Сделать домашней страницей | Добавить в избранное
База RFC-документов

Полезное


Статьи

 

Request for Comments number 1457

Главная / RFC1457


Поиск RFC:

RFC1457 Security Label Framework for the Internet


RFC1457   Security Label Framework for the Internet    R. Housley [ May 1993 ] ( TXT = 35802 bytes)

Скачать PDF версию >>>









Network Working Group                                         R. Housley
Request for Comments: 1457             Xerox Special Information Systems
                                                                May 1993


               Security Label Framework for the Internet

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard.  Distribution of this memo is
   unlimited.

Acknowledgements

   The members of the Privacy and Security Research Group and the
   attendees of the invitational Security Labels Workshop (hosted by the
   National Institute of Standards and Technology) helped me organize my
   thoughts on this subject.  The ideas of these professionals are
   scattered throughout the memo.

1.0  Introduction

   This memo presents a security labeling framework for the Internet.
   The framework is intended to help protocol designers determine what,
   if any, security labeling should be supported by their protocols.
   The framework should also help network architects determine whether
   or not a particular collection of protocols fulfill their security
   labeling requirements.  The Open Systems Interconnection Reference
   Model [1] provides the structure for the presentation, therefore OSI
   protocol designers may also find this memo useful.

2.0  Security Labels

   Data security is the set of measures taken to protect data from
   accidental, unauthorized, intentional, or malicious modification,
   destruction, or disclosure.  Data security is also the condition that
   results from the establishment and maintenance of protective measures
   [2].  Given this two-pronged definition for data security, this memo
   examines security labeling as one mechanism which provides data
   security.  In general, security labeling by itself does not provide
   sufficient data security; it must be complemented by other security
   mechanisms.

   In data communication protocols, security labels tell the protocol
   processing how to handle the data transferred between two systems.
   That is, the security label indicates what measures need to be taken
   to preserve the condition of security.  Handling means the activities



Housley                                                         [Page 1]

RFC 1457       Security Label Framework for the Internet        May 1993


   performed on data such as collecting, processing, transferring,
   storing, retrieving, sorting, transmitting, disseminating, and
   controlling [3].

   The definition of data security includes protection from modification
   and destruction.  In computer systems, this is protection from
   writing and deleting.  These protections implement the data integrity
   service defined in the OSI Security Architecture [4].

   Biba [5] has defined a data integrity model which includes security
   labels.  The Biba model specifies rule-based controls for writing and
   deleting necessary to preserve data integrity.  The model also
   specifies rule-based controls for reading to prevent a high integrity
   process from relying on data that has less integrity than the
   process.

   The definition of data security also includes protection from
   disclosure.  In computer systems, this is protection from reading.
   This protection is the data confidentiality service defined in the
   OSI Security Architecture [4].

   Bell and LaPadula [6] defined a data confidentiality model which
   includes security labels.  The Bell and LaPadula model specifies
   rule-based controls for reading necessary to preserve data
   confidentiality.  The model also specifies rule-based controls for
   writing to ensure that data is not copied to a container where
   confidentiality can not be guaranteed.

   In both the Biba model and the Bell and LaPadula model, the security
   label is an attribute of the data.  In general, the security label
   associated with the data remains constant.  Exceptions will be
   discussed later in the memo, but relabeling is always the result of
   some network entity handling the data.  Since the security label is
   an attribute of data, it should be bound to the data.  When data
   moves through the network, the integrity security service [4] is
   generally used to accomplish this binding.  If the communications
   environment does not include a protocol which provides the integrity
   security service to bind the security label to the data, then the
   communications environment should include other mechanisms to
   preserve this binding.

2.1  Integrity Labels

   Integrity labels are security labels which support data integrity
   models, like the Biba model.  The integrity label tells the degree of
   confidence that may be placed in the data and also indicates which
   measures the data requires for protection from modification and
   destruction.



