diff options
Diffstat (limited to 'doc/rfc/rfc1108.txt')
-rw-r--r-- | doc/rfc/rfc1108.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc1108.txt b/doc/rfc/rfc1108.txt new file mode 100644 index 0000000..09e7d29 --- /dev/null +++ b/doc/rfc/rfc1108.txt @@ -0,0 +1,955 @@ + + + + + + +Network Working Group S. Kent +Request for Comments: 1108 BBN Communications +Obsoletes: RFC 1038 November 1991 + + + U.S. Department of Defense + Security Options for the Internet Protocol + + +Status of this Memo + + This RFC specifies an IAB standards track protocol for the Internet + community, and requests discussion and suggestions for improvements. + Please refer to the current edition of the "IAB Official Protocol + Standards" for the standardization state and status of this protocol. + Distribution of this memo is unlimited. + +Abstract + + This RFC specifies the U.S. Department of Defense Basic Security + Option and the top-level description of the Extended Security Option + for use with the Internet Protocol. This RFC obsoletes RFC 1038 + "Revised IP Security Option", dated January 1988. + +1. DoD Security Options Defined + + The following two internet protocol options are defined for use on + Department of Defense (DoD) common user data networks: + + CF CLASS # TYPE LENGTH DESCRIPTION + + 1 0 2 130 var. DoD Basic Security: Used to carry the + classification level and protection + authority flags. + + + 1 0 5 133 var. DoD Extended Security: Used to carry + additional security information as + required by registered authorities. + + CF = Copy on Fragmentation + +2. DoD Basic Security Option + + This option identifies the U.S. classification level at which the + datagram is to be protected and the authorities whose protection + rules apply to each datagram. + + + + +Kent [Page 1] + +RFC 1108 U.S. DOD Security Option November 1991 + + + This option is used by end systems and intermediate systems of an + internet to: + + a. Transmit from source to destination in a network standard + representation the common security labels required by computer + security models, + + b. Validate the datagram as appropriate for transmission from + the source and delivery to the destination, + + c. Ensure that the route taken by the datagram is protected to + the level required by all protection authorities indicated on + the datagram. In order to provide this facility in a general + Internet environment, interior and exterior gateway protocols + must be augmented to include security label information in + support of routing control. + + The DoD Basic Security option must be copied on fragmentation. This + option appears at most once in a datagram. Some security systems + require this to be the first option if more than one option is + carried in the IP header, but this is not a generic requirement + levied by this specification. + + The format of the DoD Basic Security option is as follows: + + +------------+------------+------------+-------------//----------+ + | 10000010 | XXXXXXXX | SSSSSSSS | AAAAAAA[1] AAAAAAA0 | + | | | | [0] | + +------------+------------+------------+-------------//----------+ + TYPE = 130 LENGTH CLASSIFICATION PROTECTION + LEVEL AUTHORITY + FLAGS + + FIGURE 1. DoD BASIC SECURITY OPTION FORMAT + +2.1. Type + + The value 130 identifies this as the DoD Basic Security Option. + +2.2. Length + + The length of the option is variable. The minimum length of the + option is 3 octets, including the Type and Length fields (the + Protection Authority field may be absent). A length indication of + less than 3 octets should result in error processing as described in + Section 2.8.1. + + + + + +Kent [Page 2] + +RFC 1108 U.S. DOD Security Option November 1991 + + +2.3. Classification Level + + Field Length: One Octet + + This field specifies the (U.S.) classification level at which the + datagram must be protected. The information in the datagram must be + protected at this level. The field is encoded as shown in Table 1 + and the order of values in this table defines the ordering for + comparison purposes. The bit string values in this table were chosen + to achieve a minimum Hamming distance of four (4) between any two + valid values. This specific assignment of classification level names + to values has been defined for compatibility with security devices + which have already been developed and deployed. + + "Reserved" values in the table must be treated as invalid until such + time they are assigned to named classification levels in a successor + to this document. A datagram containing a value for this field which + is either not in this table or which is listed as "reserved" is in + error