Policy Issues in Interconnecting Networks
Policy Issues in Interconnecting Networks
Policy Issues in Interconnecting Networks
Leiner
Request for Comments: 1124 RIACS
September 1989
1. Introduction
Computer networking has become pervasive and basic to the conduct of scientific
and academic activities. To provide the needed networking support to these activities,
each of the agencies funding research has proceeded to establish one or more agency
funded computer networks.
Recognizing the importance of such networking support, the Office of Science
and Technology Policy (OSTP) working with the appropriate personnel from the
research-funding agencies on the Federal Coordinating Council on Science Engineering
and Technology (FCCSET) Committee on High-Speed Networks developed a set of
recommendations for the evolution and enhancements of scientific and academic
networks. These recommendations are described in three phases. The first phase
addresses the interconnection of the various agency networks into a ubiquitous
networking capability serving several hundred universities and research institutions
with a backbone network operating 1.5 Mb/s. The second phase involves upgrading
the network backbone to 45 Mb/s and connecting additional universities and other
research institutions. The third phase involves the development and installation of a
high bandwidth (Gb/s) networking capability.
The motivation for the first two phases are to achieve good performance in a cost
effective manner. The scientific and academic community is best served by an
interconnected ubiquitous networking capability rather than a set of partitioned
networks supporting only subsets of the community. Costs can be reduced and
performance improved through sharing of resources and using cross-support (e.g.,
using one agency’s network to serve an institution for another agency’s purposes rather
than having to connect each institution to every network.)
To accomplish these objectives, the Federal Research Internet Coordinating
Committee (FRICC) was formed. Consisting of representatives from the key research
agencies (NSF, DARPA, NASA, and DOE), this ad hoc group has been developing
strategies for interconnection of networks and evolution of the Internet in accordance
with the OSTP recommendations for Phases 1-3. In the process of developing such
plans, it became apparent that a set of issues needed to be addressed concerning the
various agency policies for their research networks in light of the desire to interconnect
such networks.
This report documents the results of a series of two workshops (18-20 June 1988
at NASA Ames Research Center and 8-10 November 1988 at MIT) held to address
these issues. Held under the auspices of the Internet Activities Board (IAB) at the
request of the FRICC, and sponsored by NASA through RIACS, the workshops
addressed the required and feasible technologies and architectures that could be used to
satisfy the desired policies for interconnection.
The issues were divided into four categories, and working groups established
within the workshops to address each area. The first working group addressed the
policies themselves. Working with the members of the FRICC, the initial statements
Leiner [Page 1]
RFC 1124 Network Interconnection Issues September 1989
of agency policies were refined so that the rest of the workshop attendees could better
understand the desired and required policies. The second working group addressed
issues associated with access control to network resources. The third working group
addressed the techniques required to support the sharing of networking resources in
accordance with agreed upon policies. The fourth working group focussed on the
end-to-end services required to support an interconnected set of networks.
Each of the working groups prepared summary reports of their deliberations.
These reports are contained in Sections 3-6 of this document. The report of the policy
working group attempts to summarize the existing policies of each of the agencies,
particularly with respect to interconnection with other networks. The other three
working groups focussed on the technology issues needed to be addressed in light of
those policies. In each case, the working group report discusses the issues and
develops an evolutionary capability with the goal of fully addressing the agency
policies. Summaries of these reports are contained in the next section.
It is hoped that the results documented in this report will help the FRICC and the
rest of the research community in achieving this exciting objective: a national research
networking capability.
Leiner [Page 2]
RFC 1124 Network Interconnection Issues September 1989
2. Workshop Summary
Driving the workshop were the policies of the individual agencies and a desire to
interconnect the networks in a way that was satisfactory to those agencies. A prime
policy driver appeared to be OMB Circular A130, which states that appropriate
mechanisms must be used to assure some level of accounting for the use of the various
networks. Another important policy driver was the need for agencies to assure that
sharing of networks did not adversely impact the support of the individual agency
users on their specific networks. This led in some cases to the need to be able to
dedicate a portion (sometimes all during a specified time period) of an agency network
to supporting its own users. Finally, the need to provide appropriate supporting end-
to-end services, including security issues, led to the need for coordinating such
services.
To facilitate the discussion of the technology issues and the presentation of
results, it was decided to describe the evolution of capability in four phases. Phase 0
represented currently deployed and available capability. While not necessarily being
currently used for the support of the policy issues, the capabilities of Phase 0 were
viewed as being currently available and could be used starting today. Phase 1
consisted of capabilities that were developed and deployed at a limited number of
sites. Thus, the issues involved in using such capabilities involved mainly those of
widespread deployment (plus perhaps some limited amount of development associated
with, e.g., porting of software). Phase 2 represented capabilities that were relatively
well understood (little research required) but would require development activity before
they could be used to support the policies for interconnection. Phase 3 capabilities
require research to achieve, and thus represent the most future capability.
