One document matched: draft-zeilenga-email-seclabel-01.txt
Differences from draft-zeilenga-email-seclabel-00.txt
Network Working Group A. Melnikov
Internet-Draft K. Zeilenga
Intended status: Standards Track Isode Limited
Expires: February 9, 2012 August 8, 2011
Security Labels in Internet Email
draft-zeilenga-email-seclabel-01
Abstract
This document describes a header field for use in Internet Mail to
convey a security label and associated data.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on February 9, 2012.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Melnikov & Zeilenga Expires February 9, 2012 [Page 1]
Internet-Draft email-seclabel August 2011
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Relationship to Enhanced Security Services for S/MIME . . . . . 3
3. Conventions Used in This Document . . . . . . . . . . . . . . . 4
4. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. The SIO-Label header field . . . . . . . . . . . . . . . . . . 4
6. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . . 5
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
8. Security Considerations . . . . . . . . . . . . . . . . . . . . 7
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
9.1. Normative References . . . . . . . . . . . . . . . . . . . 7
9.2. Informative References . . . . . . . . . . . . . . . . . . 8
Appendix A. Acknowledgements . . . . . . . . . . . . . . . . . . . 9
Melnikov & Zeilenga Expires February 9, 2012 [Page 2]
Internet-Draft email-seclabel August 2011
1. Introduction
A security label, sometimes referred to as a confidentiality label,
is a structured representation of the sensitivity of a piece of
information. A security label is used in conjunction with a
clearance, a structured representation of what information
sensitivities a person (or other entity) is authorized to access, and
a security policy to control access to each piece of information.
For instance, an email message could have a "EXAMPLE SECRET" label,
and hence requiring the sender and the receiver to have a clearance
granting access to "EXAMPLE SECRET" labeled information. X.841
[X.841] provides a discussion of security labels, clearances, and
security policy.
A display marking is a textual representation of the sensitivity of a
piece of information. For instance, "EXAMPLE SECRET" is a textual
representation of the sensitivity. A security policy can be used to
generate display markings from security labels.
Sensitivity-based authorization is used in networks which operate
under a set of information classification rules, such as in
government military agency networks. The standardized formats for
security labels, clearances, and security policy are generalized and
do have application in non-government networks.
This document describes a protocol for conveying the sensitivity of a
electronic mail message [RFC5322], as a whole. In particular, this
document describes a header field SIO-Label to carry a security
label, a display marking, and display colors.
2. Relationship to Enhanced Security Services for S/MIME
While it may be possible to utilize the protocol described in this
document concurrently with Enhanced Security Services for S/MIME
(ESS) [RFC2634], this protocol is generally viewed as an alternative
to ESS.
It is noted that in ESS, the label applies to MIME [RFC2045] content,
where in this protocol the label applies to the message as a whole.
It is also noted that in ESS, labels are securely bound to the MIME
content through the use of digital signatures, where, in this
protocol, labels are not security bound to the message. This
protocol is designed for use where securely binding the label to the
labeled information, at least through sender signing, is not
necessary but may well be inappropriate, such in deployment where
labels are replaced when crossing between security domains.
Melnikov & Zeilenga Expires February 9, 2012 [Page 3]
Internet-Draft email-seclabel August 2011
3. Conventions Used in This Document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
4. Overview
A Mail User Agent (MUAs) originating a message can, if so configured,
offer the user with a menu of sensitivities to choose from and, upon
selection, insert the display marking, foreground and background
colors, and security label parameters associated with that selection
into the SIO-Label header field of the message.
Mail Submission Agents (MSAs), Mail Transfer Agents (MTAs), and Mail
Delivery Agents (MDAs) then can, if so configured, use the provided
(or lack thereof) sensitivity information in determining whether to
accept, forward, or otherwise act on the message as submitted. MTAs
can, if so configured, modify the sensitivity information of the
message, such as replacing the security label with an equivalent
security label of a different policy.
Receiving MUAs which implement this extension SHALL prominently
display the display marking conveyed in the header field. The
display marking SHOULD be displayed using the foreground and
background colors conveyed in the header field.
MUAs are not expected to make authorization decisions based upon
values of the SIO-Label header field.
5. The SIO-Label header field
The header field name is "SIO-Label" and its content is a set of key/
value pairs, each referred to as a parameter.
The marking parameter contains a display string for use by
implementations which are unable or unwilling to utilize the
governing security policy to generate display markings.
The fgcolor and bgcolor parameters contain the foreground and
background colors, respectively, for use in colorizing the display
marking string. Their values are RGB colors in hexadecimal format
(e.g., "#ff0000"), or one of the CSS color names (e.g., "red") given
in named-color type below (the 16 HTML4 colors + "orange")
[CSS3-Color]. The default foreground color is black. The default
background is white. The fgcolor and bgcolor parameters SHALL be
absent if the marking parameter is absent.
Melnikov & Zeilenga Expires February 9, 2012 [Page 4]
Internet-Draft email-seclabel August 2011
The type parameter is either the string ":ess" or the string ":x411"
or a URI [RFC3986] denoting the type of label and its encoding as
held contained in the label parameter. The type parameter SHALL be
present if the label parameter is present.
The string ":ess" indicates the label parameter value is the base64
[RFC4648] encoding of the BER [X.690] encoding of an ESS security
label [RFC2634]. The label parameter SHALL be present if the type
parameter is present.
ESS Label Example:
SIO-Label: marking="EXAMPLE SECRET";
fgcolor=black; bgcolor=red;
type=":ess" label="MQYCAQIGASk="
The URI ":x411" indicates the label parameter value is the base64
[RFC4648] encoding of the BER [X.690] encoding of an X.411 security
label [X.411]. The label parameter SHALL be present if the type
parameter is present.