Housley                                                         [Page 2]

RFC 1457       Security Label Framework for the Internet        May 1993


   As data moves through the network, the confidence that may be placed
   in that data may change as a result of being handled by various
   network components.  Therefore, the integrity label is a function of
   the integrity of the data before being transmitted on the network and
   the path that the data takes through the network.  The confidence
   that may be placed in data does not increase because it was
   transferred across a network, but the confidence that may be placed
   in data may decrease as a result of being handled by arbitrary
   network components.  Entities are assigned integrity labels which
   indicate how much confidence may be placed in data that is handled by
   them.  Thus, when data is handled by an entity with an integrity
   label lower than the integrity label of the data, the data is
   relabeled with the integrity label of the entity.  Such relabeling
   should be avoided by limiting the possible paths that data may take
   through the network to those where the data will be handled only by
   entities with the same or a higher integrity label than the data.

   When integrity labels are used, each of the systems on a network must
   implement the integrity model and the protocol suite must transfer
   the integrity label with the data, if the confidence of the data is
   to be maintained throughout the network.  Each of the systems on a
   network may have its own internal representation for a integrity
   label, but the protocols must provide common syntax and semantics for
   the transfer of the integrity label, as well as the data itself.  To
   date, no protocols have been standardized which include integrity
   labels in the protocol control information.

2.2  Sensitivity Labels

   Sensitivity labels are security labels which support data
   confidentiality models, like the Bell and LaPadula model.  The
   sensitivity label tells the amount of damage that will result from
   the disclosure of the data and also indicates which measures the data
   requires for protection from disclosure.  The amount of damage that
   results from unauthorized disclosure depends on who obtains the data;
   the sensitivity label should reflect the worst case.

   As data moves through the network, it is processed by various network
   components and may be mixed with data of differing sensitivity.  If
   these network components are not trusted to segregate data of
   differing sensitivities, then all of the data processed by those
   components must be handled as the most sensitive data processed by
   those network components.  For example, poor buffer management may
   append highly sensitive data to the end of a protocol data unit that
   was otherwise publicly releasable.  Therefore, the sensitivity label
   is a function of the sensitivity of the data before being transmitted
   on the network and the most sensitive data handled by the network
   components, and the trustworthiness of those network components.  The



Housley                                                         [Page 3]

RFC 1457       Security Label Framework for the Internet        May 1993


   amount of damage that will result from the disclosure of the data
   does not decrease because it was transferred across a network, but
   the amount of damage that will result from the disclosure of the data
   may increase as a result of being mixed with more sensitive data by
   arbitrary network components.  Thus, when data is handled by an
   untrusted entity with a sensitivity label higher than the sensitivity
   label of the data, the data is relabeled with the higher sensitivity
   label.  Such relabeling should be avoided by limiting the possible
   paths that data may take through the network to those where the data
   will be handled only by entities with the same sensitivity label as
   the data or by using trustworthy network components.  Entities with
   lower sensitivity labels may not handle the data because this would
   be disclosure.

   When sensitivity labels are used, each of the systems on a network
   must implement the sensitivity model and the protocol suite must
   transfer the sensitivity label with the data, if the protection from
   disclosure is to be maintained throughout the network.  Each of the
   systems on a network may have its own internal representation for a
   sensitivity label, but the protocols must provide common syntax and
   semantics for the transfer of the sensitivity label, as well as the
   data itself.  Sensitivity labels, like the ones provided by the IP
   Security Option (IPSO) [7], have been used in a few networks for
   years.

3.0  Security Label Usage

   The Internet includes two major types of systems: end systems and
   intermediate systems [1].  These terms should be familiar to the
   reader.  For this discussion, the definition of intermediate system
   is understood to include routers, packet switches, and bridges.  End
   systems and intermediate systems use security labels differently.

3.1  End System Security Label Usage

   When two end systems communicate, common security label syntax and
   semantics are needed.  The security label, as an attribute of the
   data, indicates what measures need to be taken to preserve the
   condition of security.  The security label must communicate all of
   the integrity and confidentiality handling requirements.  These
   requirements can become very complex.

