Thank you for the input. I did not mean to suggest that there ought to be competing
Security Policies at layer 3. What I did mean to suggest is that, the Security is a
fairly dynamic field at this time. We expect that the requirements and operational
environment will change, and do so at a speed that might not be slow enough for the
current approach that IETF seems to have taken. For instance try to see how the
approach would accommodate requirements for "Security Auditing in VoIP".
The current IETF approach is illustrated by the work at IPSecurity Policy. What they
have done is effectively the following. Take the RFC 3060 (Policy Core Information
Model - Version 1 Specification) and use it to formulate the following IDs (no RFC yet
released).
IPsec Configuration Policy Model
IP Security Policy Requirements
IPSec Policy Information Base
IPsec Policy Configuration MIB
This process tries to take a big leap. Such a big leap may be possible at the first
stage. However in view of the dynamic nature of the Security requirements and
operational scenarios, such a leap might not be possible within the available time
(that depends on how fast the things in the security landscape change).
I therefore tried to suggect a more efficient approach. I will rephrase it below.
An RFC like 3060 could first be translated into a Security Policy Framework. This
means the following efforts.
1. First examine the work that went into RFC 3060 from a Security focused perspective.
Hopefully this will not mean changes to RFC 3060 itself.
2. Formulate a "Security Policy Framework" and document it in an RFC (call it RFC
xxxx). This would specialise the RFC 3060 to the Security landscape. However it would
be reusable to formulate an RFC for the IPSec Policy (call it RFC yyyy), in a similar
sense in which RFC 3060 is specialised to formulate RFC xxxx.
The above approach would be facilitated via a Security Policy Working Group, that
currently does not exist at IETF. (Of course there are some "rationale" issues that I
have not repeated here).
Thanks and Regards
Rahim
Note: Note: My thoughts are personal to myself, and do not represent my employer.
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 15, 2002 2:25 PM
To: Choudhary, Abdur R (Rahim)
Cc: [EMAIL PROTECTED]
Subject: Re: Security
The reason there's only IPSec at its level is because having two competing
ways to do it there is probably counterproductive (even at higher levels,
the only reason there's both OpenPGP and S/MIME is because the two have
radically different trust models).
Another reason why you only see IPSec at that level is because it's mostly a
"done deal" - the Internet has decided that IPSec is the way to provide the
functions it provides. You tuned in about 5 years too late to see the competing
proposals that have since evaporated in the mists of time...
--
Valdis Kletnieks
Computer Systems Senior Engineer
Virginia Tech