One document matched: draft-ietf-p2psip-share-03.xml


<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<rfc category="std" docName="draft-ietf-p2psip-share-03" ipr="trust200902">
  <?xml-stylesheet type='text/xsl' href='rfc2629.xslt'?>

  <?rfc toc="yes"?>

  <?rfc symrefs="yes"?>

  <?rfc sortrefs="yes"?>

  <?rfc iprnotified="no" ?>

  <?rfc strict="yes" ?>

  <front>
    <title abbrev="ShaRe">A Usage for Shared Resources in RELOAD
    (ShaRe)</title>

    <author fullname="Alexander Knauf" initials="A." surname="Knauf">
      <organization abbrev="HAW Hamburg">HAW Hamburg</organization>

      <address>
        <postal>
          <street>Berliner Tor 7</street>

          <city>Hamburg</city>

          <code>D-20099</code>

          <country>Germany</country>
        </postal>

        <phone>+4940428758067</phone>

        <email>alexanderknauf@gmail.com</email>

        <uri></uri>
      </address>
    </author>

    <author fullname="Thomas C. Schmidt" initials="T C."
            surname="Schmidt, Ed.">
      <organization abbrev="HAW Hamburg">HAW Hamburg</organization>

      <address>
        <postal>
          <street>Berliner Tor 7</street>

          <city>Hamburg</city>

          <code>D-20099</code>

          <country>Germany</country>
        </postal>

        <email>schmidt@informatik.haw-hamburg.de</email>

        <uri>http://inet.cpt.haw-hamburg.de/members/schmidt</uri>
      </address>
    </author>

    <author fullname="Gabriel Hege" initials="G." surname="Hege">
      <organization abbrev="daviko GmbH">daviko GmbH</organization>

      <address>
        <postal>
          <street>Am Borsigturm 50</street>

          <city>Berlin</city>

          <code>D-13507</code>

          <country>Germany</country>
        </postal>

        <phone>+493043004344</phone>

        <email>hege@daviko.com</email>

        <uri></uri>
      </address>
    </author>

    <author fullname="Matthias Waehlisch" initials="M." surname="Waehlisch">
      <organization abbrev="link-lab & FU Berlin">link-lab & FU
      Berlin</organization>

      <address>
        <postal>
          <street>Hoenower Str. 35</street>

          <city>Berlin</city>

          <code>D-10318</code>

          <country>Germany</country>
        </postal>

        <email>mw@link-lab.net</email>

        <uri>http://www.inf.fu-berlin.de/~waehl</uri>
      </address>
    </author>

    <date />

    <workgroup>P2PSIP Working Group</workgroup>

    <abstract>
      <t>This document defines a RELOAD Usage for managing shared write access
      to RELOAD Resources. Shared Resources in RELOAD (ShaRe) form a basic
      primitive for enabling various coordination and notification schemes
      among distributed peers. Access in ShaRe is controlled by a hierarchical
      trust delegation scheme maintained within an access list. A new
      USER-CHAIN-ACL access policy allows authorized peers to write a Shared
      Resource without owning its corresponding certificate. This
      specification also adds mechanisms to store Resources with a variable
      name which is useful whenever peer-independent rendezvous processes are
      required.</t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>This document defines a RELOAD Usage for managing shared write access
      to RELOAD Resources and a mechanism to store Resources with a variable
      name. The Usage for Shared Resources in RELOAD (ShaRe) enables overlay
      users to share their exclusive write access to specific Resource/Kind
      pairs with others. Shared Resources form a basic primitive for enabling
      various coordination and notification schemes among distributed peers.
      Write permission is controlled by an Access Control List (ACL) Kind that
      maintains a chain of Authorized Peers for a particular Shared Resource.
      A newly defined USER-CHAIN-ACL access control policy enables shared
      write access in RELOAD.</t>

      <t>The Usage for Shared Resources in RELOAD is designed for jointly
      coordinated group applications among distributed peers (e.g., third
      party registration, see <xref target="I-D.ietf-p2psip-sip"></xref> , or
      distributed conferencing, see<xref
      target="I-D.ietf-p2psip-disco"></xref>). Of particular interest are
      rendezvous processes, where a single identifier is linked to multiple,
      dynamic instances of a distributed cooperative service. Shared write
      access is based on a trust delegation mechanism. It transfers the
      authorization to write a specific Kind data by storing logical Access
      Control Lists. An ACL contains the ID of the Kind to be shared and
      contains trust delegations from one authorized to another (previously
      unauthorized) user.</t>

      <t>Shared write access augments the RELOAD security model, which is
      based on the restriction that peers are only allowed to write resources
      at a small set of well defined locations (Resource-IDs) in the overlay.
      Using the standard access control rules in RELOAD, these locations are
      bound to the username or Node-ID in the peer's certificate. This
      document extends the base policies to enable a controlled write access
      for multiple users to a common Resource Id.</t>

