One document matched: draft-ietf-zeroconf-reqts-01.txt
Differences from draft-ietf-zeroconf-reqts-00.txt
ZeroConf WG M. Hattig
Internet Engineering Task Force Editor
INTERNET DRAFT Intel Corp.
Expires May 2000 November 24, 1999
ZeroConf Requirements
draft-ietf-zeroconf-reqts-01.txt
Status of This Memo
This document is a submission by the ZeroConf Working Group of the
Internet Engineering Task Force (IETF). Comments should be
submitted to the zeroconf@merit.edu mailing list.
Distribution of this memo is unlimited.
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of [RFC 2026]. Internet-Drafts are
working documents of the Internet Engineering Task Force (IETF),
its areas, and its working groups. Note that other groups may
also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other
documents at any time. It is inappropriate to use Internet-Drafts
as reference material or to cite them other than as "work in
progress."
The list of current Internet-Drafts can be accessed at:
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at:
http://www.ietf.org/shadow.html.
Abstract
Zero Configuration (ZeroConf) Networks are a particular class of
TCP/IP networks that may be established in the home, in small
offices or even on an impromptu basis. ZeroConf Networks do not
have and should not be expected to have user configurable network
infrastructure such as DHCP servers, DNS and other administered
services. This is because typical ZeroConf network users neither
have the skill nor desire to configure, administer, or manage a
network.
This document presents ZeroConf protocol requirements for four
areas: IP host configuration, domain name to IP address
resolution, IP multicast address allocation, and service
discovery. Security issues and the transitions between a ZeroConf
protocol and a non-ZeroConf protocol are also discussed within the
context of these protocol requirements.
Hattig [Page 1]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
Table of Contents
1 Overview....................................................2
2 Introduction................................................3
2.1 Reading This Document.....................................3
2.2 ZeroConf Protocols........................................4
2.3 ZeroConf Networks.........................................7
3 Scenarios..................................................13
3.1 IP Host Configuration....................................13
3.2 Domain Name to IP Address Resolution.....................15
3.3 IP Multicast Address Allocation..........................16
3.4 Service Discovery........................................16
3.5 Additional Scenarios.....................................16
4 Security Requirements......................................17
4.1 IP Host Configuration....................................17
4.2 Domain name to IP address resolution.....................17
4.3 Multicast Address allocation.............................17
4.4 Service Discovery........................................18
5 Additional Considerations..................................18
5.1 IANA Considerations......................................18
5.2 Internationalization Considerations......................18
5.3 Security Considerations..................................18
6 Full Copyright Statement...................................18
7 Editor.....................................................19
8 References.................................................19
1 Overview
Zero Configuration (ZeroConf) Networks are a particular class of
TCP/IP networks. These networks may be established in a home, in a
small office or even on an impromptu basis. ZeroConf networks
typically do not have and should not be expected to have user
configurable network infrastructure such as DHCP servers, DNS and
other administered services. This is because typical ZeroConf
network users neither have the skill nor desire to configure,
administer, or manage a network.
This document presents ZeroConf protocol requirements for four
areas: IP host configuration, domain name to IP address
resolution, IP multicast address allocation, and service
discovery. Security issues and the transitions between a ZeroConf
protocol and a non-ZeroConf protocol are also discussed within the
context of these protocol requirements.
This ZeroConf requirements document is a companion to a ZeroConf
profile document. This requirements document lists requirements
for protocols. The profile document relates the protocol
requirements to actual protocols. In some cases, a protocol may
meet all requirements to become one of the required protocols for
ZeroConf networks. When protocols are insufficient or multiple
Hattig [Page 2]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
protocols are competing, the profile document states the
requirements of the protocol and the relationship of the
requirements to the existing protocols.
The major sections to this requirements document are the
Introduction, Scenarios, and Security. The introduction provides
the background information to have a meaningful scenarios
discussion. The scenarios describe a set of actions then the
requirements from protocols to satisfy those actions. The
security section re-examines the scenarios with security
considerations.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL"
in this document are to be interpreted as described in [RFC
2119].
2 Introduction
This introduction presents how to best read this document and
provides the restrictions, definitions and assumptions for the
remainder of the document.