   Some operating systems label the data they process.  These security
   labels are not part of the data; they are attributes of the data.
   Some database management systems (DBMSs) perform similar labeling.
   The format of these security labels is a local matter, but they are
   usually in a format different than the one used by the data
   communication protocols.  Security labels must be translated by these



Housley                                                         [Page 4]

RFC 1457       Security Label Framework for the Internet        May 1993


   operating systems and DBMSs between the local format and the format
   used in the data communication protocols without any loss of meaning.

   Trusted operating systems that implement rule-based access control
   policies require security labels on the data they import [8,9].
   These security labels permit the Trusted Computing Base (TCB) in the
   end system to perform trusted demultiplexing.  That is, the traffic
   is relayed from the TCB to a process only if the process has
   sufficient authorization for the data.  In most cases, the TCB must
   first translate the security label into the local syntax before it
   can make the access control decision.

3.2  Intermediate System Security Label Usage

   This section discusses "user" data security labels within the
   intermediate system.  The labeling requirements associated with
   intermediate system-to-end system (IS-ES) traffic, intermediate
   system-to-intermediate system (IS-IS) traffic, and intermediate
   system-to-network management (IS-NM) traffic are not included in this
   discussion.

   Intermediate systems may make routing choices or discard traffic
   based on the security label.  The security label used by the
   intermediate system should contain only enough information to make
   the routing/discard decision and may be a subset of the security
   label used by the end system.  Some portions of the label may not
   effect routing decisions, but they may effect processing done within
   the end system.

   In the Internet today, very few intermediate systems actually make
   access control decisions.  For performance reasons, only those
   intermediate systems which do make access control decisions should be
   burdened with parsing the security label.  That is, information
   hiding principles apply.  Further, security labels which are to be
   parsed only by end systems should not be visible to physical, data
   link, or network layer protocols, where intermediate systems will
   have to examine them.

   Intermediate systems do not usually translate the security labels to
   a local format.  They use them "as is" to make their routing/discard
   decisions.  However, when two classification authorities share a
   network by bilateral agreement, the intermediate systems may be
   required to perform security label translation.  Security label
   translations should be avoided whenever possible by using a security
   label format that is supported by all systems that will process the
   security label.  Since end systems do not generally know which
   intermediate systems will process their traffic, security label
   translation cannot always be avoided.



Housley                                                         [Page 5]

RFC 1457       Security Label Framework for the Internet        May 1993


   Since security labels which are to be parsed only by end systems
   should not be carried by protocols interpreted by intermediate
   systems, such security labels should be carried by upper layer
   protocols, and end systems which use different formats for such
   security labels cannot rely on an intermediate systems to perform
   security label translation.  Neither the Internet nor the OSI
   architecture includes such transformation functions in the transport,
   session, or presentation layer, which means that application layer
   gateways should be used to translate between different end system
   security label formats.  Such application gateways should be avoided
   because they impinge on operation, especially when otherwise
   compatible protocols are used.  This complication is another reason
   why the use of a security label format that is supported by all
   systems is desirable.  A standard label syntax with registered
   security label semantics goes a long way toward avoiding security
   label translation [10].

4.0  Approaches to Labeling

   There are several tradeoffs to be made when determining how a
   particular network will perform security labeling.  Explicit or
   implicit labels can be used.  Also, security labels can either be
   connectionless or connection-oriented.  A combination of these
   alternatives may be appropriate.

4.1  Explicit Versus Implicit Security Labels

   Explicit security labels are actual bits in the protocol control
   information (PCI).  The IP Security Option (IPSO) is an example of an
   explicit security label [7].  Explicit security labels may be either
   connectionless or connection-oriented.  The syntax and semantics of
   the explicit security label may be either tightly or loosely coupled.
   If the syntax and semantics are tightly coupled, then the explicit
   security label format supports a single security policy.  If the
   syntax and semantics are loosely coupled, then the explicit security
   label format can support multiple security policies through
   registration.  In both cases, software enforces the security policy,
   but the label parsing software can be written once if the syntax and
   semantics are loosely coupled.  Fixed length explicit security label
   format parsers are generally faster than parsers for variable length
   formats.  Intermediate systems suffer less performance impact when
   fixed length explicit security labels can be used, but end systems
   often need variable length explicit security labels to express data
   handling requirements.

