Category: Standards Track Cisco H. Tschofenig Nokia Siemens Networks August 2008

Similar documents
Network Working Group. Category: Standards Track August Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Remote-ID Option

Network Working Group. Category: Standards Track Samsung S. Kumar Tech Mahindra Ltd S. Madanapalli Samsung May 2008

Network Working Group. Category: Standards Track June Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Relay Agent Subscriber-ID Option

Expires: October 9, 2005 April 7, 2005

Request for Comments: 5010 Category: Standards Track Cisco Systems, Inc. September 2007

Category: Standards Track October Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4)

Category: Standards Track December 2007

Network Working Group Request for Comments: 4242 Category: Standards Track University of Southampton B. Volz Cisco Systems, Inc.

Category: Standards Track Cisco Systems, Inc. March 2005

Category: Standards Track September MIB Textual Conventions for Uniform Resource Identifiers (URIs)

Category: Standards Track October 2006

Category: Standards Track December 2003

Network Working Group Request for Comments: February 2006

Network Working Group. February 2005

Network Working Group Request for Comments: Cisco Systems, Inc. December 2005

Network Working Group. Intended status: Standards Track Columbia U. Expires: March 5, 2009 September 1, 2008

Request for Comments: 5179 Category: Standards Track May 2008

Category: Standards Track August 2002

Network Working Group Request for Comments: 3397 Category: Standards Track Apple Computer, Inc. November 2002

Network Working Group Request for Comments: August Address-Prefix-Based Outbound Route Filter for BGP-4

Request for Comments: 4759 Category: Standards Track Neustar Inc. L. Conroy Roke Manor Research November 2006

Network Working Group Request for Comments: 4143 Category: Standards Track Brandenburg November 2005

September The Internet Assigned Number Authority (IANA) tel Uniform Resource Identifier (URI) Parameter Registry. Status of This Memo

Request for Comments: May 2007

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track

Network Working Group Request for Comments: 4603 Category: Informational Cisco Systems July Additional Values for the NAS-Port-Type Attribute

Category: Standards Track June 2006

Network Working Group. Category: Standards Track Juniper Networks August 2008

Network Working Group. Category: Standards Track July 2007

Request for Comments: A. Davey Data Connection Limited A. Lindem, Ed. Redback Networks September 2008

Network Working Group. Siemens Networks GmbH & Co KG February Online Certificate Status Protocol (OCSP) Extensions to IKEv2

Network Working Group Request for Comments: 4573 Category: Standard Track July MIME Type Registration for RTP Payload Format for H.

Network Working Group. Category: Standards Track Cisco Systems May 2007

Category: Standards Track Cisco Systems, Inc January The Secure Shell (SSH) Session Channel Break Extension

Network Working Group Request for Comments: 4424 February 2006 Updates: 4348 Category: Standards Track

Network Working Group. BCP: 131 July 2007 Category: Best Current Practice

Network Working Group. Category: Informational May OSPF Database Exchange Summary List Optimization

Category: Standards Track June Requesting Attributes by Object Class in the Lightweight Directory Access Protocol (LDAP) Status of This Memo

Network Working Group. Category: Informational UNINETT A. Vijayabhaskar Cisco Systems (India) Private Limited May 2005

C. Martin ipath Services February A Policy Control Mechanism in IS-IS Using Administrative Tags

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Request for Comments: 5079 Category: Standards Track December Rejecting Anonymous Requests in the Session Initiation Protocol (SIP)

Network Working Group. N. Williams Sun Microsystems June 2006

Network Working Group Request for Comments: September IANA Considerations for the IPv4 and IPv6 Router Alert Options

Network Working Group. Category: Standards Track June 2005

Network Working Group Request for Comments: Category: Standards Track G. Neville-Neil Neville-Neil Consulting December 2007

Request for Comments: 3861 Category: Standards Track August 2004

Request for Comments: 4255 Category: Standards Track SPARTA January Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints

Updates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)

Network Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)

Network Working Group. Category: Informational January 2006

Network Working Group. Cisco Systems June 2007

Network Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-00.

