⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-cipso-ipsecurity-01.txt

📁 linux 内核源代码
💻 TXT
📖 第 1 页 / 共 2 页
字号:
3.4.4.4    Sensitivity LevelThis field is 1 octet in length. Its value is from 0 to 255.  The valuesare ordered with 0 being the minimum value and 255 representing the maximumvalue.3.4.4.5    Category RangesA category range is a 4 octet field comprised of the 2 octet index of thehighest numbered category followed by the 2 octet index of the lowestnumbered category.  These range endpoints are inclusive within the range ofcategories.  All categories within a range are included in the sensitivitylabel.  This tag may contain a maximum of 7 category pairs.  The bottomcategory endpoint for the last pair in the tag MAY be omitted and SHOULD beassumed to be 0.  The ranges MUST be non-overlapping and be listed indescending order.  Valid values for categories are 0 to 65534.  Category65535 is not a valid category value.3.4.5     Minimum RequirementsA CIPSO implementation MUST be capable of generating at least tag type 1 inthe non-optimized form.  In addition, a CIPSO implementation MUST be ableto receive any valid tag type 1 even those using the optimized tag type 1format.4.    Configuration ParametersThe configuration parameters defined below are required for all CIPSO hosts,gateways, and routers that support multiple sensitivity labels.  A CIPSOhost is defined to be the origination or destination system for an IPdatagram.  A CIPSO gateway provides IP routing services between two or moreIP networks and may be required to perform label translations betweennetworks.  A CIPSO gateway may be an enhanced CIPSO host or it may justprovide gateway services with no end system CIPSO capabilities.  A CIPSOrouter is a dedicated IP router that routes IP datagrams between two or moreIP networks.An implementation of CIPSO on a host MUST have the capability to reject adatagram for reasons that the information contained can not be adequatelyprotected by the receiving host or if acceptance may result in violation ofthe host or network security policy.  In addition, a CIPSO gateway or routerMUST be able to reject datagrams going to networks that can not provideadequate protection or may violate the network's security policy.  Toprovide this capability the following minimal set of configurationparameters are required for CIPSO implementations:HOST_LABEL_MAX - This parameter contains the maximum sensitivity label thata CIPSO host is authorized to handle.  All datagrams that have a labelgreater than this maximum MUST be rejected by the CIPSO host.  Thisparameter does not apply to CIPSO gateways or routers.  This parameter neednot be defined explicitly as it can be implicitly derived from thePORT_LABEL_MAX parameters for the associated interfaces.Internet Draft, Expires 15 Jan 93                                 [PAGE 7]CIPSO INTERNET DRAFT                                         16 July, 1992HOST_LABEL_MIN - This parameter contains the minimum sensitivity label thata CIPSO host is authorized to handle.  All datagrams that have a label lessthan this minimum MUST be rejected by the CIPSO host.  This parameter doesnot apply to CIPSO gateways or routers.  This parameter need not be definedexplicitly as it can be implicitly derived from the PORT_LABEL_MINparameters for the associated interfaces.PORT_LABEL_MAX - This parameter contains the maximum sensitivity label forall datagrams that may exit a particular network interface port.  Alloutgoing datagrams that have a label greater than this maximum MUST berejected by the CIPSO system.  The label within this parameter MUST beless than or equal to the label within the HOST_LABEL_MAX parameter.  Thisparameter does not apply to CIPSO hosts that support only one network port.PORT_LABEL_MIN - This parameter contains the minimum sensitivity label forall datagrams that may exit a particular network interface port.  Alloutgoing datagrams that have a label less than this minimum MUST berejected by the CIPSO system.  The label within this parameter MUST begreater than or equal to the label within the HOST_LABEL_MIN parameter.This parameter does not apply to CIPSO hosts that support only one networkport.PORT_DOI - This parameter is used to assign a DOI identifier value to aparticular network interface port.  All CIPSO labels within datagramsgoing out this port MUST use the specified DOI identifier.  All CIPSOhosts and gateways MUST support either this parameter, the NET_DOIparameter, or the HOST_DOI parameter.NET_DOI - This parameter is used to assign a DOI identifier value to aparticular IP network address.  All CIPSO labels within datagrams destinedfor the particular IP network MUST use the specified DOI identifier.  