Hi, Bill:

I understood the spec pretty well. I like that you have limited the
scope to what you consider to be likely higher-use scenarios.
I have a couple of questions:

In paragraph 4 of section 4, you use the phrase "indirect labeling". 
Is this the same as implicit labeling?
If so, continue to use implicit.  If not, maybe you could provide a 
glossary of terms.

In paragraph 1 of 5.1, you refer to "plaintext' at the end of the paragraph.
Is plaintext the text that is covered by the SADB_EXT_SENSITIVITY 
extension? If so, make the connection
explicit.  If not, maybe you could say where the plaintext is in the packet.

Nits:

is be > is

 which will be used by in.iked ... >
. This option is used by in.iked ....

mark its key management traffic exempt >
to mark that its key management traffic is exempt ...

that the would >
that they would

-- Sharon
----------------------------------------------------------------------
> Message: 1
> Date: Mon, 12 May 2008 13:52:15 -0400
> From: Dan McDonald <danmcd at sun.com>
> Subject: Re: labeled ipsec phase 1 design review
> To: security-discuss at opensolaris.org
> Message-ID: <20080512175215.GH5982 at sun.com>
> Content-Type: text/plain; charset=us-ascii
>
> As indicated by the brevity of other e-mails, there's not a lot here to pick
> apart.  I'll do my best, though.  :)
>
> First off --> Glenn Faden:  There's one IKE per IP Instance.  This means
>                           the IKE in the global zone is working on behalf
>                           of all shared-stack zones, including TX labelled
>                           ones.
>
> Now, on to the review itself.
>
>
> Section 1
>
> * NIT:  "Solaris IKE daemon".  Maybe that's just s/happy/glad/g, though.
>
>
> Section 2
>
> * "statically addressed" implies (at least to me) that every node has a
>   static address.  Perhaps "statically allocated" would be more correct, as
>   you could have rules with a.b.c.d/N where N < 32 that could work with many
>   deployments.
>
> * A source has informed me about one big known style of deployment today.
>   Often legacy boxes reside on an edge network.  Such edge network routers
>   often scribble labels into the transiting outbound packets and remove
>   labels from the transiting inbound packets.  I suspect a properly
>   configured deployment of your project will work nicely even communicating
>   with IPsec to these legacy edge boxes.  If you could mention this
>   possibility, it would make some people happy.
>
>   (NOTE:  I'm Bcc:ing my source on this, in the hopes that he crawls out
>         of his hiding place to review this himself.)
>
>
> Section 5.1
>
> * Another concern from my aforementioned source is that in non-encrypted
>   IPsec (AH or Auth-only ESP) that the inner label "shines through"
>   regardless, and that if there is an outer label that it must match or
>   dominate the inner label.  Perhaps this belongs in Use Cases, or perhaps
>   it's worth of a SECURITY CONSIDERATIONS section of a manpage.
>
> * It's not 100% clear when the SADB_X_SENS_IMPLICIT flag applies.  From my
>   readings, I get the idea that:
>
>       * All label-aware SAs have both SADB_EXT_SENS... and
>           SADB_X_EXT_OUTER... in their messages.
>
>       * The ...X_EXT_OUTER... has either a label OR this IMPLICIT flag.
>
>       * The SADB_EXT_SENS... never has this flag set.
>
>   I'd like to see clearer text for how this flag gets used.
>
>
>
> Section 5.5.1
>
> * Can I also instantiate "multi-label" or "single-label" as global, inherited
>   by rules that do not state anything?
>
>
> Section 5.7
>
> * Historical note:  IKE was originally kept in with the kernel IPsec bits
>                   because if we modified PF_KEY, we wanted any
>                   corresponding IKE modifications to come along for the
>                   ride.
>
>                   To be fair - and to the best of my knowledge - we've
>                   never backwards-broken PF_KEY.  OTOH we have rewhacked
>                   how NAT-Traversal is implemented.  I'm not sure how that
>                   affects the possibility of splitting out in.iked &
>                   closed-source friends into a separate package (whether
>                   old-school SysV or new-school IPS).
>
>
> Dan
>
>
> ------------------------------
>
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org
>
> End of security-discuss Digest, Vol 33, Issue 7
> ***********************************************
>   

Reply via email to