   Implicit security labels are not actual bits in the PCI; instead,
   some attribute is used to determine the security label.  For example,
   the choice of cryptographic key in the SP4 protocol [11] can



Housley                                                         [Page 6]

RFC 1457       Security Label Framework for the Internet        May 1993


   determine the security label.  Implicit security labels may be either
   connectionless or connection-oriented.

4.2  Connectionless Versus Connection-oriented Security Labels

   When connectionless security labels are used, the security label
   appears in every protocol data unit (PDU).  The IP Security Option
   (IPSO) [7] is an example of connectionless labeling.  All protocols
   have limits on the size of their PCI, and the explicit security label
   cannot exceed this size limit.  It cannot use the entire PCI space
   either; the protocol has other fields that must be transferred as
   well.  This size limitation may prohibit explicit connectionless
   security labels from meeting the requirements of end systems.
   However, the requirements of intermediate systems are more easily
   satisfied by explicit connectionless security labels.

   Connection-oriented security labels are attributes of virtual
   circuits, connections, and associations.  For simplicity, all of
   these are subsequently referred to as connections.  Connection-
   oriented security labels are used when the SDNS Key Management
   Protocol (KMP) [12] is used to associate security labels with each of
   the transport connection protected by the SP4 protocol [10,11] (using
   SP4C).  The security label is defined at connection establishment,
   and all data transferred over the connection inherits that security
   label.  This approach is more compatible with end system requirements
   than intermediate system requirements.  One noteworthy exception is
   X.25 packets switches; these intermediate systems could associate
   connection-oriented labels with each virtual circuit.

   Connectionless security labels may be used in conjunction with
   connectionless or connection-oriented data transfer protocols.
   However, connection-oriented security labels may only be used in
   conjunction with connection-oriented data transfer protocols.

5.0  Labeling Within the OSI Reference Model

   This section examines each of the seven OSI layers with respect to
   security labels.

5.1  Layer 1, The Physical Layer

   Explicit security labels are not possible in the Physical Layer.  The
   Physical Layer does not include any protocol control information
   (PCI), so there is no place to include the bits which represent the
   label.

   Implicit security labels are possible in the Physical Layer.  For
   example, all of the data that comes in through a particular physical



Housley                                                         [Page 7]

RFC 1457       Security Label Framework for the Internet        May 1993


   port could inherit one security label.  Most Physical Layer
   communication is connectionless, supporting only bit-at-a-time or
   byte-at-a-time operations.  Thus, these implicit security labels are
   connectionless.

   Implicit security labels in the Physical Layer may be used to meet
   the requirements of either end systems or intermediate systems so
   long as the communication is single level.  That is, only one
   security label is associated with all of the data received or
   transmitted through the physical connection.

5.2  Layer 2, The Data Link Layer

   Explicit security labels are possible in the Data Link Layer.  In
   fact, the IEEE 802.2 Working Group is currently working on an
   optional security label standard for the Logical Link Control (LLC)
   protocol (IEEE 802.2) [13].  These labels will optionally appear in
   each LLC frame.  These are connectionless security labels.

   Explicit connection-oriented security labels are also possible in the
   Data Link Layer.  One could imagine a security label standard which
   worked with LLC Type II.

   Of course, implicit security labels are also possible in the Data
   Link Layer.  Such labels could be either connectionless or
   connection-oriented.  One attribute that might be used in IEEE 802.3
   (CSMA/CD) [14] to determine the implicit security label is the source
   address of the frame.

   Security labels in the Data Link Layer may be used to meet the
   requirements of end systems and intermediate systems (especially
   bridges).  Explicit security labels in this layer tend to be small
   because the protocol headers for data link layer protocols are
   themselves small.  Therefore, when end systems require large security
   labels, a higher protocol layer should used to carry them.  However,
   when end systems do not require large security labels, the data link
   layer is attractive because in many cases the data link layer
   protocol supports several protocol suites simultaneously.  Label-
   based routing/relay decisions made by bridges are best supported in
   this layer.

