One document matched: draft-stiemerling-alto-info-redist-00.txt
ALTO M. Stiemerling
Internet-Draft NEC Europe Ltd.
Intended status: Standards Track August 7, 2009
Expires: February 8, 2010
ALTO Information Redistribution Considered Harmful
draft-stiemerling-alto-info-redist-00
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79. This document may not be modified,
and derivative works of it may not be created, and it may not be
published except as an Internet-Draft.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on February 8, 2010.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Stiemerling Expires February 8, 2010 [Page 1]
Internet-Draft ALTO August 2009
Abstract
The merged ALTO protocol proposal proposes several mechanisms to
increase scalability of the protocol. One of the proposed mechanisms
is the distribution of ALTO information directly between the peers
without any involvement of the server. This memo discusses why the
proposed mechanism is considered harmful and why the proposed
security framework is deployable.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Considered Harmful . . . . . . . . . . . . . . . . . . . . . . 4
3. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
4. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.1. Normative References . . . . . . . . . . . . . . . . . . . 8
5.2. Informative References . . . . . . . . . . . . . . . . . . 8
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 9
Stiemerling Expires February 8, 2010 [Page 2]
Internet-Draft ALTO August 2009
1. Introduction
Scalabilty for the ALTO protocol is of major concern, as a single
ALTO server potentially has to serve a large number of ALTO clients.
The order of magnitude of how many clients will be served by a single
ALTO server is not yet clear, but it can be expected that a single
server must be able server a multiple of 10,000 clients
simultaneously. The merged ALTO protocol proposal
[I-D.penno-alto-protocol] proposes several mechanisms to increase
scalability of the protocol. One of the proposed mechanisms is the
distribution of ALTO information directly between the peers without
any involvement of the server and any need to contact the server when
having received the information.
The next section explores why the proposal is considered harmful.
Comments and discussions about this memo should be directed to the
ALTO working group: alto@ietf.org.
Stiemerling Expires February 8, 2010 [Page 3]
Internet-Draft ALTO August 2009
2. Considered Harmful
Section 10.4 in [I-D.penno-alto-protocol] proposes this:
It is possible for applications to redistribute ALTO information
to improve scalability. Even with such a distribution scheme,
ALTO Clients obtaining ALTO information must be able to validate
the received ALTO information to ensure that it was actually
generated by the correct ALTO Server. Further, to prevent the
ALTO Server from being a target of attack, the verification scheme
must not require ALTO Clients to contact the ALTO Server.
This paragraph calls for the ability to distribute ALTO information
obtained via the ALTO protocol directly between the peers (called
applications in the above text) without any ALTO server involvement.
This approach looks promising as it allows to reach more potential
clients with the ALTO information. However, there is no mean for the
peers to verify whether the information provided is actually intended
for their usage nor if the information is actually accurate at their
current topological position in the Internet.
For instance, peer A located in ISP1 obtains ALTO information from a
peer B. Peer B is located in ISP2 and provides the information is has
obtained from its local ALTO server. Peer B and peer A do not have
an easy way to determine whether they are located in the same ISP's
network and thus they share ALTO information across ISP domains.
Sharing of ALTO information across domains does not seem to be a
natural goal of ALTO. This is considered harmful, as ALTO
information that is usual intended to be used within a single ISP is
re-distributed.
The draft proposes furthermore an assumed security solution that aims
at preventing tampering with ALTO information:
To fulfill these requirements, ALTO Information meant to be
redistributable contains a digital signature which includes a hash
of the ALTO information encrypted by the ALTO Server's private
key. The corresponding public key should either be part of the
ALTO information itself, or it could be included in the interface
descriptor. The public key SHOULD include the hostname of the
ALTO Server and it SHOULD be signed by a trusted authority.
First of all does this require public/private key pair, where the
public key is known to each peer and a trusted third party is
required. These requirements are possible to be fulfilled in certain
deployments but are not in the general Internet deployment case,
which in turn limits the applicability of this protocol. Second, the
receiving peer needs to contact the ALTO server at least once to
Stiemerling Expires February 8, 2010 [Page 4]
Internet-Draft ALTO August 2009
obtain the public key part, or it does need to contact another server
that provides the public key pair.
Stiemerling Expires February 8, 2010 [Page 5]
Internet-Draft ALTO August 2009
3. Security Considerations
This initial version of this memo does not yet have any security
considerations, even though it tackles security issues.
Stiemerling Expires February 8, 2010 [Page 6]
Internet-Draft ALTO August 2009
4. Conclusion
Martin Stiemerling is partially supported by the NAPA-WINE project
(http://www.napa-wine.org), a research project supported by the
European Commission under its 7th Framework Program (contract no.
214412).
Stiemerling Expires February 8, 2010 [Page 7]
Internet-Draft ALTO August 2009
5. References
5.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
5.2. Informative References
[I-D.penno-alto-protocol]
Penno, R. and Y. Yang, "ALTO Protocol",
draft-penno-alto-protocol-03 (work in progress),
July 2009.
Stiemerling Expires February 8, 2010 [Page 8]
Internet-Draft ALTO August 2009
Author's Address
Martin Stiemerling
NEC Laboratories Europe/University of Goettingen
Kurfuerstenanlage 36
Heidelberg 69115
Germany
Phone: +49 6221 4342 113
Fax: +49 6221 4342 155
Email: stiemerling@nw.neclab.eu
URI: http://www.net.informatik.uni-goettingen.de/people/martin_stiemerling
Stiemerling Expires February 8, 2010 [Page 9]
| PAFTECH AB 2003-2026 | 2026-04-23 20:18:55 |