xref: /OK3568_Linux_fs/kernel/Documentation/netlabel/draft-ietf-cipso-ipsecurity-01.txt (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593SmuzhiyunIETF CIPSO Working Group
2*4882a593Smuzhiyun16 July, 1992
3*4882a593Smuzhiyun
4*4882a593Smuzhiyun
5*4882a593Smuzhiyun
6*4882a593Smuzhiyun                 COMMERCIAL IP SECURITY OPTION (CIPSO 2.2)
7*4882a593Smuzhiyun
8*4882a593Smuzhiyun
9*4882a593Smuzhiyun
10*4882a593Smuzhiyun1.    Status
11*4882a593Smuzhiyun
12*4882a593SmuzhiyunThis Internet Draft provides the high level specification for a Commercial
13*4882a593SmuzhiyunIP Security Option (CIPSO).  This draft reflects the version as approved by
14*4882a593Smuzhiyunthe CIPSO IETF Working Group.  Distribution of this memo is unlimited.
15*4882a593Smuzhiyun
16*4882a593SmuzhiyunThis document is an Internet Draft.  Internet Drafts are working documents
17*4882a593Smuzhiyunof the Internet Engineering Task Force (IETF), its Areas, and its Working
18*4882a593SmuzhiyunGroups. Note that other groups may also distribute working documents as
19*4882a593SmuzhiyunInternet Drafts.
20*4882a593Smuzhiyun
21*4882a593SmuzhiyunInternet Drafts are draft documents valid for a maximum of six months.
22*4882a593SmuzhiyunInternet Drafts may be updated, replaced, or obsoleted by other documents
23*4882a593Smuzhiyunat any time.  It is not appropriate to use Internet Drafts as reference
24*4882a593Smuzhiyunmaterial or to cite them other than as a "working draft" or "work in
25*4882a593Smuzhiyunprogress."
26*4882a593Smuzhiyun
27*4882a593SmuzhiyunPlease check the I-D abstract listing contained in each Internet Draft
28*4882a593Smuzhiyundirectory to learn the current status of this or any other Internet Draft.
29*4882a593Smuzhiyun
30*4882a593Smuzhiyun
31*4882a593Smuzhiyun
32*4882a593Smuzhiyun
33*4882a593Smuzhiyun2.    Background
34*4882a593Smuzhiyun
35*4882a593SmuzhiyunCurrently the Internet Protocol includes two security options.  One of
36*4882a593Smuzhiyunthese options is the DoD Basic Security Option (BSO) (Type 130) which allows
37*4882a593SmuzhiyunIP datagrams to be labeled with security classifications.  This option
38*4882a593Smuzhiyunprovides sixteen security classifications and a variable number of handling
39*4882a593Smuzhiyunrestrictions.  To handle additional security information, such as security
40*4882a593Smuzhiyuncategories or compartments, another security option (Type 133) exists and
41*4882a593Smuzhiyunis referred to as the DoD Extended Security Option (ESO).  The values for
42*4882a593Smuzhiyunthe fixed fields within these two options are administered by the Defense
43*4882a593SmuzhiyunInformation Systems Agency (DISA).
44*4882a593Smuzhiyun
45*4882a593SmuzhiyunComputer vendors are now building commercial operating systems with
46*4882a593Smuzhiyunmandatory access controls and multi-level security.  These systems are
47*4882a593Smuzhiyunno longer built specifically for a particular group in the defense or
48*4882a593Smuzhiyunintelligence communities.  They are generally available commercial systems
49*4882a593Smuzhiyunfor use in a variety of government and civil sector environments.
50*4882a593Smuzhiyun
51*4882a593SmuzhiyunThe small number of ESO format codes can not support all the possible
52*4882a593Smuzhiyunapplications of a commercial security option.  The BSO and ESO were
53*4882a593Smuzhiyundesigned to only support the United States DoD.  CIPSO has been designed
54*4882a593Smuzhiyunto support multiple security policies.  This Internet Draft provides the
55*4882a593Smuzhiyunformat and procedures required to support a Mandatory Access Control
56*4882a593Smuzhiyunsecurity policy.  Support for additional security policies shall be
57*4882a593Smuzhiyundefined in future RFCs.
58*4882a593Smuzhiyun
59*4882a593Smuzhiyun
60*4882a593Smuzhiyun
61*4882a593Smuzhiyun
62*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 1]
63*4882a593Smuzhiyun
64*4882a593Smuzhiyun
65*4882a593Smuzhiyun
66*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
67*4882a593Smuzhiyun
68*4882a593Smuzhiyun
69*4882a593Smuzhiyun
70*4882a593Smuzhiyun
71*4882a593Smuzhiyun3.    CIPSO Format
72*4882a593Smuzhiyun
73*4882a593SmuzhiyunOption type: 134 (Class 0, Number 6, Copy on Fragmentation)
74*4882a593SmuzhiyunOption length: Variable
75*4882a593Smuzhiyun
76*4882a593SmuzhiyunThis option permits security related information to be passed between
77*4882a593Smuzhiyunsystems within a single Domain of Interpretation (DOI).  A DOI is a
78*4882a593Smuzhiyuncollection of systems which agree on the meaning of particular values
79*4882a593Smuzhiyunin the security option.  An authority that has been assigned a DOI
80*4882a593Smuzhiyunidentifier will define a mapping between appropriate CIPSO field values
81*4882a593Smuzhiyunand their human readable equivalent.  This authority will distribute that
82*4882a593Smuzhiyunmapping to hosts within the authority's domain.  These mappings may be
83*4882a593Smuzhiyunsensitive, therefore a DOI authority is not required to make these
84*4882a593Smuzhiyunmappings available to anyone other than the systems that are included in
85*4882a593Smuzhiyunthe DOI.
86*4882a593Smuzhiyun
87*4882a593SmuzhiyunThis option MUST be copied on fragmentation.  This option appears at most
88*4882a593Smuzhiyunonce in a datagram.  All multi-octet fields in the option are defined to be
89*4882a593Smuzhiyuntransmitted in network byte order.  The format of this option is as follows:
90*4882a593Smuzhiyun
91*4882a593Smuzhiyun+----------+----------+------//------+-----------//---------+
92*4882a593Smuzhiyun| 10000110 | LLLLLLLL | DDDDDDDDDDDD | TTTTTTTTTTTTTTTTTTTT |
93*4882a593Smuzhiyun+----------+----------+------//------+-----------//---------+
94*4882a593Smuzhiyun
95*4882a593Smuzhiyun  TYPE=134    OPTION    DOMAIN OF               TAGS
96*4882a593Smuzhiyun              LENGTH    INTERPRETATION
97*4882a593Smuzhiyun
98*4882a593Smuzhiyun
99*4882a593Smuzhiyun                Figure 1. CIPSO Format
100*4882a593Smuzhiyun
101*4882a593Smuzhiyun
102*4882a593Smuzhiyun3.1    Type
103*4882a593Smuzhiyun
104*4882a593SmuzhiyunThis field is 1 octet in length.  Its value is 134.
