Browse Prior Art Database

IP Security Policy (IPSP) Requirements (RFC3586)

IP.com Disclosure Number: IPCOM000019020D
Original Publication Date: 2003-Aug-01
Included in the Prior Art Database: 2003-Aug-27
Document File: 11 page(s) / 22K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

M. Blaze: AUTHOR [+4]

Abstract

This document describes the problem space and solution requirements for developing an IP Security Policy (IPSP) configuration and management framework. The IPSP architecture provides a scalable, decentralized framework for managing, discovering and negotiating the host and network security policies that govern access, authorization, authentication, confidentiality, data integrity, and other IP Security properties. This document highlights such architectural components and presents their functional requirements.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 17% of the total text.

Network Working Group M. Blaze

Request for Comments: 3586 AT&T Labs - Research

Category: Standards Track A. Keromytis

Columbia University

M. Richardson

Sandelman Software Works

L. Sanchez

Xapiens Corporation

August 2003

IP Security Policy (IPSP) Requirements

Status of this Memo

This document specifies an Internet standards track protocol for the

Internet community, and requests discussion and suggestions for

improvements. Please refer to the current edition of the "Internet

Official Protocol Standards" (STD 1) for the standardization state

and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2003). All Rights Reserved.

Abstract

This document describes the problem space and solution requirements

for developing an IP Security Policy (IPSP) configuration and

management framework. The IPSP architecture provides a scalable,

decentralized framework for managing, discovering and negotiating the

host and network security policies that govern access, authorization,

authentication, confidentiality, data integrity, and other IP

Security properties. This document highlights such architectural

components and presents their functional requirements.

Table of Contents

1. Introduction.................................................. 2

1.1. Terminology............................................. 2

1.2. Security Policy and IPsec............................... 2

2. The IP Security Policy Problem Space.......................... 3

3. Requirements for an IP Security Policy Configuration and

Management Framework.......................................... 5

3.1. General Requirements.................................... 5

3.2. Description and Justification........................... 5

3.2.1. Policy Model.................................... 5

3.2.2. Security Gateway Discovery...................... 6

Blaze, et al. Standards Track [Page 1]

RFC 3586 IP Security Policy (IPSP) Requirements August 2003

3.2.3. Policy Specification Language................... 6

3.2.4. Distributed policy.............................. 6

3.2.5. Policy Discovery................................ 6

3.2.6. Security Association Resolution................. 6

3.2.7. Compliance Checking............................. 7

4. Security Considerations....................................... 7

5. IANA Considerations........................................... 7

6. Intellectual Property Statement............................... 7

7. References.................................................... 8

7.1. Normative References.................................... 8

7.2. Informative References.................................. 8

8. Disclaimer.................................................... 8

9. Acknowledgements.............................................. 8

10. Authors' Addresses............................................ 9

11. Full Copyright Statement...................................... 10

1. Introduction

1.1. Terminology

The keywords "MUST", "MUST...