One document matched: draft-ietf-behave-turn-tcp-00.txt
Behave J. Rosenberg
Internet-Draft Cisco Systems
Intended status: Standards Track R. Mahy
Expires: May 14, 2008 Plantronics, Inc.
November 11, 2007
Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations
draft-ietf-behave-turn-tcp-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 14, 2008.
Copyright Notice
Copyright (C) The IETF Trust (2007).
Abstract
This specification defines an extension of Traversal Using Relays
around NAT (TURN), a relay protocol for NAT traversal, to allows a
TURN client to request TCP allocations, and defines new requests and
indications for the TURN server to open and accept and manage TCP
connection with the client's peers. TURN and this extension both
purposefully restricts the ways in which the relayed address can be
used. In particular, it prevents users from running general purpose
Rosenberg & Mahy Expires May 14, 2008 [Page 1]
Internet-Draft TURN TCP November 2007
servers from ports obtained from the STUN server.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Initial Allocations . . . . . . . . . . . . . . . . . . . . . . 3
3. Managing TCP Peers . . . . . . . . . . . . . . . . . . . . . . 3
3.1. Connect Request . . . . . . . . . . . . . . . . . . . . . . 3
3.2. Listen Permission Request . . . . . . . . . . . . . . . . . 4
3.3. Connection Status Indication . . . . . . . . . . . . . . . 4
4. Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . 5
5. New value in REQUESTED-TRANSPORT . . . . . . . . . . . . . . . 5
6. New CONNECT-STAT Attribute . . . . . . . . . . . . . . . . . . 5
7. New Error Reponse Codes . . . . . . . . . . . . . . . . . . . . 6
8. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6
9.1. New STUN Requests, Responses, and Indications . . . . . . . 6
9.2. New STUN Attributes . . . . . . . . . . . . . . . . . . . . 6
9.3. New STUN response codes . . . . . . . . . . . . . . . . . . 6
10. Security Considerations . . . . . . . . . . . . . . . . . . . . 7
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 7
12. IAB Considerations . . . . . . . . . . . . . . . . . . . . . . 7
13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 7
14. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
14.1. Normative References . . . . . . . . . . . . . . . . . . . 7
14.2. Informative References . . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8
Intellectual Property and Copyright Statements . . . . . . . . . . 9
Rosenberg & Mahy Expires May 14, 2008 [Page 2]
Internet-Draft TURN TCP November 2007
1. Introduction
For TCP connections, the Connection Request allows the client to ask
the server to open a connection to the peer. This also adds a
permission to accept an incoming TCP connection from the remote
address of the peer. When the server and the peer try to open a TCP
connection at the same time, this is called TCP simultaneous open.
With a Listen Permission request a client can ask the server just to
add a permission to the peer and listen for a connection request.
When the TURN-to-peer leg is TCP, the TURN client needs to be aware
of the status of these TCP connections. Consequently, the TURN
server sends a Connection State Indication for a binding whenever the
relay connection status changes for one of the client's bindings,
except when the status changes due to a TURN client request (ex: an
explicit binding deallocation).
2. Initial Allocations
The procedures for an initial allocation are nearly identical to
those in the core TURN specification [2]. Define new value for
REQUESTED-TRANSPORT attribute. The client MUST NOT request the TCP
transport in an Allocate request sent to the TURN server over UDP.
3. Managing TCP Peers
3.1. Connect Request
The Connect Request is used by a client when it has obtained an
allocated transport address that is TCP. The client can use the
Connect Request to ask the server to open a TCP connection to a
specified destination address included in the request.
If the allocation is for a UDP port, the server MUST reject the
request with a 445 (Operation for TCP Only) response. If the request
does not contain a REMOTE-ADDRESS attribute, the server sends a 400
(Bad Request) Connect error response,.
If the request contains a REMOTE-ADDRESS attribute, the IP address
contained within it is added to the permissions for this allocation,
if it was not already present. This happens regardless of whether
the subsequent TCP connection attempt succeeds or not.