105*4882a593Smuzhiyun
106*4882a593Smuzhiyun
107*4882a593Smuzhiyun3.2    Length
108*4882a593Smuzhiyun
109*4882a593SmuzhiyunThis field is 1 octet in length.  It is the total length of the option
110*4882a593Smuzhiyunincluding the type and length fields.  With the current IP header length
111*4882a593Smuzhiyunrestriction of 40 octets the value of this field MUST not exceed 40.
112*4882a593Smuzhiyun
113*4882a593Smuzhiyun
114*4882a593Smuzhiyun3.3    Domain of Interpretation Identifier
115*4882a593Smuzhiyun
116*4882a593SmuzhiyunThis field is an unsigned 32 bit integer.  The value 0 is reserved and MUST
117*4882a593Smuzhiyunnot appear as the DOI identifier in any CIPSO option.  Implementations
118*4882a593Smuzhiyunshould assume that the DOI identifier field is not aligned on any particular
119*4882a593Smuzhiyunbyte boundary.
120*4882a593Smuzhiyun
121*4882a593SmuzhiyunTo conserve space in the protocol, security levels and categories are
122*4882a593Smuzhiyunrepresented by numbers rather than their ASCII equivalent.  This requires
123*4882a593Smuzhiyuna mapping table within CIPSO hosts to map these numbers to their
124*4882a593Smuzhiyuncorresponding ASCII representations.  Non-related groups of systems may
125*4882a593Smuzhiyun
126*4882a593Smuzhiyun
127*4882a593Smuzhiyun
128*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 2]
129*4882a593Smuzhiyun
130*4882a593Smuzhiyun
131*4882a593Smuzhiyun
132*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
133*4882a593Smuzhiyun
134*4882a593Smuzhiyun
135*4882a593Smuzhiyun
136*4882a593Smuzhiyunhave their own unique mappings.  For example, one group of systems may
137*4882a593Smuzhiyunuse the number 5 to represent Unclassified while another group may use the
138*4882a593Smuzhiyunnumber 1 to represent that same security level.  The DOI identifier is used
139*4882a593Smuzhiyunto identify which mapping was used for the values within the option.
140*4882a593Smuzhiyun
141*4882a593Smuzhiyun
142*4882a593Smuzhiyun3.4    Tag Types
143*4882a593Smuzhiyun
144*4882a593SmuzhiyunA common format for passing security related information is necessary
145*4882a593Smuzhiyunfor interoperability.  CIPSO uses sets of "tags" to contain the security
146*4882a593Smuzhiyuninformation relevant to the data in the IP packet.  Each tag begins with
147*4882a593Smuzhiyuna tag type identifier followed by the length of the tag and ends with the
148*4882a593Smuzhiyunactual security information to be passed.  All multi-octet fields in a tag
149*4882a593Smuzhiyunare defined to be transmitted in network byte order.  Like the DOI
150*4882a593Smuzhiyunidentifier field in the CIPSO header, implementations should assume that
151*4882a593Smuzhiyunall tags, as well as fields within a tag, are not aligned on any particular
152*4882a593Smuzhiyunoctet boundary.   The tag types defined in this document contain alignment
153*4882a593Smuzhiyunbytes to assist alignment of some information, however alignment can not
154*4882a593Smuzhiyunbe guaranteed if CIPSO is not the first IP option.
155*4882a593Smuzhiyun
156*4882a593SmuzhiyunCIPSO tag types 0 through 127 are reserved for defining standard tag
157*4882a593Smuzhiyunformats.  Their definitions will be published in RFCs.  Tag types whose
158*4882a593Smuzhiyunidentifiers are greater than 127 are defined by the DOI authority and may
159*4882a593Smuzhiyunonly be meaningful in certain Domains of Interpretation.  For these tag
160*4882a593Smuzhiyuntypes, implementations will require the DOI identifier as well as the tag
161*4882a593Smuzhiyunnumber to determine the security policy and the format associated with the
162*4882a593Smuzhiyuntag.  Use of tag types above 127 are restricted to closed networks where
163*4882a593Smuzhiyuninteroperability with other networks will not be an issue.  Implementations
164*4882a593Smuzhiyunthat support a tag type greater than 127 MUST support at least one DOI that
165*4882a593Smuzhiyunrequires only tag types 1 to 127.
166*4882a593Smuzhiyun
167*4882a593SmuzhiyunTag type 0 is reserved. Tag types 1, 2, and 5 are defined in this
168*4882a593SmuzhiyunInternet Draft.  Types 3 and 4 are reserved for work in progress.
169*4882a593SmuzhiyunThe standard format for all current and future CIPSO tags is shown below:
170*4882a593Smuzhiyun
171*4882a593Smuzhiyun+----------+----------+--------//--------+
172*4882a593Smuzhiyun| TTTTTTTT | LLLLLLLL | IIIIIIIIIIIIIIII |
173*4882a593Smuzhiyun+----------+----------+--------//--------+
174*4882a593Smuzhiyun    TAG       TAG         TAG
175*4882a593Smuzhiyun    TYPE      LENGTH      INFORMATION
176*4882a593Smuzhiyun
177*4882a593Smuzhiyun    Figure 2:  Standard Tag Format
178*4882a593Smuzhiyun
179*4882a593SmuzhiyunIn the three tag types described in this document, the length and count
180*4882a593Smuzhiyunrestrictions are based on the current IP limitation of 40 octets for all
181*4882a593SmuzhiyunIP options.  If the IP header is later expanded, then the length and count
182*4882a593Smuzhiyunrestrictions specified in this document may increase to use the full area
183*4882a593Smuzhiyunprovided for IP options.
