1、BRITISH STANDARD BS ISO/IEC 11577:1995 Implementation of ISO/IEC 11577:1995 Information technology Open Systems Interconnection Network layer security protocolBSISO/IEC11577:1995 This British Standard, having been prepared under the directionof the Information Systems Technology Assembly,was publish
2、ed underthe authority of the Standards Board and comes intoeffect on 15October1995 BSI 02-2000 The following BSI references relate to the work on this standard: Committee reference IST/6 Draft for comment 93/640428 DC ISBN 0 580 24807 0 Committees responsible for this BritishStandard The preparation
3、 of this British Standard was entrusted to Technical Committee IST/6, Data communications, upon which the following bodies were represented: British Computer Society British Telecommunications plc CCTA (the Government Centre for Information Systems) Digital Equipment Co. Ltd. IBM United Kingdom Ltd.
4、 Institution of Electrical Engineers International Computers Limited Logica UK Ltd. Nine Tiles Computer Systems Ltd. Rank Xerox (UK) Ltd. Amendments issued since publication Amd. No. Date CommentsBSISO/IEC11577:1995 BSI 02-2000 i Contents Page Committees responsible Inside front cover National forew
5、ord ii Foreword vi Text of ISO/IEC 11577 1BSISO/IEC11577:1995 ii BSI 02-2000 National foreword This British Standard reproduces verbatim ISO/IEC11577:1995 and implements it as the UK national standard. This British Standard is published under the direction of the Information Systems Technology Assem
6、bly whose Technical Committee IST/6 has the responsibility to: aid enquirers to understand the text; present to the responsible international committee any enquiries on interpretation, or proposals for change, and keep UK interests informed; monitor related international and European developments an
7、d promulgate them in the UK. NOTEInternational and European Standards, as well as overseas standards, are available from Customer Services, BSI, 389 Chiswick High Road, London W4 4AL. A British Standard does not purport to include all the necessary provisions of a contract. Users of British Standard
8、s are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages This document comprises a front cover, an inside front cover, pages i and ii, theISO/IEC title page, pages ii to vi, pages 1 to 100 and a ba
9、ck cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on the inside front cover.ISO/IEC11577:1995(E) ii BSI 02-2000 Contents Page Foreword vi Introduction 1 1 Scope 1 2 Normative references 2 2.1 Identica
10、l Recommendations|International Standards 2 2.2 Paired Recommendations|International Standards equivalent in technical content 2 2.3 Additional References 3 3 Definitions 3 3.1 Reference Model definitions 3 3.2 Security Architecture definitions 3 3.3 Service Convention definitions 4 3.4 Network Serv
11、ice definitions 4 3.5 Internal Organisation of the Network Layer definitions 4 3.6 Connectionless Network Protocol definitions 4 3.7 Upper Layer Security Model definitions 4 3.8 Conformance Testing definitions 4 3.9 Additional definitions 4 4 Abbreviations 5 4.1 Data Units 5 4.2 Protocol Data Unit F
12、ields 5 4.3 Parameters 5 4.4 Miscellaneous 6 5 Overview of the Protocol 6 5.1 Introduction 6 5.2 Overview of Services Provided 7 5.3 Overview of Services Assumed 7 5.4 Security Associations and Security Rules 8 5.5 Overview of Protocol Protection Functions 9 5.6 Overview of Protocol NLSP-CL 10 5.7 O
13、verview of Protocol NLSP-CO 11 6 Protocol Functions Common to NLSP-CL and NLSP-CO 13 6.1 Introduction 13 6.2 Common SA Attributes 13 6.3 Common Functions on a Request for an Instance of Communication 14 6.4 Secure Data Transfer Protocol Functions 14 6.5 Use of a Security Association Protocol 16 7 Pr
14、otocol Functions FOR NLSP-CL 16 7.1 Services Provided by NLSP-CL 16 7.2 Services Assumed 17 7.3 Security Association Attributes 17 7.4 Checks 17 7.5 In-Band SA Establishment 17 7.6 Processing NLSP-UNITDATA Request 17 7.7 Processing UN-UNITDATA Indication 18 8 Protocol Functions for NLSP-CO 19 8.1 Se
15、rvices Provided by NLSP-CO 19 8.2 Services Assumed 19 8.3 Security Association Attributes 21ISO/IEC11577:1995(E) BSI 02-2000 iii Page 8.4 Checks and other Common Functions 21 8.5 NLSP-Connect Functions 22 8.6 NLSP-DATA Functions 32 8.7 NLSP-EXPEDITED-DATA Functions 33 8.8 RESET Functions 34 8.9 NLSP
16、-DATA ACKNOWLEDGE 35 8.10 NLSP-DISCONNECT 35 8.11 Other Functions 38 8.12 Peer Entity Authentication 39 9 Overview of Mechanisms used 40 9.1 Security Services and Mechanisms 40 9.2 Functions Supported 41 10 Connection security control (NLSP-CO only) 41 10.1 Overview 41 10.2 SA-Attributes 42 10.3 Pro