While these phases of capability represent evolution in availability, they should
not be viewed as evolution in starting time for action. In all cases, research and
development activities would have to start today in order that these capabilities be
available in a timely manner.
As the working group on access control discussed the required technologies and
mechanisms, it became clear that an important technology driver was the need to label
packets with the appropriate information to make determinations of routing and
resource allocation internal to the interconnected networks. For example, if certain
links in a NASA network was to be restricted to use only by NASA users (even if
accessing the network through an NSF network), it would be necessary to provide such
labelling information in the packet. The report of the working group discusses the
information that needs to be carried in such labels, requirements for authentication, and
some potential experiments and development that should be carried out to achieve the
required capability.
The working group on resource sharing focussed on the technologies that would
allow fair sharing of resources between the participating agencies. The key issue that
emerged from the discussions of this working group was the need to develop global
Leiner [Page 3]
RFC 1124 Network Interconnection Issues September 1989
Leiner [Page 4]
RFC 1124 Network Interconnection Issues September 1989
Table I
Access Control Projects
Phase 0 Access Control based on source/destination access matrix (for traffic not
transiting network)
Phase 1 Statspy experiment to determine and define requirement for transactions
‘‘ESnet hack’’ for limited access control based on source/destination
addresses.
‘‘Xerox hack’’ for limited access control based on source/destination
addresses.
Phase 2 Coloring of stream packets
Simple colors/labelling
Route filtering for access control using source/destination addresses
Incorporate ‘‘Xerox hack’’ into other gateways
Authentication and signature architecture
Phase 3 Use of complex credentials
Use of policy gateways in route computation
Leiner [Page 5]
RFC 1124 Network Interconnection Issues September 1989
Table II
Resource Sharing Projects
Leiner [Page 6]
RFC 1124 Network Interconnection Issues September 1989
Table III
End-to-End Services Projects
Leiner [Page 7]
RFC 1124 Network Interconnection Issues September 1989
Table IV
Projects for IAB Task Forces
Leiner [Page 8]
RFC 1124 Network Interconnection Issues September 1989
Leiner [Page 9]
RFC 1124 Network Interconnection Issues September 1989
It was however noted that, in dealing with subordinate (not peer) networks, NSF
has required traffic presented to the NSFnet backbone to conform to NSF rules of
acceptable use; DoE on the other hand is tending to the more liberal policy of carrying
any traffic that meets the rules for acceptable use of the agency network offering the
traffic.
DARPA:
- Purpose is to support network research and other DARPA research objectives.
- There may be ‘‘forbidden routes’’ for some traffic.
NSF
NSF1: (*,*,{F/Re})(*,*,{F/Re}){research,support}{unauthenticated UCI, no-per-
pkt charge}
i.e., NSF will carry traffic for any host connected to a F/Re network talking to any
other host connected to a F/Re via any F/Re entry and exit network, so long as it is
being used for research or support. There is no authentication of the UCI and no per
packet charging. NSFnet is a backbone and so does not connect directly to
universities or companies. Thus the indication of {F/Re} instead of {F/Re/U/Co} as
ARent and ARexit.2
NSF2: ({User svcs, Expert Svcs}, {NSF},{F/Re})(*,{F/Re},{F/Re})
i.e., NSF will carry traffic to user and expert services hosts in NSF Autonomous
Region (AR) to/from any F/Re AR, via any F/Re AR. These are the only things that
1D.D. Clark, ‘‘Policy Routing in Internet Protocols,’’ Version 1.1, May 19, 1988.
2 Note: I can’t actually decide whether it should be as stated above or (*,{F/Re},{F/Re})(*,{F/Re},{F/Re})
DOE
DOE1: (*,DOE,-)(*,*,*){research,support}{unauthenticated UCI, no-per-packet
charge}
i.e., DOE will carry traffic to and from any host directly connected to DOE so long as
it is used for research or support. There is no authentication of the UCI and no per
packet charging.
DOE2: (*,*,{F/Re})(*,*,{F/Re}){}{unauthenticated UCI, no-per-pkt charge}
i.e., DOE will carry traffic for any host connected to a F/Re network talking to any
other host connected to a F/Re via any F/Re entry and exit network without regard to
the UCI. There is no authentication of the UCI and no per packet charging. (In other
words, DOE is more restrictive with its own traffic than with traffic it is carrying as
part of a resource sharing arrangement.)
NASA
NASA1: (*,*,*)(*,NASA,-){NASA-research,support}{unauthenticated UCI,no-per-
packet-charge}
i.e., NASA will accept any traffic to/from members of the NASA AR, but no transit.
No UCI authentication and no per packet charge.