184*4882a593Smuzhiyun
185*4882a593Smuzhiyun
186*4882a593Smuzhiyun3.4.1    Tag Type Classes
187*4882a593Smuzhiyun
188*4882a593SmuzhiyunTag classes consist of tag types that have common processing requirements
189*4882a593Smuzhiyunand support the same security policy.  The three tags defined in this
190*4882a593SmuzhiyunInternet Draft belong to the Mandatory Access Control (MAC) Sensitivity
191*4882a593Smuzhiyun
192*4882a593Smuzhiyun
193*4882a593Smuzhiyun
194*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 3]
195*4882a593Smuzhiyun
196*4882a593Smuzhiyun
197*4882a593Smuzhiyun
198*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
199*4882a593Smuzhiyun
200*4882a593Smuzhiyun
201*4882a593Smuzhiyun
202*4882a593Smuzhiyunclass and support the MAC Sensitivity security policy.
203*4882a593Smuzhiyun
204*4882a593Smuzhiyun
205*4882a593Smuzhiyun3.4.2    Tag Type 1
206*4882a593Smuzhiyun
207*4882a593SmuzhiyunThis is referred to as the "bit-mapped" tag type.  Tag type 1 is included
208*4882a593Smuzhiyunin the MAC Sensitivity tag type class.  The format of this tag type is as
209*4882a593Smuzhiyunfollows:
210*4882a593Smuzhiyun
211*4882a593Smuzhiyun+----------+----------+----------+----------+--------//---------+
212*4882a593Smuzhiyun| 00000001 | LLLLLLLL | 00000000 | LLLLLLLL | CCCCCCCCCCCCCCCCC |
213*4882a593Smuzhiyun+----------+----------+----------+----------+--------//---------+
214*4882a593Smuzhiyun
215*4882a593Smuzhiyun    TAG       TAG      ALIGNMENT  SENSITIVITY    BIT MAP OF
216*4882a593Smuzhiyun    TYPE      LENGTH   OCTET      LEVEL          CATEGORIES
217*4882a593Smuzhiyun
218*4882a593Smuzhiyun            Figure 3. Tag Type 1 Format
219*4882a593Smuzhiyun
220*4882a593Smuzhiyun
221*4882a593Smuzhiyun3.4.2.1    Tag Type
222*4882a593Smuzhiyun
223*4882a593SmuzhiyunThis field is 1 octet in length and has a value of 1.
224*4882a593Smuzhiyun
225*4882a593Smuzhiyun
226*4882a593Smuzhiyun3.4.2.2    Tag Length
227*4882a593Smuzhiyun
228*4882a593SmuzhiyunThis field is 1 octet in length.  It is the total length of the tag type
229*4882a593Smuzhiyunincluding the type and length fields.  With the current IP header length
230*4882a593Smuzhiyunrestriction of 40 bytes the value within this field is between 4 and 34.
231*4882a593Smuzhiyun
232*4882a593Smuzhiyun
233*4882a593Smuzhiyun3.4.2.3    Alignment Octet
234*4882a593Smuzhiyun
235*4882a593SmuzhiyunThis field is 1 octet in length and always has the value of 0.  Its purpose
236*4882a593Smuzhiyunis to align the category bitmap field on an even octet boundary.  This will
237*4882a593Smuzhiyunspeed many implementations including router implementations.
238*4882a593Smuzhiyun
239*4882a593Smuzhiyun
240*4882a593Smuzhiyun3.4.2.4    Sensitivity Level
241*4882a593Smuzhiyun
242*4882a593SmuzhiyunThis field is 1 octet in length.  Its value is from 0 to 255.  The values
243*4882a593Smuzhiyunare ordered with 0 being the minimum value and 255 representing the maximum
244*4882a593Smuzhiyunvalue.
245*4882a593Smuzhiyun
246*4882a593Smuzhiyun
247*4882a593Smuzhiyun3.4.2.5    Bit Map of Categories
248*4882a593Smuzhiyun
249*4882a593SmuzhiyunThe length of this field is variable and ranges from 0 to 30 octets.  This
250*4882a593Smuzhiyunprovides representation of categories 0 to 239.  The ordering of the bits
251*4882a593Smuzhiyunis left to right or MSB to LSB.  For example category 0 is represented by
252*4882a593Smuzhiyunthe most significant bit of the first byte and category 15 is represented
253*4882a593Smuzhiyunby the least significant bit of the second byte.  Figure 4 graphically
254*4882a593Smuzhiyunshows this ordering.  Bit N is binary 1 if category N is part of the label
255*4882a593Smuzhiyunfor the datagram, and bit N is binary 0 if category N is not part of the
256*4882a593Smuzhiyunlabel.  Except for the optimized tag 1 format described in the next section,
257*4882a593Smuzhiyun
258*4882a593Smuzhiyun
259*4882a593Smuzhiyun
260*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 4]
261*4882a593Smuzhiyun
262*4882a593Smuzhiyun
263*4882a593Smuzhiyun
264*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
265*4882a593Smuzhiyun
266*4882a593Smuzhiyun
267*4882a593Smuzhiyun
268*4882a593Smuzhiyunminimal encoding SHOULD be used resulting in no trailing zero octets in the
269*4882a593Smuzhiyuncategory bitmap.
270*4882a593Smuzhiyun
271*4882a593Smuzhiyun        octet 0  octet 1  octet 2  octet 3  octet 4  octet 5
272*4882a593Smuzhiyun        XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX . . .
273*4882a593Smuzhiyunbit     01234567 89111111 11112222 22222233 33333333 44444444
274*4882a593Smuzhiyunnumber             012345 67890123 45678901 23456789 01234567
275*4882a593Smuzhiyun
276*4882a593Smuzhiyun            Figure 4. Ordering of Bits in Tag 1 Bit Map
277*4882a593Smuzhiyun
278*4882a593Smuzhiyun
279*4882a593Smuzhiyun3.4.2.6    Optimized Tag 1 Format
280*4882a593Smuzhiyun
281*4882a593SmuzhiyunRouters work most efficiently when processing fixed length fields.  To
282*4882a593Smuzhiyunsupport these routers there is an optimized form of tag type 1.  The format
283*4882a593Smuzhiyundoes not change.  The only change is to the category bitmap which is set to
284*4882a593Smuzhiyuna constant length of 10 octets.  Trailing octets required to fill out the 10
285*4882a593Smuzhiyunoctets are zero filled.  Ten octets, allowing for 80 categories, was chosen
286*4882a593Smuzhiyunbecause it makes the total length of the CIPSO option 20 octets.  If CIPSO
287*4882a593Smuzhiyunis the only option then the option will be full word aligned and additional
288*4882a593Smuzhiyunfiller octets will not be required.
