On Mon, Mar 30, 2009 at 10:59:15PM -0700, Jarrett Lu wrote: > That's certainly one option. We can say DOI + an opaque field is what we > will add to NFSv4 protocol. Use the information as you see fit. Going That's what David's I-D and what my RPCSEC_GSSv3 I-D both say now. It's also what CALIPSO does (except that the label must be MLS and the bits on the wire are defined, though the actual sentivity levels and compartment naming and mapping to bits is not). > this route, we basically punt on the label interpretation / translation > problem. I believe this simple DOI + opaque attribute does add value as > it provides an potentially easier way for compatible systems to > communicate label attributes on file objects. I was trying to explore > whether it makes sense to include other information (e.g. OS version, > signature of security policy or label encoding files) to make handling > of label interpretation and translation easier. Signature of security policy is certainly an interesting idea! But it does require defining a standard security policy description syntax -- that's work that I think is well outside what this WG should be working on. (Also, we'll need hash function agility.) Therefore I think the NFSv4 community should stop at either - {DOI #, opaque label, hash function name, hash-of-policy} (which means blocking on a standards-track labeled policy document) or, more likely, - {DOI #, opaque label, [extensibility field for future hash function name / hash-of-policy]}. The latter seems better to me because {DOI #, opaque label} is the easy way forward for this WG, but we'd make room for a future hash-of-policy. I think the security area of the IETF should explore Kerberos V authz-data and PKIX certificate extensions to ensure DOI label encoding synchronization (whether based on my sketch or some other approach) as well as a common labeled security policy syntax covering MLS and DTE. I know, where each set of documents gets done is a subtle distinction when it might well be the same people doing all of them. But it's an important distinction here. Also, it's possible that some of this work will be done in the form of individual submission I-Ds all the way if it doesn't naturally fit any WG and we don't have enough work to justify spinning up a new WG. But we'd still seek review in the appropriate WGs (NFSv4 WG for NFS work, KRB-WG for Kerberos work, PKIX WG for PKIX work, SAAG for labeled security policy description). (Between CALIPSO and NFSv4 and all the other potential work mentioned above we might well have enough work for a new WG. But I think we should proceed as though we don't, for now.) > Continuing on these lists is fine with me. People on these lists > probably have high tolerance on postings that don't care about. It sure seems that way so far :) Nico -- -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.