      <t>Additionally, this specification defines an optional mechanism to
      store Resources with a variable Resource Name. It enables the storage of
      Resources whose name complies to a specific pattern. Definition of the
      pattern is arbitrary, but must contain the username of the Resource
      creator.</t>
    </section>

    <section title="Terminology">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119">
      </xref>.<vspace blankLines="1" /></t>

      <t>This document uses the terminology and definitions from the RELOAD
      base <xref target="RFC6940"> </xref>and the peer-to-peer
      SIP concepts draft <xref target="I-D.ietf-p2psip-concepts"></xref>.
      Additionally, the following terms are used: <list style="hanging">
          <t hangText="Shared Resource:">The term Shared Resource in this
          document defines a RELOAD Resource with its associated Kinds, that
          can be written or overwritten by multiple RELOAD users following the
          specifications in this document.</t>

          <t hangText="Access Control List:">The term Access Control List in
          this document defines a logical list of RELOAD users allowed to
          write a specific RELOAD Resource/Kind pair by following the
          specifications in this document. The list items are stored as Access
          Control List Kinds that map trust delegations from user A to user B,
          where A is allowed to write a Shared Resource and the Access Control
          List, while B is a user that obtains write access to specified Kinds
          from A.</t>

          <t hangText="Resource Owner:">The term Resource Owner in this
          document defines a RELOAD peer that initially stored a Resource to
          be shared. The Resource Owner possesses the RELOAD certificate that
          grants write access to a specific Resource/Kind pair using the
          RELOAD certificate-based access control policies.</t>

          <t hangText="Authorized Peer:">The term Authorized Peer in this
          document defines a RELOAD peer that was granted write access to a
          Shared Resource by permission of the Resource Owner or another
          Authorized Peer.</t>
        </list></t>
    </section>

    <section anchor="sec-srir" title="Shared Resources in RELOAD">
      <t>A RELOAD user that owns a certificate for writing at a specific
      overlay location can maintain one or more RELOAD Kinds that are
      designated for a non-exclusive write access shared with other RELOAD
      users. The mechanism to share those Resource/Kind pairs with a group of
      users consists of two basic steps. <list style="numbers">
          <t>Storage of the Resource/Kind pairs to be shared.</t>

          <t>Storage of an Access Control List (ACL) associated with those
          Kinds.</t>
        </list></t>

      <t>ACLs are created by the Resource Owner and contain ACL items, each
      delegating the permission of writing the shared Kind to a specific user
      called Authorized Peer. For each shared Kind data, its Resource owner
      stores a root item that initiates an Access Control List. Trust
      delegation to the Authorized Peer can include the right to further
      delegate the write permission, enabling a tree of trust delegations with
      the Resource Owner as trust anchor at its root.</t>

      <t>The Resource/Kind pair to be shared can be any RELOAD Kind that
      complies to the following specifications: <list style="hanging">
          <t hangText="Isolated Data Storage:">To prevent concurrent writing
          from race conditions, each data item stored within a Shared Resource
          SHALL be exclusively maintained by the RELOAD user who created it.
          Hence, Usages that allow the storage of Shared Resources are
          REQUIRED to use either the array or dictionary data model and apply
          additional mechanisms for isolating data as described in <xref
          target="subsec-mfisd"></xref>.</t>

          <t hangText="Access Control Policy:">To ensure write access to
          Shared Resource by Authorized Peers, each Usage MUST use the
          USER-CHAIN-ACL access policy as described in <xref
          target="subsec-aclacp"></xref>.</t>

          <t hangText="Resource Name Extension:">To enable Shared Resources to
          be stored using a variable resource name, this document defines an
          optional ResourceNameExtension structure. It contains the Resource
          Name of the Kind data to be stored and allows any receiver of a
          shared data to validate whether the Resource Name hashes to the
          Resource-ID. The ResourceNameExtension is made optional by
          configuration. The ResourceNameExtension field is only present in
          the Kind data structure when configured in the corresponding
          kind-block of the overlay configuration document (for more details
          see <xref target="subsec-ocde"></xref>). If the configuration allows
          variable resource names, a Kind using the USER-CHAIN-ACL policy MUST
          use the ResourceNameExtension as initial field within the Kind data
          structure definition. Otherwise the Kind data structure does not
          contain the ResourceNameExtension structure.</t>
        </list></t>

      <section anchor="subsec-mfisd"
               title="Mechanisms for Isolating Stored Data">
        <t>This section defines mechanisms to avoid race conditions while
        concurrently writing an array or dictionary of a Shared Resource.</t>

        <t>If a dictionary is used in the Shared Resource, the dictionary key
        MUST be the Node-ID of the certificate that will be used to sign the
        stored data. Thus data access is bound to the unique ID-holder.</t>