NASA2: (*,{F},*)(*,{F},*){research,support}{per-packet accounting, limited to n%
of available BW}
i.e., NASA will carry transit traffic to/from other federal agency networks if they are
for research and if the total use of available BW by non-NASA Federal agencies is
below n%.3
NASA3: (*,{Co},*} (*,{F/R/U},-) {NASA research,support} {not authenticated
UCI, no per packet charge}
i.e., NASA will carry commercial traffic to federal, regional, and university ARs for
NASA research or support, but it will not allow transit. The particular entry AR is not
important.
NASA4: (*,*,-)(*,*,-){}{per-packet-charge to recoup cost, limited to n% of
available BW}
i.e., On a case by case basis, NASA will consider non-NASA traffic on a cost-
reimbursed basis. It will not carry transit traffic on this basis.
3 Note that this non-interference policy type needs some more work in terms of integrating it into the routing algorithms.
DARPA
DARPA1: (*,*,*)(*,DARPA,-){research,support}{unauthenticated-UCI, no per packet
charge}
i.e., DARPA will carry traffic to/from any host in DARPA AR from any external host
that can get it there so long as UCI is research or support. No UCI authentication or
per packet charge.
DARPA2: (*,*,{F/R/U/Co})(*,*,{F/R/U/Co}){research,support}{unauthenticated-UCI,
no per packet charge, non-interference basis}
i.e., DARPA will carry traffic for any host connected to a F/Re/U/Co network talking
to any other host connected to a F/Re/U/Co via any F/Re/U/Co entry and exit network,
so long as it is being used for research or support, and the network is not heavily
congested! There is no authentication of the UCI and no per packet charging.4
DCA
DDN1: (mailbridge,DDN,-)(*,{F/Re},{F/Re}){research,support}{unauthenticated
UCI, all incoming packets marked, per-kilopacket charge}
i.e., DDN will not carry any transit traffic. It will only accept and send traffic to and
from its mailbridge(s) and only from and to hosts on other F/Re nets.
An Example Regional5
Regional1: (*,{F/Re/U},{F/Re/U})(*,{F/Re/U},NSF){research,support}
{unauthenticated UCI, no-per-packet charge}
i.e., The Regional will carry traffic from/to any directly connected F/Re/U network to
any F/Re/U network via NSF if it is for a research or support UCI. (NSF requires that
all Regional networks only forward to it traffic that complies with its, NSF’s, policies!)
Regional2: (*,{F/Re/U},{F/Re/U})(*,{F/Re/U},Cc){}{unauthenticated UCI, per-
kilopacket charge}
i.e., The Regional will carry traffic from/to any directly connected F/Re/U network to
any F/Re/U network via a commercial carrier regardless of its UCI. In this case, the
packets are charged for since the commercial carrier charges per kilopacket.
4 Note: DARPA would like to say something about the need to enter the DARPA AR at the point closest to the destination,
4.1. Introduction
This report reflects discussions among the members of working group with regard
to network access control for the National Research Internet (NRI). The NRI will be
composed of network resources contributed by various organizations (primarily
agencies of the Federal government). The operational model for the NRI is that of a
collection of autonomous, administrative domains (referred to as ‘‘domains’’ within
this report), each of which manages a collection of network transmission and/or
switching resources. (Other, higher level resources also may be shared across domain
boundaries, but these are not the focus of the access controls discussed herein.) Some
of these network resources are owned or leased exclusively on behalf of the
administrative domain responsible for the resource, whereas other resources may be
jointly paid for and administered.
There is a perceived requirement that a domain provide access control for the
network transmission and switching resources that comprise it. This form of access
control is distinguished from measures oriented toward controlling access to subscriber
resources, e.g., workstations, file servers, etc. Rather, these measures are intended to
apply to communication paths which transit gateways, circuits, networks, etc.
There are several motivations for introducing network resource access controls.
The organizations which will contribute network resources or funding for shared
resources to the NRI need to be satisfied that sharing of these network resources can
be controlled in such a fashion as to accord priority to designated users or groups of
users and to account for resource usage in accordance with OMB guidelines. It may
be necessary to bill for usage of some resources, especially commercial facilities
connected to the NRI. Some organizations have adopted policies that prohibit
transport of data from certain classes of users across their networks.
This report examines various aspects of network resource access control measures
in the NRI context, including bases for making access control decisions (policy inputs),
communication scenarios to be supported, mechanisms for enforcing access control
policies, and assurance issues associated with enforcement. Formulation of specific
access control policies is outside the scope of this report and is addressed by the report
of Policy Working Group.
This report has been prepared by the members of the working group as a result of
discussions that took place at workshops sponsored by NASA on June 15-17, 1988 and
November 8-10, 1988. Additional inputs have been prepared by working group
members during the interval between these workshops and co-ordinated by the chair.
for a remote subject (e.g., policy controller) to determine in advance if a specified transmission resource can be used in construct-
ing a (policy) route between two points in the NRI, for reasons elucidated by Dave Clark in his policy routing paper. Thus the
conflict arises if either the remote subject cannot obtain the necessary local congestion measures or if these measures are very
dynamic.
policies.