AllCIPSO hosts and gateways MUST support either this parameter, the PORT_DOIparameter, or the HOST_DOI parameter.HOST_DOI - This parameter is used to assign a DOI identifier value to aparticular IP host address.  All CIPSO labels within datagrams destined forthe particular IP host will use the specified DOI identifier.  All CIPSOhosts and gateways MUST support either this parameter, the PORT_DOIparameter, or the NET_DOI parameter.This list represents the minimal set of configuration parameters requiredto be compliant.  Implementors are encouraged to add to this list toprovide enhanced functionality and control.  For example, many securitypolicies may require both incoming and outgoing datagrams be checked againstthe port and host label ranges.4.1    Port Range ParametersThe labels represented by the PORT_LABEL_MAX and PORT_LABEL_MIN parametersMAY be in CIPSO or local format.  Some CIPSO systems, such as routers, maywant to have the range parameters expressed in CIPSO format so that incominglabels do not have to be converted to a local format before being comparedagainst the range.  If multiple DOIs are supported by one of these CIPSOInternet Draft, Expires 15 Jan 93                                 [PAGE 8]CIPSO INTERNET DRAFT                                         16 July, 1992systems then multiple port range parameters would be needed, one set foreach DOI supported on a particular port.The port range will usually represent the total set of labels that mayexist on the logical network accessed through the corresponding networkinterface.  It may, however, represent a subset of these labels that areallowed to enter the CIPSO system.4.2    Single Label CIPSO HostsCIPSO implementations that support only one label are not required tosupport the parameters described above.  These limited implementations areonly required to support a NET_LABEL parameter.  This parameter containsthe CIPSO label that may be inserted in datagrams that exit the host.  Inaddition, the host MUST reject any incoming datagram that has a label whichis not equivalent to the NET_LABEL parameter.5.    Handling ProceduresThis section describes the processing requirements for incoming andoutgoing IP datagrams.  Just providing the correct CIPSO label formatis not enough.  Assumptions will be made by one system on how areceiving system will handle the CIPSO label.  Wrong assumptions maylead to non-interoperability or even a security incident.  Therequirements described below represent the minimal set needed forinteroperability and that provide users some level of confidence.Many other requirements could be added to increase user confidence,however at the risk of restricting creativity and limiting vendorparticipation.5.1    Input ProceduresAll datagrams received through a network port MUST have a security labelassociated with them, either contained in the datagram or assigned to thereceiving port.  Without this label the host, gateway, or router will nothave the information it needs to make security decisions.  This securitylabel will be obtained from the CIPSO if the option is present in thedatagram.  See section 4.1.2 for handling procedures for unlabeleddatagrams.  This label will be compared against the PORT (if appropriate)and HOST configuration parameters defined in section 3.If any field within the CIPSO option, such as the DOI identifier, is notrecognized the IP datagram is discarded and an ICMP "parameter problem"(type 12) is generated and returned.  The ICMP code field is set to "badparameter" (code 0) and the pointer is set to the start of the CIPSO fieldthat is unrecognized.If the contents of the CIPSO are valid but the security label isoutside of the configured host or port label range, the datagram isdiscarded and an ICMP "destination unreachable" (type 3) is generatedand returned.  The code field of the ICMP is set to "communication withdestination network administratively prohibited" (code 9) or toInternet Draft, Expires 15 Jan 93                                 [PAGE 9]CIPSO INTERNET DRAFT                                         16 July, 1992"communication with destination host administratively prohibited"(code 10).  The value of the code field used is dependent upon whetherthe originator of the ICMP message is acting as a CIPSO host or a CIPSOgateway.  The recipient of the ICMP message MUST be able to handle eithervalue.  The same procedure is performed if a CIPSO can not be added to anIP packet because it is too large to fit in the IP options area.If the error is triggered by receipt of an ICMP message, the messageis discarded and no response is permitted (consistent with general ICMPprocessing rules).5.1.1    Unrecognized tag typesThe default condition for any CIPSO implementation is that anunrecognized tag type MUST be treated as a "parameter problem" andhandled as described in section 4.1.  