        <t>If the data model of the Shared Resource is an array, each
        Authorized Peer SHALL obtain its exclusive range of the array indices.
        The following algorithm will generate an array indexing scheme that
        avoids collisions. <list style="numbers">
            <t>Obtain the Node-ID of the certificate that will be used to sign
            the stored data</t>

            <t>Take the least significant 24 bits of that Node-ID</t>

            <t>Concatenate an 8 bit long short individual index value to those
            24 bit of the Node-ID</t>
          </list>The resulting 32 bits long integer MUST be used as the index
        for storing an array entry in a Shared Resource. The 8 bit individual
        index can be incremented individually for further array entries and
        allows for 256 distinct entries per Peer.</t>

        <t>The mechanism to create the array index is related to the
        pseudo-random algorithm to generate an SSRC identifier in RTP, see
        Section 8.1 in <xref target="RFC3550"></xref> for calculating the
        probability of a collision.</t>
      </section>
    </section>

    <section anchor="sec-acd" title="Access Control List Definition">
      <section anchor="subsec-al" title="Overview">
        <t>An Access Control List (ACL) is a (self-managed) shared resource
        that contains a list of AccessControlListItem structures as defined in
        <xref target="subsec-ds"></xref>. Each entry delegates write access
        for a specific Kind data to a single RELOAD user. An ACL enables the
        RELOAD user who is authorized to write a specific Resource-ID to
        delegate his exclusive write access to a specific Kind to further
        users of the same RELOAD overlay. Each Access Control List data
        structure therefore carries the information about who obtains write
        access, the Kind-ID of the Resource to be shared, and whether
        delegation includes write access to the ACL itself. The latter
        condition grants the right to delegate write access further for the
        Authorized Peer. Access Control Lists are stored at the same overlay
        location as the Shared Resource and use the RELOAD array data model.
        They are initially created by the Resource Owner.</t>

        <t><xref target="fig-access-list"></xref> shows an example of an
        Access Control List. We omit the res_name_ext field to simplify
        illustration. The array entry at index 0x123abc001 displays the
        initial creation of an ACL for a Shared Resource of Kind-ID 1234 at
        the same Resource-ID. It represents the root item of the trust
        delegation tree for this shared RELOAD Kind. The root entry MUST
        contain the username of the Resource owner in the "to_user" field and
        can only be written by the owner of the public key certificate
        associated with this Resource-ID. The allow_delegation (ad) flag for a
        root ACL item is set to 1 by default. The array index is generated by
        using the mechanism for isolating stored data as described in <xref
        target="subsec-mfisd"></xref>. Hence, the most significant 24 bits of
        the array index (0x123abc) are the least significant 24 bits of the
        Node-ID of the Resource Owner.</t>

        <t>The array item at index 0x123abc002 represents the first trust
        delegation to an Authorized Peer that is thus permitted to write to
        the Shared Resource of Kind-ID 1234. Additionally, the Authorized peer
        Alice is also granted (limited) write access to the ACL as indicated
        by the allow_delegation flag (ad) set to 1. This configuration
        authorizes Alice to store further trust delegations to the Shared
        Resource, i.e., add items to the ACL. On the contrary, index
        0x456def001 illustrates trust delegation for Kind-ID 1234, in which
        the Authorized Peer Bob is not allowed to grant access to further
        peers (ad = 0). Each Authorized Peer signs its ACL items by using its
        own signer identity along with its own private key. This allows other
        peers to validate the origin of an ACL item and makes ownership
        transparent.</t>

        <t>To manage Shared Resource access of multiple Kinds at a single
        location, the Resource Owner can create new ACL entries that refer to
        another Kind-ID as shown in array entry index 0x123abc003. Note that
        overwriting existing items in an Access Control List that reference a
        different Kind-ID revokes all trust delegations in the corresponding
        subtree (see <xref target="subsec-rwa"></xref>). Authorized Peers are
        only enabled to overwrite existing ACL item they own. The Resource
        Owner is allowed to overwrite any existing ACL item, but should be
        aware of its consequences.</t>

        <figure align="center" anchor="fig-access-list" suppress-title="false"
                title="Simplified example of an Access Control including entries for two different Kind-IDs and varying delegation (ad) configurations">
          <artwork align="center" xml:space="preserve"><![CDATA[
+------------------------------------------------------+
|                Access Control List                   |
+-----------+------------------------------+-----------+
|  #Index   |       Array Entries          | signed by |
+-----------+------------------------------+-----------+
| 123abc001 | to_user:Owner Kind:1234 ad:1 |   Owner   |
+-----------+------------------------------+-----------+
| 123abc002 | to_user:Alice Kind:1234 ad:1 |   Owner   |
+-----------+------------------------------+-----------+
| 123abc003 | to_user:Owner Kind:4321 ad:1 |   Owner   |
+-----------+------------------------------+-----------+
| 123abc004 | to_user:Carol Kind:4321 ad:0 |   Owner   |
+-----------+------------------------------+-----------+
|    ...    |           ...                |    ...    |
+-----------+------------------------------+-----------+
| 456def001 | to_user:Bob   Kind:1234 ad:0 |   Alice   |
+-----------+------------------------------+-----------+
|    ...    |           ...                |    ...    |
+-----------+------------------------------+-----------+
          ]]></artwork>
        </figure>