At one point in the discussion it was suggested that any inputs to access control
decisions that were not universally interpretable could be accommodated by allowing
for ‘‘domain specific’’ data items. Such data items would be interpreted by only a few
domains (perhaps only a single domain) along a route. However, we note that this
concept does not seem to be in concert with the principle cited earlier (and discussed
in Clark’s paper), i.e., subjects should be able to predict access control decisions for
any domain through which they might construct a route. Thus the concept of a
domain-specific access control data item as an ‘‘escape’’ mechanism for including
additional inputs to access control decisions may not be appropriate. Recall that no
domain is required to employ all the supplied inputs in making an access control
decision and thus inclusion of a data item in a widely known collection need not
impose on domains that do not wish to make use of the data item.
Since the administrative domains often represent federal agencies (e.g., DOE,
NASA, NSF), it was perceived that there should be some means of representing an
agency’s granting authorization for resource use to the subject. This might be a
hierarchic data item, specifying both an agency identifier and further defining the
subject’s privileges as granted by the agency. For example, an agency such as DOE
might grant somewhat different privileges to its employees, to its grantees and their
staff, and to other individuals engaged in work that is viewed as supportive to the
agency mission (though not necessarily funded by the agency). This effect might be
achieved by issuing to each of these subjects credentials that specify some form of
affiliation with the agency in question but with different qualifiers, depending on the
nature of the affiliation. Thus we envision a compound access control data item that
will specify an AGENCY AFFILIATION INDICATOR, consisting of an AGENCY ID
and AFFILIATION CLASS.
It is anticipated that some form of accounting for use of resources will be
required in many circumstances within the NRI. OMB regulations requires this
accounting at the agency level, and thus it might be sufficient to rely on the agency
affiliation data to satisfy this requirement. In other cases, an orthogonal account
identifier might be required and so we allow for inclusion of a BILLING CODE7 as
part of the explicit access control data. This may prove especially important in
contexts where commercial facilities are employed.
In the most extreme cases it may be necessary for an individual subject to be
identified, either for accounting or for access authorization. Although details for such
an identifier were not discussed, it seems likely that a hierarchic data item would be
appropriate, with a domain identifier used to specify the authority that vouches for the
subject’s identity, plus a subject identifier that is unique within the domain. Even if
users need not be identified as individuals, groups of users may be identified for
7Note that this item may enter into the decision process or may be employed only for accounting.
of the computing resources being accessed, not of the subscriber initiating the
connection. The assumption underlying this concern is that the initiator of the
connection would not be capable of supplying the necessary, validated authorization
data to the satisfaction of the policy gateways because such inputs would be available
only at the destination. However, if the host being accessed could distribute
appropriate credentials to the user prior to his access, the simple initiator scenario
might suffice.
These two examples indicate how discussion of access control in the context of
specific communication scenarios can be highly dependent on underlying assumptions
about details of enforcement mechanisms. Many such discussions cannot take place
without a straw man architecture for such mechanisms, and the straw man must
address assurance issues, etc. Nonetheless, it is worthwhile to characterize the range
of communication scenarios which need be supported in order to establish a reference
for evaluating such straw men. Thus we will continue exploring communication
scenarios and postpone enforcement mechanism discussion until the next section.
8If electronic mail offered priority service categories which imposed stringent limits on delivery delays, then this general
interfaces between domains13 and thus are capable of controlling the flow of all traffic
into or out of a domain. Within each domain are one or more policy servers.14 These
devices serve several functions and are, in many respects, the heart of the access
control system proposed by Clark. A policy server serves as the repository for and the
management interface to inter-domain access control policies for its domain. Thus it
provides representations of these policies to policy servers in other domains and it
acquires from them policies applicable to their domains. A policy server responds to
queries from subjects on hosts within its domain, synthesizing valid routes based on
the subject’s communication requirements, the PS’s knowledge of current internet
connectivity, and of applicable inter-domain access control policies. A policy server
provides the selected policy route(s) to the subject, along with authorization and billing
data, cryptographically sealed by the policy server. This operation is best viewed as a
digital signature process.
A central feature of this proposal is that it requires the policy gateways to trust
the policy servers that represent a domain, but does not require this trust to be
extended to each subject within the domain. Clark assumes that domains are mutually
trustworthy to the extent that the policy gateways rely on the source policy server to
have correctly evaluated the subject’s authorization to make use of a given policy
route. Since domains in the NRI represent organizations (e.g., Federal agencies), there
may be a reasonable basis for assuming that the individuals managing a policy server
on behalf of a domain can be relied upon to operate in a responsible manner. (The
trustworthiness of the hardware and software upon which a policy server is
implemented is a separate concern.) Note that the means by which a policy server
ensures that a validated route is properly bound to an authorized subject within the
domain is a local matter, not specified by the architecture.
