoenwaelder, et al. Standards Track [Page 22]
+