        <t>Implementations of ShaRe should be aware that the trust delegation
        in an Access Control List need not be loop free. Self-contained
        circular trust delegation from A to B and B to A are syntactically
        possible, even though not very meaningful.</t>
      </section>

      <section anchor="subsec-ds" title="Data Structure">
        <t>The Kind data structure for the Access Control List is defined as
        follows:</t>

        <figure align="center" suppress-title="true">
          <artwork align="left" xml:space="preserve"><![CDATA[

struct {
     /* res_name_ext is optional, see documentation */                  
     ResourceNameExtension  res_name_ext;
     opaque                 to_user<0..2^16-1>;
     KindId                 kind;
     Boolean                allow_delegation;
} AccessControlListItem;
          ]]></artwork>
        </figure>

        <t>The AccessControlListItem structure is composed of: <list
            style="hanging">
            <t hangText="res_name_ext:">This optional field contains the
            Resource Name of a ResourceNameExtension (see <xref
            target="subsec-rnes"></xref>) to be used by a Shared Resource with
            variable resource name. This name serves the storing peer for
            validating, whether a variable resources name matches one of the
            predefined naming pattern from the configuration document for this
            Kind. The presence of this field is bound to a variable resource
            name element in the corresponding kind-block of the configuration
            document whose "enable" attribute is set to true (see <xref
            target="subsec-ocde"></xref>). Otherwise, if the "enable"
            attribute is false, the res_name_ext field SHALL NOT be present in
            the Kind data structure.</t>

            <t hangText="to_user:">This field contains the username of the
            RELOAD peer that obtains write permission to the Shared
            Resource.</t>

            <t hangText="kind:">This field contains the Kind-ID of the Shared
            Resource.</t>

            <t hangText="allow_delegation:">If true, this Boolean flag
            indicates that the Authorized Peer in the 'to_user' field is
            allowed to add additional entries to the ACL for the specified
            Kind-ID.</t>
          </list></t>
      </section>
    </section>

    <section anchor="sec-vrne" title="Extension for Variable Resource Names">
      <section anchor="subsec-vrn-o" title="Overview">
        <t>In certain use cases such as conferencing (c.f., <xref
        target="I-D.ietf-p2psip-disco"></xref>) it is desirable to increase
        the flexibility of a peer in using Resource Names beyond those defined
        by the username or Node-ID fields in its certificate. For this
        purpose, this document presents the concept for variable Resources
        Names that enables providers of RELOAD instances to define relaxed
        naming schemes for overlay Resources.</t>

        <t>Each RELOAD node uses a certificate to identify itself using its
        user name (or Node-ID) while storing data under a specific
        Resource-ID. The specifications in this document scheme adhere to this
        paradigm, but enable a RELOAD peer to store values of Resource Names
        that are derived from the username in its certificate. This is done by
        using a Resource Name with a variable substring that still matches the
        user name in the certificate using a pattern defined in the overlay
        configuration document. Thus despite being variable, an allowable
        Resource Name remains tied to the Owner's certificate. A sample
        pattern might be formed as follows.</t>

        <figure align="center" suppress-title="true">
          <artwork align="left" xml:space="preserve"><![CDATA[ 
Example Pattern:
.*-conf-\$USER@\$DOMAIN
        ]]></artwork>
        </figure>

        <t>When defining the pattern, care must be taken to avoid conflicts
        arising from two usernames of witch one is a substring of the other.
        In such cases, the holder of the shorter name could threaten to block
        the resources of the longer-named peer by choosing the variable part
        of a Resource Name to contain the entire longer username. This problem
        can easily be mitigated by delimiting the variable part of the pattern
        from the username part by some fixed string, that by convention is not
        part of a username (e.g., the "-conf-" in the above Example).</t>
      </section>

      <section anchor="subsec-rnes" title="Data Structure">
        <t>This section defines the optional ResourceNameExtension structure
        for every Kind that uses the USER-CHAIN-ACL access control policy.</t>

        <figure align="center" suppress-title="true">
          <artwork align="left" xml:space="preserve"><![CDATA[
enum { pattern  (1),
(255)} ResourceNameType;

struct {
  ResourceNameType type; 
  uint16           length;
  select(type) {      
      case pattern:
        opaque resource_name<0..2^16-1>;

      /* Types can be extended */
  }
} ResourceNameExtension          
          ]]></artwork>
        </figure>