Signing of this collection of data serves several purposes. As noted above, the
policy server for a domain is vouching for any identification and billing data and is
also stating that it has selected a route which is allowed by the access control policies
provided by other domains. Clark notes that this does not preclude checking of route
validity by policy gateways, but it does allow mutually trusting domains to rely on
these checks performed by the originating domain’s policy server. It is advantageous
that the signature be generated using asymmetric cryptography so that the policy
gateways have a non-repudiable record of these claims by a policy server (which might
prove useful should disputes arise or in isolating faults). Since only policy servers
generate the signatures, the task of managing keys for signature validation becomes
manageable.
12‘‘Policy Routing in Internet Protocols,’’ Version 1.1, May 19, 1988.
13Clark employed the term ‘‘Administrative Region’’ but we adopted the term ‘‘Administrative Domain’’ to avoid any im-
plications of geographic locality.
14 Clark designated these devices ‘‘Policy Controllers’’ but we have adopted our current designation to avoid confusion that
so as to minimize the likelihood that they can be guessed, e.g., using a pseudorandom
process. We do recommend that the policy route option be expanded to include some
indication of lifetime, either measured in time or in number of packets or both. This
limit on the lifetime of a route further reduces its vulnerability to exploitation by
unauthorized subjects and a packet quota could provide an additional means for
detecting misuse.17
might detect this if the route were to become invalid due to exhaustion of the packet quota.
scope of the architecture, i.e., the need for proxy authorization. The possible need for
such a facility was noted in conjunction with file server communication on behalf of
users, e.g., transfer of a file between two file servers. It appears that the architecture
in Clark’s paper could support such communication authorization, but the means by
which the initiating policy server determines that the communication is on behalf of a
specified user, rather than the file server itself, is a local matter not part of the
architecture.
In section 4.3.2, a concern was raised about supporting route establishment when
permission for a route was dependent on authorization of the destination, not the
initiator. In Clark’s architecture, this case would not be treated any differently since it
is the initiator’s policy server which evaluates the access control policy and makes the
decision, and all the inputs required to make the decision are available to that policy
server. For the most part, the architecture assumes the policy gateways trust the
initiating policy server to interpret the access control policies correctly at the time it
generates the sealed route option and supplies it to a subject in the local domain.
Intermediate policy gateways can review the data provided in the policy route to
confirm the decision, but the paper seems to suggest that this independent confirmation
would not usually be carried out during route establishment, for reasons of efficiency,
though the signature should be checked.
independently verifiable.
A BILLING CODE might require independent verification if the code is one
which does not somehow imply charges to the initiating domain.18 An analogy can be
made with long distance telephone charging. A direct dialed call from a home number
is assumed to be legitimate, whereas a similar call from a pay phone or hotel room
requires an independently verifiable account number unless the charges are borne
locally (via coins or billed to your room). Thus BILLING CODEs also appear to be
good candidates for independent verification, at least in some circumstances.
Finally, the other major credential considered for inclusion in policy routes was
the SUBJECT ID. Again, the circumstances in which independent verification is likely
to be of interest are those in which the subject’s domain differs from the initiating
domain. Since the SUBJECT ID already includes an indication of the domain which
vouches for the subject’s identity, it is easy to determine if independent verification is
required. Thus in all cases the motivation for an independent verification facility
arises only when the certifying domain for a credential differs from the initiating
domain for the connection.
In order for a domain to certify a credential for independent verification, the
resulting data should be bound to a subject (or class of subjects) so as to render it
useless to other subjects. This is easily accomplished by including the subjects
(subject class) to whom the credential is issued as part of the signed credential. Note
that this also allows the issuer to distribute the credentials directly to subjects, not only
through domains, if that proves useful. Thus a domain such as DOE might issue a
BILLING CODE and AGENCY AFFILIATION ID to a researcher at a university,
binding it to his SUBJECT ID. The researcher could present the credentials to his
local policy server for consideration in selecting routes and that policy server could
include the credential along with the policy route option.
Policy gateways could verify that DOE had granted permission to use the
BILLING CODE to this subject and that the subject was affiliated with DoE by
verifying the seal on the credential and matching the included SUBJECT ID against
that in the policy route. As above, it might not be feasible for every policy gateway to
perform this independent verification prior to processing packets for the connection,
but the option would exist and post hoc auditing is feasible. These credentials should
contain a validity date range to constrain their lifetime, and some form of hot list
would also need to be maintained by each issuing domain and distributed to policy
servers and gateways to revoke credentials, e.g., upon termination of affiliation.
This technique would reduce the level of trust accorded the policy server at the
university since it could not forge the credential. This binding does not ensure that the
subject and the source address are correctly paired. However, if the SUBJECT ID
18Clark suggested that such codes might incorporate an AD identifier which would explicitly establish the requisite binding.