289*4882a593Smuzhiyun
290*4882a593Smuzhiyun
291*4882a593Smuzhiyun3.4.3    Tag Type 2
292*4882a593Smuzhiyun
293*4882a593SmuzhiyunThis is referred to as the "enumerated" tag type.  It is used to describe
294*4882a593Smuzhiyunlarge but sparsely populated sets of categories.  Tag type 2 is in the MAC
295*4882a593SmuzhiyunSensitivity tag type class.  The format of this tag type is as follows:
296*4882a593Smuzhiyun
297*4882a593Smuzhiyun+----------+----------+----------+----------+-------------//-------------+
298*4882a593Smuzhiyun| 00000010 | LLLLLLLL | 00000000 | LLLLLLLL | CCCCCCCCCCCCCCCCCCCCCCCCCC |
299*4882a593Smuzhiyun+----------+----------+----------+----------+-------------//-------------+
300*4882a593Smuzhiyun
301*4882a593Smuzhiyun    TAG       TAG      ALIGNMENT  SENSITIVITY         ENUMERATED
302*4882a593Smuzhiyun    TYPE      LENGTH   OCTET      LEVEL               CATEGORIES
303*4882a593Smuzhiyun
304*4882a593Smuzhiyun                Figure 5. Tag Type 2 Format
305*4882a593Smuzhiyun
306*4882a593Smuzhiyun
307*4882a593Smuzhiyun3.4.3.1     Tag Type
308*4882a593Smuzhiyun
309*4882a593SmuzhiyunThis field is one octet in length and has a value of 2.
310*4882a593Smuzhiyun
311*4882a593Smuzhiyun
312*4882a593Smuzhiyun3.4.3.2    Tag Length
313*4882a593Smuzhiyun
314*4882a593SmuzhiyunThis field is 1 octet in length. It is the total length of the tag type
315*4882a593Smuzhiyunincluding the type and length fields.  With the current IP header length
316*4882a593Smuzhiyunrestriction of 40 bytes the value within this field is between 4 and 34.
317*4882a593Smuzhiyun
318*4882a593Smuzhiyun
319*4882a593Smuzhiyun3.4.3.3    Alignment Octet
320*4882a593Smuzhiyun
321*4882a593SmuzhiyunThis field is 1 octet in length and always has the value of 0.  Its purpose
322*4882a593Smuzhiyunis to align the category field on an even octet boundary.  This will
323*4882a593Smuzhiyun
324*4882a593Smuzhiyun
325*4882a593Smuzhiyun
326*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 5]
327*4882a593Smuzhiyun
328*4882a593Smuzhiyun
329*4882a593Smuzhiyun
330*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
331*4882a593Smuzhiyun
332*4882a593Smuzhiyun
333*4882a593Smuzhiyun
334*4882a593Smuzhiyunspeed many implementations including router implementations.
335*4882a593Smuzhiyun
336*4882a593Smuzhiyun
337*4882a593Smuzhiyun3.4.3.4    Sensitivity Level
338*4882a593Smuzhiyun
339*4882a593SmuzhiyunThis field is 1 octet in length. Its value is from 0 to 255.  The values
340*4882a593Smuzhiyunare ordered with 0 being the minimum value and 255 representing the
341*4882a593Smuzhiyunmaximum value.
342*4882a593Smuzhiyun
343*4882a593Smuzhiyun
344*4882a593Smuzhiyun3.4.3.5    Enumerated Categories
345*4882a593Smuzhiyun
346*4882a593SmuzhiyunIn this tag, categories are represented by their actual value rather than
347*4882a593Smuzhiyunby their position within a bit field.  The length of each category is 2
348*4882a593Smuzhiyunoctets.  Up to 15 categories may be represented by this tag.  Valid values
349*4882a593Smuzhiyunfor categories are 0 to 65534.  Category 65535 is not a valid category
350*4882a593Smuzhiyunvalue.  The categories MUST be listed in ascending order within the tag.
351*4882a593Smuzhiyun
352*4882a593Smuzhiyun
353*4882a593Smuzhiyun3.4.4    Tag Type 5
354*4882a593Smuzhiyun
355*4882a593SmuzhiyunThis is referred to as the "range" tag type.  It is used to represent
356*4882a593Smuzhiyunlabels where all categories in a range, or set of ranges, are included
357*4882a593Smuzhiyunin the sensitivity label.  Tag type 5 is in the MAC Sensitivity tag type
358*4882a593Smuzhiyunclass.  The format of this tag type is as follows:
359*4882a593Smuzhiyun
360*4882a593Smuzhiyun+----------+----------+----------+----------+------------//-------------+
361*4882a593Smuzhiyun| 00000101 | LLLLLLLL | 00000000 | LLLLLLLL |  Top/Bottom | Top/Bottom  |
362*4882a593Smuzhiyun+----------+----------+----------+----------+------------//-------------+
363*4882a593Smuzhiyun
364*4882a593Smuzhiyun    TAG       TAG      ALIGNMENT  SENSITIVITY        CATEGORY RANGES
365*4882a593Smuzhiyun    TYPE      LENGTH   OCTET      LEVEL
366*4882a593Smuzhiyun
367*4882a593Smuzhiyun                     Figure 6. Tag Type 5 Format
368*4882a593Smuzhiyun
369*4882a593Smuzhiyun
370*4882a593Smuzhiyun3.4.4.1     Tag Type
371*4882a593Smuzhiyun
372*4882a593SmuzhiyunThis field is one octet in length and has a value of 5.
373*4882a593Smuzhiyun
374*4882a593Smuzhiyun
375*4882a593Smuzhiyun3.4.4.2    Tag Length
376*4882a593Smuzhiyun
377*4882a593SmuzhiyunThis field is 1 octet in length. It is the total length of the tag type
378*4882a593Smuzhiyunincluding the type and length fields.  With the current IP header length
379*4882a593Smuzhiyunrestriction of 40 bytes the value within this field is between 4 and 34.
380*4882a593Smuzhiyun
381*4882a593Smuzhiyun
382*4882a593Smuzhiyun3.4.4.3    Alignment Octet
383*4882a593Smuzhiyun
384*4882a593SmuzhiyunThis field is 1 octet in length and always has the value of 0.  Its purpose
385*4882a593Smuzhiyunis to align the category range field on an even octet boundary.  This will
386*4882a593Smuzhiyunspeed many implementations including router implementations.
