Internet DRAFT - draft-patil-tram-alpn
draft-patil-tram-alpn
TRAM P. Patil
Internet-Draft T. Reddy
Intended status: Standards Track G. Salgueiro
Expires: October 24, 2014 Cisco
M. Petit-Huguenin
Jive Communications
April 22, 2014
Application Layer Protocol Negotiation (ALPN) for Session Traversal
Utilities for NAT (STUN)
draft-patil-tram-alpn-00
Abstract
An Application Layer Protocol Negotiation (ALPN) label for the
Session Traversal Utilities for NAT (STUN) protocol is defined in
this document to allow the application layer to negotiate STUN within
the Transport Layer Security (TLS) connection. The STUN ALPN
protocol identifier applies to both TLS and Datagram Transport Layer
Security (DTLS).
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 24, 2014.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Patil, et al. Expires October 24, 2014 [Page 1]
Internet-Draft ALPN for STUN/TURN April 2014
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 4
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.1. Normative References . . . . . . . . . . . . . . . . . . 4
6.2. Informative References . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
STUN can be securely transported using TLS-over-TCP (referred to as
TLS [RFC5246]), as specified in [RFC5389], or TLS-over-UDP (referred
to as DTLS [RFC6347]), as specified in
[I-D.petithuguenin-tram-turn-dtls].
ALPN [I-D.ietf-tls-applayerprotoneg] enables an endpoint to
positively identify STUN protocol uses in TLS/DTLS and distinguish
them from other TLS/DTLS protocols. With ALPN, the client sends the
list of supported application protocols as part of the TLS/DTLS
ClientHello message. The server chooses a protocol and sends the
selected protocol as part of the TLS/DTLS ServerHello message. The
application protocol negotiation can thus be accomplished within the
TLS/DTLS handshake, without adding network round-trips, and allows
the server to associate a different certificate with each application
protocol, if desired.
For example, a firewall could block all outgoing traffic except for
TCP traffic to specific ports (e.g., 443 for HTTPS). A TURN server
listening on its default ports (3478 for TCP/UDP, 5349 for TLS) would
not be reachable in this case. However, despite the restrictions
imposed by the firewall, the TURN server can still be reached on the
allowed HTTPS port if an ALPN STUN protocol identifier is used to
establish the STUN application layer protocol as part of the TLS
handshake. In this case, the STUN ALPN identifier sent by the client
will be used by the server to identify that the client intends to
make a TURN request and it must act as a TURN server to relay the
traffic to and from the remote peer. Similarly, with Quick UDP
Internet Connections (QUIC) [QUIC], a UDP-based transport protocol
Patil, et al. Expires October 24, 2014 [Page 2]
Internet-Draft ALPN for STUN/TURN April 2014
that operates under SPDY [I-D.mbelshe-httpbis-spdy], a TURN server
could be operated on the same ports as that of a SPDY server.
This document defines an entry ("stun") in the "Application Layer
Protocol Negotiation (ALPN) Protocol IDs" registry established by
[I-D.ietf-tls-applayerprotoneg] to identify the STUN protocol.
[[TODO: In various offline discussions some have expressed a desire
to add an additional ALPN protocol identifier for TURN (see IANA
Considerations below for example registration). ALPN can be used
more granularly to externally identify more of the protocol variants
and their different properties (i.e., STUN and TURN over TLS/DTLS).
The advantage in dividing it this way is that these different forms
can be externally identified (obviously, there isn't any inherent
value in the different identifiers from within the TLS
handshake).There are two main disadvantages. the first is that this
two application protocol approach may make implementations more
complicated/confusing. The second is that there may be difficulty in
differentiating the two with ALPN when TURN was specifically designed
to be able to run on the same port as STUN usage (in section 13 of
RFC 5389). Section 4.1.1.2 of RFC 5245 explicitly says that "If the
Allocate request is rejected because the server lacks resources to
fulfill it, the agent SHOULD instead send a Binding request to obtain
a server reflexive candidate." Does that prove there is no need to
differentiate TURN and STUN request on UDP/TCP or TLS and now DTLS?