However, he was concerned that a strict requirement for a billing code to be bound to the initiating AD would unduly restrict
mobile users.
indicates that the initiating domain is the certifying domain for the subject, then one
must ultimately rely on that domain to correctly maintain subject-address bindings. If
the subject is foreign to the initiating domain (as might be the case for a mobile user),
the incremental assurance offered by independently verifiable credentials seems fairly
small. It is not clear what form of credential binding would be useful for mobile
users. The ‘‘home domain’’ for a mobile user could certify that he was temporarily
associated with another (specified) domain, thus lending credence to a claim by the
initiating domain that the ‘‘foreign’’ user was in residence. If the logistics of
generating and transferring some sort of travel credential (‘‘hall pass’’?) could be made
acceptable to users, this might prove to be a viable means of addressing this problem.
For these credentials, even more than most, validity dates should be included to limit
their lifetime.
5. Resource Sharing
Working Group 2 Members
David Clark (Chair) MIT
Guy Almes Rice
Bob Braden USC-ISI
Scott Brim Cornell
Jon Crowcroft University College London
Deborah Estrin USC
Steve Goldstein Mitre
Phill Gross NRI
Bill Jones NASA/Ames
Dan Nessett NMFECC
Ari Ollikainen RIACS
Mike St. Johns DCA
Tony Villasenor NASA HQ
5.1. Introduction
This working group was asked to consider the question of mechanism necessary
to insure ‘‘fair’’ sharing of resources, in particular bandwidth.
The group proposed, as a starting position, that to permit sharing of resources,
such as networks or links, among agencies (for example), the following questions must
be answered.
- What sorts of service classes will be required? Which are possible?
- How must the users of the resources be categorized?
- What sort of accounting for the resources are required?
- What levels of assurance are required?
- How global is the impact of various sorts of service classes?
- What management tools are required to control multi-agency policy
mechanisms?
Two ideas are central to the discussion: service class and category.
- A link is shared by two (or more) service classes, each of which gets a
guaranteed fraction of the link capacity under overload.
- A link is shared by two (or more) service classes, some of which may not
interfere with others. That is, they are excluded from the resource if demand is
excessive.
An example of a service policy requirement not directly related to bandwidth is
mutual aid: two agencies that agree to carry the other’s traffic if the resources of the
one is down. Half of the mechanism necessary to support this is easy: one could
define a service class for traffic belonging to the other agency, and define the service
constraint for that class. The hard part of the mechanism is to define how the switch
is to know that the other resource is down, so that the usage by that class should be
permitted.
In the discussion of service classes, the following comments arose:
- Outside the arena of policy control, there are much broader requirements for
service classes, in order to support new sorts of applications. For example, some
applications require control of delay. This broader problem is usually called the
‘‘Type of Service’’ or TOS problem (also called quality of service or QOS in
ISO). In this respect, the mechanism required of the switch for specifying and
measuring the services classes is just a subset of that required for support of
multiple classes of service to support applications.
- Some (non-policy) examples of service classes are very difficult to support, e.g.,
those for real-time speech, or variable rate encoders (that can adjust to changing
bandwidth allocation, but must KNOW what rate they are being offered).
- We believe it is not difficult to provide commitment of resources to simple
service classes. For example, a gateway could be constructed that would take
packets in two service classes, and ensure that under overload each class
received equal access to a link. The problems in doing this are to control the
overhead in the gateway, which would have an impact on high-speed networks,
and to understand the global impact of such guarantees (see below).
- The definition of service classes must be understood globally.
- To support the sorts of requirements that were offered as examples (e.g., put all
NASA packets in service class X), it will be necessary to have some explicit tag
in the packet to indicate the packet category. This is a new IP level mechanism.
- The level of ‘‘user granularity’’ is not clear. Would one tag for all of NASA be
sufficient, for example?
- It might be necessary for a packet to carry more than one tag, to permit a user
with multiple privileges to use them at the same time. Perhaps tags could be
approximate, and could resolve in different manners in different parts of the net.
- The level of trust needed for the tag is unclear.
- If a tag is abused, the use must be traced back to an accountable entity, which
ought to be a human.
- A very hard problem is multicast: one packet going down several paths that
might require different user privileges.
may be bad global effects that the other gateways cannot prevent. The problem is
cured, not by robust dynamic algorithms, but by detection and correction (e.g., by
humans) of the problem.
For many circumstances, e.g., conformance to OMB regulations, the weaker form
of assurance is probably sufficient. But DARPA, for example, expressed an interest in
as robust an assurance as possible.
5.5. Conclusions
The problem of making a local modification to a gateway to enforce a bandwidth
usage limit to a identified category of users seemed reasonable.
