On Fri, Dec 04, 2009 at 01:39:46PM -0500, Dan McDonald wrote:
> The bigger point being missed by this thread, I think, is that it
> seems that any work in multi-level security needs to deal with
> successful interoperability.  If it doesn't, there's little point in
> documenting a single-platform solution as part of a working group's
> output.

+1.

The proposed work item is, at first glance anyways, too SELinux-
specific.

Note that SMACK encodes its labels as CIPSO labels, so a scheme that
uses CIPSO can possibly be used in SMACK and non-SMACK environments, and
possibly even be mixed.

In any case, there have been lengthy threads elsewhere (saag, IIRC)
about MAC interoperability.

Some options to consider:

 - implicit labeling
    - derived from CERTs
    - derived from IDs
    - derived from network addresses
 - negotiated labeling
    - requires a DOI negotiation of some sort
    - each node asserts one, or more, or a range of labels (SMACK, for
      example, doesn't support the notion of label ranges) and the peers
      evaluate and narrow the assertion according to policy and produce

All I see in the proposed work item is single label assertions.  That
strikes me as insufficient.

Nico
-- 
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to