1*4882a593SmuzhiyunIETF CIPSO Working Group 2*4882a593Smuzhiyun16 July, 1992 3*4882a593Smuzhiyun 4*4882a593Smuzhiyun 5*4882a593Smuzhiyun 6*4882a593Smuzhiyun COMMERCIAL IP SECURITY OPTION (CIPSO 2.2) 7*4882a593Smuzhiyun 8*4882a593Smuzhiyun 9*4882a593Smuzhiyun 10*4882a593Smuzhiyun1. Status 11*4882a593Smuzhiyun 12*4882a593SmuzhiyunThis Internet Draft provides the high level specification for a Commercial 13*4882a593SmuzhiyunIP Security Option (CIPSO). This draft reflects the version as approved by 14*4882a593Smuzhiyunthe CIPSO IETF Working Group. Distribution of this memo is unlimited. 15*4882a593Smuzhiyun 16*4882a593SmuzhiyunThis document is an Internet Draft. Internet Drafts are working documents 17*4882a593Smuzhiyunof the Internet Engineering Task Force (IETF), its Areas, and its Working 18*4882a593SmuzhiyunGroups. Note that other groups may also distribute working documents as 19*4882a593SmuzhiyunInternet Drafts. 20*4882a593Smuzhiyun 21*4882a593SmuzhiyunInternet Drafts are draft documents valid for a maximum of six months. 22*4882a593SmuzhiyunInternet Drafts may be updated, replaced, or obsoleted by other documents 23*4882a593Smuzhiyunat any time. It is not appropriate to use Internet Drafts as reference 24*4882a593Smuzhiyunmaterial or to cite them other than as a "working draft" or "work in 25*4882a593Smuzhiyunprogress." 26*4882a593Smuzhiyun 27*4882a593SmuzhiyunPlease check the I-D abstract listing contained in each Internet Draft 28*4882a593Smuzhiyundirectory to learn the current status of this or any other Internet Draft. 29*4882a593Smuzhiyun 30*4882a593Smuzhiyun 31*4882a593Smuzhiyun 32*4882a593Smuzhiyun 33*4882a593Smuzhiyun2. Background 34*4882a593Smuzhiyun 35*4882a593SmuzhiyunCurrently the Internet Protocol includes two security options. One of 36*4882a593Smuzhiyunthese options is the DoD Basic Security Option (BSO) (Type 130) which allows 37*4882a593SmuzhiyunIP datagrams to be labeled with security classifications. This option 38*4882a593Smuzhiyunprovides sixteen security classifications and a variable number of handling 39*4882a593Smuzhiyunrestrictions. To handle additional security information, such as security 40*4882a593Smuzhiyuncategories or compartments, another security option (Type 133) exists and 41*4882a593Smuzhiyunis referred to as the DoD Extended Security Option (ESO). The values for 42*4882a593Smuzhiyunthe fixed fields within these two options are administered by the Defense 43*4882a593SmuzhiyunInformation Systems Agency (DISA). 44*4882a593Smuzhiyun 45*4882a593SmuzhiyunComputer vendors are now building commercial operating systems with 46*4882a593Smuzhiyunmandatory access controls and multi-level security. These systems are 47*4882a593Smuzhiyunno longer built specifically for a particular group in the defense or 48*4882a593Smuzhiyunintelligence communities. They are generally available commercial systems 49*4882a593Smuzhiyunfor use in a variety of government and civil sector environments. 50*4882a593Smuzhiyun 51*4882a593SmuzhiyunThe small number of ESO format codes can not support all the possible 52*4882a593Smuzhiyunapplications of a commercial security option. The BSO and ESO were 53*4882a593Smuzhiyundesigned to only support the United States DoD. CIPSO has been designed 54*4882a593Smuzhiyunto support multiple security policies. This Internet Draft provides the 55*4882a593Smuzhiyunformat and procedures required to support a Mandatory Access Control 56*4882a593Smuzhiyunsecurity policy. Support for additional security policies shall be 57*4882a593Smuzhiyundefined in future RFCs. 58*4882a593Smuzhiyun 59*4882a593Smuzhiyun 60*4882a593Smuzhiyun 61*4882a593Smuzhiyun 62*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 1] 63*4882a593Smuzhiyun 64*4882a593Smuzhiyun 65*4882a593Smuzhiyun 66*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 67*4882a593Smuzhiyun 68*4882a593Smuzhiyun 69*4882a593Smuzhiyun 70*4882a593Smuzhiyun 71*4882a593Smuzhiyun3. CIPSO Format 72*4882a593Smuzhiyun 73*4882a593SmuzhiyunOption type: 134 (Class 0, Number 6, Copy on Fragmentation) 74*4882a593SmuzhiyunOption length: Variable 75*4882a593Smuzhiyun 76*4882a593SmuzhiyunThis option permits security related information to be passed between 77*4882a593Smuzhiyunsystems within a single Domain of Interpretation (DOI). A DOI is a 78*4882a593Smuzhiyuncollection of systems which agree on the meaning of particular values 79*4882a593Smuzhiyunin the security option. An authority that has been assigned a DOI 80*4882a593Smuzhiyunidentifier will define a mapping between appropriate CIPSO field values 81*4882a593Smuzhiyunand their human readable equivalent. This authority will distribute that 82*4882a593Smuzhiyunmapping to hosts within the authority's domain. These mappings may be 83*4882a593Smuzhiyunsensitive, therefore a DOI authority is not required to make these 84*4882a593Smuzhiyunmappings available to anyone other than the systems that are included in 85*4882a593Smuzhiyunthe DOI. 86*4882a593Smuzhiyun 87*4882a593SmuzhiyunThis option MUST be copied on fragmentation. This option appears at most 88*4882a593Smuzhiyunonce in a datagram. All multi-octet fields in the option are defined to be 89*4882a593Smuzhiyuntransmitted in network byte order. The format of this option is as follows: 90*4882a593Smuzhiyun 91*4882a593Smuzhiyun+----------+----------+------//------+-----------//---------+ 92*4882a593Smuzhiyun| 10000110 | LLLLLLLL | DDDDDDDDDDDD | TTTTTTTTTTTTTTTTTTTT | 93*4882a593Smuzhiyun+----------+----------+------//------+-----------//---------+ 94*4882a593Smuzhiyun 95*4882a593Smuzhiyun TYPE=134 OPTION DOMAIN OF TAGS 96*4882a593Smuzhiyun LENGTH INTERPRETATION 97*4882a593Smuzhiyun 98*4882a593Smuzhiyun 99*4882a593Smuzhiyun Figure 1. CIPSO Format 100*4882a593Smuzhiyun 101*4882a593Smuzhiyun 102*4882a593Smuzhiyun3.1 Type 103*4882a593Smuzhiyun 104*4882a593SmuzhiyunThis field is 1 octet in length. Its value is 134. 105*4882a593Smuzhiyun 106*4882a593Smuzhiyun 107*4882a593Smuzhiyun3.2 Length 108*4882a593Smuzhiyun 109*4882a593SmuzhiyunThis field is 1 octet in length. It is the total length of the option 110*4882a593Smuzhiyunincluding the type and length fields. With the current IP header length 111*4882a593Smuzhiyunrestriction of 40 octets the value of this field MUST not exceed 40. 112*4882a593Smuzhiyun 113*4882a593Smuzhiyun 114*4882a593Smuzhiyun3.3 Domain of Interpretation Identifier 115*4882a593Smuzhiyun 116*4882a593SmuzhiyunThis field is an unsigned 32 bit integer. The value 0 is reserved and MUST 117*4882a593Smuzhiyunnot appear as the DOI identifier in any CIPSO option. Implementations 118*4882a593Smuzhiyunshould assume that the DOI identifier field is not aligned on any particular 119*4882a593Smuzhiyunbyte boundary. 120*4882a593Smuzhiyun 121*4882a593SmuzhiyunTo conserve space in the protocol, security levels and categories are 122*4882a593Smuzhiyunrepresented by numbers rather than their ASCII equivalent. This requires 123*4882a593Smuzhiyuna mapping table within CIPSO hosts to map these numbers to their 124*4882a593Smuzhiyuncorresponding ASCII representations. Non-related groups of systems may 125*4882a593Smuzhiyun 126*4882a593Smuzhiyun 127*4882a593Smuzhiyun 128*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 2] 129*4882a593Smuzhiyun 130*4882a593Smuzhiyun 131*4882a593Smuzhiyun 132*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 133*4882a593Smuzhiyun 134*4882a593Smuzhiyun 135*4882a593Smuzhiyun 136*4882a593Smuzhiyunhave their own unique mappings. For example, one group of systems may 137*4882a593Smuzhiyunuse the number 5 to represent Unclassified while another group may use the 138*4882a593Smuzhiyunnumber 1 to represent that same security level. The DOI identifier is used 139*4882a593Smuzhiyunto identify which mapping was used for the values within the option. 140*4882a593Smuzhiyun 141*4882a593Smuzhiyun 142*4882a593Smuzhiyun3.4 Tag Types 143*4882a593Smuzhiyun 144*4882a593SmuzhiyunA common format for passing security related information is necessary 145*4882a593Smuzhiyunfor interoperability. CIPSO uses sets of "tags" to contain the security 146*4882a593Smuzhiyuninformation relevant to the data in the IP packet. Each tag begins with 147*4882a593Smuzhiyuna tag type identifier followed by the length of the tag and ends with the 148*4882a593Smuzhiyunactual security information to be passed. All multi-octet fields in a tag 149*4882a593Smuzhiyunare defined to be transmitted in network byte order. Like the DOI 150*4882a593Smuzhiyunidentifier field in the CIPSO header, implementations should assume that 151*4882a593Smuzhiyunall tags, as well as fields within a tag, are not aligned on any particular 152*4882a593Smuzhiyunoctet boundary. The tag types defined in this document contain alignment 153*4882a593Smuzhiyunbytes to assist alignment of some information, however alignment can not 154*4882a593Smuzhiyunbe guaranteed if CIPSO is not the first IP option. 155*4882a593Smuzhiyun 156*4882a593SmuzhiyunCIPSO tag types 0 through 127 are reserved for defining standard tag 157*4882a593Smuzhiyunformats. Their definitions will be published in RFCs. Tag types whose 158*4882a593Smuzhiyunidentifiers are greater than 127 are defined by the DOI authority and may 159*4882a593Smuzhiyunonly be meaningful in certain Domains of Interpretation. For these tag 160*4882a593Smuzhiyuntypes, implementations will require the DOI identifier as well as the tag 161*4882a593Smuzhiyunnumber to determine the security policy and the format associated with the 162*4882a593Smuzhiyuntag. Use of tag types above 127 are restricted to closed networks where 163*4882a593Smuzhiyuninteroperability with other networks will not be an issue. Implementations 164*4882a593Smuzhiyunthat support a tag type greater than 127 MUST support at least one DOI that 165*4882a593Smuzhiyunrequires only tag types 1 to 127. 166*4882a593Smuzhiyun 167*4882a593SmuzhiyunTag type 0 is reserved. Tag types 1, 2, and 5 are defined in this 168*4882a593SmuzhiyunInternet Draft. Types 3 and 4 are reserved for work in progress. 169*4882a593SmuzhiyunThe standard format for all current and future CIPSO tags is shown below: 170*4882a593Smuzhiyun 171*4882a593Smuzhiyun+----------+----------+--------//--------+ 172*4882a593Smuzhiyun| TTTTTTTT | LLLLLLLL | IIIIIIIIIIIIIIII | 173*4882a593Smuzhiyun+----------+----------+--------//--------+ 174*4882a593Smuzhiyun TAG TAG TAG 175*4882a593Smuzhiyun TYPE LENGTH INFORMATION 176*4882a593Smuzhiyun 177*4882a593Smuzhiyun Figure 2: Standard Tag Format 178*4882a593Smuzhiyun 179*4882a593SmuzhiyunIn the three tag types described in this document, the length and count 180*4882a593Smuzhiyunrestrictions are based on the current IP limitation of 40 octets for all 181*4882a593SmuzhiyunIP options. If the IP header is later expanded, then the length and count 182*4882a593Smuzhiyunrestrictions specified in this document may increase to use the full area 183*4882a593Smuzhiyunprovided for IP options. 184*4882a593Smuzhiyun 185*4882a593Smuzhiyun 186*4882a593Smuzhiyun3.4.1 Tag Type Classes 187*4882a593Smuzhiyun 188*4882a593SmuzhiyunTag classes consist of tag types that have common processing requirements 189*4882a593Smuzhiyunand support the same security policy. The three tags defined in this 190*4882a593SmuzhiyunInternet Draft belong to the Mandatory Access Control (MAC) Sensitivity 191*4882a593Smuzhiyun 192*4882a593Smuzhiyun 193*4882a593Smuzhiyun 194*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 3] 195*4882a593Smuzhiyun 196*4882a593Smuzhiyun 197*4882a593Smuzhiyun 198*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 199*4882a593Smuzhiyun 200*4882a593Smuzhiyun 201*4882a593Smuzhiyun 202*4882a593Smuzhiyunclass and support the MAC Sensitivity security policy. 203*4882a593Smuzhiyun 204*4882a593Smuzhiyun 205*4882a593Smuzhiyun3.4.2 Tag Type 1 206*4882a593Smuzhiyun 207*4882a593SmuzhiyunThis is referred to as the "bit-mapped" tag type. Tag type 1 is included 208*4882a593Smuzhiyunin the MAC Sensitivity tag type class. The format of this tag type is as 209*4882a593Smuzhiyunfollows: 210*4882a593Smuzhiyun 211*4882a593Smuzhiyun+----------+----------+----------+----------+--------//---------+ 212*4882a593Smuzhiyun| 00000001 | LLLLLLLL | 00000000 | LLLLLLLL | CCCCCCCCCCCCCCCCC | 213*4882a593Smuzhiyun+----------+----------+----------+----------+--------//---------+ 214*4882a593Smuzhiyun 215*4882a593Smuzhiyun TAG TAG ALIGNMENT SENSITIVITY BIT MAP OF 216*4882a593Smuzhiyun TYPE LENGTH OCTET LEVEL CATEGORIES 217*4882a593Smuzhiyun 218*4882a593Smuzhiyun Figure 3. Tag Type 1 Format 219*4882a593Smuzhiyun 220*4882a593Smuzhiyun 221*4882a593Smuzhiyun3.4.2.1 Tag Type 222*4882a593Smuzhiyun 223*4882a593SmuzhiyunThis field is 1 octet in length and has a value of 1. 224*4882a593Smuzhiyun 225*4882a593Smuzhiyun 226*4882a593Smuzhiyun3.4.2.2 Tag Length 227*4882a593Smuzhiyun 228*4882a593SmuzhiyunThis field is 1 octet in length. It is the total length of the tag type 229*4882a593Smuzhiyunincluding the type and length fields. With the current IP header length 230*4882a593Smuzhiyunrestriction of 40 bytes the value within this field is between 4 and 34. 231*4882a593Smuzhiyun 232*4882a593Smuzhiyun 233*4882a593Smuzhiyun3.4.2.3 Alignment Octet 234*4882a593Smuzhiyun 235*4882a593SmuzhiyunThis field is 1 octet in length and always has the value of 0. Its purpose 236*4882a593Smuzhiyunis to align the category bitmap field on an even octet boundary. This will 237*4882a593Smuzhiyunspeed many implementations including router implementations. 238*4882a593Smuzhiyun 239*4882a593Smuzhiyun 240*4882a593Smuzhiyun3.4.2.4 Sensitivity Level 241*4882a593Smuzhiyun 242*4882a593SmuzhiyunThis field is 1 octet in length. Its value is from 0 to 255. The values 243*4882a593Smuzhiyunare ordered with 0 being the minimum value and 255 representing the maximum 244*4882a593Smuzhiyunvalue. 245*4882a593Smuzhiyun 246*4882a593Smuzhiyun 247*4882a593Smuzhiyun3.4.2.5 Bit Map of Categories 248*4882a593Smuzhiyun 249*4882a593SmuzhiyunThe length of this field is variable and ranges from 0 to 30 octets. This 250*4882a593Smuzhiyunprovides representation of categories 0 to 239. The ordering of the bits 251*4882a593Smuzhiyunis left to right or MSB to LSB. For example category 0 is represented by 252*4882a593Smuzhiyunthe most significant bit of the first byte and category 15 is represented 253*4882a593Smuzhiyunby the least significant bit of the second byte. Figure 4 graphically 254*4882a593Smuzhiyunshows this ordering. Bit N is binary 1 if category N is part of the label 255*4882a593Smuzhiyunfor the datagram, and bit N is binary 0 if category N is not part of the 256*4882a593Smuzhiyunlabel. Except for the optimized tag 1 format described in the next section, 257*4882a593Smuzhiyun 258*4882a593Smuzhiyun 259*4882a593Smuzhiyun 260*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 4] 261*4882a593Smuzhiyun 262*4882a593Smuzhiyun 263*4882a593Smuzhiyun 264*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 265*4882a593Smuzhiyun 266*4882a593Smuzhiyun 267*4882a593Smuzhiyun 268*4882a593Smuzhiyunminimal encoding SHOULD be used resulting in no trailing zero octets in the 269*4882a593Smuzhiyuncategory bitmap. 270*4882a593Smuzhiyun 271*4882a593Smuzhiyun octet 0 octet 1 octet 2 octet 3 octet 4 octet 5 272*4882a593Smuzhiyun XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX . . . 273*4882a593Smuzhiyunbit 01234567 89111111 11112222 22222233 33333333 44444444 274*4882a593Smuzhiyunnumber 012345 67890123 45678901 23456789 01234567 275*4882a593Smuzhiyun 276*4882a593Smuzhiyun Figure 4. Ordering of Bits in Tag 1 Bit Map 277*4882a593Smuzhiyun 278*4882a593Smuzhiyun 279*4882a593Smuzhiyun3.4.2.6 Optimized Tag 1 Format 280*4882a593Smuzhiyun 281*4882a593SmuzhiyunRouters work most efficiently when processing fixed length fields. To 282*4882a593Smuzhiyunsupport these routers there is an optimized form of tag type 1. The format 283*4882a593Smuzhiyundoes not change. The only change is to the category bitmap which is set to 284*4882a593Smuzhiyuna constant length of 10 octets. Trailing octets required to fill out the 10 285*4882a593Smuzhiyunoctets are zero filled. Ten octets, allowing for 80 categories, was chosen 286*4882a593Smuzhiyunbecause it makes the total length of the CIPSO option 20 octets. If CIPSO 287*4882a593Smuzhiyunis the only option then the option will be full word aligned and additional 288*4882a593Smuzhiyunfiller octets will not be required. 289*4882a593Smuzhiyun 290*4882a593Smuzhiyun 291*4882a593Smuzhiyun3.4.3 Tag Type 2 292*4882a593Smuzhiyun 293*4882a593SmuzhiyunThis is referred to as the "enumerated" tag type. It is used to describe 294*4882a593Smuzhiyunlarge but sparsely populated sets of categories. Tag type 2 is in the MAC 295*4882a593SmuzhiyunSensitivity tag type class. The format of this tag type is as follows: 296*4882a593Smuzhiyun 297*4882a593Smuzhiyun+----------+----------+----------+----------+-------------//-------------+ 298*4882a593Smuzhiyun| 00000010 | LLLLLLLL | 00000000 | LLLLLLLL | CCCCCCCCCCCCCCCCCCCCCCCCCC | 299*4882a593Smuzhiyun+----------+----------+----------+----------+-------------//-------------+ 300*4882a593Smuzhiyun 301*4882a593Smuzhiyun TAG TAG ALIGNMENT SENSITIVITY ENUMERATED 302*4882a593Smuzhiyun TYPE LENGTH OCTET LEVEL CATEGORIES 303*4882a593Smuzhiyun 304*4882a593Smuzhiyun Figure 5. Tag Type 2 Format 305*4882a593Smuzhiyun 306*4882a593Smuzhiyun 307*4882a593Smuzhiyun3.4.3.1 Tag Type 308*4882a593Smuzhiyun 309*4882a593SmuzhiyunThis field is one octet in length and has a value of 2. 310*4882a593Smuzhiyun 311*4882a593Smuzhiyun 312*4882a593Smuzhiyun3.4.3.2 Tag Length 313*4882a593Smuzhiyun 314*4882a593SmuzhiyunThis field is 1 octet in length. It is the total length of the tag type 315*4882a593Smuzhiyunincluding the type and length fields. With the current IP header length 316*4882a593Smuzhiyunrestriction of 40 bytes the value within this field is between 4 and 34. 317*4882a593Smuzhiyun 318*4882a593Smuzhiyun 319*4882a593Smuzhiyun3.4.3.3 Alignment Octet 320*4882a593Smuzhiyun 321*4882a593SmuzhiyunThis field is 1 octet in length and always has the value of 0. Its purpose 322*4882a593Smuzhiyunis to align the category field on an even octet boundary. This will 323*4882a593Smuzhiyun 324*4882a593Smuzhiyun 325*4882a593Smuzhiyun 326*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 5] 327*4882a593Smuzhiyun 328*4882a593Smuzhiyun 329*4882a593Smuzhiyun 330*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 331*4882a593Smuzhiyun 332*4882a593Smuzhiyun 333*4882a593Smuzhiyun 334*4882a593Smuzhiyunspeed many implementations including router implementations. 335*4882a593Smuzhiyun 336*4882a593Smuzhiyun 337*4882a593Smuzhiyun3.4.3.4 Sensitivity Level 338*4882a593Smuzhiyun 339*4882a593SmuzhiyunThis field is 1 octet in length. Its value is from 0 to 255. The values 340*4882a593Smuzhiyunare ordered with 0 being the minimum value and 255 representing the 341*4882a593Smuzhiyunmaximum value. 342*4882a593Smuzhiyun 343*4882a593Smuzhiyun 344*4882a593Smuzhiyun3.4.3.5 Enumerated Categories 345*4882a593Smuzhiyun 346*4882a593SmuzhiyunIn this tag, categories are represented by their actual value rather than 347*4882a593Smuzhiyunby their position within a bit field. The length of each category is 2 348*4882a593Smuzhiyunoctets. Up to 15 categories may be represented by this tag. Valid values 349*4882a593Smuzhiyunfor categories are 0 to 65534. Category 65535 is not a valid category 350*4882a593Smuzhiyunvalue. The categories MUST be listed in ascending order within the tag. 351*4882a593Smuzhiyun 352*4882a593Smuzhiyun 353*4882a593Smuzhiyun3.4.4 Tag Type 5 354*4882a593Smuzhiyun 355*4882a593SmuzhiyunThis is referred to as the "range" tag type. It is used to represent 356*4882a593Smuzhiyunlabels where all categories in a range, or set of ranges, are included 357*4882a593Smuzhiyunin the sensitivity label. Tag type 5 is in the MAC Sensitivity tag type 358*4882a593Smuzhiyunclass. The format of this tag type is as follows: 359*4882a593Smuzhiyun 360*4882a593Smuzhiyun+----------+----------+----------+----------+------------//-------------+ 361*4882a593Smuzhiyun| 00000101 | LLLLLLLL | 00000000 | LLLLLLLL | Top/Bottom | Top/Bottom | 362*4882a593Smuzhiyun+----------+----------+----------+----------+------------//-------------+ 363*4882a593Smuzhiyun 364*4882a593Smuzhiyun TAG TAG ALIGNMENT SENSITIVITY CATEGORY RANGES 365*4882a593Smuzhiyun TYPE LENGTH OCTET LEVEL 366*4882a593Smuzhiyun 367*4882a593Smuzhiyun Figure 6. Tag Type 5 Format 368*4882a593Smuzhiyun 369*4882a593Smuzhiyun 370*4882a593Smuzhiyun3.4.4.1 Tag Type 371*4882a593Smuzhiyun 372*4882a593SmuzhiyunThis field is one octet in length and has a value of 5. 373*4882a593Smuzhiyun 374*4882a593Smuzhiyun 375*4882a593Smuzhiyun3.4.4.2 Tag Length 376*4882a593Smuzhiyun 377*4882a593SmuzhiyunThis field is 1 octet in length. It is the total length of the tag type 378*4882a593Smuzhiyunincluding the type and length fields. With the current IP header length 379*4882a593Smuzhiyunrestriction of 40 bytes the value within this field is between 4 and 34. 380*4882a593Smuzhiyun 381*4882a593Smuzhiyun 382*4882a593Smuzhiyun3.4.4.3 Alignment Octet 383*4882a593Smuzhiyun 384*4882a593SmuzhiyunThis field is 1 octet in length and always has the value of 0. Its purpose 385*4882a593Smuzhiyunis to align the category range field on an even octet boundary. This will 386*4882a593Smuzhiyunspeed many implementations including router implementations. 387*4882a593Smuzhiyun 388*4882a593Smuzhiyun 389*4882a593Smuzhiyun 390*4882a593Smuzhiyun 391*4882a593Smuzhiyun 392*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 6] 393*4882a593Smuzhiyun 394*4882a593Smuzhiyun 395*4882a593Smuzhiyun 396*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 397*4882a593Smuzhiyun 398*4882a593Smuzhiyun 399*4882a593Smuzhiyun 400*4882a593Smuzhiyun3.4.4.4 Sensitivity Level 401*4882a593Smuzhiyun 402*4882a593SmuzhiyunThis field is 1 octet in length. Its value is from 0 to 255. The values 403*4882a593Smuzhiyunare ordered with 0 being the minimum value and 255 representing the maximum 404*4882a593Smuzhiyunvalue. 