387*4882a593Smuzhiyun
388*4882a593Smuzhiyun
389*4882a593Smuzhiyun
390*4882a593Smuzhiyun
391*4882a593Smuzhiyun
392*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 6]
393*4882a593Smuzhiyun
394*4882a593Smuzhiyun
395*4882a593Smuzhiyun
396*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
397*4882a593Smuzhiyun
398*4882a593Smuzhiyun
399*4882a593Smuzhiyun
400*4882a593Smuzhiyun3.4.4.4    Sensitivity Level
401*4882a593Smuzhiyun
402*4882a593SmuzhiyunThis field is 1 octet in length. Its value is from 0 to 255.  The values
403*4882a593Smuzhiyunare ordered with 0 being the minimum value and 255 representing the maximum
404*4882a593Smuzhiyunvalue.
405*4882a593Smuzhiyun
406*4882a593Smuzhiyun
407*4882a593Smuzhiyun3.4.4.5    Category Ranges
408*4882a593Smuzhiyun
409*4882a593SmuzhiyunA category range is a 4 octet field comprised of the 2 octet index of the
410*4882a593Smuzhiyunhighest numbered category followed by the 2 octet index of the lowest
411*4882a593Smuzhiyunnumbered category.  These range endpoints are inclusive within the range of
412*4882a593Smuzhiyuncategories.  All categories within a range are included in the sensitivity
413*4882a593Smuzhiyunlabel.  This tag may contain a maximum of 7 category pairs.  The bottom
414*4882a593Smuzhiyuncategory endpoint for the last pair in the tag MAY be omitted and SHOULD be
415*4882a593Smuzhiyunassumed to be 0.  The ranges MUST be non-overlapping and be listed in
416*4882a593Smuzhiyundescending order.  Valid values for categories are 0 to 65534.  Category
417*4882a593Smuzhiyun65535 is not a valid category value.
418*4882a593Smuzhiyun
419*4882a593Smuzhiyun
420*4882a593Smuzhiyun3.4.5     Minimum Requirements
421*4882a593Smuzhiyun
422*4882a593SmuzhiyunA CIPSO implementation MUST be capable of generating at least tag type 1 in
423*4882a593Smuzhiyunthe non-optimized form.  In addition, a CIPSO implementation MUST be able
424*4882a593Smuzhiyunto receive any valid tag type 1 even those using the optimized tag type 1
425*4882a593Smuzhiyunformat.
426*4882a593Smuzhiyun
427*4882a593Smuzhiyun
428*4882a593Smuzhiyun4.    Configuration Parameters
429*4882a593Smuzhiyun
430*4882a593SmuzhiyunThe configuration parameters defined below are required for all CIPSO hosts,
431*4882a593Smuzhiyungateways, and routers that support multiple sensitivity labels.  A CIPSO
432*4882a593Smuzhiyunhost is defined to be the origination or destination system for an IP
433*4882a593Smuzhiyundatagram.  A CIPSO gateway provides IP routing services between two or more
434*4882a593SmuzhiyunIP networks and may be required to perform label translations between
435*4882a593Smuzhiyunnetworks.  A CIPSO gateway may be an enhanced CIPSO host or it may just
436*4882a593Smuzhiyunprovide gateway services with no end system CIPSO capabilities.  A CIPSO
437*4882a593Smuzhiyunrouter is a dedicated IP router that routes IP datagrams between two or more
438*4882a593SmuzhiyunIP networks.
439*4882a593Smuzhiyun
440*4882a593SmuzhiyunAn implementation of CIPSO on a host MUST have the capability to reject a
441*4882a593Smuzhiyundatagram for reasons that the information contained can not be adequately
442*4882a593Smuzhiyunprotected by the receiving host or if acceptance may result in violation of
443*4882a593Smuzhiyunthe host or network security policy.  In addition, a CIPSO gateway or router
444*4882a593SmuzhiyunMUST be able to reject datagrams going to networks that can not provide
445*4882a593Smuzhiyunadequate protection or may violate the network's security policy.  To
446*4882a593Smuzhiyunprovide this capability the following minimal set of configuration
447*4882a593Smuzhiyunparameters are required for CIPSO implementations:
448*4882a593Smuzhiyun
449*4882a593SmuzhiyunHOST_LABEL_MAX - This parameter contains the maximum sensitivity label that
450*4882a593Smuzhiyuna CIPSO host is authorized to handle.  All datagrams that have a label
451*4882a593Smuzhiyungreater than this maximum MUST be rejected by the CIPSO host.  This
452*4882a593Smuzhiyunparameter does not apply to CIPSO gateways or routers.  This parameter need
453*4882a593Smuzhiyunnot be defined explicitly as it can be implicitly derived from the
454*4882a593SmuzhiyunPORT_LABEL_MAX parameters for the associated interfaces.
455*4882a593Smuzhiyun
456*4882a593Smuzhiyun
457*4882a593Smuzhiyun
458*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 7]
459*4882a593Smuzhiyun
460*4882a593Smuzhiyun
461*4882a593Smuzhiyun
462*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
463*4882a593Smuzhiyun
464*4882a593Smuzhiyun
465*4882a593Smuzhiyun
466*4882a593Smuzhiyun
467*4882a593SmuzhiyunHOST_LABEL_MIN - This parameter contains the minimum sensitivity label that
468*4882a593Smuzhiyuna CIPSO host is authorized to handle.  All datagrams that have a label less
469*4882a593Smuzhiyunthan this minimum MUST be rejected by the CIPSO host.  This parameter does
470*4882a593Smuzhiyunnot apply to CIPSO gateways or routers.  This parameter need not be defined
471*4882a593Smuzhiyunexplicitly as it can be implicitly derived from the PORT_LABEL_MIN
472*4882a593Smuzhiyunparameters for the associated interfaces.
473*4882a593Smuzhiyun
474*4882a593SmuzhiyunPORT_LABEL_MAX - This parameter contains the maximum sensitivity label for
475*4882a593Smuzhiyunall datagrams that may exit a particular network interface port.  All
476*4882a593Smuzhiyunoutgoing datagrams that have a label greater than this maximum MUST be
477*4882a593Smuzhiyunrejected by the CIPSO system.  The label within this parameter MUST be
478*4882a593Smuzhiyunless than or equal to the label within the HOST_LABEL_MAX parameter.  This
479*4882a593Smuzhiyunparameter does not apply to CIPSO hosts that support only one network port.
480*4882a593Smuzhiyun
481*4882a593SmuzhiyunPORT_LABEL_MIN - This parameter contains the minimum sensitivity label for
482*4882a593Smuzhiyunall datagrams that may exit a particular network interface port.  All
483*4882a593Smuzhiyunoutgoing datagrams that have a label less than this minimum MUST be
484*4882a593Smuzhiyunrejected by the CIPSO system.  The label within this parameter MUST be
485*4882a593Smuzhiyungreater than or equal to the label within the HOST_LABEL_MIN parameter.