A CIPSO implementation MAY allowthe system administrator to identify tag types that may safely beignored.  This capability is an allowable enhancement, not arequirement.5.1.2    Unlabeled PacketsA network port may be configured to not require a CIPSO label for allincoming  datagrams.  For this configuration a CIPSO label must beassigned to that network port and associated with all unlabeled IPdatagrams.  This capability might be used for single level networks ornetworks that have CIPSO and non-CIPSO hosts and the non-CIPSO hostsall operate at the same label.If a CIPSO option is required and none is found, the datagram isdiscarded and an ICMP "parameter problem" (type 12) is generated andreturned to the originator of the datagram.  The code field of the ICMPis set to "option missing" (code 1) and the ICMP pointer is set to 134(the value of the option type for the missing CIPSO option).5.2    Output ProceduresA CIPSO option MUST appear only once in a datagram.  Only one tag typefrom the MAC Sensitivity class MAY be included in a CIPSO option.  Giventhe current set of defined tag types, this means that CIPSO labels atfirst will contain only one tag.All datagrams leaving a CIPSO system MUST meet the following condition:        PORT_LABEL_MIN <= CIPSO label <= PORT_LABEL_MAXIf this condition is not satisfied the datagram MUST be discarded.If the CIPSO system only supports one port, the HOST_LABEL_MIN and theHOST_LABEL_MAX parameters MAY be substituted for the PORT parameters inthe above condition.The DOI identifier to be used for all outgoing datagrams is configured byInternet Draft, Expires 15 Jan 93                                 [PAGE 10]CIPSO INTERNET DRAFT                                         16 July, 1992the administrator.  If port level DOI identifier assignment is used, thenthe PORT_DOI configuration parameter MUST contain the DOI identifier touse.  If network level DOI assignment is used, then the NET_DOI parameterMUST contain the DOI identifier to use.  And if host level DOI assignmentis employed, then the HOST_DOI parameter MUST contain the DOI identifierto use.  A CIPSO implementation need only support one level of DOIassignment.5.3    DOI Processing RequirementsA CIPSO implementation MUST support at least one DOI and SHOULD supportmultiple DOIs.  System and network administrators are cautioned toensure that at least one DOI is common within an IP network to allow forbroadcasting of IP datagrams.CIPSO gateways MUST be capable of translating a CIPSO option from oneDOI to another when forwarding datagrams between networks.  Forefficiency purposes this capability is only a desired feature for CIPSOrouters.5.4    Label of ICMP MessagesThe CIPSO label to be used on all outgoing ICMP messages MUST be equivalentto the label of the datagram that caused the ICMP message.  If the ICMP wasgenerated due to a problem associated with the original CIPSO label then thefollowing responses are allowed:  a.  Use the CIPSO label of the original IP datagram  b.  Drop the original datagram with no return message generatedIn most cases these options will have the same effect.  If you can notinterpret the label or if it is outside the label range of your host orinterface then an ICMP message with the same label will probably not beable to exit the system.6.    Assignment of DOI Identifier Numbers                                   =Requests for assignment of a DOI identifier number should be addressed tothe Internet Assigned Numbers Authority (IANA).7.    AcknowledgementsMuch of the material in this RFC is based on (and copied from) workdone by Gary Winiger of Sun Microsystems and published as CommercialIP Security Option at the INTEROP 89, Commercial IPSO Workshop.8.    Author's AddressTo submit mail for distribution to members of the IETF CIPSO WorkingGroup, send mail to: cipso@wdl1.wdl.loral.com.Internet Draft, Expires 15 Jan 93                                 [PAGE 11]CIPSO INTERNET DRAFT                                         16 July, 1992To be added to or deleted from this distribution, send mail to:cipso-request@wdl1.wdl.loral.com.9.    ReferencesRFC 1038, "Draft Revised IP Security Option", M. St. Johns, IETF, January1988.RFC 1108, "U.S. Department of Defense Security Optionsfor the Internet Protocol", Stephen Kent, IAB, 1 March, 1991.Internet Draft, Expires 15 Jan 93                                 [PAGE 12]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -