Network Working Group | A. McMillan |
Internet-Draft | Morphoss |
Intended status: Standards Track | C. Daboo |
Expires: July 13, 2013 | Apple Inc. |
January 09, 2013 |
Aggregated Service Discovery
draft-daboo-aggregated-service-discovery-02
This specification describes how clients can discover multiple services to configure themselves with a minimum of user-provided information, as short as possible sequence of queries and with a minimum of overhead for administrators of the services.
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http:/⁠/⁠datatracker.ietf.org/⁠drafts/⁠current/⁠.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."
This Internet-Draft will expire on July 13, 2013.
Copyright (c) 2013 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http:/⁠/⁠trustee.ietf.org/⁠license-⁠info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
There are currently various systems in place for discovery and configuration of individual protocols, but the process can often require an extensive series of requests using different protocols to discover all of the details needed to set up the various client services which an individual might use to interact with an organisation or service provider.
Consider Jason, a new employee at Example Enterprises. Jason needs to configure his e-mail program to use IMAP [RFC3501] + TLS on port 143 against mail.example.com, he needs to send mail on port 8557 via TLS+SMTP to smtp.example.com, his calendar is on port 8443 at https://caldav.example.com:8443/calendar/, and so forth. Some of these things can be discovered relatively easily, with a combination of DNS queries (including SRV lookups, certificate checking, and http requests). However, each protocol has its own requirements and settings and each has to be done separately. Whilst the client can "hide" the multiple service setup from the user, the actual implementation often requires separate code and processes to manage, making it more complex that it needs to be.
This specification defines a single protocol which will allows for discovery of a variety of services in a single call, allowing developers to simplify the coding and user interface in client software, and in particular in multi-function client software such as a combined e-mail and calendar client. Discovery is accomplished via a retrieval of a single document from a server, improving performance over per-service discovery mechanisms that require multiple network operations. In addition, complex dependencies between different services can be easily represented, so that, for example, some services can be prioritized over others, or grouped together by "logical" function. Further, rich information about each service can be included, such as details about required transport layer security or authentication.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].
The following outlines the steps a client carries out to setup multiple services for a user:
The aggregated service discovery document is an JSON [RFC4627] document. The document contains a single object with two members representing two pieces of information: overall service provider information (e.g., name, icon "badge", contact information), and a list of each service supported. Each service will contain some information common to each type of service, and then information specific to each service.
The JSON document format is defined here using the syntax in [I-D.newton-json-content-rules]. An example of such an aggregated service discovery document for some common services is shown in Appendix B.
JSON Content Rules for the JSON document returned for a "capabilities" action request.
; root object root { provider, entries } ; ----- provider ----- ; Contains information describing the service provider, that can be ; used by clients to "group" individual services together under a ; common name or section when presenting details to the user. provider "provider" { provider_name, ?description, ?image, ?contact, ?manage, ?password_reset, ?ttl } ; The name for the service provider. provider_name "name" : string ; The description of the service provider. description "description" : string ; A URI for an image that can be used as an "icon" for the service ; provider. The URI SHOULD be an http or https URI and clients ; SHOULD use standard HTTP Accept header behavior to request an ; appropriate image format from the server (see Section 14.1 of ; [RFC2616]). The image SHOULD NOT exceed a size of 128 x 128 ; pixels. image "image" : uri ; Contact information for the service provider. contact "contact" { email / (?email, uri) } ; An email address that can be used to contact the service ; provider. email "email" : email ; A URI for a webpage providing information about the service ; provider. url "url" : uri ; A URI for a webpage where a user can manage details of their ; account. ; e.g., a place where users can go to add additional (possibly ; payment required) services. manage "manage" : uri ; A URI for a webpage where a user can change their account ; password. password_reset "password-reset" : uri ; The minimum interval in seconds which clients SHOULD wait ; before re-fetching the document to check for changes. ttl "ttl" : integer ; ----- entries ----- ; List of services. entries "entries" [ *entry ] entry { name, service, ?