📄 draft-ietf-cipso-ipsecurity-01.txt
字号:
IETF CIPSO Working Group16 July, 1992 COMMERCIAL IP SECURITY OPTION (CIPSO 2.2)1. StatusThis Internet Draft provides the high level specification for a CommercialIP Security Option (CIPSO). This draft reflects the version as approved bythe CIPSO IETF Working Group. Distribution of this memo is unlimited.This document is an Internet Draft. Internet Drafts are working documentsof the Internet Engineering Task Force (IETF), its Areas, and its WorkingGroups. Note that other groups may also distribute working documents asInternet Drafts.Internet Drafts are draft documents valid for a maximum of six months.Internet Drafts may be updated, replaced, or obsoleted by other documentsat any time. It is not appropriate to use Internet Drafts as referencematerial or to cite them other than as a "working draft" or "work inprogress."Please check the I-D abstract listing contained in each Internet Draftdirectory to learn the current status of this or any other Internet Draft.2. BackgroundCurrently the Internet Protocol includes two security options. One ofthese options is the DoD Basic Security Option (BSO) (Type 130) which allowsIP datagrams to be labeled with security classifications. This optionprovides sixteen security classifications and a variable number of handlingrestrictions. To handle additional security information, such as securitycategories or compartments, another security option (Type 133) exists andis referred to as the DoD Extended Security Option (ESO). The values forthe fixed fields within these two options are administered by the DefenseInformation Systems Agency (DISA).Computer vendors are now building commercial operating systems withmandatory access controls and multi-level security. These systems areno longer built specifically for a particular group in the defense orintelligence communities. They are generally available commercial systemsfor use in a variety of government and civil sector environments.The small number of ESO format codes can not support all the possibleapplications of a commercial security option. The BSO and ESO weredesigned to only support the United States DoD. CIPSO has been designedto support multiple security policies. This Internet Draft provides theformat and procedures required to support a Mandatory Access Controlsecurity policy. Support for additional security policies shall bedefined in future RFCs.Internet Draft, Expires 15 Jan 93 [PAGE 1]CIPSO INTERNET DRAFT 16 July, 19923. CIPSO FormatOption type: 134 (Class 0, Number 6, Copy on Fragmentation)Option length: VariableThis option permits security related information to be passed betweensystems within a single Domain of Interpretation (DOI). A DOI is acollection of systems which agree on the meaning of particular valuesin the security option. An authority that has been assigned a DOIidentifier will define a mapping between appropriate CIPSO field valuesand their human readable equivalent. This authority will distribute thatmapping to hosts within the authority's domain. These mappings may besensitive, therefore a DOI authority is not required to make thesemappings available to anyone other than the systems that are included inthe DOI.This option MUST be copied on fragmentation. This option appears at mostonce in a datagram. All multi-octet fields in the option are defined to betransmitted in network byte order. The format of this option is as follows:+----------+----------+------//------+-----------//---------+| 10000110 | LLLLLLLL | DDDDDDDDDDDD | TTTTTTTTTTTTTTTTTTTT |+----------+----------+------//------+-----------//---------+ TYPE=134 OPTION DOMAIN OF TAGS LENGTH INTERPRETATION Figure 1. CIPSO Format3.1 TypeThis field is 1 octet in length. Its value is 134.3.2 LengthThis field is 1 octet in length. It is the total length of the optionincluding the type and length fields. With the current IP header lengthrestriction of 40 octets the value of this field MUST not exceed 40.3.3 Domain of Interpretation IdentifierThis field is an unsigned 32 bit integer. The value 0 is reserved and MUSTnot appear as the DOI identifier in any CIPSO option. Implementationsshould assume that the DOI identifier field is not aligned on any particularbyte boundary.To conserve space in the protocol, security levels and categories arerepresented by numbers rather than their ASCII equivalent. This requiresa