and must be processed according to the "out-of-range" + procedures defined in section 2.8.1. + + A classification level value from the Basic Security Option in a + datagram may be checked for equality against any of the (assigned) + values in Table 1 by performing a simple bit string comparison. + However, because of the sparseness of the classification level + encodings, range checks involving a value from this field must not be + performed based solely using arithmetic comparisons (as such + comparisons would encompass invalid and or unassigned values within + the range). The details of how ordered comparisons are performed for + this field within a system is a local matter, subject to the + requirements set forth in this paragraph. + + Table 1. Classification Level Encodings + + Value Name + + 00000001 - (Reserved 4) + 00111101 - Top Secret + 01011010 - Secret + 10010110 - Confidential + 01100110 - (Reserved 3) + 11001100 - (Reserved 2) + 10101011 - Unclassified + 11110001 - (Reserved 1) + + + + + + + +Kent [Page 3] + +RFC 1108 U.S. DOD Security Option November 1991 + + +2.4. Protection Authority Flags + + Field Length: Variable + + This field identifies the National Access Programs or Special Access + Programs which specify protection rules for transmission and + processing of the information contained in the datagram. Note that + protection authority flags do NOT represent accreditation + authorities, though the semantics are superficially similar. In + order to maintain architectural consistency and interoperability + throughout DoD common user data networks, users of these networks + should submit requirements for additional Protection Authority Flags + to DISA DISDB, Washington, D.C. 20305-2000, for review and approval. + Such review and approval should be sought prior to design, + development or deployment of any system which would make use of + additional facilities based on assignment of new protection authority + flags. As additional flags are approved and assigned, they will be + published, along with the values defined above, in the Assigned + Numbers RFC edited by the Internet Assigned Numbers Authority (IANA). + + a. Field Length: This field is variable in length. The low- + order bit (Bit 7) of each octet is encoded as "0" if it is the + final octet in the field or as "1" if there are additional + octets. Initially, only one octet is required for this field + (because there are fewer than seven authorities defined), thus + the final bit of the first octet is encoded as "0". However, + minimally compliant implementations must be capable of + processing a protection authority field consisting of at least 2 + octets (representing up to 14 protection authorities). + Implementations existing prior to the issuance of this RFC, and + which process fewer protection authority than specified here, + will be considered minimally compliant so long as such + implementations process the flags in accordance with the RFC. + This field must be a minimally encoded representation, i.e., no + trailing all-zero octets should be emitted. If the length of + this field as indicated by this extensible encoding is not + consistent with the length field for the option, the datagram is + in error and the procedure described in Section 2.8.1 must be + followed. (Figure 2 illustrates the relative significance of + the bits within an octet). + + 0 1 2 3 4 5 6 7 + +---+---+---+---+---+---+---+---+ + High-order | | | | | | | | | Low-order + +---+---+---+---+---+---+---+---+ + + Figure 2. Significance of Bits + + + + +Kent [Page 4] + +RFC 1108 U.S. DOD Security Option November 1991 + + + b. Source Flags: The first seven bits (Bits 0 through 6) in + each octet are flags. Each flag is associated with an + authority. Protection Authority flags currently assigned are + indicated in Table 2. The bit corresponding to an authority is + "1" if the datagram is to be protected in accordance with the + rules of that authority. More than one flag may be present in a + single instance of this option if the data contained in the + datagram should be protected according to rules established by + multiple authorities. Table 3 identifies a point of contact for + each of the authorities listed in Table 2. No "unassigned" bits + in this or other octets in the Protection Authority Field shall + be considered valid Protection Authority flags until such time + as such bits are assigned and the assignments are published in + the Assigned Numbers RFC. Thus a datagram containing flags for + unassigned bits in this field for this option is in error and + must be processed according to the "out-of-range" procedures + defined in section 2.8.1. + + Two protection authority flag fields can be compared for + equality (=) via simple bit string matching. No relative + ordering between two protection authority flag fields is + defined. Because these flags represent protection authorities, + security models such as Bell-LaPadula do not apply to + interpretation of this field. However, the symbol "=<" refers + to set inclusion when comparing a protection authority flag + field to a set of such fields. Means for effecting these tests + within a system are a local matter, subject to the requirements + set forth in this paragraph. + + Table 2 - Protection Authority Bit Assignments + + BIT + NUMBER AUTHORITY + + 0 GENSER + + 1 SIOP-ESI + + 2 SCI + + 3 NSA + + 4 DOE + + 5, 6 Unassigned + + 7 Field Termination Indicator + + + + +Kent [Page 5] + +RFC 1108 U.S. DOD Security Option November 1991 + + + Table 3 - Protection Authority Points of Contact + + AUTHORITY POINT OF CONTACT + + GENSER Designated Approving Authority + per DOD 5200.28 + + SIOP-ESI Department of Defense + Organization of the + Joint Chiefs of Staff + Attn: J6 + Washington, DC 20318-6000 + + SCI Director of Central Intelligence + Attn: Chairman, Information + Handling Committee, Intelligence + Community Staff + Washington, D.C. 20505 + + NSA National Security Agency + 9800 Savage Road + Attn: T03 + Ft. Meade, MD 20755-6000 + + DOE Department of Energy + Attn: DP343.2 + Washington, DC 20545 + +2.5. System Security Configuration Parameters + + Use of the Basic Security Option (BSO) by an end or intermediate + system requires that the system configuration include the parameters + described below. These parameters are critical to secure processing + of the BSO, and thus must be protected from unauthorized + modification. Note that compliant implementations must allow a + minimum of 14 distinct Protection Authority flags (consistent with + the Protection Authority field size defined in Section 2.4) to be set + independently in any parameter involving Protection Authority flag + fields. + + a. SYSTEM-LEVEL-MAX: This parameter specifies the highest + Classification Level (see Table 1) which may be present in the + classification level field of the Basic Security Option in any + datagram transmitted or received by the system. + + b. SYSTEM-LEVEL-MIN: This parameter specifies the lowest + Classification Level (see Table 1) which may be present in the + classification level field of the Basic Security Option in any + + + +Kent [Page 6] + +RFC 1108 U.S. DOD Security Option November 1991 + + + datagram transmitted by the system. + + c. SYSTEM-AUTHORITY-IN: This parameter is a set, each member of + which is a Protection Authority flag field. The set enumerates + all of the Protection Authority flag fields which may be present + in the Protection Authority field of the Basic Security Option + in any datagram received by this system. A compliant + implementation must be capable of representing at least 256 + distinct Protection Authority flag fields (each field must be + capable of representing 14 distinct Protection Authority flags) + in this set. Each element of the enumerated set may be a + combination of multiple protection authority flags. + + Set elements representing multiple Protection Authorities are + formed by ORing together the flags that represent each + authority. Thus, for example, a set element representing + datagrams to be protected according to NSA and SCI rules might + be represented as "00110000" while an element representing + protection mandated by NSA, DOE and SIOP-ESI might be + represented as "01011000". (These examples illustrate 8-bit set + elements apropos the minimal encodings for currently defined + Protection Authority flags. If additional flags are defined + beyond the first byte of the Protection Authority Field, longer + encodings for set elements may be required.) + + It is essential that implementations of the Internet Protocol + Basic Security Option provide a convenient and compact way for + system security managers to express which combinations of flags + are allowed. The details of such an interface are outside the + scope of this RFC, however, enumeration of bit patterns is NOT a + recommended interface. As an alternative, one might consider a + notation of the form COMB(GENSER,NSA,SCI)+COMB(SIOP-ESI,NSA,SCI) + in which "COMB" means ANY combination of the flags referenced as + parameters of the COMB function are allowed and "+" means "or". + + d. SYSTEM-AUTHORITY-OUT: This parameter is a set, each member + of which is a Protection Authority flag field. The set + enumerates all of the Protection Authority flag