2.1 Reading This Document
The major sections of the document are this Introduction,
Scenarios, and Security.
This Introduction provides the necessary information to have a
concise scenario discussions. This includes reference information,
definitions, restriction, and assumptions. All readers should read
the entire introduction.
The Scenarios Section lists specific scenarios. Each scenario
results in protocol requirements. Scenarios are chosen to generate
unique requirements. Each scenario has an overview, key points,
and protocol requirements.
The Security section lists security issues and requirements that
relate to the scenarios.
Because this document deals with a wide range of networking
topics, many sections are divided by topic. The division allows
readers focus on particular interests. The topics are:
- IP host configuration,
- domain name to IP address resolution,
- IP multicast address allocation, and
- service discovery.
Hattig [Page 3]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
The below references follow this division with additions of
security and general knowledge references. Note that some working
groups are listed because they specify protocols that impact
ZeroConf protocols.
IP host configuration:
- [IPv4Auto] Ipv4 Auto-Configuration ID
- [RFC 1918] RFC 1918 Private Addresses
- [RFC 2131] RFC 2131 DHCP
- [RFC 2132] RFC 2132 DHCP Options
- [RFC 2462] IPv6 Auto-Configuration
- [RFC 2461] IPv6 Neighbor Discovery
- [IPv6 WG] Next Generation (Ipv6) WG
- [DHC WG] Dynamic Host Configuration WG
Domain name to IP address resolution:
- [Mcast DNS] Multicast DNS
- [RFC 1001] NETBIOS: CONCEPTS AND METHODS
- [RFC 1002] NETBIOS: DETAILED SPECIFICATIONS
- [RFC 1034] RFC 1034 DNS
- [DNS WG] DNS Update WG
Multicast address allocation:
- [MADCAP] Multicast Address Dynamic Client Alloc Protocol ID
- [RFC 2365] RFC 2365, Administratively Scoped Multicast Address
- [MALLOC WG] Multicast Address Allocation WG
Service discovery:
- [SSDP] Simple Service Discovery Protocol ID
- [RFC 2608] RFC 2608 Service Location Protcol v2
- [RFC 2609] RFC 2609 SLP Schemes
Security:
- [RFC 2316] RFC 2316, IAB Security Architecture Workshop
- [RFC 2401] RFC 2401, Security Architecture for IP
- [RFC 2411] RFC 2411, IP Security Document Roadmap
- [RFC 2504] RFC 2504, User's Security Handbook
General knowledge:
- [STD3] RFC 1122 Requirements for Internet Hosts - Comm Layers
- [STD4] RFC 1123 Requirements for Internet Hosts - App Layers
- [RFC 1458] RFC 1458 Requirements for Multicast Protocols
- [RFC 1812] RFC 1812 Requirements for Internet Gateways
All readers should be familiar with the general knowledge
references.
2.2 ZeroConf Protocols
Hattig [Page 4]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
This section defines "ZeroConf protocol". Then, the assumptions
and restrictions of protocols are discussed. The assumptions and
restrictions are divided by networking topic.
2.2.1 Definition of ZeroConf Protocol
A ZeroConf protocol requires no user configuration and does not
rely on the existence of a centralized server.
A non-ZeroConf protocol requires user configuration or relies on a
centralized server.
A ZeroConf protocol must easily transition in three ways:
1. from a ZeroConf protocol to a non-ZeroConf protocol,
2. from a non-ZeroConf protocol to a ZeroConf protocol, and
3. from a ZeroConf protocol back to a ZeroConf protocol (possibly
with new values).
The ZeroConf to non-ZeroConf transition occurs when either a
device moves to a different network or when a server becomes
accessible on the network. For example, if a DHCP server gets
added to a network, then [IPv4Auto] is no longer be needed.
The non-ZeroConf to ZeroConf transition occurs when either a
device moves to a different network or when a server is no longer
accessible. For example, if a DHCP server is no longer on the
network so IP host must configure with [IPv4Auto].
The third transition occurs when a device moves from one ZeroConf
network to another ZeroConf network or when the ZeroConf network
topology changes significantly. For example a bridge is installed
between two existing ZeroConf networks. This is more like
"restarting" the ZeroConf protocol than transitioning.