5.3  Layer 3, The Network Layer

   Explicit security labels are possible in the Network Layer.  In fact,
   the IP Security Option (IPSO) [7] has been used for many years.
   These labels optionally appear in each IP datagram.  IPSO labels are
   obviously connectionless security labels.




Housley                                                         [Page 8]

RFC 1457       Security Label Framework for the Internet        May 1993


   Explicit connection-oriented security labels are also possible in the
   Network Layer.  One could easily imagine a security label standard
   for X.25 [15], but none exists.

   Of course, implicit security labels are also possible in the Network
   Layer.  These labels could be either connectionless or connection-
   oriented.  One attribute that might be used to determine the implicit
   security label is the X.25 virtual circuit.

   Security labels in the Network Layer may be used to meet the
   requirements of end systems and intermediate systems.  Explicit
   security labels in this layer tend to be small because the protocol
   headers for network layer protocols are themselves small.  Small
   fixed size network layer protocol headers allow efficient router
   implementations.  Therefore, when end systems require large security
   labels, a higher protocol layer should used to carry them.
   Alternatively, the Network Layer (especially the Subnetwork
   Independent Convergence Protocol (SNICP) sublayer) is an excellent
   place to carry a security label to support trusted demultiplexing,
   because many implementations demultiplex from an system-wide daemon
   to a user process after network layer processing.  The SNICP is end-
   to-end, yet it is low enough in the protocol stack to aid trusted
   demultiplexing.

   Label-based routing/relay decisions made by routers and packet
   switches are best supported in the Network Layer.  Routers can also
   add labels at subnetwork boundaries.  However, placement of these
   security labels must be done carefully to ensure that their addition
   does not degrade overall network performance by forcing routers that
   do not make label-based routing decisions to parse the security
   label.  Also, performance will suffer if the addition of security
   labels at subnet boundaries induces fragmentation/segmentation.

5.4  Layer 4, The Transport Layer

   Explicit security labels are possible in the Transport Layer.  For
   example, the SP4 protocol [10,11] includes them.  These labels can be
   either connectionless (using SP4E) or connection-oriented (using
   SP4C).  SP4 is an addendum to the TP [16] and CLTP [17] protocols.

   Implicit security labels are also possible in the Transport Layer.
   Such labels could be either connectionless or connection-oriented.
   One attribute that might be used to determine the implicit label in
   the SP4 protocol (when explicit labels are not used as discussed
   above) is the choice of cryptographic key.

   Security labels in the Transport Layer may be used to meet the
   requirements of end systems. The Transport Layer cannot be used to



Housley                                                         [Page 9]

RFC 1457       Security Label Framework for the Internet        May 1993


   meet the requirements of intermediate systems because intermediate
   systems, by definition, do not process protocols above the Network
   Layer.  Connection-oriented explicit security labels in this layer
   are especially good for meeting end system requirements where large
   labels are required.  The security label is transmitted only at
   connection establishment, so overhead is kept to a minimum.  Of
   course, connectionless transport protocols may not take advantage of
   this overhead reduction technique.  Yet, in many implementations the
   Transport Layer is low enough in the protocol stack to aid trusted
   demultiplexing.

5.5  Layer 5, The Session Layer

   Explicit security labels are possible in the Session Layer.  Such
   labels could be either connectionless or connection-oriented.
   However, it is unlikely that a standard will ever be developed for
   such labels because the OSI Security Architecture [4] does not
   allocate any security services to the Session Layer, and the Internet
   protocol suite does not have a Session Layer.

   Implicit security labels are also possible in the Session Layer.
   These implicit labels could be either connectionless or connection-
   oriented.  Again, the OSI Security Architecture makes this layer an
   unlikely choice for security labeling.