fields which may + be present in the Protection Authority field of the Basic + Security Option in any datagram transmitted by this system. A + compliant implementation must be capable of representing at + least 256 distinct Protection Authority flag fields in this set. + Explicit enumeration of all authorized Protection Authority + field flags permits great flexibility, and in particular does + not impose set inclusion restrictions on this parameter. + + The following configuration parameters are defined for each network + port present on the system. The term "port" is used here to refer + + + +Kent [Page 7] + +RFC 1108 U.S. DOD Security Option November 1991 + + + either to a physical device interface (which may represent multiple + IP addresses) or to a single IP address (which may be served via + multiple physical interfaces). In general the former interpretation + will apply and is consistent with the Trusted Network Interpretation + of the Trusted Computer Systems Evaluation Criteria (TNI) concept of + a "communications channel" or "I/O device." However, the latter + interpretation also may be valid depending on local system security + capabilities. Note that some combinations of port parameter values + are appropriate only if the port is "single level," i.e., all data + transmitted or received via the port is accurately characterized by + exactly one Classification Level and Protection Authority Flag field. + + e. PORT-LEVEL-MAX: This parameter specifies the highest + Classification Level (see Table 1) which may be present in the + classification level field of the Basic Security Option in any + datagram transmitted or received by the system via this network + port. + + f. PORT-LEVEL-MIN: This parameter specifies the lowest + Classification Level (see Table 1) which may be present in the + classification level field of the Basic Security Option in any + datagram transmitted by the system via this network port. + + g. PORT-AUTHORITY-IN: This parameter is a set each member of + which is a Protection Authority flag field. The set enumerates + all of the Protection Authority flag fields which may be present + in the Protection Authority field of the Basic Security Option + in any datagram received via this port. A compliant + implementation must be capable of representing at least 256 + distinct Protection Authority flag fields in this set. + + h. PORT-AUTHORITY-OUT: This parameter is a set each member of + which is a Protection Authority flag field. The set enumerates + all of the Protection Authority flag fields which may be present + in the Protection Authority field of the Basic Security Option + in any datagram transmitted via this port. A compliant + implementation must be capable of representing at least 256 + distinct Protection Authority flag fields in this set. + + i. PORT-AUTHORITY-ERROR: This parameter is a single Protection + Authority flag field assigned to transmitted ICMP error messages + (see Section 2.8). The PORT-AUTHORITY-ERROR value is selected + from the set of values which constitute PORT-AUTHORITY-OUT. + Means for selecting the PORT-AUTHORITY-ERROR value within a + system are a local matter subject to local security policies. + + j. PORT-IMPLICIT-LABEL: This parameter specifies a single + Classification Level and a Protection Authority flag field + + + +Kent [Page 8] + +RFC 1108 U.S. DOD Security Option November 1991 + + + (which may be null) to be associated with all unlabelled + datagrams received via the port. This parameter is meaningful + only if PORT-BSO-REQUIRED-RECEIVE = FALSE, otherwise receipt of + an unlabelled datagram results in an error response. + + k. PORT-BSO-REQUIRED-RECEIVE: This parameter is a boolean which + indicates whether all datagrams received via this network port + must contain a Basic Security Option. + + l. PORT-BSO-REQUIRED-TRANSMIT: This parameter is a boolean + which indicates whether all datagrams transmitted via this + network port must contain a Basic Security Option. If this + parameter is set to FALSE, then PORT-BSO-REQUIRED-RECEIVE should + also be set to FALSE (to avoid communication failures resulting + from asymmetric labelling constraints). + + In every intermediate or end system, the following relationship must + hold for these parameters for all network interfaces. The symbol + ">=" is interpreted relative to the linear ordering defined for + security levels specified in Section 2.3 for the "LEVEL" parameters, + and as set inclusion for the "AUTHORITY" parameters. + + SYSTEM-LEVEL-MAX >= PORT-LEVEL-MAX >= + PORT-LEVEL-MIN >= SYSTEM-LEVEL-MIN + + SYSTEM-AUTHORITY-IN >= PORT-AUTHORITY-IN + and + SYSTEM-AUTHORITY-OUT >= PORT-AUTHORITY-OUT + +2.6. Configuration Considerations + + Systems which do not maintain separation for different security + classification levels of data should have only trivial ranges for the + LEVEL parameters, i.e., SYSTEM-LEVEL-MAX = PORT-LEVEL-MAX = PORT- + LEVEL-MIN = SYSTEM-LEVEL-MIN. + + Systems which do maintain separation for different security + classification levels of data may have non-trivial ranges for the + LEVEL parameters, e.g., SYSTEM-LEVEL-MAX >= PORT-LEVEL-MAX >= PORT- + LEVEL-MIN >= SYSTEM-LEVEL-MIN. + +2.7. Processing the Basic Security Option + + For systems implementing the Basic Security Option, the parameters + PORT-BSO-REQUIRED-TRANSMIT and PORT-BSO-REQUIRED-RECEIVE are used to + specify the local security policy with regard to requiring the + presence of this option on transmitted and received datagrams, + respectively, on a per-port basis. Each datagram transmitted or + + + +Kent [Page 9] + +RFC 1108 U.S. DOD Security Option November 1991 + + + received by the system must be processed in accordance with the per- + port and system-wide security parameters configured for the system. + + Systems which process only Unclassified data may or may not be + configured to generate the BSO on transmitted datagrams. Such + systems also may or may not require a BSO to be present on received + datagrams. However, all systems must be capable of accepting + datagrams containing this option, irrespective of whether the option + is processed or not. + + In general, systems which process classified data must generate this + option for transmitted datagrams. The only exception to this rule + arises in (dedicated or system high [DoD 5200.28]) networks where + traffic may be implicitly labelled rather than requiring each + attached system to generate explicit labels. If the local security + policy permits receipt of datagrams without the option, each such + datagram is presumed to be implicitly labelled based on the port via + which the datagram is received. A per-port parameter (PORT- + IMPLICIT-LABEL) specifies the label to be associated with such + datagrams upon receipt. Note that a datagram transmitted in response + to receipt of an implicitly labelled datagram, may, based on local + policy, require an explicit Basic Security Option. + +2.7.1. Handling Unclassified Datagrams + + If an unmarked datagram is received via a network port for which + PORT-BSO-REQUIRED = FALSE and PORT-IMPLICIT-LABEL = UNCLASSIFIED (NO + FLAGS), the datagram shall be processed as though no Protection + Authority Flags were set. Thus there are two distinct, valid + representations for Unclassified datagrams to which no Protection + Authority rules apply (an unmarked datagram as described here and a + datagram containing an explicit BSO with Classification Level set to + Unclassified and with no Protection Authority flags set). Note that + a datagram also may contain a Basic Security Option in which the + Classification Level is Unclassified and one or more Protection + Authority Field Flags are set. Such datagrams are explicitly + distinct from the equivalence class noted above (datagrams marked + Unclassified with no Protection Authority field flags set and + datagrams not containing a Basic Security Option). + +2.7.2. Input Processing + + Upon receipt of any datagram a system compliant with this RFC must + perform the following actions. First, if PORT-BSO-REQUIRED-RECEIVE = + TRUE for this port, then any received datagram must contain a Basic + Security Option and a missing BSO results in an ICMP error response + as specified in Section 2.8.1. A received datagram which contains a + Basic Security Option must be processed as described below. This + + + +Kent [Page 10] + +RFC 1108 U.S. DOD Security Option November 1991 + + + algorithm assumes that the IP header checksum has already been + verified and that, in the course of processing IP options, this + option has been encountered. The value of the Classification Level + field from the option will be designated "DG-LEVEL" and the value of + the Protection Authority Flags field will be designated "DG- + AUTHORITY." + + Step 1. Check that DG-LEVEL is a valid security classification level, + i.e., it must be one of the (non-reserved) values from Table + 1. If this test fails execute the out-of-range procedure in + Section 2.8.1. + + Step 2. Check that PORT-LEVEL-MAX >= DG-LEVEL. If this test fails, + execute out-of-range procedure specified in Section 2.8.2. + + Step 3. Check that DG-AUTHORITY =< PORT-AUTHORITY-IN. If this test + fails, execute out-of-range procedure specified in Section + 2.8.2. + +2.7.3. Output Processing + + Any