486*4882a593SmuzhiyunThis parameter does not apply to CIPSO hosts that support only one network
487*4882a593Smuzhiyunport.
488*4882a593Smuzhiyun
489*4882a593SmuzhiyunPORT_DOI - This parameter is used to assign a DOI identifier value to a
490*4882a593Smuzhiyunparticular network interface port.  All CIPSO labels within datagrams
491*4882a593Smuzhiyungoing out this port MUST use the specified DOI identifier.  All CIPSO
492*4882a593Smuzhiyunhosts and gateways MUST support either this parameter, the NET_DOI
493*4882a593Smuzhiyunparameter, or the HOST_DOI parameter.
494*4882a593Smuzhiyun
495*4882a593SmuzhiyunNET_DOI - This parameter is used to assign a DOI identifier value to a
496*4882a593Smuzhiyunparticular IP network address.  All CIPSO labels within datagrams destined
497*4882a593Smuzhiyunfor the particular IP network MUST use the specified DOI identifier.  All
498*4882a593SmuzhiyunCIPSO hosts and gateways MUST support either this parameter, the PORT_DOI
499*4882a593Smuzhiyunparameter, or the HOST_DOI parameter.
500*4882a593Smuzhiyun
501*4882a593SmuzhiyunHOST_DOI - This parameter is used to assign a DOI identifier value to a
502*4882a593Smuzhiyunparticular IP host address.  All CIPSO labels within datagrams destined for
503*4882a593Smuzhiyunthe particular IP host will use the specified DOI identifier.  All CIPSO
504*4882a593Smuzhiyunhosts and gateways MUST support either this parameter, the PORT_DOI
505*4882a593Smuzhiyunparameter, or the NET_DOI parameter.
506*4882a593Smuzhiyun
507*4882a593SmuzhiyunThis list represents the minimal set of configuration parameters required
508*4882a593Smuzhiyunto be compliant.  Implementors are encouraged to add to this list to
509*4882a593Smuzhiyunprovide enhanced functionality and control.  For example, many security
510*4882a593Smuzhiyunpolicies may require both incoming and outgoing datagrams be checked against
511*4882a593Smuzhiyunthe port and host label ranges.
512*4882a593Smuzhiyun
513*4882a593Smuzhiyun
514*4882a593Smuzhiyun4.1    Port Range Parameters
515*4882a593Smuzhiyun
516*4882a593SmuzhiyunThe labels represented by the PORT_LABEL_MAX and PORT_LABEL_MIN parameters
517*4882a593SmuzhiyunMAY be in CIPSO or local format.  Some CIPSO systems, such as routers, may
518*4882a593Smuzhiyunwant to have the range parameters expressed in CIPSO format so that incoming
519*4882a593Smuzhiyunlabels do not have to be converted to a local format before being compared
520*4882a593Smuzhiyunagainst the range.  If multiple DOIs are supported by one of these CIPSO
521*4882a593Smuzhiyun
522*4882a593Smuzhiyun
523*4882a593Smuzhiyun
524*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 8]
525*4882a593Smuzhiyun
526*4882a593Smuzhiyun
527*4882a593Smuzhiyun
528*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
529*4882a593Smuzhiyun
530*4882a593Smuzhiyun
531*4882a593Smuzhiyun
532*4882a593Smuzhiyunsystems then multiple port range parameters would be needed, one set for
533*4882a593Smuzhiyuneach DOI supported on a particular port.
534*4882a593Smuzhiyun
535*4882a593SmuzhiyunThe port range will usually represent the total set of labels that may
536*4882a593Smuzhiyunexist on the logical network accessed through the corresponding network
537*4882a593Smuzhiyuninterface.  It may, however, represent a subset of these labels that are
538*4882a593Smuzhiyunallowed to enter the CIPSO system.
539*4882a593Smuzhiyun
540*4882a593Smuzhiyun
541*4882a593Smuzhiyun4.2    Single Label CIPSO Hosts
542*4882a593Smuzhiyun
543*4882a593SmuzhiyunCIPSO implementations that support only one label are not required to
544*4882a593Smuzhiyunsupport the parameters described above.  These limited implementations are
545*4882a593Smuzhiyunonly required to support a NET_LABEL parameter.  This parameter contains
546*4882a593Smuzhiyunthe CIPSO label that may be inserted in datagrams that exit the host.  In
547*4882a593Smuzhiyunaddition, the host MUST reject any incoming datagram that has a label which
548*4882a593Smuzhiyunis not equivalent to the NET_LABEL parameter.
549*4882a593Smuzhiyun
550*4882a593Smuzhiyun
551*4882a593Smuzhiyun5.    Handling Procedures
552*4882a593Smuzhiyun
553*4882a593SmuzhiyunThis section describes the processing requirements for incoming and
554*4882a593Smuzhiyunoutgoing IP datagrams.  Just providing the correct CIPSO label format
555*4882a593Smuzhiyunis not enough.  Assumptions will be made by one system on how a
556*4882a593Smuzhiyunreceiving system will handle the CIPSO label.  Wrong assumptions may
557*4882a593Smuzhiyunlead to non-interoperability or even a security incident.  The
558*4882a593Smuzhiyunrequirements described below represent the minimal set needed for
559*4882a593Smuzhiyuninteroperability and that provide users some level of confidence.
560*4882a593SmuzhiyunMany other requirements could be added to increase user confidence,
561*4882a593Smuzhiyunhowever at the risk of restricting creativity and limiting vendor
562*4882a593Smuzhiyunparticipation.
563*4882a593Smuzhiyun
564*4882a593Smuzhiyun
565*4882a593Smuzhiyun5.1    Input Procedures
566*4882a593Smuzhiyun
567*4882a593SmuzhiyunAll datagrams received through a network port MUST have a security label
568*4882a593Smuzhiyunassociated with them, either contained in the datagram or assigned to the
569*4882a593Smuzhiyunreceiving port.  Without this label the host, gateway, or router will not
570*4882a593Smuzhiyunhave the information it needs to make security decisions.  This security
571*4882a593Smuzhiyunlabel will be obtained from the CIPSO if the option is present in the
572*4882a593Smuzhiyundatagram.  See section 4.1.2 for handling procedures for unlabeled
573*4882a593Smuzhiyundatagrams.  This label will be compared against the PORT (if appropriate)
574*4882a593Smuzhiyunand HOST configuration parameters defined in section 3.