        <t>The content of the ResourceNameExtension consist of <list
            style="hanging">
            <t hangText="length:">This field contains the length of the
            remaining data structure. It is only used to allow for further
            extensions to this data structure.</t>
          </list> The content of the rest of the data structure depends of the
        ResourceNameType. Currently, the only defined type is "pattern".</t>

        <t>If the type is "pattern", then the following data structure
        contains an opaque <0..2^16-1> field containing the Resource
        Name of the Kind being stored. The type "pattern" further indicates
        that the Resource Name MUST match to one of the variable resource name
        pattern defined for this Kind in the configuration document.</t>

        <t>The ResourceNameType enum and the ResourceNameExtension structure
        can be extended by further Usages to define other naming schemes.</t>
      </section>

      <section anchor="subsec-ocde"
               title="Overlay Configuration Document Extension">
        <t>This section extends the overlay configuration document by defining
        new elements for patterns relating resource names to user names.
        Configurations in this overlay document MUST adhere in syntax and
        semantic of names as defined by the context of use. For example, AOR
        syntax restrictions apply when using P2PSIP<xref
        target="I-D.ietf-p2psip-sip"> </xref> , while a more general naming is
        feasible in plain RELOAD.</t>

        <t>The <variable-resource-names> element serves as a container
        for one or multiple <pattern> sub-elements. It is an additional
        parameter within the kind block and has a boolean "enable" attribute
        that indicates, if true, that the overlay provider allows variable
        resource names for this Kind. The default value of the "enable"
        attribute is "false". In the absence of a
        <variable-resource-names> element for a Kind using the
        USER-CHAIN-ACL access policy (see <xref
        target="subsec-aclacp"></xref>), implementors SHOULD assume this
        default value.</t>

        <t>A <pattern> element MUST be present if the "enabled"
        attribute of its parent element is set to true. Each <pattern>
        element defines a pattern for constructing extended resource names for
        a single Kind. It is of type xsd:string and interpreted as a regular
        expression according to "POSIX Extended Regular Expression" (see the
        specifications in <xref target="IEEE-Posix"></xref>). In this regular
        expression, $USER and $DOMAIN are used as variables for the
        corresponding parts of the string in the certificate user name field
        (with $USER preceding and $DOMAIN succeeding the '@'). Both variables
        MUST be present in any given pattern definition. If no pattern is
        defined for a Kind or the "enable" attribute is false, allowable
        Resource Names are restricted to the username of the signer for Shared
        Resource.</t>

        <t>The Relax NG Grammar for the Variable Resource Names Extension
        reads:</t>

        <figure align="left" anchor="fig-le" suppress-title="true">
          <artwork align="left" xml:space="preserve"><![CDATA[
<!-- VARIABLE RESOURCE URN SUB-NAMESPACE -->

namespace share = "urn:ietf:params:xml:ns:p2p:config-base:share"

<!-- VARIABLE RESOURCE NAMES ELEMENT -->

kind-parameter &= element share:variable-resource-names {

    attribute enable { xsd:boolean }

    <!-- PATTERN ELEMENT -->

    element pattern { xsd:string }*
}?
          ]]></artwork>
        </figure>
      </section>
    </section>

    <section anchor="sec-actsr" title="Access Control to Shared Resources">
      <section anchor="subsec-gwa" title="Granting Write Access">
        <t>Write access to a Kind that is intended to be shared with other
        RELOAD users can solely be issued by the Resource Owner. A Resource
        Owner can share RELOAD Kinds by using the following procedure. <list
            style="symbols">
            <t>The Resource Owner stores an ACL root item at the Resource-ID
            of the Shared Resource. The root item contains the resource name
            extension field (see <xref target="subsec-rnes"></xref>), the
            username of the Resource Owner and Kind-ID of the Shared Resource.
            The allow_delegation flag is set to 1. The index of array data
            structure MUST be generated as described in <xref
            target="subsec-mfisd"></xref></t>

            <t>Further ACL items for this Kind-ID stored by the Resource Owner
            will delegate write access to Authorized Peers. These ACL items
            contain the same resource name extension field, the username of
            the Authorized Peer and the Kind-Id of the Shared Resource.
            Optionally, the Resource Owner sets the "ad" to 1 (the default
            equals 0) to enable the Authorized Peer to further delegate write
            access. Each succeeding ACL item created by the Resource Owner can
            be stored in the numerical order of the array index starting with
            the index of the root item incremented by one.</t>
          </list></t>

        <t>An Authorized Peer with delegation allowance ("ad"=1) can extend
        the access to an existing Shared Resource as follows.<list
            style="symbols">
            <t>An Authorized Peer can store additional ACL items at the
            Resource-ID of the Shared Resource. These ACL items contain the
            resource name extension field, the username of the newly
            Authorized Peer, and the Kind-Id of the Shared Resource.
            Optionally, the "ad" flag is set to 1 for allowing the Authorized
            Peer to further delegate write access. The array index MUST be
            generated as described in <xref target="subsec-mfisd"></xref>.
            Each succeeding ACL item can be stored in the numerical order of
            the array index.</t>
          </list></t>