system which implements the Basic Security Option must adhere to + a fundamental rule with regard to transmission of datagrams, i.e., no + datagram shall be transmitted with a Basic Security Option the value + of which is outside of the range for which the system is configured. + Thus for every datagram transmitted by a system the following must + hold: PORT-LEVEL-MAX >= DG-LEVEL >= PORT-LEVEL-MIN and DG-AUTHORITY + =< PORT-AUTHORITY-OUT. It is a local matter as to what procedures + are followed by a system which detects at attempt to transmit a + datagram for which these relationships do not hold. + + If a port is configured to allow both labelled and unlabelled + datagrams (PORT-BSO-REQUIRED-TRANSMIT = FALSE) to be transmitted, the + question arises as to whether a label should be affixed. In + recognition of the lack of widespread implementation or use of this + option, especially in unclassified networks, this RFC recommends that + the default be transmission of unlabelled datagrams. If the + destination requires all datagrams to be labelled on input, then it + will respond with an ICMP error message (see Section 2.8.1) and the + originator can respond by labelling successive packets transmitted to + this destination. + + To support this mode of operation, a system which allows transmission + of both labelled and unlabelled datagrams must maintain state + information (a cache) so that the system can associate the use of + labels with specific destinations, e.g., in response to receipt of an + ICMP error message as specified in Section 2.8.1. This requirement + for maintaining a per-destination cache is very much analogous to + + + +Kent [Page 11] + +RFC 1108 U.S. DOD Security Option November 1991 + + + that imposed for processing the IP source route option or for + maintaining first hop routing information (RFC 1122). This RFC does + not specify which protocol module must maintain the per-destination + cache (e.g., IP vs. TCP or UDP) but security engineering constraints + may dictate an IP implementation in trusted systems. This RFC also + does not specify a cache maintenance algorithm, though use of a timer + and activity flag may be appropriate. + +2.8. Error Procedures + + Datagrams received with errors in the Basic Security Option or which + are out of range for the network port via which they are received, + should not be delivered to user processes. Local policy will specify + whether logging and/or notification of a system security officer is + required in response to receipt of such datagrams. The following are + the least restrictive actions permitted by this protocol. Individual + end or intermediate systems, system administrators, or protection + authorities may impose more stringent restrictions on responses and + in some instances may not permit any response at all to a datagram + which is outside the security range of a host or system. + + In all cases, if the error is triggered by receipt of an ICMP, the + ICMP is discarded and no response is permitted (consistent with + general ICMP processing rules). + +2.8.1.Parameter Problem Response + + If a datagram is received with no Basic Security Option and the + system security configuration parameters require the option on the + network port via which the datagram was received, an ICMP Parameter + Problem Missing Option (Type = 12, Code = 1) message is transmitted + in response. The Pointer field of the ICMP should be set to the + value "130" to indicate the type of option missing. A Basic Security + Option is included in the response datagram with Clearance Level set + to PORT-LEVEL-MIN and Protection Authority Flags set to PORT- + AUTHORITY-ERROR. + + If a datagram is received in which the Basic Security Option is + malformed (e.g., an invalid Classification Level Protection Authority + Flag field), an ICMP Parameter Problem (Type = 12, Code = 0) message + is transmitted in response. The pointer field is set to the + malformed Basic Security Option. The Basic Security Option is + included in the response datagram with Clearance Level set to PORT- + LEVEL-MIN and Protection Authority Flags set to PORT-AUTHORITY-ERROR. + + + + + + + +Kent [Page 12] + +RFC 1108 U.S. DOD Security Option November 1991 + + +2.8.2. Out-Of-Range Response + + If a datagram is received which is out of range for the network port + on which it was received, an ICMP Destination Unreachable + Communication Administratively Prohibited (Type = 3, Code = 9 for net + or Code = 10 for host) message is transmitted in response. A Basic + Security Option is included in the response datagram with Clearance + Level set to PORT-LEVEL-MIN and