405*4882a593Smuzhiyun 406*4882a593Smuzhiyun 407*4882a593Smuzhiyun3.4.4.5 Category Ranges 408*4882a593Smuzhiyun 409*4882a593SmuzhiyunA category range is a 4 octet field comprised of the 2 octet index of the 410*4882a593Smuzhiyunhighest numbered category followed by the 2 octet index of the lowest 411*4882a593Smuzhiyunnumbered category. These range endpoints are inclusive within the range of 412*4882a593Smuzhiyuncategories. All categories within a range are included in the sensitivity 413*4882a593Smuzhiyunlabel. This tag may contain a maximum of 7 category pairs. The bottom 414*4882a593Smuzhiyuncategory endpoint for the last pair in the tag MAY be omitted and SHOULD be 415*4882a593Smuzhiyunassumed to be 0. The ranges MUST be non-overlapping and be listed in 416*4882a593Smuzhiyundescending order. Valid values for categories are 0 to 65534. Category 417*4882a593Smuzhiyun65535 is not a valid category value. 418*4882a593Smuzhiyun 419*4882a593Smuzhiyun 420*4882a593Smuzhiyun3.4.5 Minimum Requirements 421*4882a593Smuzhiyun 422*4882a593SmuzhiyunA CIPSO implementation MUST be capable of generating at least tag type 1 in 423*4882a593Smuzhiyunthe non-optimized form. In addition, a CIPSO implementation MUST be able 424*4882a593Smuzhiyunto receive any valid tag type 1 even those using the optimized tag type 1 425*4882a593Smuzhiyunformat. 426*4882a593Smuzhiyun 427*4882a593Smuzhiyun 428*4882a593Smuzhiyun4. Configuration Parameters 429*4882a593Smuzhiyun 430*4882a593SmuzhiyunThe configuration parameters defined below are required for all CIPSO hosts, 431*4882a593Smuzhiyungateways, and routers that support multiple sensitivity labels. A CIPSO 432*4882a593Smuzhiyunhost is defined to be the origination or destination system for an IP 433*4882a593Smuzhiyundatagram. A CIPSO gateway provides IP routing services between two or more 434*4882a593SmuzhiyunIP networks and may be required to perform label translations between 435*4882a593Smuzhiyunnetworks. A CIPSO gateway may be an enhanced CIPSO host or it may just 436*4882a593Smuzhiyunprovide gateway services with no end system CIPSO capabilities. A CIPSO 437*4882a593Smuzhiyunrouter is a dedicated IP router that routes IP datagrams between two or more 438*4882a593SmuzhiyunIP networks. 439*4882a593Smuzhiyun 440*4882a593SmuzhiyunAn implementation of CIPSO on a host MUST have the capability to reject a 441*4882a593Smuzhiyundatagram for reasons that the information contained can not be adequately 442*4882a593Smuzhiyunprotected by the receiving host or if acceptance may result in violation of 443*4882a593Smuzhiyunthe host or network security policy. In addition, a CIPSO gateway or router 444*4882a593SmuzhiyunMUST be able to reject datagrams going to networks that can not provide 445*4882a593Smuzhiyunadequate protection or may violate the network's security policy. To 446*4882a593Smuzhiyunprovide this capability the following minimal set of configuration 447*4882a593Smuzhiyunparameters are required for CIPSO implementations: 448*4882a593Smuzhiyun 449*4882a593SmuzhiyunHOST_LABEL_MAX - This parameter contains the maximum sensitivity label that 450*4882a593Smuzhiyuna CIPSO host is authorized to handle. All datagrams that have a label 451*4882a593Smuzhiyungreater than this maximum MUST be rejected by the CIPSO host. This 452*4882a593Smuzhiyunparameter does not apply to CIPSO gateways or routers. This parameter need 453*4882a593Smuzhiyunnot be defined explicitly as it can be implicitly derived from the 454*4882a593SmuzhiyunPORT_LABEL_MAX parameters for the associated interfaces. 455*4882a593Smuzhiyun 456*4882a593Smuzhiyun 457*4882a593Smuzhiyun 458*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 7] 459*4882a593Smuzhiyun 460*4882a593Smuzhiyun 461*4882a593Smuzhiyun 462*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 463*4882a593Smuzhiyun 464*4882a593Smuzhiyun 465*4882a593Smuzhiyun 466*4882a593Smuzhiyun 467*4882a593SmuzhiyunHOST_LABEL_MIN - This parameter contains the minimum sensitivity label that 468*4882a593Smuzhiyuna CIPSO host is authorized to handle. All datagrams that have a label less 469*4882a593Smuzhiyunthan this minimum MUST be rejected by the CIPSO host. This parameter does 470*4882a593Smuzhiyunnot apply to CIPSO gateways or routers. This parameter need not be defined 471*4882a593Smuzhiyunexplicitly as it can be implicitly derived from the PORT_LABEL_MIN 472*4882a593Smuzhiyunparameters for the associated interfaces. 473*4882a593Smuzhiyun 474*4882a593SmuzhiyunPORT_LABEL_MAX - This parameter contains the maximum sensitivity label for 475*4882a593Smuzhiyunall datagrams that may exit a particular network interface port. All 476*4882a593Smuzhiyunoutgoing datagrams that have a label greater than this maximum MUST be 477*4882a593Smuzhiyunrejected by the CIPSO system. The label within this parameter MUST be 478*4882a593Smuzhiyunless than or equal to the label within the HOST_LABEL_MAX parameter. This 479*4882a593Smuzhiyunparameter does not apply to CIPSO hosts that support only one network port. 480*4882a593Smuzhiyun 481*4882a593SmuzhiyunPORT_LABEL_MIN - This parameter contains the minimum sensitivity label for 482*4882a593Smuzhiyunall datagrams that may exit a particular network interface port. All 483*4882a593Smuzhiyunoutgoing datagrams that have a label less than this minimum MUST be 484*4882a593Smuzhiyunrejected by the CIPSO system. The label within this parameter MUST be 485*4882a593Smuzhiyungreater than or equal to the label within the HOST_LABEL_MIN parameter. 