| < draft-ietf-ipsp-roadmap-00.txt | draft-ietf-ipsp-roadmap-01.txt > | |||
|---|---|---|---|---|
| IPSP Working Group L.A. Sanchez | IPSP Working Group L.A. Sanchez | |||
| INTERNET-DRAFT BBN Technologies | INTERNET-DRAFT BBN Technologies | |||
| Expire in March, 2001 H. Orman | Expire in March, 2001 H. Orman | |||
| Novell Corporation | Novell Corporation | |||
| September 25, 2000 | November 16, 2000 | |||
| A Roadmap for IPsec Policy Management | A Roadmap for IPsec Policy Management | |||
| draft-ietf-ipsp-roadmap-00.txt | draft-ietf-ipsp-roadmap-01.txt | |||
| Status of this Memo | Status of this Memo | |||
| This document is an Internet-Draft and is in full conformance with | This document is an Internet-Draft and is in full conformance with | |||
| all provisions of Section 10 of RFC2026. Internet-Drafts are | all provisions of Section 10 of RFC2026. Internet-Drafts are | |||
| working documents of the Internet Engineering Task Force (IETF), | working documents of the Internet Engineering Task Force (IETF), | |||
| its areas, and its working groups. Note that other groups may also | its areas, and its working groups. Note that other groups may also | |||
| distribute working documents as Internet-Drafts. | distribute working documents as Internet-Drafts. | |||
| Internet-Drafts are draft documents valid for a maximum of six | Internet-Drafts are draft documents valid for a maximum of six | |||
| skipping to change at line 76 ¶ | skipping to change at line 76 ¶ | |||
| the path of the communication. | the path of the communication. | |||
| 2. Roadmap to a solution | 2. Roadmap to a solution | |||
| In essence the IPSP WG will produce a set of documents and working | In essence the IPSP WG will produce a set of documents and working | |||
| code. To accomplish this the IPSP WG will work on the items listed | code. To accomplish this the IPSP WG will work on the items listed | |||
| below. Please note, that not all items require code | below. Please note, that not all items require code | |||
| development. Below, you will find a complete list of all | development. Below, you will find a complete list of all | |||
| items. The IPSP WG will: | items. The IPSP WG will: | |||
| 1) first establish the requirements for IPsec policy | 1) first establish the requirements for IPsec policy | |||
| management. Any solution developed under the IPSP umbrella | management. Any solution developed under the IPSP umbrella | |||
| MUST meet these requirements. The requirements document | MUST meet these requirements. The requirements document | |||
| will cover all aspects of IPsec policy management including: | will cover all aspects of IPsec policy management including: | |||
| - IPsec data model | - IPsec data model | |||
| - IPsec policy architecture | - IPsec policy architecture | |||
| - IPsec policy specification | - IPsec policy specification | |||
| - IPsec policy provisioning | - IPsec policy provisioning | |||
| - IPsec security gateway discovery | - IPsec security gateway discovery | |||
| - IPsec policy discovery, negotiation, conflict | - IPsec policy discovery, negotiation, conflict | |||
| resolution and compliance checking | resolution and compliance checking | |||
| This WG item will produce a standards-track document. | This WG item will produce a standards-track document. | |||
| 2) define a data model for IPsec policies. This model will be | 2) define a data model for IPsec policies. This model will be | |||
| compatible with the P-CIM [PCIM]. This WG item will | compatible with the P-CIM [PCIM]. This WG item will | |||
| produce a standards-track document. | produce a standards-track document. | |||
| 3) develop an architecture for IPsec policy management. The | 3) develop an architecture for IPsec policy management. The | |||
| document will discuss and cover the following topics: | document will discuss and cover the following topics: | |||
| - IPsec data model | - IPsec data model | |||
| - IPsec policy specification | - IPsec policy specification | |||
| - IPsec policy provisioning | - IPsec policy provisioning | |||
| - IPsec security gateway discovery | - IPsec security gateway discovery | |||
| - IPsec policy discovery, negotiation, conflict | - IPsec policy discovery, negotiation, conflict | |||
| resolution and compliance checking | resolution and compliance checking | |||
| This WG item will produce a standards-track document. | This WG item will produce a standards-track document. | |||
| 4) develop a flexible, vendor-independent language to | 4) develop a flexible, vendor-independent language to | |||
| represent IPsec policies. The language MUST follow the | represent IPsec policies. The language MUST follow the | |||
| IPsec data model which in turns follows the P-CIM. | IPsec data model which in turns follows the P-CIM. | |||
| This WG item will produce a standards-track document and | This WG item will produce a standards-track document and | |||
| parser implementations. | parser implementations. | |||
| 5) develop guidelines for the provisioning of IPsec policies | 5) develop guidelines for the provisioning of IPsec policies | |||
| using existing policy provisioning protocols. This includes | using existing policy provisioning protocols. This includes | |||