HIIT L. Eggert Nokia April Host Identity Protocol (HIP) Registration Extension

Category: Standards Track October 2006

Request for Comments: Starent Networks A. Lior Bridgewater Systems K. Leung Cisco Systems October 2007

Network Working Group Request for Comments: A. Zinin Alcatel-Lucent March 2007

Request for Comments: 4715 Category: Informational NTT November 2006

Network Working Group. Category: Informational April A Uniform Resource Name (URN) Namespace for the Open Geospatial Consortium (OGC)

Category: Standards Track Redback Networks June 2008

Request for Comments: 5369 Category: Informational October Framework for Transcoding with the Session Initiation Protocol (SIP)

Network Working Group Internet-Draft October 27, 2007 Intended status: Experimental Expires: April 29, 2008

Request for Comments: 4509 Category: Standards Track May Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)

Request for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice

Category: Standards Track LabN Consulting, LLC July 2008

Intended status: Standards Track August 15, 2008 Expires: February 16, 2009

Request for Comments: 4571 Category: Standards Track July 2006

Category: Standards Track Juniper Networks E. Rosen Cisco Systems, Inc. August MPLS Upstream Label Assignment and Context-Specific Label Space

Request for Comments: Category: Standards Track January 2008

vcard Extensions for Instant Messaging (IM)

Request for Comments: K. Norrman Ericsson June 2006

Request for Comments: 5156 Category: Informational April 2008

Request for Comments: 4633 Category: Experimental August 2006

Network Working Group. Category: Informational SPARTA, Inc. S. Crocker Shinkuro Inc. S. Krishnaswamy SPARTA, Inc. August 2007

Category: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP

Category: Informational September A Suggested Scheme for DNS Resolution of Networks and Gateways

Network Working Group Internet-Draft January 25, 2006 Expires: July 29, Feed Rank draft-snell-atompub-feed-index-05.txt. Status of this Memo

Category: Experimental April BinaryTime: An Alternate Format for Representing Date and Time in ASN.1

Network Working Group Internet-Draft August 2005 Expires: February 2, Atom Link No Follow draft-snell-atompub-feed-nofollow-03.

Ericsson D. Willis. Cisco Systems. April 2006

Category: Standards Track May Transport Layer Security Protocol Compression Methods

Columbia University G. Camarillo Ericsson October 2005

Request for Comments: 4433 Category: Standards Track Cisco Systems Inc. March 2006

Expires in six months 24 October 2004 Obsoletes: RFC , , 3377, 3771

Network Working Group. J. Lee Samsung Electronics T. Iwata Nagoya University August 2006

Network Working Group Request for Comments: Cisco Systems, Inc. June 2006

Request for Comments: 5115 Category: Standards Track UCL January Telephony Routing over IP (TRIP) Attribute for Resource Priority

Isode Limited March 2008

Request for Comments: 3968 Updates: 3427 December 2004 BCP: 98 Category: Best Current Practice

Network Working Group Request for Comments: 4432 March 2006 Category: Standards Track

Request for Comments: 4142 Category: Standards Track Nine by Nine November 2005

Network Working Group Request for Comments: 4558 Category: Standards Track Cisco Systems D. Papadimitriou Alcatel June 2006

Request for Comments: M. Stillman Nokia M. Tuexen Muenster Univ. of Applied Sciences September 2008

Network Working Group. Category: Standards Track September 2006

Category: Standards Track Microsoft May 2004

Jabber, Inc. August 20, 2004

Request for Comments: 4755 Category: Standards Track December 2006

Request for Comments: Category: Best Current Practice June 2008

Request for Comments: 5208 Category: Informational May 2008

Transcription:

Network Working Group Request for Comments: 5223 Category: Standards Track H. Schulzrinne Columbia University J. Polk Cisco H. Tschofenig Nokia Siemens Networks August 2008 Discovering Location-to-Service Translation (LoST) Servers Using the Dynamic Host Configuration Protocol (DHCP) Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Location-to-Service Translation (LoST) Protocol describes an XMLbased protocol for mapping service identifiers and geospatial or civic location information to service contact Uniform Resource Locators (URLs). LoST servers can be located anywhere, but a placement closer to the end host, e.g., in the access network, is desirable. In disaster situations with intermittent network connectivity, such a LoST server placement provides benefits regarding the resiliency of emergency service communication. This document describes how a LoST client can discover a LoST server using the Dynamic Host Configuration Protocol (DHCP). Schulzrinne, et al. Standards Track [Page 1]