mapping table within CIPSO hosts to map these numbers to theircorresponding ASCII representations. Non-related groups of systems mayInternet Draft, Expires 15 Jan 93 [PAGE 2]CIPSO INTERNET DRAFT 16 July, 1992have their own unique mappings. For example, one group of systems mayuse the number 5 to represent Unclassified while another group may use thenumber 1 to represent that same security level. The DOI identifier is usedto identify which mapping was used for the values within the option.3.4 Tag TypesA common format for passing security related information is necessaryfor interoperability. CIPSO uses sets of "tags" to contain the securityinformation relevant to the data in the IP packet. Each tag begins witha tag type identifier followed by the length of the tag and ends with theactual security information to be passed. All multi-octet fields in a tagare defined to be transmitted in network byte order. Like the DOIidentifier field in the CIPSO header, implementations should assume thatall tags, as well as fields within a tag, are not aligned on any particularoctet boundary. The tag types defined in this document contain alignmentbytes to assist alignment of some information, however alignment can notbe guaranteed if CIPSO is not the first IP option.CIPSO tag types 0 through 127 are reserved for defining standard tagformats. Their definitions will be published in RFCs. Tag types whoseidentifiers are greater than 127 are defined by the DOI authority and mayonly be meaningful in certain Domains of Interpretation. For these tagtypes, implementations will require the DOI identifier as well as the tagnumber to determine the security policy and the format associated with thetag. Use of tag types above 127 are restricted to closed networks whereinteroperability with other networks will not be an issue. Implementationsthat support a tag type greater than 127 MUST support at least one DOI thatrequires only tag types 1 to 127.Tag type 0 is reserved. Tag types 1, 2, and 5 are defined in thisInternet Draft. Types 3 and 4 are reserved for work in progress.The standard format for all current and future CIPSO tags is shown below:+----------+----------+--------//--------+| TTTTTTTT | LLLLLLLL | IIIIIIIIIIIIIIII |+----------+----------+--------//--------+ TAG TAG TAG TYPE LENGTH INFORMATION Figure 2: Standard Tag FormatIn the three tag types described in this document, the length and countrestrictions are based on the current IP limitation of 40 octets for allIP options. If the IP header is later expanded, then the length and countrestrictions specified in this document may increase to use the full areaprovided for IP options.3.4.1 Tag Type ClassesTag classes consist of tag types that have common processing requirementsand support the same security policy. The three tags defined in thisInternet Draft belong to the Mandatory Access Control (MAC) SensitivityInternet Draft, Expires 15 Jan 93 [PAGE 3]CIPSO INTERNET DRAFT 16 July, 1992class and support the MAC Sensitivity security policy.3.4.2 Tag Type 1This is referred to as the "bit-mapped" tag type. Tag type 1 is includedin the MAC Sensitivity tag type class. The format of this tag type is asfollows:+----------+----------+----------+----------+--------//---------+| 00000001 | LLLLLLLL | 00000000 | LLLLLLLL | CCCCCCCCCCCCCCCCC |+----------+----------+----------+----------+--------//---------+ TAG TAG ALIGNMENT SENSITIVITY BIT MAP OF TYPE LENGTH OCTET LEVEL CATEGORIES Figure 3. Tag Type 1 Format3.4.2.1 Tag TypeThis field is 1 octet in length and has a value of 1.3.4.2.2 Tag LengthThis field is 1 octet in length. It is the total length of the tag typeincluding the type and length fields. With the current IP header lengthrestriction of 40 bytes the value within this field is between 4 and 34.3.4.2.3 Alignment OctetThis field is 1 octet in length and always has the value of 0. Its purposeis to align the category bitmap field on an even octet boundary. This willspeed many implementations including router implementations.3.4.2.4 Sensitivity LevelThis field is 1 octet in length. Its value is from 0 to 255. The valuesare ordered with 0 being the minimum value and 255 representing the maximumvalue.3.4.2.5 Bit Map of CategoriesThe length of this field is variable and ranges from 0 to 30 octets. Thisprovides representation of categories 0 to 239. The ordering of the bitsis left to right or MSB