Ideally these transitions occur due to some active trigger. When
there is no active trigger, a periodic timer should passively
allow for the transition to occur.
DHCP and [IPv4Auto] simply provide a clear illustrative example;
these protocols are in no way required by this document.
A ZeroConf protocol in one area may coexist with a non-ZeroConf
protocol in another area. To illustrate this point, suppose there
are standard ZeroConf and non-ZeroConf protocols for IP host
configuration and domain name to IP address resolution (two of the
four Areas).
For IP host configuration, the ZeroConf protocol is "protocol-A."
The non-ZeroConf protocol is "protocol-B", supported by a fully
conformant "protocol-B" server.
Hattig [Page 5]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
For domain name to IP address resolution, the ZeroConf protocol is
"protocol-C". The non-ZeroConf protocol is "protocol-D" supported
by a fully conformant "protocol-D" server.
Within a single network, the non-ZeroConf protocol-B (with its
server) may co-exist with the ZeroConf protocol-C.
2.2.2 IP Host Configuration
Of the four areas, IP host configuration is the most
straightforward. IP host configuration is complete when there is a
known IP address, netmask, and default route for an interface on
an IP host. DHCP is the most prevalent non-ZeroConf solution
deployed today.
Network topologies greatly affect IP host configuration. While
hosts on a single IP network do not need a netmask or default
route to communicate, hosts on different IP networks do.
2.2.3 Domain name to IP address resolution
Domain names within the ZeroConf network must be resolved to IP
addresses. This enables one of the most basic of TCP/IP networking
paradigms of applications only being aware of host names and not
IP addresses.
Domain name to IP address resolution is accomplished in many
networks with DNS; therefore, it is highly likely that DNS will
play a key role in this area.
ZeroConf protocols must allow resolution of fully qualified domain
names as well as non-fully qualified domain names.
2.2.4 IP Multicast Address Allocation
[MADCAP] defines a sever-based allocation of IP multicast
addresses. Much like DHCP and DNS servers, [MADCAP] servers will
likely play a key role in the IP multicast address allocation
Area.
[EDITOR'S NOTE: Help wanted. There has not been a lot of
discussion on IP multicast address allocation. ]
2.2.5 Service Discovery
While IP Host configuration is the most straightforward, service
discovery is the least. The leading protocols in this Area are
SLPv2 [RFC 2608] and [SSDP].
Hattig [Page 6]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
[EDITOR'S NOTE: HELP!!!! There has been lots of discussion on the
list, but before I'm able to write something useful we need some
high-level discussion.
a) What are the major components of service discovery?
b) Definition of a service
c) Is service discover conclusive?
d) What kinds of services does ZeroConfig network want to
discover? or What are the service we are talking about?
e) What is the goal of service discovery?
f) What is the position of service discovery protocol in network?
g) Bootstrapping protocol or not?
h) How does a service discovery protocol support both simple and
complex devices in a ZeroConfig network? ]
2.3 ZeroConf Networks
A ZeroConf network is a network that at some point in time has one
or more ZeroConf protocols. By this definition, almost all
networks are ZeroConf networks. This definition is intentionally
broad because this document does not intend to mandate some
networks to be ZeroConf or exclude other networks from using
ZeroConf protocols. The sole intention of using the term "ZeroConf
network" is to focus the discussion within this document.
Generally speaking, the Internet and corporate LANs are non-
ZeroConf networks because they have many non-ZeroConf protocols.
Also, generally speaking, ZeroConf networks are grouped by the
topologies shown below.
This section describes the existing Internet network model, the
ZeroConf topologies, and a summary of the key points.
2.3.1 Existing Internet Model
All networks in this document follow the Internet Model as
described in RFC 1812. Specifically, networks consist of bridges,
routers, hosts, link layer networks, and IP networks to form
internets. [STD 3] and [STD 4] define IP host requirements.
A summary of the terms from [RFC 1812] that apply to this document
are:
- Bridges: a device that routes link layer packets (e.g. Ethernet
packets) between link layer networks (e.g. Ethernet) based on
the destination link layer addresses (e.g. 48-bit Ethernet
address) of a packet.