If a connection already exists for this address and port, the server
returns a 446 (Connection Already Exists) Connect error response.
Otherwise the server tries to establish the corresponding TCP
Rosenberg & Mahy Expires May 14, 2008 [Page 3]
Internet-Draft TURN TCP November 2007
connection and returns a Connect Success Response. This just
indicates that the server added the permission and is attempting to
establish a TCP connection. The server does not wait for the
connection attempt to succeed or fail. The status of the connection
attempt is returned via the Connect Status Indication.
Note that the server needs to use the same source connection
address for all connections/permissions associated with an
allocation. For servers written using Berkeley sockets, the
SO_REUSEADDR flag is typically used to use the same local address
with multiple sockets.
3.2. Listen Permission Request
The Listen Permission Request is used by the client to ask the server
to create a permission for a TCP peer without attempting to make a
connection to that peer. If it has not already done so, the server
should start listening on the allocated port and should be prepared
to accept any incoming connection requests from a peer with an active
permission.
Note that the server needs to use the same source connection
address for all connections/permissions associated with an
allocation. For servers written using Berkeley sockets, the
SO_REUSEADDR flag is typically used to use the same local address
with multiple sockets.
3.3. Connection Status Indication
When the TURN to peer leg is TCP, the TURN client needs to be aware
of the status of TCP connections and other open permissions created
on its behalf. The TURN extension defines application states for a
TCP connection as follows: LISTEN, ESTABLISHED, CLOSED.
Consequently, the TURN server sends a Connection State Indication for
a TCP permission whenever the relay connection status changes for one
of the client's permissions except when the status changes due to a
TURN client request (ex: an explicit binding close or deallocation).
A Connection Status Indiciation MUST also contain a REMOTE-ADDRESS
attribute.
A TURN can only relay to a peer over TCP if the client
communicates with the server over TCP or TLS over TCP. Because of
this, the server can be assured that Connection Status Indications
are received reliably.
Rosenberg & Mahy Expires May 14, 2008 [Page 4]
Internet-Draft TURN TCP November 2007
4. Forwarding
If a server receives a TCP connection request on an allocated TCP
transport address, it checks the permissions associated with that
allocation. If the source IP address of the TCP SYN packet matches
one of the permissions (the source port does not need to match), the
TCP connection is accepted. Otherwise, it is rejected. When a TCP
connection is accepted, the server sends the corresponding client a
Connect Status Indication with the CONNECT-STAT attribute set to
ESTABLISHED. No information is passed to the client if the server
rejects the connection because there is no corresponding permission.
If a server receives data on a TCP connection that terminates on the
allocated TCP transport address, the server sends the data received
on the TCP connection to the client as described in [TODO].
Note that, because data is forwarded blindly across TCP bindings,
TLS will successfully operate over a TURN allocated TCP port if
the linkage to the client is also TCP.
5. New value in REQUESTED-TRANSPORT
This attribute is used by the client to request a specific transport
protocol for the allocated transport address. It is a 32 bit
unsigned integer. Its values are:
0x0000 0000: UDP
0x0000 0001: TCP
If an Allocate request is sent over TCP and requests a UDP
allocation, or an Allocate request is sent over TLS over TCP and
requests a UDP or TCP allocation, the server will relay data between
the two transports.
Extensions to TURN can define additional transport protocols in an
IETF-consensus RFC.
6. New CONNECT-STAT Attribute
The connection status attribute is used by the server to convey the
status of server-to-peer connections. It is a 32 bit unsigned
integer. Its values are:
Rosenberg & Mahy Expires May 14, 2008 [Page 5]
Internet-Draft TURN TCP November 2007
0x0000 0000: LISTEN
0x0000 0001: ESTABLISHED
0x0000 0002: CLOSED
7. New Error Reponse Codes
445 (Operation for TCP Only): The client tried to send a request to
perform a TCP-only operation on an allocation, and allocation is UDP.