17、cedures 43 10.4 CSC-PDU Fields used 44 11 SDT PDU Based encapsulation Function 44 11.1 Overview 44 11.2 SA Attributes 44 11.3 Procedures 46 11.4 PDU Fields used 48 12 No-Header Encapsulation Function (NLSP-CO only) 48 12.1 Overview 48 12.2 SA Attributes 48 12.3 Procedures 49 13 Structure and Encodin
18、g of PDUS 49 13.1 Introduction 49 13.2 Content Field Format 50 13.3 Protected Data 50 13.4 Security Association PDU 55 13.5 Connection Security Control PDU 56 14 Conformance 58 14.1 Static Conformance Requirements 58 14.2 Dynamic Conformance Requirements 59 14.3 Protocol Implementation Conformance S
19、tatement 60 Annex A Mapping UN primitives to CCITT Rec. X.213|ISO 8348 61 Annex B Mapping UN Primitives to CCITT Rec. X.25|ISO 8208 61 Annex C Security Association Protocol Using Key Token Exchange andDigitalSignatures 62 C.1 Overview 62 C.2 Key Token Exchange (KTE) 63 C.3 SA-Protocol Authentication
20、 63 C.4 SA Attribute Negotiation 63 C.5 SA Abort/Release 65 C.6 Mapping of SA-Protocol Functions to Protocol Exchanges 65 C.7 SA PDU SA Contents 67 Annex D NLSP PICS Proforma 71 D.1 Introduction 71ISO/IEC11577:1995(E) iv BSI 02-2000 Page D.2 Abbreviations and Special Symbols 71 D.3 Instructions for
21、Completing the PICS Proforma 71 D.4 Identification 73 D.5 Features Common to NLSP-CO and NLSP-CL 74 D.6 Features Specific to NLSP-CL 78 D.7 Features Specific to NLSP-CO 79 Annex E Tutorial on some Basic Concepts of NLSP 82 E.1 Basis of Protection 82 E.2 Underlying vs NLSP Service 82 E.3 NLSP Address
22、ing 83 E.4 Connection Mode NLSP 87 E.5 Connectionless Mode NLSP 88 E.6 Security Attributes and Associations 93 E.7 Dynamic Functional Relationship between NLSP and CLNP 93 E.8 Dynamic Functionality Related to Layered Model 95 Annex F Example of an Agreed Set of Security Rules 97 Annex G Security Ass
23、ociations and Attributes 98 Annex H Example Key Token Exchange EKE Algorithm 99 Figure 8-1 Service Primitive Time Sequence Diagram for NLSP-CONNECT in UN-CONNECT 24 Figure 8-2 Service Primitive Time Sequence Diagram for NLSP-CONNECT in UN-CONNECT with SA-P 27 Figure 8-3 Service Primitive Time Sequen
24、ce Diagram for NLSP-CONNECT in UN-DATA 29 Figure 8-4 Service Primitive Time Sequence Diagram for NLSP-DISCONNECT 36 Figure 8-5 NLSP initiated disconnect due to an unsuccessful SA-P 38 Figure 13-1 Content Field 50 Figure 13-2 Generic Secure Data Transfer PDU Structure 51 Figure 13-3 Confidentiality o
25、nly using No_Header Option 51 Figure 13-4 Unprotected Header 51 Figure 13-5 Structure of Encapsulated Octet String 52 Figure 13-6 Octet-String-Before-Encapsulation 52 Figure 13-7 Test Data 54 Figure 13-8 Value of Label 54 Figure 13-9 Security Association PDU Structure 55 Figure 13-10 Connection Secu
26、rity Control PDU 56 Figure 13-11 CSC-PDU Contents 57 Figure 13-12 Enciphered Auth-data 57 Figure C.1 SA Contents 67 Figure E.1 Building a Secure Data Transfer PDU 82 Figure E.2 Illustration of NLSP-CO with an Intermediate System 83 Figure E.3-1 Upper and lower SAPs and addresses 83 Figure E.3-2 NLSP
27、 Placement in the Network layer 84 Figure E.3-3 Addresses in a Network layer containing a NLSP sub-layer-With one Network Protocol (NP) above and below NLSP 84 Figure E.3-4 Addresses in a Network layer containing a NLSP sub-layer-With Network Protocol (NP) above and below NLSP No Network Protocol 84
28、ISO/IEC11577:1995(E) BSI 02-2000 v Page Figure E.3-5 Virtual UN within an OSIE 85 Figure E.3-6 Placements of the NLSPE in the Network layer 86 Figure E.4-1 Illustration of NLSP within an Multi-network Environment 88 Figure E.4-2 Illustration of NLSP-CO between End Systems 89 Figure E.4-3 NLSP-CO wit
29、h an Untrusted Network 89 Figure E.4-4 Illustration of NLSP-CO with Untrusted Relay System 90 Figure E.5-1 Illustration of NLSP-CL between End Systems 91 Figure E.5-2 Illustration of NLSP-CL with Untrusted Subnetwork 91 Figure E.5-3 Illustration of NLSP-CL with Untrusted Relay System 92 Figure E.7-1
30、 Flow Chart of NLSP with CLNP 94 Figure E.7-2 Layered Model Related to Flow Chart 95 Figure G.1 Illustration of 3 tiers of Security Association 99 Figure H.1 Illustration of On-line Key Derivation and DerivationusingEKE 100 Table 8-1 Table Giving Limitations for NLSP Connection EstablishmentMode 23
31、Table 8-2 CSC PDU Flags Identifying NLSP Connection Set Up Procedures 24 Table 14-1 NLSP Support for PDUs 59 Table A-1 61 Table B.1 61 Table E.1 87ISO/IEC11577:1995(E) vi BSI 02-2000 Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commiss
32、ion) form the specialized system for worldwide standardization. National bodies that are members of ISO or IECparticipate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO an
33、d IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IE
34、CJTC1. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least75% of the national bodies casting a vote. International Standard ISO/IEC11577 was prepared by Joint Techn
