This ran for a week (or longer) over on opensolaris-arc.  
http://mail.opensolaris.org/pipermail/opensolaris-arc/2009-June/016505.html

I'm re-distilling on this alias to ensure proper aging and body. 

I'd appreciate feedback.  I'll set the timer for next Wednesday, 2009-09-02.

The text is available at: 
http://cr.opensolaris.org/~devnull/PSARC/2008/252/psarc_2008_252_draft_opinion.txt
 
<http://cr.opensolaris.org/%7Edevnull/PSARC/2008/252/psarc_2008_252_draft_opinion.txt>

It is also attached here (inline):


   Sun
   Microsystems              Systems Architecture Committee
_________________________________________________________________

Subject:        Labeled IPsec phase 1

Submitted by:   Bill Sommerfeld

File:           PSARC/2008/252/opinion.txt

Date:           June 17th, 2009.

Committee:      Kais Belgaied (opinion written by Mark Martin), James Carlson,
                Mark Carlson, Richard Matthews, Sebastien Roy, Gary Winiger
                
Product Approval Committee:
                Solaris PAC
                solaris-pac-opinion at sun.com

1.  Summary

The current labeled networking technologies in Trusted Extensions assume that
the underlying network will not misroute or manipulate packets in flight between
parties. This project proposes to augment labeled networking to allow IPsec to
be used instead of or in addition to the existing CIPSO security option, with
the IPsec SADB augmented to associate sensitivity labels with each security
association.

2.  Decision & Precedence Information

The project is approved as specified in reference [1].

The project may be delivered in a patch release of Solaris.


3.  Interfaces

                      Interfaces Exported

    Interface           Classification      Comments
    ike config file     Committed           /etc/inet/ike/config
    PF_KEY extensions   Committed

4.  Opinion

4.1.  The "wire-label" keyword

Members of the committe noted that the "wire-label" keyword has the potential
for confusion. It can be used to control two different and possibly independent
things: the choice of outer labels on IKE and AH/ESP traffic. Those labels can
conceivably each be entirely missing, computed based on the label ranges of the
peers (either max or min), hard-coded to some particular value, or driven by the
label of the invoking zone.

There are at least 25 distinct choices for the two policies combined, perhaps
more if we get really creative. The single keyword approach means that you need
to have subkeywords that somehow indicate how each of this traffic will be
handled. That would make a lot of sense if there were only a handful of
operationally meaningful combinations.

Depending on the amount of "meaningful combinations", or the most meaningful of
those combinations, the "omit/omit" setting may be obvious as a way to get out
of the CIPSO mire, but it seems all of the others require detailed understanding
of the policies that sites have and (likely) the limitations of the other
vendor's equipment they're using.

It is strongly suggested to control them separately, and introduce a single
simplified control in the future if particular combinations turn out to be
common enough to warrant it. This last point was not felt strongly enough to be
listed as a TCA

5.  Minority Opinion(s)

None.

6.  Advisory Information

None.

7.  Appendices

7.1.  Appendix A: Technical Changes Required

None.

7.2.  Appendix B: Technical Changes Advised

None.

7.3.  Appendix C: Reference Material

Unless stated otherwise, path names are relative to the case directory
PSARC/2008/097.

1    Onepager
     File: 20080409_bill.sommerfeld

2    Inception minutes
     File: inception.materials/20080806.2008.252.inception
         
3    Commmitment minutes
         File:  commitment.materials/20090128.2008.252.commitment

4    Issues
     File: issues

5    PSARC 20 Questions.
     File: commitment.materials/txipsec-phase1-20q.txt

6    Security 
     File: inception.materials/txipsec-phase1-security.txt



PSARC/2008/252               Copyright 2008 Sun Microsystems



Reply via email to