486*4882a593SmuzhiyunThis parameter does not apply to CIPSO hosts that support only one network 487*4882a593Smuzhiyunport. 488*4882a593Smuzhiyun 489*4882a593SmuzhiyunPORT_DOI - This parameter is used to assign a DOI identifier value to a 490*4882a593Smuzhiyunparticular network interface port. All CIPSO labels within datagrams 491*4882a593Smuzhiyungoing out this port MUST use the specified DOI identifier. All CIPSO 492*4882a593Smuzhiyunhosts and gateways MUST support either this parameter, the NET_DOI 493*4882a593Smuzhiyunparameter, or the HOST_DOI parameter. 494*4882a593Smuzhiyun 495*4882a593SmuzhiyunNET_DOI - This parameter is used to assign a DOI identifier value to a 496*4882a593Smuzhiyunparticular IP network address. All CIPSO labels within datagrams destined 497*4882a593Smuzhiyunfor the particular IP network MUST use the specified DOI identifier. All 498*4882a593SmuzhiyunCIPSO hosts and gateways MUST support either this parameter, the PORT_DOI 499*4882a593Smuzhiyunparameter, or the HOST_DOI parameter. 500*4882a593Smuzhiyun 501*4882a593SmuzhiyunHOST_DOI - This parameter is used to assign a DOI identifier value to a 502*4882a593Smuzhiyunparticular IP host address. All CIPSO labels within datagrams destined for 503*4882a593Smuzhiyunthe particular IP host will use the specified DOI identifier. All CIPSO 504*4882a593Smuzhiyunhosts and gateways MUST support either this parameter, the PORT_DOI 505*4882a593Smuzhiyunparameter, or the NET_DOI parameter. 506*4882a593Smuzhiyun 507*4882a593SmuzhiyunThis list represents the minimal set of configuration parameters required 508*4882a593Smuzhiyunto be compliant. Implementors are encouraged to add to this list to 509*4882a593Smuzhiyunprovide enhanced functionality and control. For example, many security 510*4882a593Smuzhiyunpolicies may require both incoming and outgoing datagrams be checked against 511*4882a593Smuzhiyunthe port and host label ranges. 512*4882a593Smuzhiyun 513*4882a593Smuzhiyun 514*4882a593Smuzhiyun4.1 Port Range Parameters 515*4882a593Smuzhiyun 516*4882a593SmuzhiyunThe labels represented by the PORT_LABEL_MAX and PORT_LABEL_MIN parameters 517*4882a593SmuzhiyunMAY be in CIPSO or local format. Some CIPSO systems, such as routers, may 518*4882a593Smuzhiyunwant to have the range parameters expressed in CIPSO format so that incoming 519*4882a593Smuzhiyunlabels do not have to be converted to a local format before being compared 520*4882a593Smuzhiyunagainst the range. If multiple DOIs are supported by one of these CIPSO 521*4882a593Smuzhiyun 522*4882a593Smuzhiyun 523*4882a593Smuzhiyun 524*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 8] 525*4882a593Smuzhiyun 526*4882a593Smuzhiyun 527*4882a593Smuzhiyun 528*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 529*4882a593Smuzhiyun 530*4882a593Smuzhiyun 531*4882a593Smuzhiyun 532*4882a593Smuzhiyunsystems then multiple port range parameters would be needed, one set for 533*4882a593Smuzhiyuneach DOI supported on a particular port. 534*4882a593Smuzhiyun 535*4882a593SmuzhiyunThe port range will usually represent the total set of labels that may 536*4882a593Smuzhiyunexist on the logical network accessed through the corresponding network 537*4882a593Smuzhiyuninterface. It may, however, represent a subset of these labels that are 538*4882a593Smuzhiyunallowed to enter the CIPSO system. 539*4882a593Smuzhiyun 540*4882a593Smuzhiyun 541*4882a593Smuzhiyun4.2 Single Label CIPSO Hosts 542*4882a593Smuzhiyun 543*4882a593SmuzhiyunCIPSO implementations that support only one label are not required to 544*4882a593Smuzhiyunsupport the parameters described above. These limited implementations are 545*4882a593Smuzhiyunonly required to support a NET_LABEL parameter. This parameter contains 546*4882a593Smuzhiyunthe CIPSO label that may be inserted in datagrams that exit the host. In 547*4882a593Smuzhiyunaddition, the host MUST reject any incoming datagram that has a label which 548*4882a593Smuzhiyunis not equivalent to the NET_LABEL parameter. 549*4882a593Smuzhiyun 550*4882a593Smuzhiyun 551*4882a593Smuzhiyun5. Handling Procedures 552*4882a593Smuzhiyun 553*4882a593SmuzhiyunThis section describes the processing requirements for incoming and 554*4882a593Smuzhiyunoutgoing IP datagrams. Just providing the correct CIPSO label format 555*4882a593Smuzhiyunis not enough. Assumptions will be made by one system on how a 556*4882a593Smuzhiyunreceiving system will handle the CIPSO label. Wrong assumptions may 557*4882a593Smuzhiyunlead to non-interoperability or even a security incident. The 558*4882a593Smuzhiyunrequirements described below represent the minimal set needed for 559*4882a593Smuzhiyuninteroperability and that provide users some level of confidence. 560*4882a593SmuzhiyunMany other requirements could be added to increase user confidence, 561*4882a593Smuzhiyunhowever at the risk of restricting creativity and limiting vendor 562*4882a593Smuzhiyunparticipation. 