- Routers: a devices that routes IP packets between IP networks
based on the destination IP address of a packet.
- IP network: a network that consists of hosts with interfaces
that share the same network portion of the IP address. A single
Hattig [Page 7]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
IP network may physically consist of several link layer
networks connected by a bridge, but it is one logical IP
network; the hosts remain unaware of the bridge or multiple
link layer networks.
- internet: a network that consists of multiple IP networks
connected by routers.
2.3.2 Isolated Single IP Network
In an isolated single IP network topology, hosts simply connect
directly to each other with no routers. Also, there is no
connectivity to non-ZeroConf networks. Enabling these types of
simple networks is one of the primary motivations behind this
document.
The two primary instances of single IP-network topologies are
shown in Figure 1 and Figure 2.
*****************************************************
* ZeroConf Network *
* *
* ------ crossover cable ------- *
* | | *
* | | *
* +------+ +------+ *
* | Host | | Host | *
* +------+ +------+ *
* *
*****************************************************
Figure 1. Impromptu network
The ZeroConf network in Figure 1 has two hosts connected through a
crossover cable. A crossover cable between two hosts is one of the
most common impromptu ZeroConf networks. Infrared or other point-
to-point wireless technologies are other examples.
*****************************************************
* ZeroConf Network *
* *
* -------[ HUB ]------- *
* | | | *
* | | | *
* +------+ +------+ +------+ *
* | Host | | Host | | Host | *
* +------+ +------+ +------+ *
* *
*****************************************************
Figure 2. Fixed location network
Hattig [Page 8]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
The Figure 2 ZeroConf network has a small number of hosts
connected through a hub. A hub between hosts is the most common
fixed-location ZeroConf network.
Only an IP address and netmask is needed for an IP host to
communicate with other hosts on these networks. If the IP address
is a link-local (169.254/16) address, the netmask is not needed.
2.3.3 Single IP Network with a Gateway
In a topology with a single IP network and a gateway, the gateway
is a specialized router. It resides between the ZeroConf and non-
ZeroConf networks. The single IP network within the ZeroConf
network connects directly to the gateway.
The gateway is specialized because it restricts packets that pass
between the ZeroConf and non-ZeroConf networks to ensure autonomy
of the ZeroConf network and to avoid many security problems. For
the remainder of this document the term gateway has this meaning.
Figure 3 shows the single IP network with a gateway topology.
***************************
* *
* non-ZeroConf *
* Network *
* *
***************************
|
|
|
+----------------+
**********************| Gateway |*************************
* ZeroConf Network +----------------+ *
* | *
* | *
* | IP Network *
* ------------------------|----------------------------- *
* | | | | | *
* | | | | | *
* | | | | | *
* +------+ +------+ +------+ +------+ +------+ *
* | Host | | Host | | Host | | Host | | Host | *
* +------+ +------+ +------+ +------+ +------+ *
* *
*****************************************************************
Figure 3. Single IP Network with gateway Topology
Hattig [Page 9]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
Examples of this topology include a typical small business network
with a single gateway and a single Ethernet segment; a home
network with a single gateway and a single Home Phonewire Network
Alliance (HomePNA) link connecting a few PCs; and an Internet cafe
where people with 802.11 equipped laptops roam into the cafe,
lease some Internet connection time, then start surfing the
Internet while sipping their mocha.
The key points to this topology are that no default route is
needed for communication within the ZeroConf network; the netmask
and default route allow hosts to easily communicate outside the
ZeroConf network through the gateway; and IP broadcast packets can
reach all hosts and can be used to query for servers.
2.3.4 Star Topology
Star topologies center around a gateway. A gateway is a router
that resides between the ZeroConf and non-ZeroConf networks.
Multiple link layer networks that resides in the ZeroConf network
are directly connected to the gateway.
In addition to the above definition of a gateway, the gateway in a
star topology provides connectivity between all IP networks within
the ZeroConf network.
Figure 4 shows the general form of this topology.