35、ical Committee ISO/IEC JTC1, Information technology, Subcommittee SC6, Telecommunications and information exchange between systems, in collaboration with ITU-T. The identical text is published as ITU-T Recommendation X.273. NOTEThe publication dates of ISO/IEC7498-1, ISO/IEC9646-1, ISO/IEC9646-2, IS
36、O/IEC10731, ISO/IEC10745 and ISO/IECTR13594, referenced in this International Standard, differ from those referenced in the identical ITU Recommendation X.273 due to the publication of new editions during final preparation of this International Standard. Annex A to Annex D form an integral part of t
37、his International Standard. Annex E to Annex H are for information only.ISO/IEC11577:1995(E) BSI 02-2000 1 Introduction The protocol defined by this ITU-T Recommendation|International Standard is used to provide security services in support of an instance of communication between lower layer entitie
38、s. This protocol is positioned with respect to other Standards by the layered structure defined in CCITT Rec. X.200|ISO/IEC7498-1 and by the Network layer organization as defined in ISO8648 and extended by ITU-T Rec. X.802|ISO/IECTR13594 (Lower Layer Security Model). It provides security services in
39、 support of both connection-mode and connectionless-mode Network services. In particular, this protocol is located in the Network layer, and it has functional interfaces and clearly defined service interfaces at its upper and lower boundaries. To evaluate conformance of a particular implementation,
40、it is necessary to have a statement of which capabilities and options have been implemented for a given OSI protocol. Such a statement is called a Protocol Implementation Conformance Statement (PICS). 1 Scope This ITU-T Recommendation|International Standard specifies a protocol to be used by End Sys
41、tems andIntermediate Systems in order to provide security services in the Network layer, which is definedbyCCITT Rec. X.213|ISO/IEC8348, and ISO8648. The protocol defined in this ITU-T Recommendation|International Standard is called the Network Layer Security Protocol (NLSP). This ITU-T Recommendati
42、on|International Standard specifies: 1) Support for the following security services defined in CCITT Rec. X.800|ISO7498-2: a) peer entity authentication; b) data origin authentication; c) access control; d) connection confidentiality; e) connectionless confidentiality; f) traffic flow confidentialit
43、y; g) connection integrity without recovery (including Data Unit Integrity, in which individual SDUs on a connection are integrity protected); h) connectionless integrity. 2) The functional requirements for implementations that claim conformance to this ITU-T Recommendation|International Standard. T
44、he procedures of this protocol are defined in terms of: a) requirements on the cryptographic techniques that can be used in an instance of this protocol; b) requirements on the information carried in the security association used in an instance of communication. Although the degree of protection aff
45、orded by some security mechanisms depends on the use of some specific cryptographic techniques, correct operation of this protocol is not dependent on the choice of any particular encipherment or decipherment algorithm. This is a local matter for the communicating systems. Furthermore, neither the c
46、hoice nor the implementation of a specific security policy are within the scope of this ITU-T Recommendation|International Standard. The choice of a specific security policy, and hence the degree of protection that will be achieved, is left as a local matter among the systems that are using a single
47、 instance of secure communications. This ITU-T Recommendation|International Standard does not require that multiple instances of secure communications involving a single open system must use the same security protocol. Annex D provides the PICS proforma for the Network Layer Security Protocol in com
48、pliance with the relevant guidance given in ISO/IEC9646-2.ISO/IEC11577:1995(E) 2 BSI 02-2000 2 Normative references The following Recommendations and International Standards contain provisions which, though reference in this text, constitute provisions of this ITU-T Recommendation|International Stan
49、dard. At time of publication, the editions indicated were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this ITU-T Recommendation|International Standard are encouraged to investigate the possibility of applying the most recent edition of the Recommendations and Standards listed below. Members of IEC and ISO maintain a registry of currently valid International Standards. The Telecommunications Standardization Bureau of IT