   Security labels in the Session Layer may be used to meet the
   requirements of end systems, but the Session Layer is too high in the
   protocol stack to support trusted demultiplexing.  The Session Layer
   cannot be used to meet the requirements of intermediate systems
   because intermediate systems, by definition, do not process protocols
   above the Network Layer.  Security labels in the Session Layer do not
   offer any advantages to security labels in the Transport Layer.

5.6  Layer 6, The Presentation Layer

   Explicit security labels are possible in the Presentation Layer.  The
   presentation syntax may include a security label.  This approach
   naturally performs translation to the local label format and supports
   both connectionless and connection-oriented security labeling.

   Implicit security labels are also possible in the Presentation Layer.
   Such labels could be either connectionless or connection-oriented.

   Security labels in the Presentation Layer may be used to meet the
   requirements of end systems, but the Presentation Layer is too high
   in the protocol stack to support trusted demultiplexing.  The
   Presentation Layer cannot be used to meet the requirements of
   intermediate systems because intermediate systems, by definition, do



Housley                                                        [Page 10]

RFC 1457       Security Label Framework for the Internet        May 1993


   not process protocols above the Network Layer.  To date, no
   Presentation Layer protocols have been standardized which include
   security labels.

5.7  Layer 7, The Application Layer

   Explicit security labels are possible in the Application Layer.  The
   CCITT X.400 message handling system includes security labels in
   message envelopes [18].  Other Application Layer protocols will
   probably include security labels in the future.  These labels could
   be either connectionless or connection-oriented.  Should security
   labels be incorporated into transaction processing protocols and
   message handling protocols, these will most likely be connectionless
   security labels; should security labels be incorporated into other
   application protocols, these will most likely be connection-oriented
   security labels.  Application layer protocols are unique in that they
   can include security label information which is specific to a
   particular application without burdening other applications with the
   syntax or semantics of that security label.

   Store and forward application protocols, like electronic messaging
   and directory protocols, deserve special attention.  In terms of the
   OSI Reference Model, they are end system protocols, but multiple end
   systems cooperate to provide the communications service.  End systems
   may use security labels to determine which end system should be next
   in a chain of store and forward interactions; this use of security
   labels is very similar to the label-based routing/relay decisions
   made by routers except that the security labels are carried in an
   Application Layer protocol.  Also, Application Layer protocols must
   be used to carry security labels in a store and forward application
   when sensitivity labels must be concealed from some end systems in
   the chain or when some end systems in the chain are untrustworthy.

   Implicit security labels are also possible in the Application Layer.
   These labels could be either connectionless or connection-oriented.
   Application title or well know port number might be used to determine
   the implicit label.

   Security labels in the Application Layer may be used to meet the
   requirements of end systems, but the Application Layer is too high in
   the protocol stack to support trusted demultiplexing.  The
   Application Layer cannot be used to meet the requirements of
   intermediate systems because intermediate systems, by definition, do
   not process protocols above the Network Layer.







Housley                                                        [Page 11]

RFC 1457       Security Label Framework for the Internet        May 1993


6.0  Summary

   Very few hard rules exist for security labels. Internet architects
   and protocol designers face many tradeoffs when making security label
   placement decisions.  However, a few guidelines can be derived from
   the preceding discussion:

   First, security label-based routing decisions are best supported by
   explicit security labels in the Data Link Layer and the Network
   Layer.  When bridges are making the routing decisions, the Data Link
   Layer should carry the explicit security label; when routers are
   making the routing decisions, the Network Layer should carry the
   explicit security label.

   Second, when security labels are specific to a particular application
   it is wise to define them in the application protocol, so that these
   security labels will not burden other applications on the network.

   Third, when trusted demultiplexing is a concern, the Network Layer
   (preferably the SNICP) or Transport Layer should be used to carry the
   explicit security label.  The SNICP or transport protocol are
   especially attractive when combined with a cryptographic protocol
   that binds the security label to the data and protects the both
   against undetected modification.

   Fourth, to avoid explicit security label translation, a common
   explicit security label format should be defined for the Internet.
   Registration of security label semantics should be used so that many
   security policies can be supported by the common explicit security
   label syntax.