***************************
* *
* Non-ZeroConf *
* Network *
* *
***************************
|
|
|
+----------------+
**********************| Gateway |*************************
* ZeroConf Network +----------------+ *
* | | | *
* | | | *
* | | | *
* | | | *
* IP network A | | | IP network B *
* ------------------| | |---------------------- *
* | | | | | *
* | | | IP network C | | *
* | | | | | *
* +------+ +------+ +------+ +------+ +------+ *
* | Host | | Host | | Host | | Host | | Host | *
Hattig [Page 10]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
* +------+ +------+ +------+ +------+ +------+ *
* *
*****************************************************************
Figure 4. Generic Star Topology
The primary example of this topology is a future home network with
many link layers such as HomePNA, HomeRF, IEEE 802.11, and IEEE
1394-1995. Most agree that home networks will be composed of many
different link layers that meet specific needs. These networks
either require no new wires to be installed or provide some
special function such as the ability to roam or to carry high-
quality video streams.
This topology requires all hosts to be configured with IP address,
netmask, and default route to communicate within the ZeroConf
network or outside the ZeroConf network. IP multicast must be used
to reach all hosts in the ZeroConf network (or to query for
servers) and the gateway must limit that IP multicast traffic from
leaving the ZeroConf network.
2.3.5 Ad-hoc Topology
Ad-hoc topologies have multiple gateways and/or multiple routers.
As with other topologies, gateways in an ad-hoc topology reside
between the ZeroConf network and the non-ZeroConf network. The
gateways ensure autonomy of the ZeroConf network by restricting
packets between the ZeroConf and non-ZeroConf networks. Routers
reside somewhere within the ZeroConf network and connect multiple
IP networks.
Figure 5 shows an instance of an ad-hoc network.
***************************
* *
* Internet *
* *
***************************
|
|ADSL
|
+----------------+
**********************| Gateway |*************************
* ZeroConf Network +----------------+ *
* | | *
* | | *
* IEEE 1394-1995 +--------+ | | HomePNA *
* -----------| Router |---| |-------------------- *
* | | +--------+ | | | *
* | | | HomeRF | | *
* | | | | | *
Hattig [Page 11]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
* +------+ +------+ +------+ +------+ +------+ *
* | Host | | Host | | Host | | Host | | Host | *
* +------+ +------+ +------+ +------+ +------+ *
* *
*****************************************************************
Figure 5. Home Network
Figure 5 shows a future home network. Such networks will come
about through users installing follow-on networks in their homes
over time without a long-term plan. Ad-hoc networking is the
expected long-term deployment pattern of many home networks.
This topology requires all hosts to be configured with IP address,
netmask, and default route to communicate within the ZeroConf
network or outside the ZeroConf network. IP multicast must be used
to reach all hosts in the ZeroConf network (or to query for
servers) and the gateway must limit that IP multicast traffic from
leaving the ZeroConf network. In addition, router-to-router
protocols may be required.
This document does not consider router-to-route ZeroConf
protocols; only ZeroConf protocols between hosts. In some limited
cases, ZeroConf protocols may require interaction between hosts
and routers.
[EDITOR'S NOTE: We need to discuss this a little more on the list.
We're getting close.]
2.3.6 Summary
The purpose of showing topologies is to restrict and focus the
discussion in this document. The purpose is not to mandate some
networks as ZeroConf and others as non-ZeroConf.
The gateway is a specialized router. It restricts packets that
pass between the ZeroConf and non-ZeroConf networks to ensure
autonomy of the ZeroConf network and to avoid many security
problems.
All ZeroConf protocols MUST operate in single IP networks and star
topologies. ZeroConf protocols SHOULD operate in ad-hoc networks.
However, router-to-router communication in such networks is
outside the scope of this document.
As topologies increase in complexity, the assumptions increase in
complexity. For example, hosts in an isolated single IP network
topology can use link-local addresses without configuring a
netmask or default route. Alternately, hosts in ad-hoc topologies
must use a netmask and a default route.
Hattig [Page 12]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
3 Scenarios
This section lists ZeroConf scenarios. This section does not
discuss specific protocols. Instead this section lists scenarios
that lead to requirements for protocols.
Each scenario begins with an explanation or overview. Then, the
key points of the scenario are identified along with requirements.
To consistently provide this information, each scenario has the
following outline:
- Overview
- Key Points
- Protocol Requirements
To provide further focus, the scenarios are grouped by networking
topic.