(group, priority), uri / (host, ?port), ?tls, ?auth, } ; A description for the service. name "name" : string ; The service type. See below for details of the value used. service "service" : string ; Identifies the nature of the service to allow similar services to ; be grouped together. group "group" : string ; Identifies the nature of the service to allow similar services to ; be grouped together. priority "priority" : integer 1 ; The URI used to contact the server providing the service. uri "uri" : uri ; The hostname of the server providing the service. host "host" : string ; The network port number of the server providing the service. port "port" : integer 0..65535 ; Provides detail of transport layer security to be used with the ; service. tls "tls" { ?required, ?at_start, ?certificates } ; Indicates that clients MUST use transport layer security when ; connecting to the server providing the service. required "required" : boolean ; Indicates that clients MUST initiate TLS immediately upon ; connecting to the server rather than using an "in-protocol" ; upgrade mechanism. at_start "at-start" : boolean ; List of certificates. certificates "certificates" [ *certificate ] ; Details about the TLS certificate the server will use. Clients ; MAY use the specified certificate information to validate any TLS ; connection to the server, otherwise existing rules for the target ; protocol are used. certificate "certificate" { cert_name / fingerprint / public_key } ; The name of the certificate. cert_name "name" : string ; The fingerprint of the certificate. fingerprint "fingerprint" : string ; The fingerprint of the certificate. public_key "public-key" : string ; List of authentication methods to use in server preferred order. ; If the protocol supports SASL [RFC4422] then this is a list of ; SASL authentication mechanisms, otherwise it is a protocol ; specific list of names. In either case, clients MUST NOT use ; a mechanism that is not advertised in this list. auth "auth" [ *string ]
Additional members can be added to the JSON document root, "provider" or "entries" objects with the following rules:
Clients SHOULD ignore all extension member elements that they are unable to process.
The "service" member in the "entry" object is used to convey an identifier for the type of service being described. This can have one of two forms:
A ".well-known" URI is registered by this specification: "servicediscovery" (see Section 10). This URI points to a resource that the client can use to retrieve the aggregated service discovery document for the site. Clients MUST handle HTTP redirects on the ".well-known" URI, but MUST NOT allow a redirect to an insecure URI. Clients MUST handle HTTP authentication on the ".well-known" URI. Servers MUST require clients to authenticate if there is any sensitive or per-user information in the document.
When requesting the document clients MUST include a URI query parameter "id" set to the user identifier entered by the user. When responding to the request, the server MUST tailor the aggregated service discovery document for the user making the request and MUST require HTTP authentication by that user before returning the document.
Clients SHOULD cache the document for a period of time no less than the value of the "ttl" member in the "provider" object, or for a minimum of 24 hours of no "ttl" member is present.
The "group" and "priority" members of an entry provide a way for a service provider to distinguish multiple services of the same type, as well as allow the client to select the most appropriate service when several alternatives exist.
For example, consider the case of a service provider supporting two separate email retrieval services, one the "primary" account, and the other for "internal" messaging only. It is expected that clients configure accounts for both services. Each service also offers either IMAP [RFC3501] or POP3 [RFC1939] as an email retrieval protocol. In this case the aggregated service discovery document would contain four entry items: two describing an IMAP service and two describing a POP3 service. Each entry would contain a "group" member that groups one IMAP and one POP3 service together for each of the "primary" and "internal" account groups. Each entry would also contain a "priority" member indicating the service providers preference for clients to use either IMAP or POP3. An example of such an aggregated service discovery document is shown in Appendix C.
When a client retrieves and processes such a document, it would first group services based on the SD:application value. For each group, it iterates over the list of entries in the group, ordered by SD:priority values, and configures an account for the first one it finds with an SD:service that it supports.
Some elements of the service discovery document can contain human readable text that clients might choose to present to a user. Clients SHOULD use the Accept-Language header behavior described in Section 14.4 of [RFC2616] to ensure the server can return a document suitable for the user's chosen language. Servers SHOULD support variations of the service discovery document based on language, returning the appropriate variation in response to client requests.