        <t>A store request by an Authorized Peer that attempts to overwrite
        any ACL item signed by another Peer is unauthorized and causes an
        Error_Forbidden response from the Storing Peer. Such access conflicts
        could be caused by an array index collision. However, the probability
        of a collision of two or more identical array indices will be
        negligibly low using the mechanism for isolating stored data (see
        <xref target="subsec-mfisd"></xref>)</t>
      </section>

      <section anchor="subsec-rwa" title="Revoking Write Access">
        <t>Write permissions are revoked by storing a non-existent value <xref
        target="RFC6940"></xref> at the corresponding item of the
        Access Control List. Revoking a permission automatically invalidates
        all delegations performed by that user including all subsequent
        delegations. This allows to invalidate entire subtrees of the
        delegations tree with only a single operation. Overwriting the root
        item with a non-existent value of an Access List invalidates the
        entire delegations tree.</t>

        <t>An existing ACL item MUST only be overwritten by the user who
        initially stored the corresponding entry, or by the Resource Owner
        that is allowed to overwrite all ACL items for revoking write
        access.</t>
      </section>

      <section anchor="subsec-vasr"
               title="Validating Write Access through an ACL">
        <t>Access Control Lists are used to transparently validate
        authorization of peers for writing a data value at a Shared Resource.
        Thereby it is assumed that the validating peer is in possession of the
        complete and most recent ACL for a specific Resource/Kind pair. The
        corresponding procedure consists of recursively traversing the trust
        delegation tree and proceeds as follows. <list style="numbers">
            <t>Obtain the username of the certificate used for signing the
            data stored at the Shared Resource.</t>

            <t>Validate that an item of the corresponding ACL (i.e., for this
            Resource/Kind pair) contains a "to_user" field whose value equals
            the username obtained in step 1. If the Shared Resource under
            examination is an Access Control List Kind, further validate if
            the "ad" flag is set to 1.</t>

            <t>Select the username of the certificate that was used to sign
            the ACL item obtained in step 2.</t>

            <t>Validate that an item of the corresponding ACL contains a
            "to_user" field whose value equals the username obtained in step
            3. Additionally validate that the "ad" flag is set to 1.</t>

            <t>Repeat steps 3 and 4 until the "to_user" value is equal to the
            username of the signer of the previously selected ACL item. This
            final ACL item is expected to be the root item of this ACL which
            SHALL be further validated by verifying that the root item was
            signed by the owner of the ACL Resource.</t>
          </list></t>

        <t>The trust delegation chain is valid if and only if all verification
        steps succeed. In this case, the creator of the data value of the
        Shared Resource is an Authorized Peer.</t>

        <t>Note that the ACL validation procedure can be omitted whenever the
        creator of data at a Shared Resource is the Resource Owner itself. The
        latter can be verified by its public key certificate as defined in
        <xref target="subsec-aclacp"></xref>.</t>
      </section>

      <section anchor="subsec-oosp" title="Operations of Storing Peers">
        <t>Storing peers at which Shared Resource and ACL are physically
        stored, are responsible for controlling storage attempts to a Shared
        Resource and its corresponding Access Control List. To assert the
        USER-CHAIN-ACL access policy (see <xref
        target="subsec-aclacp"></xref>), a storing peer MUST perform the
        access validation procedure described in <xref
        target="subsec-vasr"></xref> on any incoming store request using the
        most recent Access Control List for every Kind that uses the
        USER-CHAIN-ACL policy. It SHALL further ensure that only the Resource
        Owner stores new ACL root items for Shared Resources.</t>
      </section>

      <section anchor="ooap" title="Operations of Accessing Peers">
        <t>Accessing peers, i.e., peers that fetch a Shared Resource, MAY
        validate that the originator of a Shared Resource was authorized to
        store data at this Resource-ID by processing the corresponding ACL. To
        enable an accessing peer to perform the access validation procedure
        described in <xref target="subsec-vasr"></xref>, it first needs to
        obtain the most recent Access Control List in the following way. <list
            style="numbers">
            <t>Send a Stat request to the Resource-ID of the Shared Resource
            to obtain all array indexes of stored ACL Kinds.</t>

            <t>Fetch all indexes of existing ACL items at this Resource-ID by
            using the array ranges retrieved in the Stat request answer.</t>
          </list></t>

        <t>Peers can cache previously fetched Access Control Lists up to the
        maximum lifetime of an individual item. Since stored values could have
        been modified or invalidated prior to their expiration, an accessing
        peer SHOULD use a Stat request to check for updates prior to using the
        data cache.</t>
      </section>

