DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T a

⟦8555e0102⟧ TextFile

    Length: 8167 (0x1fe7)
    Types: TextFile
    Names: »area.security.91mar.txt«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦this⟧ »./papers/IETF-drafts/area.security.91mar.txt« 

TextFile



Security Area

Director(s):

   o Steve Crocker:  crocker@tis.com

Area Summary reported by Steve Crocker/TIS

The Security Area within the IETF is responsible for development of
security oriented protocols, security review of RFCs, development of
candidate policies, and review of operational security on the Internet.

This report has two parts.  The first section covers highlights from the
meeting.  The second section covers the organization and operation of
the Security Area.

HIGHLIGHTS

Security Policy and Site Security Policy Handbook (SPWG and SSPHWG)

Both the Security Policy and Site Security Policy Handbook Working
Groups prepared drafts of their documents.  The security policy document
is a concise statement of principles for protection of information
assets and computing resources in the Internet.  Because it's intended
to act as a guide to others who will establish policies for their
networks, hosts, products, etc., the IAB determined that this document
will be called a Guidelines and will be issued as an informational RFC.
The document is now available as an Internet Draft.

The Site Security Policy Handbook is an extensive document that is
intended to serve as a basis for tailoring site-specific policies.  It
covers numerous facets of security including configuration, operation
and responses to incidents.

These efforts are the result of the hard work and persistence of the
Security Policy and Site Security Policy Handbook Working Groups.  The
members and particularly the Chairs of these groups deserve
congratulations for the work they have done.

Common Authentication Technology (CAT)

John Linn and Jeff Schiller will co-Chair a new Working Group to explore
and define a common authentication framework.  This work will embrace
MIT's Kerberos and Digital's SPx authentication servers.  Digital also

                                   1
\f







unveiled its General Security Services Application Program Interface
(GSSAPI) which provides a common interface for SPx, Kerberos and any
other authentication service that may be defined in the future.  This
work is intended to provide a uniform method for applications to
authenticate connections in client-server and peer-peer connections.

Privacy Enhanced Mail (PEM)

The Privacy and Security Research Group (PSRG) under the Internet
Research Task Force (IRTF) has revised the specifications for privacy
enhanced mail.  The specifications are being released as Internet Drafts
and will be reviewed through the usual open process.  At this IETF
meeting, Jim Bidzos, the President of RSA Data Securityi, Inc, presented
the outline of the forthcoming organizational agreement.  (RSADSI holds
the patent on the RSA public key technology and is licensing its use for
privacy enhanced mail within the Internet.)  Additional open meetings
will be scheduled in forthcoming IETF meetings.

IP Security Option (IPSO)

Some time ago a protocol was defined for adding U.S. DoD security labels
at the IP level.  The protocol was never fully completed and sat in an
incomplete state.  Last fall, the effort was resurrected by Vint Cerf,
the IAB Chair.  Steve Kent has now completed the revisions to the
document, and it is now available as an Internet Draft.  This document
covers only the Basic Security Option and is applicable only to the U.S.
DoD security labels.  Another document is expected later which will
cover the Extended Security Option, and a separate effort is described
next which is intended to cover labels outside of the U.S. DoD
hierarchy.

Trusted Systems Interoperability Group (TSIG -- CIPSO and TNFS)

The Trusted Systems Interoperability Group is a consortium of computer
systems vendors developing protocols for trusted systems.  Has asked the
IETF and IAB for assistance in standardizing their protocols.  The
operation and rules of the TSIG are quite similar to the IAB and IETF.
Each of the TSIG's protocols is developed by a TSIG Working Group whose
deliberations are open to all.  In order to facilitate the publication
of protocols developed by the TSIG, the individual TSIG Working Groups
will be chartered as IETF Working Groups.  Two groups have submitted
charters, CIPSO and TNFS.

The CIPSO Working Group is developing a commercial IP security option.
This is intended to make security labels available to the commercial,
civilian U.S. government and non-U.S. government communities.  A draft
document is essentially complete and will be made available as an
Internet Draft.

                                   2
\f







The TNFS Working Group is developing a trusted version of the NFS
(Network File System) protocol.  This work is being coordinated with the
distributed file systems Working Group in the Applications area.  This
work also depends on clarification of the status of NFS as a base for
building other protocols.

ORGANIZATION AND OPERATION

Much of the work of the Security Area is performed in coordination with
Working Groups in other areas.  Indeed, one of the primary tasks is to
provide security expertise to Working Groups in other IETF areas.

Starting with the December 1990 IETF meeting, we organized a Security
Area Advisory Group (SAAG) to gather together the limited number of
people knowledgeable about security in protocols and to provide a
coordinated forum for discussion of security issues in Internet
protocols.  We've also established a pattern of having the SAAG meet
twice during the IETF meeting, once at the beginning and once at the end
of week.  Although these are business meetings devoted principally to
assignment of tasks and coordination of new work items, observers are
welcome.

SAAG Operation

The main bulk of work for the SAAG consists of a set of formal work
items.  These work items correspond to three types of activities.

Security relevant developments within Working Groups in areas other than
security.

Assistance to the Telnet Working Group on authentication and encryption
is a typical example.  For items of this type, a SAAG member is assigned
and supports the Working Groups.

Working groups within the Security Area.

The development of SNMP security is an example.  In many cases, even
though a Working Group is in the Security Area, there are close ties to
another area.  SNMP security is obviously tied closely to the Management
area.  In several instances, it's a matter of choice whether a Working
Group is in the Security Area or in another area.  These decisions are
made on a case by case basis by mutual agreement of the respective Area
Directors.  In these cases the work is usally coordinated closely with
the relevant Area Director.

Preliminary inquiries

                                   3
\f







These are topics which do not merit the creation of a formal Working
Group but which do need some level of attention.  These are assigned to
a SAAG member and followed for one or SAAG meeting.

In addition to the items formally being worked on by the SAAG, there are
other discussions that take place but do not lead to the creation of a
formal work item.  No follow up actions are scheduled for these.

The following table shows the work items and other discussions arranged
by status (SAAG, Security Area, Other Area, Prelim) and by which area
they interact with.  Minutes of the meetings of many of these groups are
included in these proceedings.

                       SAAG            Security Area   Other Areas    Prelim

Security                export          spwg
                       iabcc

Management                             snmpsec

User Services                          ssphwg

Routing                                                rreq

Applications            passwd          cat             telnet          email
                       privdb          pem(2)          npp             nntp
                       chronos                        tnfs(1)

Internet Services                      ipso                           iplpdn
                                       cipso(1)

OSI                                                   ds

Operations


(1) This is a TSIG WG
(2) PEM is being developed by the PSRG



                                   4