Protection Authority Flags set to + PORT-AUTHORITY-ERROR. + +2.9. Trusted Intermediary Procedure + + Certain devices in an internet may act as intermediaries to validate + that communications between two hosts are authorized. This decision + is based on the knowledge of the accredited security levels of the + hosts and the values in the DoD Basic Security Option. These devices + may receive IP datagrams which are in range for the intermediate + device, but are not within the accredited range either for the source + or for the destination. In the former case, the datagram should be + treated as described above for an out-of-range option. In the latter + case, an ICMP Destination Unreachable Communication Administratively + Prohibited (Type = 3, Code = 9 for net or Code = 10 for host) + response should be transmitted. The security range of the network + interface on which the reply will be sent determines whether a reply + is allowed and at what level it will be sent. + +3. DoD Extended Security Option + + This option permits additional security labelling information, beyond + that present in the Basic Security Option, to be supplied in an IP + datagram to meet the needs of registered authorities. Note that + information which is not labelling data or which is meaningful only + to the end systems (not intermediate systems) is not appropriate for + transmission in the IP layer and thus should not be transported using + this option. This option must be copied on fragmentation. Unlike + the Basic Option, this option may appear multiple times within a + datagram, subject to overall IP header size constraints. + + This option may be present only in conjunction with the Basic + Security Option, thus all systems which support Extended Security + Options must also support the Basic Security Option. However, not + all systems which support the Basic Security Option need to support + Extended Security Options and support for these options may be + selective, i.e., a system need not support all Extended Security + Options. + + The top-level format for this option is as follows: + + + + +Kent [Page 13] + +RFC 1108 U.S. DOD Security Option November 1991 + + + +------------+------------+------------+-------//-------+ + | 10000101 | 000LLLLL | AAAAAAAA | add sec info | + +------------+------------+------------+-------//-------+ + TYPE = 133 LENGTH ADDITIONAL ADDITIONAL + SECURITY INFO SECURITY + FORMAT CODE INFO + + FIGURE 3. DoD EXTENDED SECURITY OPTION FORMAT + +3.1. Type + + The value 133 identifies this as the DoD Extended Security Option. + +3.2. Length. + + The length of the option, which includes the "Type" and "Length" + fields, is variable. The minimum length of the option is 3 octets. + +3.3. Additional Security Info Format Code + + Length: 1 Octet + + The value of the Additional Security Info Format Code identifies the + syntax and semantics for a specific "Additional Security Information" + field. For each Additional Security Info Format Code, an RFC will be + published to specify the syntax and to provide an algorithmic + description of the processing required to determine whether a + datagram carrying a label specified by this Format Code should be + accepted or rejected. This specification must be sufficiently + detailed to permit vendors to produce interoperable implementations, + e.g., it should be comparable to the specification of the Basic + Security Option provided in this RFC. However, the specification + need not include a mapping from the syntax of the option to human + labels if such mapping would cause distribution of the specification + to be restricted. + + In order to maintain the architectural consistency of DoD common user + data networks, and to maximize interoperability, each activity should + submit its plans for the definition and use of an Additional Security + Info Format Code to DISA DISDB, Washington, D.C. 20305-2000 for + review and approval. DISA DISDB will forward plans to the Internet + Activities Board for architectural review and, if required, a cleared + committee formed by the IAB will be constituted for the review + process. Once approved, the Internet Assigned Number authority will + assign an Additional Security Info Format Code to the requesting + activity, concurrent with publication of the corresponding RFC. + + Note: The bit assignments for the Protection Authority flags of the + + + +Kent [Page 14] + +RFC 1108 U.S. DOD Security Option November 1991 + + + Basic Security Option have no relationship to the "Additional + Security Info Format Code" of this option. + +3.4. Additional Security Information. + + Length: Variable + + The Additional