On Wed, 2008-08-27 at 16:50 -0400, Paul Moore wrote: > Hi Joy, et al. > > I'll respond to the rest of you email a little bit later when I have > some time but since you and David have been having a good discussion > around DOI issues I wanted to add some quick comments ... (see below) > > On Wednesday 27 August 2008 2:41:48 pm Joy Latten wrote: > > On Wed, 2008-08-27 at 12:49 -0400, David P. Quigley wrote: > > > On Wed, 2008-08-27 at 11:17 -0500, Joy Latten wrote: > > > > On Tue, 2008-08-26 at 16:24 -0400, David P. Quigley wrote: > > > > > On Tue, 2008-08-26 at 12:17 -0500, Joy Latten wrote: > > > > > > On Mon, 2008-08-25 at 17:42 -0400, David P. Quigley wrote: > > > > > > > On Mon, 2008-08-25 at 15:46 -0500, Joy Latten wrote: > > ... > > > > > > Yea, it is unfortunate that CALIPSO is only for MLS labels. > > > > > IPv6 is still growing in its deployment so it would be nice to > > > > > have a robust and flexible method for conveying security labels > > > > > from the start. For now it seems as if CALIPSO will try to go > > > > > through just as MLS labels and then DTE or other security > > > > > labels will have to create their own IP security option. > > I've had many discussions with Randall regarding this topic, I even > offered a series of edits to earlier CALIPSO (back when it was still > SIPSO, yipee for the name change!) drafts which introduced a more > generic DTE labeling mechanism. After much discussion Randall agreed > that having a more generic, DTE-friendly labeling mechanism would be > nice but he wanted to keep CALIPSO focused on MLS labeling since that > was the feedback he had been receiving. He was very helpful and the > discussion unveiled many potential issues with a DTE labeling protocol, > primarily around the need to make the protocol more intermediate hop > friendly. > I very much liked your idea of generic. This is kinda where I want to go, something that would be somewhat flexible enough to possibly allow DTE and/or MLS labels, because the information is "opaque" to the protocol, at least the ipsec protocol. > I am currently waiting to see how the CALIPSO specification is received > by the general IETF SAAG community, especially the assertion that > explicit packet labeling is an important user requirement. If the > CALIPSO specification is well received I plan on submitting a draft > specification which will provide a more general packet labeling > mechanism for IPv6 and possibly IPv4. > Do you mean one that would take a more generic label? > > > > > > > > >I'm also concerned with the implied convention of > > > > > > > > > assigning one value to a particular implementation. In > > > > > > > > > the SELinux case, how do you deal with a non-MLS/MCS > > > > > > > > > policy such as Gentoo/Ubuntu talking to a MLS/MCS > > > > > > > > > policy such as Fedora/RHEL? What about policies with > > > > > > > > > different types? Differing numbers of MLS sensitivity > > > > > > > > > levels or categories? > > > > > > > > > > > > > > > > Hmm... not sure I understand so I may not answer this > > > > > > > > correctly... > > > > > > > > > > > > > > > > The algorithm indicates the security mechanism. > > > > > > > > In a way, it identifies the syntax/semantics of the > > > > > > > > security context to security mechanism, since security > > > > > > > > mechanisms may use different syntax/semantics for the > > > > > > > > security contexts. i.e. SELinux and SMACK. > > > > > > > > The algorithm field in SELinux is used to "authorize" the > > > > > > > > security context. In other words, SELinux only wants and > > > > > > > > understands SELinux's security context syntax/semantics. > > > > > > > > The "doi" would be used for further differentiation > > > > > > > > within SELinux domain. Far example, a sysadm wants to > > > > > > > > differentiate between SELinux policy versions in his > > > > > > > > domain. He could used "doi" field to do this. > > > > > > > > > > > > > > > > I suppose if you wanted two different security mechanisms > > > > > > > > to interoperate, a mapping of some sort would have to be > > > > > > > > created between them. The security mechanisms would need > > > > > > > > to indicate they accept (via the mapping) the other's > > > > > > > > security context syntax/semantics. In other words, they > > > > > > > > would "authorize" the two different security contexts. It > > > > > > > > would do this via the "algorithm" and/or "doi" fields. I > > > > > > > > am thinking in this case, "doi" could even indicate the > > > > > > > > mapping such as CIPSO's DOI does. > > > > > > > > > > > > > > > > I considered the information contained in the "algorithm" > > > > > > > > and "doi" fields required for interoperability, and the > > > > > > > > use implementation specific. > > > > > > > > > > > > > > > > If this doesn't answer your question, let me know. > > > > > > > > > > > > > > I think what Paul might be asking is why is it better to > > > > > > > have two fields, one for Security Mechanism and one for the > > > > > > > DOI when that can be one field. If we go with a method > > > > > > > similar to the second described above for DOIs you could > > > > > > > have IANA allocate a range of DOIs for SELinux partitioning > > > > > > > it off into a range for publicly assigned DOIs and > > > > > > > privately managed DOIs. It is acceptable to have IANA > > > > > > > create and populate a registry with values in the document. > > > > > > > > > > > > Ok, I understand now. Yes, that seems reasonable, fair, and > > > > > > flexible. I can still keep semantics (a mechanism and ability > > > > > > to group or differentiate). > > > > > > > > > > > > So, a doi field that is 32 bits, with perhaps so much for > > > > > > SELinux, further partitioned for public and private use. The > > > > > > same for Smack. Right? And remaining for future use. > > > > > > > > > > The standards people don't particularly care about specific > > > > > security models in this case. I initially mentioned > > > > > implementation specific details in my early labeled NFS drafts > > > > > and was told that those aren't really a concern of the > > > > > protocol. Since the label is a (DOI,<OPAQUE>) tuple it is up to > > > > > whomever obtains a number from IANA to define the meaning of > > > > > that DOI. However it should be written into the standard what > > > > > information is recorded by IANA to bind to these numbers. Also > > > > > do we see several registries? I really only see one registry > > > > > that can be shared by all three of these drafts. I just hope > > > > > they don't want us to write up an RFC for the definition and > > > > > management of DOIs (it might happen that way though). > > > > > > > > Ok, gotta admit, I am a little confused as to how we could share > > > > the same DOI registry with CALIPSO since they are using a > > > > dotted-quad format right now? And it doesn't seem to accomodate > > > > but one DOI from IANA which leaves me confused as to how I would > > > > get one and then partition it for private and non-private uses. > > > > > > Well we might need to talk with the CALIPSO people to figure out a > > > way that we can all use their DOI scheme. At its core their method > > > just seems to be a dotted-quad format as you have said. IANA's job > > > is to keep track of these dotted-quads. > > The CALIPSO DOI is defined as a opaque 32 bit unsigned integer, similar > to CIPSO and your description of labeled NFS's DOI. The dotted > notation used in part of the CALIPSO draft is just a convenient way of > representing the value in the same way we represent IPv4 addresses. > > The CALIPSO specification does set aside DOI ranges for specific uses > (is this the source of confusion?) which I think is a good idea and I > would encourage other protocols to follow suit. The CALIPSO draft restricted the amount of DOIs given to an organization. And I am thinking that if we share a DOI registry, I will need more than one if I want any security mechanism that uses labeled ipsec to also have a range for private use. I wasn't sure how this would fit into what the draft stated. Thus my confusion. But I do think it would be really great if we could share a registry and use DOIs in such a similar manner that we could even share the values. Am I making sense? What I mean is labeled ipsec could use the same DOIs as labeled nfs and CALIPSO. It would not have to allocate a separate range of them. regards, Joy -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.