[EDITOR'S NOTE: These scenarios have not been agreed upon by the
ZeroConf WG, thus they will likely change. For this reason, only
the limited information is provided for each scenario in the
current draft.]
3.1 IP Host Configuration
3.1.1 Single IP Network Communication
3.1.1.1 Overview
Hosts on a single IP network within the ZeroConf network
communicate to each other.
3.1.1.2 Key Points
This scenario applies to single IP network topologies (isolated or
with a gateway). As stated, if link-local IP address is used, then
only the IP address must be configured. Otherwise, an IP address
and netmask must be configured.
3.1.1.3 Protocol Requirements
- IP hosts MUST configure an IP address.
- IP hosts MUST configure a netmask (if the IP address is not
link-local).
- The host number of an IP address MUST be unique within a single
IP network.
- The network number of an IP address MUST equal the network
number of other IP addresses within a single IP network (if the
IP address is not link-local).
Hattig [Page 13]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
3.1.2 Multiple IP Network Communication
3.1.2.1 Overview
Hosts on multiple IP networks within a ZeroConf network
communicate to each other.
3.1.2.2 Key Points
This scenario is important for star topologies and ad-hoc
topologies.
3.1.2.3 Protocol Requirements
- IP hosts MUST configure an IP address.
- IP hosts MUST configure a netmask.
- IP hosts MUST configure a default route.
- The host number of an IP address MUST be unique within a single
IP network.
- The network number of an IP address MUST equal the network
number of other IP addresses within a single IP network.
- Network numbers of IP addresses MUST be unique within the entire
ZeroConf network.
- IP address MUST be routable within the ZeroConf network.
3.1.3 Bridge Installed
3.1.3.1 Overview
Between two operational IP networks, a bridge (or hub) is
installed. Now, two hosts on the newly formed IP network may share
the same IP address. In addition, hosts on different link layer
networks may not have been using the same network number and now
they must share the same network number.
3.1.3.2 Key Points
This is a special case of a previous scenario when IP hosts first
communicate on the same IP network. All the key points and
requirements to the previous scenario apply. In addition, host
must have the ability to re-configure their IP address and net
mask.
3.1.3.3 Protocol Requirements
- Hosts MUST be able to re-configure their IP address and netmask
after networks are connected.
- All requirements in section 3.1.1.3.
Hattig [Page 14]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
3.1.4 Router Installed
3.1.4.1 Overview
Within a ZeroConf network, a router is installed after IP hosts
have been configured to communicate throughout the ZeroConf
network. Multiple IP networks within the ZeroConf network may now
share the same IP network number.
3.1.4.2 Key Points
This is a special case of a previous scenario when hosts on a
multiple IP networks within a ZeroConf network communicate. All
the key points and requirements to the previous scenario apply. In
addition, host must have the ability to re-configure their IP
address, net mask, and default route.
3.1.4.3 Protocol Requirements
- Hosts MUST re-configure IP address, net mask, and default route
at various times after the initial configuration.
- All requirements in section 3.1.2.3.
3.2 Domain Name to IP Address Resolution
3.2.1 Resolve Non-Fully Qualified Name
3.2.1.1 Overview
Domain names within the ZeroConf network must be resolved to IP
addresses. This enables one of the most basic of TCP/IP networking
paradigms of applications only being aware of host names and not
IP addresses.
3.2.1.2 Key Points
Name resolution must span the entire ZeroConf network, but be
limited by the gateway from leaving or entering the ZeroConf
network. This protocol should include the ability for a host to
choose a name, determine if the name is in use, and then choose a
different name if it is re-used.
The name resolution protocol must become active at various times
such as when previously disconnected yet operational networks now
become connected by the installation of a router or a bridge.
3.2.1.3 Protocol Requirements
- A host that wishes to be addressable by name MUST select a
domain name.
Hattig [Page 15]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
- A host MUST determine if the domain name is in use by another
host.
- A host MUST participate to defend the name it uses.
- A host MUST be able to reconfigure its name in the case it was
unable to successfully defend the name it previously used.
- At various times a host MUST actively determine if another host
is using its name.
- Gateways MUST restrict this protocol from leaving or entering
the ZeroConf network.