When using an SRV lookup to discover a server hosting the service discovery document, a malicious attacker with access to the DNS server data, or able to get spoofed answers cached in a recursive resolver, can potentially cause clients to connect to a server hosting a bogus service discovery document with service data chosen by the attacker. In the absence of a secure DNS option, clients SHOULD check that the target FQDN returned in the SRV record matches the original service domain that was queried. If the target FQDN is not in the queried domain, clients SHOULD verify with the user that the SRV target FQDN is suitable for use before executing any connections to the host.
HTTP requests for the service-discovery document MUST be performed via TLS. Clients MUST use the procedure outlined in Section 4.3 of [RFC6125] to verify the service.
This document defines a ".well-known" URI using the registration procedure and template from Section 5.1 of [RFC5785].
The authors would like to thank the following individuals for contributing their ideas and support for writing this specification: Andrew Biggs, Mike Douglass, Joe Hildebrand, and Stepan Potys
The authors would also like to thank CalConnect, The Calendaring and Scheduling Consortium, for advice with this specification.
[RFC1939] | Myers, J.G. and M.T. Rose, "Post Office Protocol - Version 3", STD 53, RFC 1939, May 1996. |
[RFC3501] | Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1", RFC 3501, March 2003. |
Changes in -02:
Changes in -01:
GET /.well-known/servicediscovery?id=cyrus@example.com HTTP/1.1 Host:example.com:443 Authorization: basic QmFzZTY0IGlzIGVhc3kgdG8gZGVjb2Rl Content-Type: application/json Content-Length: xxx { "provider" : { "name" : "Super-duper ISP", "description" : "Super-duper ISP is the home for all your data.", "contact" : { "email" : "superduper@example.com", "uri" : "http://www.example.com" }, "manage" : "http://www.example.com/myaccount.html", "ttl" : 2592000 }, "entries" : [ { "name" : "Corporate Mail", "service" : "imap", "group" : "mail-access-1", "priority" : 2, "uri" : "imap:imap.example.com", "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] }, { "name" : "Corporate Mail", "service" : "pop3", "group" : "mail-access-1", "priority" : 1, "host" : "mail.example.com", "port" : 110, "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] }, { "name" : "Corporate Mail", "service" : "submission", "host" : "mail.example.com", "port" : 587, "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] }, { "name" : "Corporate Calendar", "service" : "caldav", "uri" : "https://calendar.example.com", "tls" : { "required" : true, "at-start" : true }, "auth" : ["Digest"] }, { "name" : "Corporate Contacts", "service" : "carddav", "uri" : "https://contacts.example.com", "tls" : { "required" : true, "at-start" : true }, "auth" : ["Digest"] } ] }
GET /.well-known/servicediscovery?id=cyrus@example.com HTTP/1.1 Host:example.com:443 Authorization: basic QmFzZTY0IGlzIGVhc3kgdG8gZGVjb2Rl Content-Type: application/json Content-Length: xxx { "provider" : { "name" : "Mail Agrregator ISP", "description" : "Primary and internal email services.", "contact" : { "email" : "emails@example.com", "uri" : "http://www.example.com" }, "manage" : "http://www.example.com/myaccount.html", "ttl" : 2592000 }, "entries" : [ { "name" : "Primary Mail", "service" : "imap", "group" : "primary", "priority" : 2, "uri" : "imap:mail.example.com", "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] }, { "name" : "Primary Mail", "service" : "pop3", "group" : "primary", "priority" : 1, "host" : "mail.example.com", "port" : 110, "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] }, { "name" : "Internal Mail", "service" : "imap", "group" : "internal", "priority" : 2, "uri" : "imap:int.example.com", "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] }, { "name" : "Internal Mail", "service" : "pop3", "group" : "internal", "priority" : 1, "host" : "int.example.com", "port" : 110, "tls" : { "required" : true }, "auth" : ["CRAM-MD5"] } { "name" : "Internal Mail", "service" : "{example.com}webmail", "group" : "internal", "priority" : 1, "uri" : "https://int.example.com/webmail", "{example.com}bookmark": "https://int.example.com/webmail" } ] }
This example shows two different email services: "Primary Mail" (which has both IMAP4 and POP3 services available), and "Internal Mail" (which additionally has a private "webmail" service available). An extension member is also specified for the "webmail" service.