On Mar 10, 2009, at 5:00 PM, Boyd Fletcher wrote:


I think it should be generalized further so not be specific to either ESS or ICISM.

As nothing in the specification calls for use any particular label format in XMPP. In fact, the first and second implementations of this specification (both quite experimental at this stage) each used label formats not discussed in this XEP (and different from each other). One nice thing about using ESS in the illustrations is that value is just a base64 blob to most folks, so they are unlikely to attach any particular semantics to the value. (For this XEP, I assume the client is quite dumb. In particular, has no specific knowledge of the security (labeling) policy. While certainly supporting security (labeling) policy aware clients is desirable as well, but I rather save such features for another document.

BTW, Example 2 <displaymarking> should be "U//FOUO" or "UNCLASSIFIED//FOR OFFICIAL USE ONLY" not "SECRET" because of the disseminationControls attribute of SECRET can’t have FOUO.

My bad...  half an edit got applied.

Also its probably safer to require that colors be specified in their #RRGGBB hexadecimal equivalent not the symbolic name.

As a protocol guy, I hate multiple representations of any particular abstract value. However, in our use case, labels and other security information objects tend to get constructed using XML authoring tools more than anything else. Users of these tools much rather use symbolic names they understand than hexadecimal values. Raw labeled messages do get exposed to humans before/during/after transmission in various cases (such as in audit logs), so it seems reasonable to cater some to the human.

Though I am not a GUI guy, I do recall discussion in HTML land that not all hexadecimal values are display safe, however this may now be of only historical interest.

It also might be good to make a note about accessibility here.

I think displayMarking should have two attribute portionMarking (i.e. “S//REL USA and GBR”) and securityBanner (i.e. ”SECRET//REL USA and GBR”).

securityBanner – The long string representation of the security marking portionMarking – The short string representation of the security marking

I rather only have a single string to prominently display. Having two will likely lead to some implementations favoring one over the other. If there were to be two, I rather use generic names for them (e.g., shortMarking, longMarking) and, most importantly, a clear statement of when/where each is to used.

we define a <feature> for MUC that specific to security markings, perhaps
"http://www.xmpp.org/protocol/securitylabel";

It's intended that "urn:xmpp:sec-label:0" feature be published in each service domain, and elsewhere, which is using security labels.


<presence> and <iq> packets should be labeled be required to be label is message packets are. In many environments a person presence could be very sensitive.

There are two models for handling presence. One is to regard a person's (or resource's) presence information (regardless of particulars) to have a given sensitivity.

Another is to allow each statement of presence to have its own sensitivity. The latter introduces significant complexity into the security model. In particular, when a user's presence changes from "A (UNCLASSIFIED)" to "B (SECRET)", not all subscribers to the presence may be authorized to see "B (SECRET)" but as "A (UNCLASSIFIED)" is no longer the current presence, the server ends up in a quandary. Solutions seem to either violate the security model or lead to usability problems.

Hence, this document takes the former approach.

if you DISCO a room for the above feature it needs to return:

Why just a room? The document provides security labeling on all <message/> traffic (IM, MUC, PUBSUB).

1. XML namespace of the security labeling scheme used

Only one? Our server actually supports (concurrently) multiple label formats. Though in practice we hope only one format would be used, I can see cases where multiple formats are used concurrently in a single system (ugly as it might be).

2. labeling attributes/element used

Given the focus of this XEP is not to require clients to have any particular knowledge of the label format or security policy, I cannot see what use this would be to such clients. As I noted above, I rather save features intended to support smarter clients to a follow- up XEP.

3. an ordered list of security labels.
in the ordered list only highest and lowest have meaning. since a label like “S//REL USA and FRA” and “S//REL USA and GBR” are non- comparable.

The specification does provide a simple catalog of label discovery mechanism. I didn't define an order, but don't have a problem with saying that the labels should loosely ordered (as there is no strict ordering of labels).



On 3/10/09 6:03 PM, "XMPP Extensions Editor" <[email protected]> wrote:

> Version 0.2 of XEP-0258 (Security Labels in XMPP) has been released.
>
> Abstract: This document describes the use of security labels in XMPP. The
> document
> specifies how security label metadata is carried in XMPP, when this
> metadata
> should or should not be provided, and how the metadata is to be processed.
>
> Changelog: Reworked discovery and various updates. (kdz)
>
> Diff:
> http://svn.xmpp.org:18080/browse/XMPP/trunk/extensions/xep-0258.xml?%40diffMod
> e=u&%40diffWrap=s&r1=2598&r2=2867&u=3&ignore=&k=
>
> URL: http://www.xmpp.org/extensions/xep-0258.html
>

Reply via email to