      <section anchor="subsec-aclacp" title="USER-CHAIN-ACL Access Policy">
        <t>This document specifies an additional access control policy to the
        RELOAD base draft <xref target="RFC6940"></xref>. The
        USER-CHAIN-ACL policy allows Authorized Peers to write a Shared
        Resource, even though they do not own the corresponding certificate.
        Additionally, the USER-CHAIN-ACL allows the storage of Kinds with a
        variable resource name that are following one of the specified naming
        pattern. Hence, on an inbound store request on a Kind that uses the
        USER-CHAIN-ACL access policy, the following rules MUST be applied:</t>

        <t>In the USER-CHAIN-ACL policy, a given value MUST be written or
        overwritten, if either one of USER-MATCH or USER-NODE-MATCH (mandatory
        if the data model is dictionary) access policies of the base document
        <xref target="RFC6940"></xref> applies.</t>

        <t>Otherwise, the value MUST be written if the certificate of the
        signer contains a username that matches to one of the variable
        resource name pattern (c.f. <xref target="sec-vrne"></xref>) specified
        in the configuration document and, additionally, the hashed Resource
        Name matches the Resource-ID. The Resource Name of the Kind to be
        stored MUST be taken from the mandatory ResourceNameExtension field in
        the corresponding Kind data structure.</t>

        <t>Otherwise, the value MUST be written if the ACL validation
        procedure described in <xref target="subsec-vasr"></xref> has been
        successfully applied.</t>
      </section>
    </section>

    <section anchor="sec-akd" title="ACCESS-CONTROL-LIST Kind Definition">
      <t>This section defines the ACCESS-CONTROL-LIST Kind previously
      described in this document. <list style="hanging">
          <t hangText="Name:">ACCESS-CONTROL-LIST</t>

          <t hangText="Kind IDs:">The Resource Name for ACCESS-CONTROL-LIST
          Kind-ID is the Resource Name of the Kind that will be shared by
          using the ACCESS-CONTROL-LIST Kind.</t>

          <t hangText="Data Model:">The data model for the ACCESS-CONTROL-LIST
          Kind-ID is array. The array indexes are formed by using the
          mechanism for isolated stored data as described in <xref
          target="subsec-mfisd"></xref></t>

          <t hangText="Access Control:">USER-CHAIN-ACL (see <xref
          target="subsec-aclacp"></xref>)</t>
        </list></t>
    </section>

    <section title="Security Considerations">
      <t>In this section we discuss security issues that are relevant to the
      usage of shared resources in RELOAD.</t>

      <section title="Resource Exhaustion">
        <t>Joining a RELOAD overlay inherently poses a certain resource load
        on a peer, because it has to store and forward data for other peers.
        In common RELOAD semantics, each Resource ID and thus position in the
        overlay may only be written by a limited set of peers - often even
        only a single peer, which limits this burden. In the case of Shared
        Resources, a single resource may be written by multiple peers, who may
        even write an arbitrary number of entries (e.g., delegations in the
        ACL). This leads to an enhanced use of resources at individual overlay
        nodes. The problem of resource exhaustion can easily be mitigated for
        Usages based on the ShaRe-Usage by imposing restrictions on size,
        i.e., <max-size> element for a certain Kind in the configuration
        document.</t>
      </section>

      <section title="Malicious or Misbehaving Storing Peer">
        <t>The RELOAD overlay is designed to operate despite the presence of a
        small set of misbehaving peers. This is not different for Shared
        Resources since a small set of malicious peers does not disrupt the
        functionality of the overlay in general, but may have implications for
        the peers needing to store or access information at the specific
        locations in the ID space controlled by a malicious peer. A storing
        peer could withhold stored data which results in a denial of service
        to the group using the specific resource. But it could not return
        forged data, since the validity of any stored data can be
        independently verified using the attached signatures.</t>
      </section>

      <section title="Privacy Issues">
        <t>All data stored in the Shared Resource is publicly readable, thus
        applications requiring privacy need to encrypt the data. The ACL needs
        to be stored unencrypted, thus the list members of a group using a
        Shared Resource will always be publicly visible.</t>
      </section>
    </section>

    <section title="IANA Considerations">
      <section title="Access Control Policy">
        <t>IANA shall register the following entry in the "RELOAD Access
        Control Policies" Registry (cf., <xref
        target="RFC6940"></xref>) to represent the USER-CHAIN-ACL
        Access Control Policy, as described in <xref
        target="subsec-aclacp"></xref>. [NOTE TO IANA/RFC-EDITOR: Please
        replace RFC-AAAA with the RFC number for this specification in the
        following list.]</t>

        <figure>
          <artwork align="center"><![CDATA[ 
+-------------------+----------+
| Kind              |      RFC |
+-------------------+----------+
| USER-CHAIN-ACL    | RFC-AAAA |
+-------------------+----------+
	]]></artwork>
        </figure>
      </section>