References

   [1] ISO Open Systems Interconnection - Basic Reference Model (ISO
       7498).  International Organization for Standardization, 1981.

   [2] Dictionary of Military and Associated Terms (JCS Pub 1).  Joint
       Chiefs of Staff.  1 April 1984.

   [3] Security Requirements for Automatic Data Processing (ADP) Systems
       (DODD 5200.28).  Department of Defense.  21 March 1988.

   [4] Information Processing Systems - Open Systems Interconnection
       Reference Model - Security Architecture (ISO 7498-2).
       Organization for Standardization, 1988.

   [5] Biba, K. J.  "Integrity Considerations for Secure Computer
       Systems",  MTR-3153, The Mitre Corporation, April 1977.



Housley                                                        [Page 12]

RFC 1457       Security Label Framework for the Internet        May 1993


   [6] Bell, D. E.;  LaPadula, L. J.  "Secure Computer System: Unified
       Exposition and Multics Interpretation", MTR-2997, The MITRE
       Corporation, March 1976.

   [7] Kent, S.  "U.S. Department of Defense Security Options for the
       Internet Protocol", RFC 1108, BBN Communications, November 1992.

   [8] Trusted Computer System Evaluation Criteria (DoD 5200.28-STD)
       National Computer Security Center, 26 December 1985.

   [9] Trusted Network Interpretation of the Trusted Computer System
       Evaluation Criteria, (NCSC-TG-005, Version-1).  National Computer
       Security Center, 31 July 1987.

  [10] Nazario, Noel (Chairman). "Standard Security Label for GOSIP An
       Invitational Workshop", NISTIR 4614, June 1991.

  [11] Dinkel, Charles (Editor). "Secure Data Network System (SDNS)
       Network, Transport, and Message Security Protocols", NISTIR 90-
       4250, February 1990, pp 39-62.

  [12] Dinkel, Charles (Editor). "Secure Data Network System (SDNS) Key
       Management Documents", NISTIR 90-4262, February 1990.

  [13] IEEE Standards for Local Area Networks: Logical Link Control,
       IEEE 802.2.  The Institute of Electrical and Electronics
       Engineers, Inc, 1984.

  [14] IEEE Standards for Local Area Networks: Carrier Sense Multiple
       Access with Collision Detection (CSMA/CD) Access Method and
       Physical Layer Specification, IEEE 802.3.  The Institute of
       Electrical and Electronics Engineers, Inc, 1985.

  [15] Recommendation X.25, Interface Between Data Terminal Equipment
       (DTE) and Data Circuit Terminating Equipment (DCE) for Terminals
       Operating in the Packet Mode on Public Data Networks.
       Consultative Committee, International Telephone and Telegraph
       (CCITT), 1984.

  [16] Information Processing Systems - Open Systems Interconnection -
       Connection oriented transport protocol specification (ISO 8073).
       Organization for Standardization, 1985.  [Also ISO 8208]

  [17] Information Processing Systems - Open Systems Interconnection -
       Protocol for providing the connectionless-mode transport service
       (ISO 8602).  Organization for Standardization, 1986.





Housley                                                        [Page 13]

RFC 1457       Security Label Framework for the Internet        May 1993


  [18] Recommendation X.411, Message Handling Systems: Message Transfer
       System: Abstract Service Definition and Procedures.  Consultative
       Committee, International Telephone and Telegraph (CCITT), 1988.
       [Also ISO 8883-1]

Security Considerations

   This entire memo is devoted to a discussion of a Framework for
   labeling information for security purposes in network protocols.

Author's Address

   Russell Housley
   Xerox Special Information Systems
   7900 Westpark Drive
   McLean, Virginia  22102

   Phone:  703-790-3767
   EMail:  Housley.McLean_CSD@Xerox.COM
































Housley                                                        [Page 14]




 
Полезное

Статьи

Анализ сайта
Rambler's Top100
Render time: 0.0088131427764893 sec