563*4882a593Smuzhiyun 564*4882a593Smuzhiyun 565*4882a593Smuzhiyun5.1 Input Procedures 566*4882a593Smuzhiyun 567*4882a593SmuzhiyunAll datagrams received through a network port MUST have a security label 568*4882a593Smuzhiyunassociated with them, either contained in the datagram or assigned to the 569*4882a593Smuzhiyunreceiving port. Without this label the host, gateway, or router will not 570*4882a593Smuzhiyunhave the information it needs to make security decisions. This security 571*4882a593Smuzhiyunlabel will be obtained from the CIPSO if the option is present in the 572*4882a593Smuzhiyundatagram. See section 4.1.2 for handling procedures for unlabeled 573*4882a593Smuzhiyundatagrams. This label will be compared against the PORT (if appropriate) 574*4882a593Smuzhiyunand HOST configuration parameters defined in section 3. 575*4882a593Smuzhiyun 576*4882a593SmuzhiyunIf any field within the CIPSO option, such as the DOI identifier, is not 577*4882a593Smuzhiyunrecognized the IP datagram is discarded and an ICMP "parameter problem" 578*4882a593Smuzhiyun(type 12) is generated and returned. The ICMP code field is set to "bad 579*4882a593Smuzhiyunparameter" (code 0) and the pointer is set to the start of the CIPSO field 580*4882a593Smuzhiyunthat is unrecognized. 581*4882a593Smuzhiyun 582*4882a593SmuzhiyunIf the contents of the CIPSO are valid but the security label is 583*4882a593Smuzhiyunoutside of the configured host or port label range, the datagram is 584*4882a593Smuzhiyundiscarded and an ICMP "destination unreachable" (type 3) is generated 585*4882a593Smuzhiyunand returned. The code field of the ICMP is set to "communication with 586*4882a593Smuzhiyundestination network administratively prohibited" (code 9) or to 587*4882a593Smuzhiyun 588*4882a593Smuzhiyun 589*4882a593Smuzhiyun 590*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 9] 591*4882a593Smuzhiyun 592*4882a593Smuzhiyun 593*4882a593Smuzhiyun 594*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 595*4882a593Smuzhiyun 596*4882a593Smuzhiyun 597*4882a593Smuzhiyun 598*4882a593Smuzhiyun"communication with destination host administratively prohibited" 599*4882a593Smuzhiyun(code 10). The value of the code field used is dependent upon whether 600*4882a593Smuzhiyunthe originator of the ICMP message is acting as a CIPSO host or a CIPSO 601*4882a593Smuzhiyungateway. The recipient of the ICMP message MUST be able to handle either 602*4882a593Smuzhiyunvalue. The same procedure is performed if a CIPSO can not be added to an 603*4882a593SmuzhiyunIP packet because it is too large to fit in the IP options area. 604*4882a593Smuzhiyun 605*4882a593SmuzhiyunIf the error is triggered by receipt of an ICMP message, the message 606*4882a593Smuzhiyunis discarded and no response is permitted (consistent with general ICMP 607*4882a593Smuzhiyunprocessing rules). 608*4882a593Smuzhiyun 609*4882a593Smuzhiyun 610*4882a593Smuzhiyun5.1.1 Unrecognized tag types 611*4882a593Smuzhiyun 612*4882a593SmuzhiyunThe default condition for any CIPSO implementation is that an 613*4882a593Smuzhiyununrecognized tag type MUST be treated as a "parameter problem" and 614*4882a593Smuzhiyunhandled as described in section 4.1. A CIPSO implementation MAY allow 615*4882a593Smuzhiyunthe system administrator to identify tag types that may safely be 616*4882a593Smuzhiyunignored. This capability is an allowable enhancement, not a 617*4882a593Smuzhiyunrequirement. 618*4882a593Smuzhiyun 619*4882a593Smuzhiyun 620*4882a593Smuzhiyun5.1.2 Unlabeled Packets 621*4882a593Smuzhiyun 622*4882a593SmuzhiyunA network port may be configured to not require a CIPSO label for all 623*4882a593Smuzhiyunincoming datagrams. For this configuration a CIPSO label must be 624*4882a593Smuzhiyunassigned to that network port and associated with all unlabeled IP 625*4882a593Smuzhiyundatagrams. This capability might be used for single level networks or 626*4882a593Smuzhiyunnetworks that have CIPSO and non-CIPSO hosts and the non-CIPSO hosts 627*4882a593Smuzhiyunall operate at the same label. 628*4882a593Smuzhiyun 629*4882a593SmuzhiyunIf a CIPSO option is required and none is found, the datagram is 630*4882a593Smuzhiyundiscarded and an ICMP "parameter problem" (type 12) is generated and 631*4882a593Smuzhiyunreturned to the originator of the datagram. The code field of the ICMP 632*4882a593Smuzhiyunis set to "option missing" (code 1) and the ICMP pointer is set to 134 633*4882a593Smuzhiyun(the value of the option type for the missing CIPSO option). 634*4882a593Smuzhiyun 635*4882a593Smuzhiyun 636*4882a593Smuzhiyun5.2 Output Procedures 637*4882a593Smuzhiyun 638*4882a593SmuzhiyunA CIPSO option MUST appear only once in a datagram. Only one tag type 639*4882a593Smuzhiyunfrom the MAC Sensitivity class MAY be included in a CIPSO option. Given 640*4882a593Smuzhiyunthe current set of defined tag types, this means that CIPSO labels at 641*4882a593Smuzhiyunfirst will contain only one tag. 642*4882a593Smuzhiyun 643*4882a593SmuzhiyunAll datagrams leaving a CIPSO system MUST meet the following condition: 644*4882a593Smuzhiyun 645*4882a593Smuzhiyun PORT_LABEL_MIN <= CIPSO label <= PORT_LABEL_MAX 646*4882a593Smuzhiyun 647*4882a593SmuzhiyunIf this condition is not satisfied the datagram MUST be discarded. 648*4882a593SmuzhiyunIf the CIPSO system only supports one port, the HOST_LABEL_MIN and the 649*4882a593SmuzhiyunHOST_LABEL_MAX parameters MAY be substituted for the PORT parameters in 650*4882a593Smuzhiyunthe above condition. 