      <section title="Data Kind-ID">
        <t>IANA shall register the following code point in the "RELOAD Data
        Kind-ID" Registry (cf., <xref target="RFC6940"></xref>)
        to represent the ShaRe ACCESS-CONTROL-LIST kind, as described in <xref
        target="sec-akd"></xref>. [NOTE TO IANA/RFC-EDITOR: Please replace
        RFC-AAAA with the RFC number for this specification in the following
        list.]</t>

        <figure>
          <artwork align="center"><![CDATA[ 
+----------------------+------------+----------+
| Kind                 |    Kind-ID |      RFC |
+----------------------+------------+----------+
| ACCESS-CONTROL-LIST  |         17 | RFC-AAAA |
+----------------------+------------+----------+
	]]></artwork>
        </figure>
      </section>

      <section title="XML Name Space Registration">
        <t>This document registers the following URI for the config XML
        namespace in the IETF XML registry defined in <xref
        target="RFC3688"></xref></t>

        <t><list style="hanging">
            <t
            hangText="URI:">urn:ietf:params:xml:ns:p2p:config-base:share</t>

            <t hangText="Registrant Contact:">The IESG</t>

            <t hangText="XML:">N/A, the requested URI is an XML namespace</t>
          </list></t>
      </section>
    </section>

    <section title="Acknowledgments">
      <t>This work was stimulated by fruitful discussions in the P2PSIP
      working group and SAM research group. We would like to thank all active
      members for constructive thoughts and feedback. In particular, the
      authors would like to thank (in alphabetical order) Lothar Grimm, Cullen
      Jennings, Peter Musgrave, Joerg Ott, Marc Petit-Huguenin, Peter
      Pogrzeba, and Jan Seedorf. This work was partly funded by the German
      Federal Ministry of Education and Research, projects HAMcast, Mindstone,
      and SAFEST.</t>
    </section>
  </middle>

  <back>
    <references title="Normative References">
      <?rfc include="reference.RFC.6940"?>

      <?rfc include="reference.RFC.2119"?>

      <?rfc include="reference.RFC.3688"?>

      <reference anchor="IEEE-Posix">
        <front>
          <title>IEEE Standard for Information Technology - Portable Operating
          System Interface (POSIX) - Part 2: Shell and Utilities (Vol.
          1)</title>

          <author fullname="The Institute of Electrical and Electronics Engineers"></author>

          <date month="January" year="1993" />
        </front>

        <seriesInfo name="IEEE Std" value="1003.2-1992, ISBN 1-55937-255-9" />
      </reference>
    </references>

    <references title="Informative References">
      <?rfc include="reference.I-D.ietf-p2psip-concepts"?>

      <?rfc include="reference.I-D.ietf-p2psip-sip"?>

      <?rfc include="reference.I-D.ietf-p2psip-disco"?>

      <?rfc include="reference.RFC.3550"?>
    </references>

    <section title="Change Log">
     <t>The following changes have been made from version
      draft-ietf-p2psio-share-02:<list style="numbers">

          <t>Updated References</t>
        </list></t>    
      <t>The following changes have been made from version
      draft-ietf-p2psio-share-01:<list style="numbers">
          <t>Added IANA registration for namespace</t>

          <t>Editorial improvements</t>

          <t>Updated References</t>
        </list></t>

      <t>The following changes have been made from version
      draft-ietf-p2psio-share-00:<list style="numbers">
          <t>Clarified use of identities in ACLs</t>

          <t>Specified use of Posix regular expressions in configuration
          document</t>

          <t>Added IANA considerations</t>

          <t>Editorial improvements</t>

          <t>Updated References</t>
        </list></t>

      <t>The following changes have been made from version
      draft-knauf-p2psip-share-02: <list style="numbers">
          <t>Editorial improvements</t>

          <t>Updated References</t>
        </list></t>

      <t>The following changes have been made from version
      draft-knauf-p2psip-share-01: <list style="numbers">
          <t>Simplified the ACL data structure in response to WG feedback</t>

          <t>Added ResourceNameExtension data structure to simplify the use of
          variable resource names</t>

          <t>Restructured document</t>

          <t>Many editorial improvements</t>
        </list></t>

      <t>The following changes have been made from version
      draft-knauf-p2psip-share-00: <list style="numbers">
          <t>Integrated the USER-PATTERN-MATCH access policy into
          USER-CHAIN-ACL</t>

          <t>Access Control List Kind uses USER-CHAIN-ACL exclusively</t>

          <t>Resources to be shared use USER-CHAIN-ACL exclusively</t>

          <t>More precise specification of mandatory User_name and
          Resource_name fields for Shared Resources</t>

          <t>Added mechanism for isolating stored data to prevent race
          conditions while concurrent storing</t>

          <t>XML Extension for variable resource names uses its own
          namespace</t>

          <t>Many editorial improvements</t>
        </list></t>
    </section>
  </back>
</rfc>

PAFTECH AB 2003-20262026-04-23 20:38:20