X.411 Label Example:
SIO-Label: marking="EXAMPLE SECRET";
fgcolor=black; bgcolor=red;
type=":x411" label="MQYCAQIGASk="
6. Formal Syntax
The following syntax specification uses the Augmented Backus-Naur
Form (ABNF) as described in [RFC5234]. Terms not defined here are
taken from [RFC5322].
Melnikov & Zeilenga Expires February 9, 2012 [Page 5]
Internet-Draft email-seclabel August 2011
sio-label = "SIO-Label:" [FWS] sio-label-parm-seq CRLF
sio-label-parm-seq = sio-label-parm [ [FWS] ";" [FWS] sio-label-parm-seq ]
sio-label-parm = marking-parm /
bgcolor-parm /
fgcolor-parm /
type-parm /
label-parm
marking-parm = "marking" "=" quoted-string
bgcolor-parm = "bgcolor" "=" color
; default value "white" is assumed
fgcolor-parm = "fgcolor" "=" color
; default value "black" is assumed
color = hex-color / named-color
hex-color = "#" 6HEXDIG ; Hex encoded RGB
named-color =
"aqua" /
"black" /
"blue" /
"fuschia" /
"gray" /
"green" /
"lime" /
"maroon" /
"navy" /
"olive" /
"purple" /
"red" /
"silver" /
"teal" /
"white" /
"yellow" /
"orange" ; named colors
type-parm = quoted-string ; ":ess" or ":x411" or URI
label-parm = quoted-string ; encoded as indicated by type-parm URI
Melnikov & Zeilenga Expires February 9, 2012 [Page 6]
Internet-Draft email-seclabel August 2011
7. IANA Considerations
IANA is requested to add, as detailed below, the SIO-Label header
field to the "Permanent Message Header Field Registry", defined by
Registration Procedures for Message Header Fields [RFC3864].
Header field name: SIO-Label
Applicable protocol: mail [RFC5322]
Status: standard
Author/change controller: IETF (iesg@ietf.org)
Specification document(s): [[anchor7: this document]]
8. Security Considerations
Security labels and display markings are used to express the
sensitivity of a piece of information. This document describes how
to convey the security label and display marking expressing the
sensitivity of an email message, as a whole, including its headers
and body. This extension does not provide a means to express the
sensitivity of portions of an email message, such as the possibly
different sensitivities of various MIME parts that the message may be
composed of.
This extension is intended to be used in environments/situations
where it not necessary for the security label and other sensitivity
information to be securely bound to message through use of digital
signatures, and hence this document does not detail how security
labels digital signatures could be used to securely bind the security
label to the message.
In environments/situations where security labels are used to make
authorization decisions, MTAs making those authorization decisions
are to ensure appropriate data confidential and integrity protection
services are in place, such as requiring use of TLS [RFC5246] in
email protocols such as SMTP [RFC5321] and IMAP [RFC3501].
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC2634] Hoffman, P., "Enhanced Security Services for S/MIME",
RFC 2634, June 1999.
[RFC3864] Klyne, G., Nottingham, M., and J. Mogul, "Registration
Procedures for Message Header Fields", BCP 90,
Melnikov & Zeilenga Expires February 9, 2012 [Page 7]
Internet-Draft email-seclabel August 2011
RFC 3864, September 2004.
[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter,
"Uniform Resource Identifier (URI): Generic Syntax",
STD 66, RFC 3986, January 2005.
[RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data
Encodings", RFC 4648, October 2006.
[RFC5322] Resnick, P., Ed., "Internet Message Format", RFC 5322,
October 2008.
[RFC5234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", STD 68, RFC 5234, January 2008.
[X.411] International Telephone and Telegraph Consultative
Committee, "Message Handling Systems (MHS) - Message
Transfer System: Abstract Service Definition and
Procedures", CCITT Recommendation X.411, June 1999.
[X.690] International Telephone and Telegraph Consultative
Committee, "ASN.1 encoding rules: Specification of
basic encoding Rules (BER), Canonical encoding rules
(CER) and Distinguished encoding rules (DER)",
CCITT Recommendation X.690, July 2002.
[CSS3-Color] Celik, T. and C. Lilley, "CSS3 Color Module", World
Wide Web Consortium CR CR-css3-color-20030514,
May 2003,
<http://www.w3.org/TR/2003/CR-css3-color-20030514>.
9.2. Informative References
[RFC2045] Freed, N. and N. Borenstein, "Multipurpose Internet
Mail Extensions (MIME) Part One: Format of Internet
Message Bodies", RFC 2045, November 1996.
[RFC3501] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL -
VERSION 4rev1", RFC 3501, March 2003.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer
Security (TLS) Protocol Version 1.2", RFC 5246,
August 2008.
[RFC5321] Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,
October 2008.
[X.841] International Telephone and Telegraph Consultative
Melnikov & Zeilenga Expires February 9, 2012 [Page 8]
Internet-Draft email-seclabel August 2011
Committee, "Security information objects for access
control", CCITT Recommendation X.841, October 2000.
Appendix A. Acknowledgements
The authors appreciate the review, comment, and text provided by
community members, including Dave Cridland, Brad Hards, Steve Kille,
Alan Ross, and David Wilson.
Authors' Addresses
Alexey Melnikov
Isode Limited
5 Castle Business Village
36 Station Road
Hampton, Middlesex TW12 2BX
UK
EMail: Alexey.Melnikov@isode.com
Kurt Zeilenga
Isode Limited
EMail: Kurt.Zeilenga@isode.com
Melnikov & Zeilenga Expires February 9, 2012 [Page 9]
| PAFTECH AB 2003-2026 | 2026-04-23 04:03:57 |