| profiles for distributing IPsec policies over protocols | profiles for distributing IPsec policies over protocols | |||
| such as LDAP, COPS, SNMPCONF, FTP, etc. | such as LDAP, COPS, SNMPCONF, FTP, etc. | |||
| This WG item will produce standards-track documents and | This WG item will produce standards-track documents and | |||
| implementations. | implementations. | |||
| 6) specify and develop adopt or develop an IPsec policy | 6) specify and develop adopt or develop an IPsec policy | |||
| exchange and negotiation protocol. The protocol must be | exchange and negotiation protocol. The protocol must be | |||
| capable of: | capable of: | |||
| i) discovering security gateways | i) discovering security gateways | |||
| ii) exchanging and negotiating security policies, and; | ii) exchanging and negotiating security policies, and; | |||
| iii) resolving policy conflicts in both intra/inter | iii) resolving policy conflicts in both intra/inter | |||
| domain environments. The protocol must be | domain environments. The protocol must be | |||
| independent of any security protocol suite and key | independent of any security protocol suite and key | |||
| management protocol. | management protocol. | |||
| Note that the WG MAY decide to divide the above-mentioned | Note that the WG MAY decide to divide the above-mentioned | |||
| functionality into one or more protocols. This WG item will | functionality into one or more protocols. This WG item will | |||
| produce a standards-track document and implementations. | produce a standards-track document and implementations. | |||
| 3. Roadmap Nutshell | 3. Roadmap Nutshell | |||
| Roadmap Document | Requirements document. Standards track. | |||
| Information Model | Roadmap Document. This is the roadmap document. Standards track. | |||
| Specification Language | Data Information Model. Standards track. | |||
| Provisioning Guidelines | Policy Management Architecture. Standards track. | |||
| Gateway Discovery, policy exchange, | Specification Language. Standards track document and a reference | |||
| implementation of the parser. | ||||
| 3. Security Considerations | Provisioning Guidelines. Standards track document and implementations | |||
| using existing provisioning protocols. | ||||
| Policy Exchange and Negotiation Protocol. At least one standards | ||||
| track document and implementation. | ||||
| 4. Security Considerations | ||||
| The document provides a framework for applications to identify the | The document provides a framework for applications to identify the | |||
| relevant policies in place across the network. Policies must be | relevant policies in place across the network. Policies must be | |||
| communicated in a secure way so as not to jeopardize the ability | communicated in a secure way so as not to jeopardize the ability | |||
| of the application to run. It is also important to ensure that the | of the application to run. It is also important to ensure that the | |||
| policies that are communicated statically or dynamically to the | policies that are communicated statically or dynamically to the | |||
| Policy Enforcement device are doen so, securely. Not doing so could | Policy Enforcement device are doen so, securely. Not doing so could | |||
| compromise the security of the entire network. | compromise the security of the entire network. | |||
| REFERENCES | REFERENCES | |||
| [RFC2119] Bradner, S., "Key Words for use in RFCs to indicate | [RFC2119] Bradner, S., "Key Words for use in RFCs to indicate | |||
| Requirement Levels", RFC2119, March 1997. | Requirement Levels", RFC2119, March 1997. | |||
| [RFC2401] S. Kent, R. Atkinson, "Security Architecture for the Internet | [RFC2401] S. Kent, R. Atkinson, "Security Architecture for the Internet | |||
| Protocol", RFC 2401. | Protocol", RFC 2401. | |||
| [RFC2403] S. Kent, R. Atkinson, "IP Authentication Header", RFC 2402 | [RFC2403] S. Kent, R. Atkinson, "IP Authentication Header", RFC 2402 | |||
| [RFC2406] S. Kent, R. Atkinson, "IP Encapsulating Security Payload | [RFC2406] S. Kent, R. Atkinson, "IP Encapsulating Security Payload | |||
| (ESP)", RFC 2406. | (ESP)", RFC 2406. | |||
| [PCIM] Moore, et al., "Policy Core Information Model -- Version 1 | [PCIM] Moore, et al., "Policy Core Information Model -- Version 1 | |||
| Specification" | Specification" | |||
| ftp://ftp.ietf.org/internet-drafts/draft-ietf-policy-core-info-model-07.txt | ftp://ftp.ietf.org/internet-drafts/draft-ietf-policy-core-info-model-07.txt | |||
| [RFC2407] D. Piper, "The Internet IP Security Domain of Interpretation | [RFC2407] D. Piper, "The Internet IP Security Domain of Interpretation | |||
| for ISAKMP", RFC 2407. | for ISAKMP", RFC 2407. | |||
| [RFC2409] D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)", | [RFC2409] D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)", | |||
| RFC 2409. | RFC 2409. | |||
| Authors' Addresses | Authors' Addresses | |||
| Luis A. Sanchez | Luis A. Sanchez | |||
| BBN Technologies | BBN Technologies | |||
| GTE Internetworking | GTE Internetworking | |||
| 10 Moulton Street | 10 Moulton Street | |||
| End of changes. 25 change blocks. | ||||
| 40 lines changed or deleted | 47 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||