Re: [RFC 1/2] labeled ipsec internet drafts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2008-08-27 at 17:56 -0400, Paul Moore wrote:
> On Wednesday 27 August 2008 5:21:17 pm David P. Quigley wrote:
> > I would like Paul to give his opinion on this as well but I think the
> > best thing at the moment would be go submit your draft where the DOI
> > is a tuple of (mechanism,doi). I personally like the idea of
> > representing the 32 bit value as a series of four octets for human
> > readable purposes but your idea does have some merit with regards to
> > what information should be stored with these numbers by IANA. By
> > having your draft out there recommending your method of handling DOIs
> > it gives people one more thing to consider for discussion during the
> > BOF.
> 
> Our emails may have crossed in flight, but just in case it isn't clear 
> from the response I sent earlier this afternoon I think we are best 
> served with the DOI as a unified 32 bit value (the dotted notation is 
> just for display/readability purposes).

I completely agree.

> 
> I would encourage us to stop thinking about specific DOI values 
> as "SELinux", "Smack", or whatever.  There is no reason we can't get 
> the different labeled security implementation to work together but if 
> we continue to propagate the notion of implementation specific DOIs 
> then it becomes that much harder.  I think we need to think of DOIs as 
> defining a mapping between an on-the-wire label format to a semantic 
> meaning; the actual format of the wire label isn't important, the 
> meaning of the label is what really counts.  Once we understand what a 
> wire formatted label means we can internalize it however we need to so 
> that the implementation can do the necessary access control.

Once again agreed. The issue with this though is that this generalized
on the wire label is a very difficult thing to come up with. Especially
since you really want to express concepts such as this webserver can
only serve public data. That is the kind of high level semantic you
would want to specify and then have the endpoints decide what that
means. For MLS this might translate into a category for SELinux this
might translate into a specific type. This is by no means an easy
problem. 


> 
> Once again, think of how we handle the MLS-only CIPSO labels today; it 
> is a simplified example but it demonstrates the basic concept of 
> internalizing implementation agnostic security labels and the 
> interoperability benefits that result.
> 

You might have to explain this to me. The issue you raise in the
paragraph above deals with talking in terms of mechanisms not
necessarily implementations. The issue with CIPSO is that it is only one
mechanism which allows them to define their labels in an implementation
agnostic manner since everyone has agreed on the mechanism. This is a
little harder when you're spanning mechanisms unless we use something
similar to what I describe above.

Dave


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux