<?xml version="1.0" encoding="us-ascii"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd"[
<!ENTITY RFC6256 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6256.xml">
<!ENTITY RFC4838 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.4838.xml">
<!ENTITY RFC2119 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC5050 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.5050.xml">
<!ENTITY RFC6257 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.6257.xml">
]>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc tocdep"4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc compact="no" ?>
<?rfc subcompact="no" ?>

<rfc category="exp" ipr="trust200902" docName="draft-birrane-dtn-adm-ionsec-01" obsoletes="" updates="" submissionType="IETF" xml:lang="en">

   <!-- ***** FRONT MATTER ***** -->
   <front> 
      <title abbrev="IONSEC ADM">ION Security Application Data Model</title>
      <author fullname="Edward J. Birrane" initials="E.B." surname="Birrane">
         <organization> Johns Hopkins Applied Physics Laboratory </organization>
         <address>
            <email>Edward.Birrane@jhuapl.edu</email>
         </address>
      </author>
      <author fullname="Evana DiPietro" initials="E.D." surname="DiPietro">
         <organization> Johns Hopkins Applied Physics Laboratory </organization>
         <address>
            <email>Evana.DiPietro@jhuapl.edu</email>
         </address>
      </author>
      <author fullname="David Linko" initials="D.L." surname="Linko">
         <organization> Johns Hopkins Applied Physics Laboratory </organization>
         <address>
            <email>David.Linko@jhuapl.edu</email>
         </address>
      </author>
      <date year="2019" />
      
       <!-- Meta-data Declarations -->
      <area>General</area>
      <workgroup>Delay-Tolerant Networking</workgroup>
      <keyword>DTN</keyword>
      <keyword>Network Management</keyword>

      <abstract>
         <t>
            This document describes the Application Data Model (ADM) for ION Security in compliance with the template provided by <xref target="I-D.birrane-dtn-adm"/>.
         </t>
      </abstract>
   </front>
  
   <middle>
      <section title="Introduction" toc="default">
         <t>
            An Application Data Model (ADM) provides a guaranteed 
            interface for the management of an application or 
            protocol in accordance with the Asynchronous Management 
            Architecture (AMA) defined in <xref target="I-D.birrane-dtn-ama"/>. 
            The ADM described in this document complies with the 
            ADM Template provided in <xref target="I-D.birrane-dtn-adm"/> 
            as encoded using the JSON syntax.
         </t>
         <t>
            The IONSEC Admin ADM provides the set of information necessary to configure and manage the ION security policy database on the local computer that is running ION. This information includes both authentication from Licklider Transmission Protocol (LTP) and Bundle Protocol Security (BPSEC). 
         </t>
             
         <section title="Technical Notes" toc="default">
            <t>
               <list style="symbols">
                  <t>
                     This document describes Version 0.0 of the IONSEC Admin ADM.
                  </t>
                  <t>
                     The AMM Resource Identifier (ARI) for this ADM is 
                     NOT correctly set. A sample ARI is used in this version of the
                     specification and MAY change in future versions of this ADM
                     until an ARI registry is established. This notice will be removed
                     at that time.
                  </t>
                  <t>
                     Agent applications MAY choose to ignore the name, description,
                     or other annotative information associated with the component definitions within this ADM where such items are only used to provide human-readable information or are otherwise not necessary to manage a device.                     
                  </t>              
               </list>
            </t>
         </section>
      
         <section title="Scope" toc="default">
            <t>
               This ADM specifies those components of the Asynchronous 
               Management Model (AMM) common to the manqgement of any instance 
               of an ION node. 
            </t>
            <t>
               Any Manager software implementing this ADM MUST perform the responsibilities of an AMA Manager as outlined in <xref target="I-D.birrane-dtn-adm"/> as they relate to the objects included in this document.
            </t>
            <t>
               Any Agent software implementing this ADM MUST perform the responsibilities
               of an AMA Agent as outlined in <xref target="I-D.birrane-dtn-adm"/> as they relate to the objects included in this document.
            </t>
         </section>
         
         <section title="Requirements Language" toc="default">
            <t>
               The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
               "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
               document are to be interpreted as described in 
               <xref target="RFC2119" pageno="false" format="default">RFC 2119</xref>.
            </t>
         </section>   
                 
      </section>
      <section title="Structure and Design of this ADM">
        <t>
          The IONSEC Admin ADM's structure is in accordance to <xref target="I-D.birrane-dtn-adm"/>. This ADM contains metadata, table templates, and controls. Table Templates are column templates that will be followed by any instance of this table available in the network. They may not be created dynamically within the network by Managers. Controls are predefined and sometimes parameterized opcodes that can be run on an Agent. Controls are preconfigured in Agents and Managers as part of ADM support. There are no variables, report templates, macros, edd, constants, or operators in this ADM at this time. The contents of this ADM are derived from the main functions and data that are needed to configure the security policy database on the local computer that is running ION and includes both Bundle Protocol Security and Licklider Transmission Protocol Authentication. 
        </t>
        <t>
          All ADMs have metadata that includes the name, namespace, and version of the ADM as well as the name of the organization that is issuing that particular ADM. This is important for identification purposes of the ADMs and to ensure version control.
        </t>
        <t>
          The controls that were chosen to be expressed in this document are related to adding, deleting, and modifying security keys. The controls also deal with LTP segment authentication and LTP segment signing rules. The table templates expressed in this document show all of the keys and rules that are in the security policy database.
        </t>
      </section>
      <section title="Naming and Identification">
         <t>
            This section outlines the namespaces used to uniquely identify
            ADM objects in this specification.
         </t>
          <section title="Namespace and Nicknames">
            <t>
               In accordance with <xref target="I-D.birrane-dtn-adm"/>, every ADM
               is assigned a moderated Namespace. In accordance with 
               <xref target="I-D.birrane-dtn-amp"/>, these namespaces may be
               enumerated for compactness. The namespace and ADM identification
               for these objects is defined as follows.
            </t>
            <texttable anchor="agent_ns" title="Namespace Information" align="center">
               <ttcol align="center">Identifier</ttcol>
               <ttcol align="center">Value</ttcol>
               
               <c>Namespace</c>
               <c>DTN/ION/ionsecadmin</c>

               <c>ADM Enumeration</c>
               <c>8</c>
            </texttable>

            <t>
              Given the above ADM enumeration, in accordance with 
              <xref target="I-D.birrane-dtn-amp"/>, the following AMP
              nicknames are defined.
            </t>
            
            <texttable anchor="ionsec_nn" title="IONSEC ADM Nicknames" align="center" style="full">
               <ttcol width="10%" align="center">Nickname</ttcol>
               <ttcol width="45%" align="center">Collection</ttcol>
               
               <c>160</c>
               <c>DTN/ION/ionsecadmin/Const</c>

               <c>161</c>
               <c>DTN/ION/ionsecadmin/Ctrl</c>

               <c>162</c>
               <c>DTN/ION/ionsecadmin/Edd</c>

               <c>163</c>
               <c>DTN/ION/ionsecadmin/Mac</c>

               <c>164</c>
               <c>DTN/ION/ionsecadmin/Oper</c>

               <c>165</c>
               <c>DTN/ION/ionsecadmin/Rptt</c>

               <c>167</c>
               <c>DTN/ION/ionsecadmin/Tblt</c>

               <c>169</c>
               <c>DTN/ION/ionsecadmin/Var</c>

               <c>170</c>
               <c>DTN/ION/ionsecadmin/Mdat</c>

               <c>171-179</c>
               <c>DTN/ION/ionsecadmin/Reserved</c>

            </texttable>
         
         </section>
      </section>

      <section title="IONSEC ADM JSON Encoding">
        <t>
          The following is the JSON encoding of the IONsec Admin ADM:
          <figure>
            <artwork>

{
  "Mdat": [{
      "name": "name",
      "type": "STR",
      "value": "ionsec_admin",
      "description": "The human-readable name of the ADM."
    },
    {
      "name": "namespace",
      "type": "STR",
      "value": "DTN/ION/ionsecadmin",
      "description": "The namespace of the ADM."
    },
    {
      "name": "version",
      "type": "STR",
      "value": "v0.0",
      "description": "The version of the ADM."
    },
    {
      "name": "organization",
      "type": "STR",
      "value": "JHUAPL",
      "description": "The name of the issuing organization of the 
                      ADM."
    }
  ],

  "Tblt": [{
      "name": "ltp_rx_rules",
      "columns": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }, {
        "type": "UINT",
        "name": "ciphersuite_nbr"
      }, {
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This table lists all LTP segment authentication 
                      rules in the security policy database."
    },
    {
      "name": "ltp_tx_rules",
      "columns": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }, {
        "type": "UINT",
        "name": "ciphersuite_nbr"
      }, {
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This table lists all LTP segment signing rules 
                      in the security policy database."
    }
  ],

  "Ctrl": [{
      "name": "key_add",
      "parmspec": [{
        "type": "STR",
        "name": "key_name"
      }, {
        "type": "BYTESTR",
        "name": "key_value"
      }],
      "description": "This control adds a named key value to the 
                       security policy database. The content of 
                       file_name is taken as the value of the key. 
                       Named keys can be referenced by other elements 
                       of the security policy database."
    },
    {
      "name": "key_change",
      "parmspec": [{
        "type": "STR",
        "name": "key_name"
      }, {
        "type": "BYTESTR",
        "name": "key_value"
      }],
      "description": "This control changes the value of the named key, 
                      obtaining the new key value from the content of 
                      file_name."
    },
    {
      "name": "key_del",
      "parmspec": [{
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This control deletes the key identified by 
                      name."
    },
    {
      "name": "ltp_rx_rule_add",
      "parmspec": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }, {
        "type": "UINT",
        "name": "ciphersuite_nbr"
      }, {
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This control adds a rule specifying the manner 
                      in which LTP segment authentication will be 
                      applied to LTP segmentsrecieved from the 
                      indicated LTP engine. A segment from the 
                      indicated LTP engine will only be deemed 
                      authentic if it contains an authentication 
                      extension computed via the ciphersuite 
                      identified by ciphersuite_nbr using the 
                      applicable key value. If ciphersuite_nbr is 255 
                      then the applicable key value is a hard-coded 
                      constant and key_name must be omitted; otherwise 
                      key_nameis required and the applicable key 
                      value is the current value of the key named 
                      key_name in the local security policy database. 
                      Valid values of ciphersuite_nbr are: 0: 
                      HMAC-SHA1-80 1: RSA-SHA256 255: NULL"
    },
    {
      "name": "ltp_rx_rule_change",
      "parmspec": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }, {
        "type": "UINT",
        "name": "ciphersuite_nbr"
      }, {
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This control changes the parameters of the LTP 
                      segment authentication rule for the indicated 
                      LTP engine."
    },
    {
      "name": "ltp_rx_rule_del",
      "parmspec": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }],
      "description": "This control deletes the LTP segment 
                      authentication rule for the indicated LTP 
                      engine."
    },
    {
      "name": "ltp_tx_rule_add",
      "parmspec": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }, {
        "type": "UINT",
        "name": "ciphersuite_nbr"
      }, {
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This control adds a rule specifying the manner 
                      in which LTP segments transmitted to the 
                      indicated LTP engine mustbe signed. Signing a 
                      segment destined for the indicated LTP engine 
                      entails computing an authentication extension 
                      via the ciphersuite identified by 
                      ciphersuite_nbr using the applicable key value. 
                      If ciphersuite_nbr is 255 then the applicable 
                      key value is a hard-coded constant and key_name 
                      must be omitted; otherwise key_nameis required 
                      and the applicable key value is the current 
                      value of the key named key_name in the local 
                      security policy database.Valid values of 
                      ciphersuite_nbr are: 0:HMAC_SHA1-80 
                      1: RSA_SHA256 255: NULL"
    },
    {
      "name": "ltp_tx_rule_change",
      "parmspec": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }, {
        "type": "UINT",
        "name": "ciphersuite_nbr"
      }, {
        "type": "STR",
        "name": "key_name"
      }],
      "description": "This control changes the parameters of the LTP 
                      segment signing rule for the indicated LTP 
                      engine."
    },
    {
      "name": "ltp_tx_rule_del",
      "parmspec": [{
        "type": "UINT",
        "name": "ltp_engine_id"
      }],
      "description": "This control deletes the LTP segment signing 
                      rule for the indicated LTP engine."
    },
    {
      "name": "list_keys",
      "description": "This control lists the names of keys available 
                      in the key policy database."
    },
    {
      "name": "list_ltp_rx_rules",
      "description": "This control lists all LTP segment 
                      authentication rules in the security policy 
                      database."
    },
    {
      "name": "list_ltp_tx_rules",
      "description": "This control lists all LTP segment signing 
                      rules in the security policy database."
    }
  ]
}

        </artwork>
      </figure>
    </t>

      </section>

				    
    <section anchor="IANA" title="IANA Considerations" toc="default">
      <t>
		At this time, this protocol has no fields registered by IANA.
	  </t>
    </section>
  </middle>

   <!--  *****BACK MATTER ***** -->
   <back>
      <references title="Informative References">
               
         <?rfc include="reference.I-D.draft-birrane-dtn-ama-07"?>
         
      </references>
      
      <references title="Normative References">
         
         &RFC2119;     
        
         
  
  <?rfc include="reference.I-D.draft-birrane-dtn-adm-02"?>
  <?rfc include="reference.I-D.draft-birrane-dtn-amp-04"?>
      </references>
    
  </back>
</rfc>