Associating a user category with a packet is very hard. The actual requirements
are not clear (are one or several categories required, what is the level of assurance that
the specified category is legitimate, and so on). In addition, the mechanism is not
obvious. This matter is addressed in the report of working group 1.
The problem of level of assurance is also very hard, again because the actual
requirement is not clear.
Accounting for usage is probably not too hard.
The hardest problem is redefining the routing algorithms of the Internet to
correctly propagate and respond to the impact of local policy controls.
There are several hard and interesting research questions:
- How do service guarantees compose?
- Is it possible to build multi-region systems that are resistant to attack by
malicious third-party regions?
- How could user categories be managed? Are they multi-valued, hierarchical or
flat?
- How can fault isolation and service assurance be performed?
- What is the relation between statistical resource allocation and possible
guarantees of access?
To avoid solving too general a problem, several questions should be asked of the
agencies.
- What level of assurance is required?
- What sort of user categories will be required?
5.6. Recommendations
The group proposed a number of experiments and changes that could be
undertaken at once, to better understand the problems of policy routing and resource
control, and to provide operational facilities toward these goals.
These goals are organized in three categories, things that could be done at once
using existing tools, projects with a short time frame, to provide better capabilities and
understanding quickly, and finally, projects that would require longer to complete.
Statspy
Although source and destination addresses are not a precise indicator of service
class, they do provide much useful information. The so-called statspy tool has been
used in the past to collect a matrix of traffic sorted by source/destination address. This
information could be collected for shared links today to provide a first cut at
accounting for the resource.
Route filtering
Route filtering provides a way to instruct a gateway to believe only part of an
incoming routing packet, or to change parts of that incoming data, e.g., the cost metric
of a proposed path. This capability, available in most commercial gateways and in the
gated software for Unix, provides a way to control which destinations are reached by
which paths. It cannot separate service classes, but can be used for very rough
divisions of traffic based on destination address.
to the server with the source and destination addresses, the name of the sponsoring
agency, and other credentials. In return, one would get the suitable IP option, which
would just be inserted into the packet.
This would provide a more accurate accounting of shared resources, and a first
demonstration of the concept of the policy server.
6.1. Introduction
This section deals with end-to-end security services for the National Research
Internet (NRI). As described previously, the NRI consists of multiple, autonomous,
mutually-suspicious, administrative domains. The NRI is an open environment with a
dynamic security perimeter. Each domain may have its own security policy and offers
a unique set of security services to its own community. However, if secure
interoperation is desired across domains, these security policies must belong to a set of
hierarchical, consistent policies, and certain cross-domain agreements with respect to
security are needed. Working Group 3 focused on the nature and content of such
inter-domain cross-agreements.
A security architecture for the federally-funded research networks (which make
up the NRI) was proposed. The architecture consists of security sevices, where they
are needed, example mechanisms, and the implied common technologies and common
policies necessary to support interoperation.
First we offer the strawman architecture. Next, we introduce the concept of a
‘‘security domain’’; we discuss multi-administrative higher-level security services in
detail; then, using the workshop model (of phase 0-3 technologies), suggest a phased
approach to making the architecture a reality.
______________________________________________________________________
Security Services in a Multi-Administrative Domain Environment
______________________________________________________________________
Security Example Common Common
S ervices Mechanisms Technologies Policies
_____________________________________________________________________ _
Origin Authentication
-user/process secure-ID card Key Distribution global ID
-host certificates (common protocols conventions
-gateway certificates and standards)
-realtime/deferred challenge/response Directory Services
- certificates (object registration)
Object Integrity
-msg MACs
-file MACs common format for global ID
-datagram MACs integrity labels conventions
-connection MACs
-field MACs
6.4. Projects
The above suggests several projects that the FRICC or some constituent agency
should pursue:
- End-to-end private mail is currently in the experimental phase; encryption is
done using the DES, and authentication involves certificates built using RSA.
The mechanism allows both privacy and integrity of sent mail.
- A national file system will raise issues of access control, authentication,
confidentiality, and integrity.
- Directory services should provide white pages for mail and multi- domain object
registration; issues to be addressed include registration of services, distributed
list service, and authenticity.
- Finally, questions of multi-domain network monitoring and control are at the
heart of interconnected network operations and raise issues of access control,
authentication, and integrity.
Some common or interoperable approach to authentication, integrity, and access
control, as well as the tools and services to be provided, is necessary; note the policies
may differ across administrative domains, but the mechanisms must be able to
communicate with one another. They need not rely on each other, however; that is a
policy issue. Whether or not these inter-domain mechanisms can be built with
common facilities, the specific protocol base (such as OSI or TCP/IP) that these
projects are to be conducted, how results are to be transferred into GOSIP and a
European context, the role of vendors as opposed to researchers, and the IETF, IAB,
and other such organizations, and which agency or agencies shall take the lead, are all
issues that can be resolved in the longer range.
