In this procedure, you configure IPsec on two Trusted Extensions systems to handle the following conditions:
The two systems, enigma and partym, are multilevel Trusted Extensions systems that are operating in a multilevel network.
Application data is encrypted and protected against unauthorized change within the network.
The security label of the data is visible in the form of a CALIPSO or CIPSO IP option for use by multilevel routers and security devices on the path between the enigma and partym systems.
The security labels that enigma and partym exchange are protected against unauthorized changes.
Before You Begin
You are in the root role in the global zone.
Follow the procedures in Labeling Hosts and Networks. Use a template with a cipso host type.
For the procedure, see How to Secure Network Traffic Between Two Servers With IPsec in Securing the Network in Oracle Solaris 11.3. Use IKE for key management, as described in the following step.
Follow the procedure in How to Configure IKEv2 With Preshared Keys in Securing the Network in Oracle Solaris 11.3, then modify the ike/config file as follows:
The resulting file appears similar to the following. The label additions are highlighted.
### ike/config file on enigma, 192.0.2.16 ## Global parameters # ## Use IKE to exchange security labels. label_aware # ## Defaults that individual rules can override. p1_xform { auth_method preshared oakley_group 5 auth_alg sha encr_alg 3des } p2_pfs 2 # ## The rule to communicate with partym # Label must be unique { label "enigma-partym" local_addr 192.0.2.16 remote_addr 192.0.2.111 multi_label wire_label inner p1_xform { auth_method preshared oakley_group 5 auth_alg sha1 encr_alg aes } p2_pfs 5 }
### ike/config file on partym, 192.0.2.111 ## Global Parameters # ## Use IKE to exchange security labels. label_aware # p1_xform { auth_method preshared oakley_group 5 auth_alg sha encr_alg 3des } p2_pfs 2 ## The rule to communicate with enigma # Label must be unique { label "partym-enigma" local_addr 192.0.2.111 remote_addr 192.0.2.16 multi_label wire_label inner p1_xform { auth_method preshared oakley_group 5 auth_alg sha1 encr_alg aes } p2_pfs 5 }
Use encr_auth_algs rather than auth_algs in the /etc/inet/ipsecinit.conf file to handle authentication. ESP authentication does not cover the IP header and IP options, but will authenticate all information after the ESP header.
{laddr enigma raddr partym} ipsec {encr_algs any encr_auth_algs any sa shared}