575*4882a593Smuzhiyun
576*4882a593SmuzhiyunIf any field within the CIPSO option, such as the DOI identifier, is not
577*4882a593Smuzhiyunrecognized the IP datagram is discarded and an ICMP "parameter problem"
578*4882a593Smuzhiyun(type 12) is generated and returned.  The ICMP code field is set to "bad
579*4882a593Smuzhiyunparameter" (code 0) and the pointer is set to the start of the CIPSO field
580*4882a593Smuzhiyunthat is unrecognized.
581*4882a593Smuzhiyun
582*4882a593SmuzhiyunIf the contents of the CIPSO are valid but the security label is
583*4882a593Smuzhiyunoutside of the configured host or port label range, the datagram is
584*4882a593Smuzhiyundiscarded and an ICMP "destination unreachable" (type 3) is generated
585*4882a593Smuzhiyunand returned.  The code field of the ICMP is set to "communication with
586*4882a593Smuzhiyundestination network administratively prohibited" (code 9) or to
587*4882a593Smuzhiyun
588*4882a593Smuzhiyun
589*4882a593Smuzhiyun
590*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 9]
591*4882a593Smuzhiyun
592*4882a593Smuzhiyun
593*4882a593Smuzhiyun
594*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
595*4882a593Smuzhiyun
596*4882a593Smuzhiyun
597*4882a593Smuzhiyun
598*4882a593Smuzhiyun"communication with destination host administratively prohibited"
599*4882a593Smuzhiyun(code 10).  The value of the code field used is dependent upon whether
600*4882a593Smuzhiyunthe originator of the ICMP message is acting as a CIPSO host or a CIPSO
601*4882a593Smuzhiyungateway.  The recipient of the ICMP message MUST be able to handle either
602*4882a593Smuzhiyunvalue.  The same procedure is performed if a CIPSO can not be added to an
603*4882a593SmuzhiyunIP packet because it is too large to fit in the IP options area.
604*4882a593Smuzhiyun
605*4882a593SmuzhiyunIf the error is triggered by receipt of an ICMP message, the message
606*4882a593Smuzhiyunis discarded and no response is permitted (consistent with general ICMP
607*4882a593Smuzhiyunprocessing rules).
608*4882a593Smuzhiyun
609*4882a593Smuzhiyun
610*4882a593Smuzhiyun5.1.1    Unrecognized tag types
611*4882a593Smuzhiyun
612*4882a593SmuzhiyunThe default condition for any CIPSO implementation is that an
613*4882a593Smuzhiyununrecognized tag type MUST be treated as a "parameter problem" and
614*4882a593Smuzhiyunhandled as described in section 4.1.  A CIPSO implementation MAY allow
615*4882a593Smuzhiyunthe system administrator to identify tag types that may safely be
616*4882a593Smuzhiyunignored.  This capability is an allowable enhancement, not a
617*4882a593Smuzhiyunrequirement.
618*4882a593Smuzhiyun
619*4882a593Smuzhiyun
620*4882a593Smuzhiyun5.1.2    Unlabeled Packets
621*4882a593Smuzhiyun
622*4882a593SmuzhiyunA network port may be configured to not require a CIPSO label for all
623*4882a593Smuzhiyunincoming  datagrams.  For this configuration a CIPSO label must be
624*4882a593Smuzhiyunassigned to that network port and associated with all unlabeled IP
625*4882a593Smuzhiyundatagrams.  This capability might be used for single level networks or
626*4882a593Smuzhiyunnetworks that have CIPSO and non-CIPSO hosts and the non-CIPSO hosts
627*4882a593Smuzhiyunall operate at the same label.
628*4882a593Smuzhiyun
629*4882a593SmuzhiyunIf a CIPSO option is required and none is found, the datagram is
630*4882a593Smuzhiyundiscarded and an ICMP "parameter problem" (type 12) is generated and
631*4882a593Smuzhiyunreturned to the originator of the datagram.  The code field of the ICMP
632*4882a593Smuzhiyunis set to "option missing" (code 1) and the ICMP pointer is set to 134
633*4882a593Smuzhiyun(the value of the option type for the missing CIPSO option).
634*4882a593Smuzhiyun
635*4882a593Smuzhiyun
636*4882a593Smuzhiyun5.2    Output Procedures
637*4882a593Smuzhiyun
638*4882a593SmuzhiyunA CIPSO option MUST appear only once in a datagram.  Only one tag type
639*4882a593Smuzhiyunfrom the MAC Sensitivity class MAY be included in a CIPSO option.  Given
640*4882a593Smuzhiyunthe current set of defined tag types, this means that CIPSO labels at
641*4882a593Smuzhiyunfirst will contain only one tag.
642*4882a593Smuzhiyun
643*4882a593SmuzhiyunAll datagrams leaving a CIPSO system MUST meet the following condition:
644*4882a593Smuzhiyun
645*4882a593Smuzhiyun        PORT_LABEL_MIN <= CIPSO label <= PORT_LABEL_MAX
646*4882a593Smuzhiyun
647*4882a593SmuzhiyunIf this condition is not satisfied the datagram MUST be discarded.
648*4882a593SmuzhiyunIf the CIPSO system only supports one port, the HOST_LABEL_MIN and the
649*4882a593SmuzhiyunHOST_LABEL_MAX parameters MAY be substituted for the PORT parameters in
650*4882a593Smuzhiyunthe above condition.
651*4882a593Smuzhiyun
652*4882a593SmuzhiyunThe DOI identifier to be used for all outgoing datagrams is configured by
653*4882a593Smuzhiyun
654*4882a593Smuzhiyun
655*4882a593Smuzhiyun
656*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 10]
657*4882a593Smuzhiyun
658*4882a593Smuzhiyun
659*4882a593Smuzhiyun
660*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
661*4882a593Smuzhiyun
662*4882a593Smuzhiyun
663*4882a593Smuzhiyun
664*4882a593Smuzhiyunthe administrator.  If port level DOI identifier assignment is used, then
665*4882a593Smuzhiyunthe PORT_DOI configuration parameter MUST contain the DOI identifier to
666*4882a593Smuzhiyunuse.  If network level DOI assignment is used, then the NET_DOI parameter
667*4882a593SmuzhiyunMUST contain the DOI identifier to use.  And if host level DOI assignment
668*4882a593Smuzhiyunis employed, then the HOST_DOI parameter MUST contain the DOI identifier
669*4882a593Smuzhiyunto use.  A CIPSO implementation need only support one level of DOI
670*4882a593Smuzhiyunassignment.