651*4882a593Smuzhiyun 652*4882a593SmuzhiyunThe DOI identifier to be used for all outgoing datagrams is configured by 653*4882a593Smuzhiyun 654*4882a593Smuzhiyun 655*4882a593Smuzhiyun 656*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 10] 657*4882a593Smuzhiyun 658*4882a593Smuzhiyun 659*4882a593Smuzhiyun 660*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 661*4882a593Smuzhiyun 662*4882a593Smuzhiyun 663*4882a593Smuzhiyun 664*4882a593Smuzhiyunthe administrator. If port level DOI identifier assignment is used, then 665*4882a593Smuzhiyunthe PORT_DOI configuration parameter MUST contain the DOI identifier to 666*4882a593Smuzhiyunuse. If network level DOI assignment is used, then the NET_DOI parameter 667*4882a593SmuzhiyunMUST contain the DOI identifier to use. And if host level DOI assignment 668*4882a593Smuzhiyunis employed, then the HOST_DOI parameter MUST contain the DOI identifier 669*4882a593Smuzhiyunto use. A CIPSO implementation need only support one level of DOI 670*4882a593Smuzhiyunassignment. 671*4882a593Smuzhiyun 672*4882a593Smuzhiyun 673*4882a593Smuzhiyun5.3 DOI Processing Requirements 674*4882a593Smuzhiyun 675*4882a593SmuzhiyunA CIPSO implementation MUST support at least one DOI and SHOULD support 676*4882a593Smuzhiyunmultiple DOIs. System and network administrators are cautioned to 677*4882a593Smuzhiyunensure that at least one DOI is common within an IP network to allow for 678*4882a593Smuzhiyunbroadcasting of IP datagrams. 679*4882a593Smuzhiyun 680*4882a593SmuzhiyunCIPSO gateways MUST be capable of translating a CIPSO option from one 681*4882a593SmuzhiyunDOI to another when forwarding datagrams between networks. For 682*4882a593Smuzhiyunefficiency purposes this capability is only a desired feature for CIPSO 683*4882a593Smuzhiyunrouters. 684*4882a593Smuzhiyun 685*4882a593Smuzhiyun 686*4882a593Smuzhiyun5.4 Label of ICMP Messages 687*4882a593Smuzhiyun 688*4882a593SmuzhiyunThe CIPSO label to be used on all outgoing ICMP messages MUST be equivalent 689*4882a593Smuzhiyunto the label of the datagram that caused the ICMP message. If the ICMP was 690*4882a593Smuzhiyungenerated due to a problem associated with the original CIPSO label then the 691*4882a593Smuzhiyunfollowing responses are allowed: 692*4882a593Smuzhiyun 693*4882a593Smuzhiyun a. Use the CIPSO label of the original IP datagram 694*4882a593Smuzhiyun b. Drop the original datagram with no return message generated 695*4882a593Smuzhiyun 696*4882a593SmuzhiyunIn most cases these options will have the same effect. If you can not 697*4882a593Smuzhiyuninterpret the label or if it is outside the label range of your host or 698*4882a593Smuzhiyuninterface then an ICMP message with the same label will probably not be 699*4882a593Smuzhiyunable to exit the system. 700*4882a593Smuzhiyun 701*4882a593Smuzhiyun 702*4882a593Smuzhiyun6. Assignment of DOI Identifier Numbers = 703*4882a593Smuzhiyun 704*4882a593SmuzhiyunRequests for assignment of a DOI identifier number should be addressed to 705*4882a593Smuzhiyunthe Internet Assigned Numbers Authority (IANA). 706*4882a593Smuzhiyun 707*4882a593Smuzhiyun 708*4882a593Smuzhiyun7. Acknowledgements 709*4882a593Smuzhiyun 710*4882a593SmuzhiyunMuch of the material in this RFC is based on (and copied from) work 711*4882a593Smuzhiyundone by Gary Winiger of Sun Microsystems and published as Commercial 712*4882a593SmuzhiyunIP Security Option at the INTEROP 89, Commercial IPSO Workshop. 713*4882a593Smuzhiyun 714*4882a593Smuzhiyun 715*4882a593Smuzhiyun8. Author's Address 716*4882a593Smuzhiyun 717*4882a593SmuzhiyunTo submit mail for distribution to members of the IETF CIPSO Working 718*4882a593SmuzhiyunGroup, send mail to: cipso@wdl1.wdl.loral.com. 719*4882a593Smuzhiyun 720*4882a593Smuzhiyun 721*4882a593Smuzhiyun 722*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 11] 723*4882a593Smuzhiyun 724*4882a593Smuzhiyun 725*4882a593Smuzhiyun 726*4882a593SmuzhiyunCIPSO INTERNET DRAFT 16 July, 1992 727*4882a593Smuzhiyun 728*4882a593Smuzhiyun 729*4882a593Smuzhiyun 730*4882a593Smuzhiyun 731*4882a593SmuzhiyunTo be added to or deleted from this distribution, send mail to: 732*4882a593Smuzhiyuncipso-request@wdl1.wdl.loral.com. 733*4882a593Smuzhiyun 734*4882a593Smuzhiyun 735*4882a593Smuzhiyun9. References 736*4882a593Smuzhiyun 737*4882a593SmuzhiyunRFC 1038, "Draft Revised IP Security Option", M. St. Johns, IETF, January 738*4882a593Smuzhiyun1988. 739*4882a593Smuzhiyun 740*4882a593SmuzhiyunRFC 1108, "U.S. Department of Defense Security Options 741*4882a593Smuzhiyunfor the Internet Protocol", Stephen Kent, IAB, 1 March, 1991. 742*4882a593Smuzhiyun 743*4882a593Smuzhiyun 744*4882a593Smuzhiyun 745*4882a593Smuzhiyun 746*4882a593Smuzhiyun 747*4882a593Smuzhiyun 748*4882a593Smuzhiyun 749*4882a593Smuzhiyun 750*4882a593Smuzhiyun 751*4882a593Smuzhiyun 752*4882a593Smuzhiyun 753*4882a593Smuzhiyun 754*4882a593Smuzhiyun 755*4882a593Smuzhiyun 756*4882a593Smuzhiyun 757*4882a593Smuzhiyun 758*4882a593Smuzhiyun 759*4882a593Smuzhiyun 760*4882a593Smuzhiyun 761*4882a593Smuzhiyun 762*4882a593Smuzhiyun 763*4882a593Smuzhiyun 764*4882a593Smuzhiyun 765*4882a593Smuzhiyun 766*4882a593Smuzhiyun 767*4882a593Smuzhiyun 768*4882a593Smuzhiyun 769*4882a593Smuzhiyun 770*4882a593Smuzhiyun 771*4882a593Smuzhiyun 772*4882a593Smuzhiyun 773*4882a593Smuzhiyun 774*4882a593Smuzhiyun 775*4882a593Smuzhiyun 776*4882a593Smuzhiyun 777*4882a593Smuzhiyun 778*4882a593Smuzhiyun 779*4882a593Smuzhiyun 780*4882a593Smuzhiyun 781*4882a593Smuzhiyun 782*4882a593Smuzhiyun 783*4882a593Smuzhiyun 784*4882a593Smuzhiyun 785*4882a593Smuzhiyun 786*4882a593Smuzhiyun 787*4882a593Smuzhiyun 788*4882a593SmuzhiyunInternet Draft, Expires 15 Jan 93 [PAGE 12] 789*4882a593Smuzhiyun 790*4882a593Smuzhiyun 791*4882a593Smuzhiyun 792