Table of Contents 1. Introduction......................... 2 2. Terminology.......................... 2 3. Domain Name Encoding..................... 3 4. LoST Server DHCPv4 Option................... 3 5. LoST Server DHCPv6 Option................... 4 6. Example............................ 4 7. IANA Considerations...................... 5 7.1. DHCPv4 Option....................... 5 7.2. DHCPv6 Option....................... 5 8. Security Considerations.................... 5 9. Acknowledgements....................... 5 10. References.......................... 6 10.1. Normative References................... 6 10.2. Informative References.................. 6 1. Introduction The Location-to-Service Translation (LoST) Protocol [RFC5222] describes an XML-based protocol for mapping service identifiers and geospatial or civic location information to service contact Uniform Resource Locators (URLs). In order to interact with a LoST server, the LoST client needs to discover the server s IP address. Several mechanisms can be used to learn this address, including manual configuration. In environments where the access network itself either deploys a LoST server or knows a third party that operates a LoST server, DHCP can provide the end host with a domain name. This domain name is then used as input to the DNS-based resolution mechanism described in LoST [RFC5222] that reuses the URI-enabled NAPTR specification (see [RFC4848]). This document specifies a DHCPv4 and a DHCPv6 option that allows LoST clients to discover local LoST servers. Section 2 provides terminology. Section 3 shows the encoding of the domain name. Section 4 describes the DHCPv4 option while Section 5 describes the DHCPv6 option, with the same functionality. IANA and Security Considerations complete the document in Sections 7 and 8. 2. Terminology In this document, the key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as described in RFC 2119 [RFC2119]. Schulzrinne, et al. Standards Track [Page 2]

Within this document, we use terminology from [RFC5012] and [RFC5222]. 3. Domain Name Encoding This section describes the encoding of the domain name used in the DHCPv4 option shown in Section 4 and also used in the DHCPv6 option shown in Section 5. The domain name is encoded according to Section 3.1 of RFC 1035 [RFC1035] whereby each label is represented as a one-octet length field followed by that number of octets. Since every domain name ends with the null label of the root, a domain name is terminated by a length byte of zero. The high-order two bits of every length octet MUST be zero, and the remaining six bits of the length field limit the label to 63 octets or less. To simplify implementations, the total length of a domain name (i.e., label octets and label length octets) is restricted to 255 octets or less. 4. LoST Server DHCPv4 Option The LoST server DHCPv4 option carries a DNS (RFC 1035 [RFC1035]) fully-qualified domain name (FQDN) to be used by the LoST client to locate a LoST server. The DHCP option for this encoding has the following format: Code Len LoST Server Domain Name +-----+-----+-----+-----+-----+-----+-----+---- 137 n s1 s2 s3 s4 s5... +-----+-----+-----+-----+-----+-----+-----+---- Figure 1: LoST FQDN DHCPv4 Option The values s1, s2, s3, etc. represent the domain name labels in the domain name encoding. Note that the length field in the DHCPv4 option represents the length of the entire domain name encoding, whereas the length fields in the domain name encoding (see Section 3) is the length of a single domain name label. Code: OPTION_V4_LOST (137) Len: Length of the LoST Server Domain Name field in octets; variable. LoST Server Domain Name: The domain name of the LoST server for the client to use. Schulzrinne, et al. Standards Track [Page 3]