Are there sufficiently meaningful differences between the usages to
warrant separate STUN and TURN ALPN identifiers?]]
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. IANA Considerations
The following entry is to be added to the "Application Layer Protocol
Negotiation (ALPN) Protocol IDs" registry established by
[I-D.ietf-tls-applayerprotoneg].
The "stun" label identifies STUN over TLS/DTLS:
Protocol: Session Traversal Utilities for NAT (STUN)
Identification Sequence: 0x73 0x74 0x75 0x6E ("stun")
Specification: This document (RFCXXXX)
Patil, et al. Expires October 24, 2014 [Page 3]
Internet-Draft ALPN for STUN/TURN April 2014
[[TODO: Shown only as an example. Remove the below registry entry if
open issue above dictates a single STUN ALPN identifier is
sufficient.]]
The "turn" label identifies TURN over TLS/DTLS:
Protocol: Traversal Using Relays around NAT (TURN)
Identification Sequence: 0x74 0x75 0x72 0x6E ("turn")
Specification: This document (RFCXXXX)
4. Security Considerations
The ALPN STUN protocol identifier does not introduce any specific
security considerations beyond those detailed in the TLS ALPN
Extension specification [I-D.ietf-tls-applayerprotoneg]. It also
does not impact the security of TLS/DTLS session establishment nor
the application data exchange.
5. Acknowledgements
This work benefited from the discussions and invaluable input by the
various members of the TRAM working group. These include Simon
Perrault, Paul Kyzivat, and Andrew Hutton. Special thanks to Martin
Thomson and Oleg Moskalenko for their constructive comments,
suggestions, and early reviews that were critical to the formulation
and refinement of this document.
6. References
6.1. Normative References
[I-D.ietf-tls-applayerprotoneg]
Friedl, S., Popov, A., Langley, A., and S. Emile,
"Transport Layer Security (TLS) Application Layer Protocol
Negotiation Extension", draft-ietf-tls-applayerprotoneg-05
(work in progress), March 2014.
[I-D.mbelshe-httpbis-spdy]
Belshe, M. and R. Peon, "SPDY Protocol", draft-mbelshe-
httpbis-spdy-00 (work in progress), February 2012.
[I-D.petithuguenin-tram-turn-dtls]
Petit-Huguenin, M. and G. Salgueiro, "Datagram Transport
Layer Security (DTLS) as Transport for Traversal Using
Relays around NAT (TURN)", draft-petithuguenin-tram-turn-
dtls-00 (work in progress), January 2014.
Patil, et al. Expires October 24, 2014 [Page 4]
Internet-Draft ALPN for STUN/TURN April 2014
[QUIC] http://www.ietf.org/proceedings/88/slides/
slides-88-tsvarea-10.pdf, "QUIC Slide Deck at IETF88,", .
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246, August 2008.
[RFC5389] Rosenberg, J., Mahy, R., Matthews, P., and D. Wing,
"Session Traversal Utilities for NAT (STUN)", RFC 5389,
October 2008.
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, January 2012.
6.2. Informative References
[RFC5766] Mahy, R., Matthews, P., and J. Rosenberg, "Traversal Using
Relays around NAT (TURN): Relay Extensions to Session
Traversal Utilities for NAT (STUN)", RFC 5766, April 2010.
Authors' Addresses
Prashanth Patil
Cisco Systems, Inc.
Bangalore
India
Email: praspati@cisco.com
Tirumaleswar Reddy
Cisco Systems, Inc.
Cessna Business Park, Varthur Hobli
Sarjapur Marathalli Outer Ring Road
Bangalore, Karnataka 560103
India
Email: tireddy@cisco.com
Patil, et al. Expires October 24, 2014 [Page 5]
Internet-Draft ALPN for STUN/TURN April 2014
Gonzalo Salgueiro
Cisco Systems, Inc.
7200-12 Kit Creek Road
Research Triangle Park, NC 27709
US
Email: gsalguei@cisco.com
Marc Petit-Huguenin
Jive Communications
1275 West 1600 North, Suite 100
Orem, UT 84057
USA
Email: marcph@getjive.com
Patil, et al. Expires October 24, 2014 [Page 6]