- Routers MUST route this protocol to ensure it spans the entire
ZeroConf network.
3.2.2 Resolve Fully Qualified Name
[TBD]
3.2.2.1 Overview
3.2.2.2 Key Points
3.2.2.3 Protocol Requirements
3.3 IP Multicast Address Allocation
[TBD]
3.3.1 Allocate XX Scoped IP multicast address
[TBD, one XX for each relevant scope.]
3.4 Service Discovery
3.4.1 Discover Printer
[TBD]
3.4.2 Discover Shared Internet Access Service
[TBD]
3.4.3 Discover Internet Web Server
[TBD]
3.4.4 Discover Multiple Web Servers
3.5 Additional Scenarios
[EDITOR'S NOTE: Please post additional scenarios for discussion to
ZeroConf@merit.edu. Eventually this section will be removed.]
Hattig [Page 16]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
4 Security Requirements
The principal goal of security requirements for ZeroConf
networking is to not make IP networking less secure than it is
without the use of ZeroConf protocols. This is challenging since
ZeroConf provides the ability for any host to obtain host
configuration, to discover and to use network resources. In the
case where ZeroConf access media is physically accessible (e.g.
wireless, powerline) or routed to additional network segments,
there is no longer any physical security.
The following sections are security considerations for the four
Areas which this document addresses. The threats fall into three
broad categories:
Hoarding: Hosts claim all available resources, whether they plan
to use them or not. This is a form of denial of service attack.
Masquerading: Hosts can respond to requests that they should not
so they can masquerade as another host.
Antagonistic Server: A server could offer support for a critical
service but intentionally misconfigure hosts on the network.
[TO DO: Add security requirements after potential threats have
been identified and selected as requiring attention by the
ZEROCONF Working Group.]
4.1 IP Host Configuration
Potential threats include:
- A host could hoard IP addresses, denying others access to the
network.
- A host could pose as an antagonistic DHCP server and
misconfigure other hosts on the network.
4.2 Domain name to IP address resolution
Potential threats include:
- A host could masquerade, responding to names requests
illegitimately.
- A host could hoard names, responding to all 'claim' requests.
- A host could pose as an antagonistic DNS server and fail to
resolve names correctly, or intentionally resolve them
incorrectly.
4.3 Multicast Address allocation
Potential threats include:
Hattig [Page 17]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
- A host could hoard multicast addresses, denying others the
ability to obtain them.
4.4 Service Discovery
Potential threats include:
- Servers could masquerade by responding to service discovery
requests which they shouldn't respond to.
- A host could pose as an antagonistic service discovery
'infrastructure element.' Some service discovery protocols
offer a 'registry', 'directory', 'proxy' or other
infrastructure element for scalability.
5 Additional Considerations
5.1 IANA Considerations
There are no known IANA considerations arising from this document.
5.2 Internationalization Considerations
ZeroConf protocols may exchange human readable strings. Human
readable strings may need to be internationalized.
5.3 Security Considerations
ZeroConf security considerations are in Section 5 of this
document.
6 Full Copyright Statement
Copyright (C) The Internet Society (1997). All Rights Reserved.
This document and translations of it may be copied and furnished
to others, and derivative works that comment on or otherwise
explain it or assist in its implementation may be prepared,
copied, published and distributed, in whole or in part, without
restriction of any kind, provided that the above copyright notice
and this paragraph are included on all such copies and derivative
works. However, this document itself may not be modified in any
way, such as by removing the copyright notice or references to the
Internet Society or other Internet organizations, except as needed
for the purpose of developing Internet standards in which case the
procedures for copyrights defined in the Internet Standards
process must be followed, or as required to translate it into
languages other than English.
The limited permissions granted above are perpetual and will not
be revoked by the Internet Society or its successors or assigns.
Hattig [Page 18]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
This document and the information contained herein is provided on
an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE."