671*4882a593Smuzhiyun
672*4882a593Smuzhiyun
673*4882a593Smuzhiyun5.3    DOI Processing Requirements
674*4882a593Smuzhiyun
675*4882a593SmuzhiyunA CIPSO implementation MUST support at least one DOI and SHOULD support
676*4882a593Smuzhiyunmultiple DOIs.  System and network administrators are cautioned to
677*4882a593Smuzhiyunensure that at least one DOI is common within an IP network to allow for
678*4882a593Smuzhiyunbroadcasting of IP datagrams.
679*4882a593Smuzhiyun
680*4882a593SmuzhiyunCIPSO gateways MUST be capable of translating a CIPSO option from one
681*4882a593SmuzhiyunDOI to another when forwarding datagrams between networks.  For
682*4882a593Smuzhiyunefficiency purposes this capability is only a desired feature for CIPSO
683*4882a593Smuzhiyunrouters.
684*4882a593Smuzhiyun
685*4882a593Smuzhiyun
686*4882a593Smuzhiyun5.4    Label of ICMP Messages
687*4882a593Smuzhiyun
688*4882a593SmuzhiyunThe CIPSO label to be used on all outgoing ICMP messages MUST be equivalent
689*4882a593Smuzhiyunto the label of the datagram that caused the ICMP message.  If the ICMP was
690*4882a593Smuzhiyungenerated due to a problem associated with the original CIPSO label then the
691*4882a593Smuzhiyunfollowing responses are allowed:
692*4882a593Smuzhiyun
693*4882a593Smuzhiyun  a.  Use the CIPSO label of the original IP datagram
694*4882a593Smuzhiyun  b.  Drop the original datagram with no return message generated
695*4882a593Smuzhiyun
696*4882a593SmuzhiyunIn most cases these options will have the same effect.  If you can not
697*4882a593Smuzhiyuninterpret the label or if it is outside the label range of your host or
698*4882a593Smuzhiyuninterface then an ICMP message with the same label will probably not be
699*4882a593Smuzhiyunable to exit the system.
700*4882a593Smuzhiyun
701*4882a593Smuzhiyun
702*4882a593Smuzhiyun6.    Assignment of DOI Identifier Numbers                                   =
703*4882a593Smuzhiyun
704*4882a593SmuzhiyunRequests for assignment of a DOI identifier number should be addressed to
705*4882a593Smuzhiyunthe Internet Assigned Numbers Authority (IANA).
706*4882a593Smuzhiyun
707*4882a593Smuzhiyun
708*4882a593Smuzhiyun7.    Acknowledgements
709*4882a593Smuzhiyun
710*4882a593SmuzhiyunMuch of the material in this RFC is based on (and copied from) work
711*4882a593Smuzhiyundone by Gary Winiger of Sun Microsystems and published as Commercial
712*4882a593SmuzhiyunIP Security Option at the INTEROP 89, Commercial IPSO Workshop.
713*4882a593Smuzhiyun
714*4882a593Smuzhiyun
715*4882a593Smuzhiyun8.    Author's Address
716*4882a593Smuzhiyun
717*4882a593SmuzhiyunTo submit mail for distribution to members of the IETF CIPSO Working
718*4882a593SmuzhiyunGroup, send mail to: cipso@wdl1.wdl.loral.com.
719*4882a593Smuzhiyun
720*4882a593Smuzhiyun
721*4882a593Smuzhiyun
722*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 11]
723*4882a593Smuzhiyun
724*4882a593Smuzhiyun
725*4882a593Smuzhiyun
726*4882a593SmuzhiyunCIPSO INTERNET DRAFT                                         16 July, 1992
727*4882a593Smuzhiyun
728*4882a593Smuzhiyun
729*4882a593Smuzhiyun
730*4882a593Smuzhiyun
731*4882a593SmuzhiyunTo be added to or deleted from this distribution, send mail to:
732*4882a593Smuzhiyuncipso-request@wdl1.wdl.loral.com.
733*4882a593Smuzhiyun
734*4882a593Smuzhiyun
735*4882a593Smuzhiyun9.    References
736*4882a593Smuzhiyun
737*4882a593SmuzhiyunRFC 1038, "Draft Revised IP Security Option", M. St. Johns, IETF, January
738*4882a593Smuzhiyun1988.
739*4882a593Smuzhiyun
740*4882a593SmuzhiyunRFC 1108, "U.S. Department of Defense Security Options
741*4882a593Smuzhiyunfor the Internet Protocol", Stephen Kent, IAB, 1 March, 1991.
742*4882a593Smuzhiyun
743*4882a593Smuzhiyun
744*4882a593Smuzhiyun
745*4882a593Smuzhiyun
746*4882a593Smuzhiyun
747*4882a593Smuzhiyun
748*4882a593Smuzhiyun
749*4882a593Smuzhiyun
750*4882a593Smuzhiyun
751*4882a593Smuzhiyun
752*4882a593Smuzhiyun
753*4882a593Smuzhiyun
754*4882a593Smuzhiyun
755*4882a593Smuzhiyun
756*4882a593Smuzhiyun
757*4882a593Smuzhiyun
758*4882a593Smuzhiyun
759*4882a593Smuzhiyun
760*4882a593Smuzhiyun
761*4882a593Smuzhiyun
762*4882a593Smuzhiyun
763*4882a593Smuzhiyun
764*4882a593Smuzhiyun
765*4882a593Smuzhiyun
766*4882a593Smuzhiyun
767*4882a593Smuzhiyun
768*4882a593Smuzhiyun
769*4882a593Smuzhiyun
770*4882a593Smuzhiyun
771*4882a593Smuzhiyun
772*4882a593Smuzhiyun
773*4882a593Smuzhiyun
774*4882a593Smuzhiyun
775*4882a593Smuzhiyun
776*4882a593Smuzhiyun
777*4882a593Smuzhiyun
778*4882a593Smuzhiyun
779*4882a593Smuzhiyun
780*4882a593Smuzhiyun
781*4882a593Smuzhiyun
782*4882a593Smuzhiyun
783*4882a593Smuzhiyun
784*4882a593Smuzhiyun
785*4882a593Smuzhiyun
786*4882a593Smuzhiyun
787*4882a593Smuzhiyun
788*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93                                 [PAGE 12]
789*4882a593Smuzhiyun
790*4882a593Smuzhiyun
791*4882a593Smuzhiyun
792