446 (Connection Already Exists): The client tried to open a
connection to a peer, but a connection to that peer already exists.
8. Security Considerations
9. IANA Considerations
This specification defines several new STUN messages, STUN
attributes, and STUN response codes. This section directs IANA to
add these new protocol elements to the IANA registry of STUN protocol
elements.
9.1. New STUN Requests, Responses, and Indications
Request/Response Transactions
0x007 : Connect
0x008 : Listen Permission
Indications
0x009 : Connect Status
9.2. New STUN Attributes
0x0023: CONNECT-STAT
9.3. New STUN response codes
445 Operation for TCP Only
446 Connection Already Exists
Rosenberg & Mahy Expires May 14, 2008 [Page 6]
Internet-Draft TURN TCP November 2007
10. Security Considerations
TBD
11. IANA Considerations
TBD
12. IAB Considerations
The IAB has studied the problem of "Unilateral Self Address Fixing",
which is the general process by which a client attempts to determine
its address in another realm on the other side of a NAT through a
collaborative protocol reflection mechanism RFC 3424 [8]. The TURN
extension is an example of a protocol that performs this type of
function. The IAB has mandated that any protocols developed for this
purpose document a specific set of considerations.
TURN is an extension of the STUN protocol. As such, the specific
usages of STUN that use the TURN extensions need to specifically
address these considerations. Currently the only STUN usage that
uses TURN is ICE [9].
13. Acknowledgements
The authors would like to thank Marc Petit-Huguenin for his comments
and suggestions.
14. References
14.1. Normative References
[1] Rosenberg, J., Huitema, C., Mahy, R., Matthews, P., and D.
Wing, "Session Traversal Utilities for (NAT) (STUN)",
draft-ietf-behave-rfc3489bis-11 (work in progress),
October 2007.
[2] Rosenberg, J., "Traversal Using Relays around NAT (TURN): Relay
Extensions to Session Traversal Utilities for NAT (STUN)",
draft-ietf-behave-turn-04 (work in progress), July 2007.
[3] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997.
Rosenberg & Mahy Expires May 14, 2008 [Page 7]
Internet-Draft TURN TCP November 2007
14.2. Informative References
[4] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson,
"RTP: A Transport Protocol for Real-Time Applications", STD 64,
RFC 3550, July 2003.
[5] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model with
Session Description Protocol (SDP)", RFC 3264, June 2002.
[6] Kent, S., "IP Authentication Header", RFC 4302, December 2005.
[7] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC 4303,
December 2005.
[8] Daigle, L. and IAB, "IAB Considerations for UNilateral Self-
Address Fixing (UNSAF) Across Network Address Translation",
RFC 3424, November 2002.
[9] Rosenberg, J., "Interactive Connectivity Establishment (ICE): A
Protocol for Network Address Translator (NAT) Traversal for
Offer/Answer Protocols", draft-ietf-mmusic-ice-19 (work in
progress), October 2007.
[10] Audet, F. and C. Jennings, "NAT Behavioral Requirements for
Unicast UDP", draft-ietf-behave-nat-udp-08 (work in progress),
October 2006.
Authors' Addresses
Jonathan Rosenberg
Cisco Systems
600 Lanidex Plaza
Parsippany, NJ 07054
US
Phone: +1 973 952-5000
Email: jdrosen@cisco.com
URI: http://www.jdrosen.net
Rohan Mahy
Plantronics, Inc.
Email: rohan@ekabal.com
Rosenberg & Mahy Expires May 14, 2008 [Page 8]
Internet-Draft TURN TCP November 2007
Full Copyright Statement
Copyright (C) The IETF Trust (2007).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Rosenberg & Mahy Expires May 14, 2008 [Page 9]
| PAFTECH AB 2003-2026 | 2026-04-23 05:44:57 |