Notes: Reference for the use of productive and supportive services is the ECMA
(European Computer Manufacturers Assoociation) Security in Open Systems, A
Security Framework document, ECMA TR/46, July 1988.
7. Workshop Attendees
Guy Almes Rice
Matt Bishop Dartmouth
Brian Boesch DARPA
Bill Bostwick Los Alamos
Dennis Branstad NIST
Hans-Werner Braun Merit
Scott Brim Cornell
Ross Callon DEC
Vint Cerf NRI
David Clark MIT
Mike Corrigan DoD
Jon Crowcroft UCL
Richard desJardins CTA
Deborah Estrin USC
Steve Goldstein Mitre
Phill Gross NRI
Tony Hain Livermore
Jim Hart NASA
Jack Haverty BBN
Dan Hitchcock DoE
Anita Holmgren Unisys
Barry Howard Livermore
Bill Jones NASA
Steve Kent BBN
Larry Landweber Wisconsin
Jim Leighton Livermore
Barry Leiner RIACS
Dan Lynch ACE
Sandy Merola Lawrence Berkeley Labs
James Morrill Sparta
Russ Mundy DCA
Dan Nessett Livermore
Ari Ollikainen RIACS
David Peters NASA
Nachum Shacham SRI
Henry Sowizral RIACS
Mike St. Johns DCA
Paul Tsuchiya Mitre
Tony Villasenor NASA
Steve Walker TIS
Jil Westcott BBN
Steve Wolff NSF
8. Glossary
AR Autonomous Region
CLNP Connectionless Network Protocol
DARPA Defense Advanced Research Projects Agency
DES Data Encryption Standard
DoE Department of Energy
ECMA European Computer Manufacturers Association
FRICC Federal Research Internet Coordinating Committee
GOSIP Government OSI Protocol
IETF Internet Engineering Task Force
IP Internet Protocol
ISO International Standards Organization
LAN Local Area Network
MTA Mail Transfer Agent
NASA National Aeronautics and Space Administration
NRI National Research Internet
NSF National Science Foundation
OMB Office of Management and Budget
OSTP White House Office of Science and Technology Policy
PS Policy Server
PT Policy Term
RSA Rivest Shamir Algorithm
TAC Terminal Access Controller
TOS Type of Service
QOS Quality of Service
Security Considerations
None.
Author’s Address
Barry Leiner
Research Institute for Advanced Computer Science
National Aeronautics and Space Administration
Ames Research Center
Mail Stop 230-5
Moffett Field, CA 94035
EMail: LEINER@RIACS.EDU
Page
1. Introduction ......................................................................................................... 1
2. Workshop Summary ........................................................................................... 3
3. Working Group on Interconnection Policies ..................................................... 9
3.1. Existing Policies, Summarized ........................................................................ 10
3.2. Refined Policy Statements ............................................................................... 11
4. Access Control for Network Switching and Transmission Resources ............. 14
4.1. Introduction ...................................................................................................... 14
4.2. Access Control Policy Issues .......................................................................... 15
4.2.1. Policies and Models ..................................................................................... 15
4.2.2. Policy Inputs ................................................................................................. 16
4.3. Communication Scenarios ............................................................................... 18
4.3.1. Connection-Oriented Communication .......................................................... 18
4.3.2. Variations on Connection-Oriented Scenarios ............................................. 19
4.3.3. Electronic Messaging ................................................................................... 20
4.3.4. Transaction-Oriented Communication ......................................................... 21
4.3.5. Multicast Communication ............................................................................ 21
4.4. Access Control Architectures .......................................................................... 22
4.4.1. Analogies with Operating System Security ................................................. 22
4.4.2. Clark’s Policy Routing Model and Access Control .................................... 23
4.4.3. Clark’s Architecture in Retrospect ............................................................... 26
4.4.4. Trust Implications and Possible Remedies .................................................. 27
5. Resource Sharing ................................................................................................ 30
5.1. Introduction ...................................................................................................... 30
5.2. Service Class .................................................................................................... 30
5.3. User Categories ................................................................................................ 31
5.4. Additional Discussion ...................................................................................... 32
5.4.1. Accounting for usage: .................................................................................. 32
5.4.2. Levels of assurance: ..................................................................................... 32
5.4.3. Global effects: ............................................................................................... 33
5.5. Conclusions ...................................................................................................... 34
5.6. Recommendations ............................................................................................ 34
5.6.1. Instant projects .............................................................................................. 35
5.6.2. Short-term experiments ................................................................................ 35
5.6.3. Longer-term experiments ............................................................................. 36
6. End-to-End Security Services ............................................................................ 38
6.1. Introduction ...................................................................................................... 38
6.2. Multi-administrative Security Architecture .................................................... 38
6.2.1. Security Domains ......................................................................................... 40
Leiner [Page i]
RFC 1124 Network Interconnection Issues September 1989