Security Info field contains the additional security + labelling information specified by the "Additional Security Info + Format Code" of the Extended Security Option. The syntax and + processing requirements for this field are specified by the + associated RFC as noted above. The minimum length of this field is + zero. + +3.5. System Security Configuration Parameters + + Use of the Extended Security Option requires that the intermediate or + end system configuration accurately reflect the security parameters + associated with communication via each network port (see Section 2.5 + as a guide). Internal representation of the security parameters + implementation dependent. The set of parameters required to support + processing of the Extended Security Option is a function of the set + of Additional Security Info Format Codes supported by the system. + The RFC which specifies syntax and processing rules for a registered + Additional Security Info Format Code will specify the additional + system security parameters required for processing an Extended + Security Option relative to that Code. + +3.6. Processing Rules + + Any datagram containing an Extended Security Option must also contain + a Basic Security Option and receipt of a datagram containing the + former absent the latter constitutes an error. If the length + specified by the Length field is inconsistent with the length + specified by the variable length encoding for the Additional Security + Info field, the datagram is in error. If the datagram is received in + which the Additional Security Info Format Code contains a non- + registered value, the datagram is in error. Finally, if the + Additional Security Info field contains data inconsistent with the + defining RFC for the Additional Security Info Format Code, the + datagram is in error. In any of these cases, an ICMP Parameter + Problem response should be sent as per Section 2.8.1. Any additional + error processing rules will be specified in the defining RFC for this + Additional Security Info Format Code. + + If the additional security information contained in the Extended + Security Option indicates that the datagram is within range according + to the security policy of the system, then the datagram should be + + + +Kent [Page 15] + +RFC 1108 U.S. DOD Security Option November 1991 + + + accepted for further processing. Otherwise, the datagram should be + rejected and the procedure specified in Section 2.8.2 should be + followed (with the Extended Security Option values set apropos the + Additional Security Info Format Code port security parameters). + + As with the Basic Security Option, it will not be possible in a + general internet environment for intermediate systems to provide + routing control for datagrams based on the labels contained in the + Extended Security Option until such time as interior and exterior + gateway routing protocols are enhanced to process such labels. + +References + + [DoD 5200.28] Department of Defense Directive 5200.28, "Security + Requirements for Automated Information Systems," 21 + March 1988. + +Security Considerations + + The focus of this RFC is the definition of formats and processing + conventions to support security labels for data contained in IP + datagrams, thus a variety of security issues must be considered + carefully when making use of these options. It is not possible to + address all of the security considerations which affect correct + implementation and use of these options, however the following + paragraph highglights some of these issues. + + Correct implementation and operation of the software and hardware + which processes these options is essential to their effective use. + Means for achieving confidence in such correct implementation and + operation are outside of the scope of this RFC. The options + themselves incorporate no facilities to ensure the integrity of the + security labels in transit (other than the IP checksum mechanism), + thus appropriate technology must be employed whenever datagrams + containing these options transit "hostile" communication + environments. Careful, secure management of the configuration + variables associated with each system making use of these options is + essential if the options are to provide the intended security + functionality. + + + + + + + + + + + + +Kent [Page 16] + +RFC 1108 U.S. DOD Security Option November 1991 + + +Author's Address + + Stephen Kent + BBN Communications + 150 CambridgePark Drive + Cambridge, MA 02140 + + Phone: (617) 873-3988 + + Email: kent@bbn.com + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +Kent [Page 17] +
\ No newline at end of file |