7 Editor
Myron Hattig
Intel Corporation
2111 NE 25th Ave. JF3 206
Hillsboro, OR 97124
myron.hattig@intel.com
8 References
[STD 3] R. Braden Requirements for Internet Hosts --
Communication Layers RFC 1122, STD 3, October 1989
[STD 4] R. Braden, Requirements for Internet Hosts --
Application and Support RFC 1123, STD 4 October 1989
[RFC 1001] PROTOCOL STANDARD FOR A NetBIOS SERVICE ON A TCP/UDP
TRANSPORT: CONCEPTS AND METHODS, RFC 1001 March, 1987
[RFC 1002] PROTOCOL STANDARD FOR A NetBIOS SERVICE ON A TCP/UDP
TRANSPORT: DETAILED SPECIFICATIONS, RFC 1002, March
1987
[RFC 1034] P. Mockapetris, Domain Names - Concepts and
Facilities, RFC 1034, November 1987
[RFC 1458] R. Braudes, Requirements for Multicast Protocols, RFC
1458, May 1993
[RFC 1918] D. Karrenberg, et al, Address Allocation for Private
Internets, RFC 1918, Feb 1996
[RFC 2026] S. Bradner, The Internet Standards Process --
Revision 3, RFC 2026 Oct 1996
[RFC 2119] S. Bradner. Key words for use in RFCs to Indicate
Requirement Levels. RFC 2119, March 1997.
[RFC 2131] R. Droms. Dynamic Host Configuration Protocol. RFC
2131, March 1997.
Hattig [Page 19]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
[RFC 2132] S. Alexander, R. Droms DHCP Options and BOOTP Vendor
Extension RFC 2132, March 1997.
[RFC 2316] S. Bellovin, Report of the IAB Security Architecture
Workshop, RFC 2316, April 1998
[RFC 2365] D. Meyer Administratively Scoped Multicast Address
RFC 2365,July 1998.
[RFC 2401] S. Kent, Security Architecture for the Internet
Protocol, RFC 2401, Nov 1998
[RFC 2411] R. Thayer, IP Security Document Roadmap, RFC 2411,
Nov 1998
[RFC 2461] T. Narten, E. Nordmark, W. Simpson Neighbor
Discovery for IP Version 6 (IPv6) RFC 2461, December
1998.
[RFC 2462] S. Thomson, T. Narten IPv6 Address Autoconfiguration
RFC 2462, December 1998.
[RFC 2504] E. Guttman, Users' Security Handbook, RFC 2504, Feb.
1999
[RFC 2608] E. Guttman, C. Perkins, J. Veizades, and M. Day.
Service Location Protocol version 2. RFC 2608, June
1999.
[RFC 2609] E. Guttman, C. Perkins, J. Kempf Service Templates
and service: Schemes, RFC 2609, June 1999.
[IPv4Auto] R. Troll Automatically Choosing an IP Address in an
Ad-Hoc IPv4 Network draft-ietf-dhc-ipv4-autoconfig-
04.txt April, 1999. A work in progress.
[DisAuto] R. Troll, DHCP Option to Disable Stateless Auto-
Configuration in IPv4 Clients draft-ietf-autoconfig-
04.txt February, 1999. A work in progress.
[MCAST DNS] B. Woodcock, B. Manning Multicast Discovery of DNS
Services draft-manning-multicast-dns-01.txt
December, 1998. A work in progress.
[MADCAP] iS. Hanna, B. Patel, M. Shah Multicast Address
Dynamic Client Allocation Protocol (MADCAP) draft-
ietf-malloc-madcap-05.txt May 1999. A work in
progress.
Hattig [Page 20]
Internet Draft draft-ietf-zeroconf-reqts-01.txt Nov 1999
[SSDP] Y. Goand et al, Simple Service Discovery Protocol,
draft-cai-ssdp-v1-02.txt, June 1999, A work in
progress.
[IPv6 WG] IP Next Generation WG,
www.ietf.org/html.charters/ipngwg-charter.html.
[DHC WG] Dynamic Host Configuration WG,
www.ietf.org/html.charters/dhc-charter.html.
[NAT WG] Network Address Translation WG,
www.ietf.org/html.charters/nat-charter.html.
[DNS WG] DNS Update WG, www.ietf.org/html.charters/dnsind-
charter.html
[MALLOC WG] Multicast Allocation WG Charter,
www.ietf.org/html.charters/malloc-charter.html.
Hattig [Page 21]
| PAFTECH AB 2003-2026 | 2026-04-23 14:25:39 |