A DHCPv4 client MAY request a LoST server domain name in a Parameter Request List option, as described in [RFC2131]. The encoding of the domain name is described in Section 3. This option contains a single domain name and, as such, MUST contain precisely one root label. 5. LoST Server DHCPv6 Option This section defines a DHCPv6 option to carry a domain name. The DHCPv6 option has the format shown in Figure 2. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ OPTION_V6_LOST option-length +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ LoST Server Domain Name... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ option-code: OPTION_V6_LOST (51) option-length: Length of the LoST Server Domain Name field in octets; variable. LoST Server Domain Name: The domain name of the LoST server for the client to use. Figure 2: DHCPv6 Option for LoST Server Domain Name List A DHCPv6 client MAY request a LoST server domain name in an Options Request Option (ORO), as described in [RFC3315]. The encoding of the domain name is described in Section 3. This option contains a single domain name and, as such, MUST contain precisely one root label. 6. Example This section shows an example of a DHCPv4 option where the DHCP server wants to offer the "example.com" domain name to the client as input to the U-NAPTR LoST discovery procedure. This domain name would be encoded as follows: Schulzrinne, et al. Standards Track [Page 4]

+----+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ 137 13 7 e x a m p l e 3 c o m 0 +----+---+---+---+---+---+---+---+---+---+---+---+---+---+---+ 7. IANA Considerations 7.1. DHCPv4 Option Figure 3: Example for a LoST FQDN DHCPv4 Option The following DHCPv4 option code for the Location-to-Service Translation (LoST) Protocol server option has been assigned by IANA: Option Name Value Described in ----------------------------------------------- OPTION_V4_LOST 137 Section 4 7.2. DHCPv6 Option IANA has assigned the following DHCPv6 option code for the Locationto-Service Translation (LoST) Protocol option: Option Name Value Described in ------------------------------------------------ OPTION_V6_LOST 51 Section 5 8. Security Considerations If an adversary manages to modify the response from a DHCP server or insert its own response, a LoST client could be led to contact a rogue LoST server under the control of the adversary or be given an invalid address. These threats are documented in [RFC5069]. The security considerations in [RFC2131], [RFC2132], and [RFC3315] are applicable to this document. [RFC5222] enumerates the LoST security mechanisms. 9. Acknowledgements Andrew Newton reviewed the document and helped simplify the mechanism. Other helpful input was provided by Jari Arkko, Leslie Daigle, Vijay K. Gurbani (Gen-ART Review), David W. Hankins, Russ Housley, Tim Polk, Mark Stapp, and Christian Vogt. Schulzrinne, et al. Standards Track [Page 5]

10. References 10.1. Normative References [RFC1035] Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, November 1987. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", RFC 2119, BCP 14, March 1997. [RFC2131] Droms, R., "Dynamic Host Configuration Protocol", RFC 2131, March 1997. [RFC2132] Alexander, S. and R. Droms, "DHCP Options and BOOTP Vendor Extensions", RFC 2132, March 1997. [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. 10.2. Informative References [RFC4848] Daigle, L., "Domain-Based Application Service Location Using URIs and the Dynamic Delegation Discovery Service (DDDS)", RFC 4848, April 2007. [RFC5012] Schulzrinne, H. and R. Marshall, "Requirements for Emergency Context Resolution with Internet Technologies", RFC 5012, January 2008. [RFC5069] Taylor, T., Tschofenig, H., Schulzrinne, H., and M. Shanmugam, "Security Threats and Requirements for Emergency Call Marking and Mapping", RFC 5069, January 2008. [RFC5222] Hardie, T., Newton, A., Schulzrinne, H., and H. Tschofenig, "LoST: A Location-to-Service Translation Protocol", RFC 5222, August 2008. Schulzrinne, et al. Standards Track [Page 6]

Authors Addresses Henning Schulzrinne Columbia University Department of Computer Science 450 Computer Science Building New York, NY 10027 US EMail: hgs+ecrit@cs.columbia.edu URI: http://www.cs.columbia.edu James Polk Cisco 2200 East President George Bush Turnpike Richardson, TX 75082 US EMail: jmpolk@cisco.com Hannes Tschofenig Nokia Siemens Networks Linnoitustie 6 Espoo 02600 Finland Phone: +358 (50) 4871445 EMail: Hannes.Tschofenig@nsn.com URI: http://www.tschofenig.priv.at Schulzrinne, et al. Standards Track [Page 7]

Full Copyright Statement Copyright (C) The IETF Trust (2008). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Schulzrinne, et al. Standards Track [Page 8]