On Sep 19, 2007, at 11:40 AM, Bill Sommerfeld wrote:

> On Wed, 2007-09-19 at 11:12 -0700, james hughes wrote:
>> Can implicit IPSEC labels be similar to what we do with real
>> interfaces in S10 TX? With real interfaces, we label based on a  
>> static
>> policy for an ethernet port. For IPSEC, can we assign a label based  
>> on
>> a policy for the other party
>
> Yes.

:^)

> What's more, this becomes a matter of slight-of-hand within the
> IPsec key management daemon - with implicit labels, the kernel ip  
> stack
> verifies label of traffic == label of SA; the key management daemon
> assigns labels to each SA it creates, and can do so however it feels  
> is
> appropriate.
>
>> (where the other party is identified by their public key)?
>
> Or anything else used to identify the peer.  Exact on-the-wire  
> protocol
> is not nailed down but it looks very feasible to allow local  
> mechanisms
> to pick a label based on every attribute on hand

> (public key, certificate,

Good Cryptographic Hygiene.

> ip addresses, phase of moon, etc.,)

Scary.  spoofing phase of moon is trivial...

> when the peer is not
> aware of our extensions; when the peer is label-aware, similar
> mechanisms would be needed to confirm that the peer is authorized to  
> use
> a particular label.

... needed to confirm that the peer is authorized to use a particular  
range of labels.

>
>                                       - Bill

Very cool.


Reply via email to