to LSB. For example category 0 is represented bythe most significant bit of the first byte and category 15 is representedby the least significant bit of the second byte. Figure 4 graphicallyshows this ordering. Bit N is binary 1 if category N is part of the labelfor the datagram, and bit N is binary 0 if category N is not part of thelabel. Except for the optimized tag 1 format described in the next section,Internet Draft, Expires 15 Jan 93 [PAGE 4]CIPSO INTERNET DRAFT 16 July, 1992minimal encoding SHOULD be used resulting in no trailing zero octets in thecategory bitmap. octet 0 octet 1 octet 2 octet 3 octet 4 octet 5 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX . . .bit 01234567 89111111 11112222 22222233 33333333 44444444number 012345 67890123 45678901 23456789 01234567 Figure 4. Ordering of Bits in Tag 1 Bit Map3.4.2.6 Optimized Tag 1 FormatRouters work most efficiently when processing fixed length fields. Tosupport these routers there is an optimized form of tag type 1. The formatdoes not change. The only change is to the category bitmap which is set toa constant length of 10 octets. Trailing octets required to fill out the 10octets are zero filled. Ten octets, allowing for 80 categories, was chosenbecause it makes the total length of the CIPSO option 20 octets. If CIPSOis the only option then the option will be full word aligned and additionalfiller octets will not be required.3.4.3 Tag Type 2This is referred to as the "enumerated" tag type. It is used to describelarge but sparsely populated sets of categories. Tag type 2 is in the MACSensitivity tag type class. The format of this tag type is as follows:+----------+----------+----------+----------+-------------//-------------+| 00000010 | LLLLLLLL | 00000000 | LLLLLLLL | CCCCCCCCCCCCCCCCCCCCCCCCCC |+----------+----------+----------+----------+-------------//-------------+ TAG TAG ALIGNMENT SENSITIVITY ENUMERATED TYPE LENGTH OCTET LEVEL CATEGORIES Figure 5. Tag Type 2 Format3.4.3.1 Tag TypeThis field is one octet in length and has a value of 2.3.4.3.2 Tag LengthThis field is 1 octet in length. It is the total length of the tag typeincluding the type and length fields. With the current IP header lengthrestriction of 40 bytes the value within this field is between 4 and 34.3.4.3.3 Alignment OctetThis field is 1 octet in length and always has the value of 0. Its purposeis to align the category field on an even octet boundary. This willInternet Draft, Expires 15 Jan 93 [PAGE 5]CIPSO INTERNET DRAFT 16 July, 1992speed many implementations including router implementations.3.4.3.4 Sensitivity LevelThis field is 1 octet in length. Its value is from 0 to 255. The valuesare ordered with 0 being the minimum value and 255 representing themaximum value.3.4.3.5 Enumerated CategoriesIn this tag, categories are represented by their actual value rather thanby their position within a bit field. The length of each category is 2octets. Up to 15 categories may be represented by this tag. Valid valuesfor categories are 0 to 65534. Category 65535 is not a valid categoryvalue. The categories MUST be listed in ascending order within the tag.3.4.4 Tag Type 5This is referred to as the "range" tag type. It is used to representlabels where all categories in a range, or set of ranges, are includedin the sensitivity label. Tag type 5 is in the MAC Sensitivity tag typeclass. The format of this tag type is as follows:+----------+----------+----------+----------+------------//-------------+| 00000101 | LLLLLLLL | 00000000 | LLLLLLLL | Top/Bottom | Top/Bottom |+----------+----------+----------+----------+------------//-------------+ TAG TAG ALIGNMENT SENSITIVITY CATEGORY RANGES TYPE LENGTH OCTET LEVEL Figure 6. Tag Type 5 Format3.4.4.1 Tag TypeThis field is one octet in length and has a value of 5.3.4.4.2 Tag LengthThis field is 1 octet in length. It is the total length of the tag typeincluding the type and length fields. With the current IP header lengthrestriction of 40 bytes the value within this field is between 4 and 34.3.4.4.3 Alignment OctetThis field is 1 octet in length and always has the value of 0. Its purposeis to align the category range field on an even octet boundary. This willspeed many implementations including router implementations.Internet Draft, Expires 15 Jan 93 [PAGE 6]CIPSO INTERNET DRAFT 16 July, 1992
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -