Internet DRAFT - draft-smaes-lemonade-intermediary-challenges

draft-smaes-lemonade-intermediary-challenges



                <Lemonade and Intermediary Challenges>   October 2005 
 
 
Lemonade                                                                
Internet Draft: Challenges of Intermediaries                 S. H. Maes 
Document: draft-smaes-lemonade-intermediary-                             
challenges-02.txt 
Expires: April 2006                                        October 2005 
    
    
              Lemonade and the challenges of Intermediaries 
    

Status of this Memo 
 
   
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware have 
   been or will be disclosed, and any of which he or she becomes aware 
   will be disclosed, in accordance with Section 6 of BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups.  Note that 
   other groups may also distribute working documents as Internet-
   Drafts. 
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time.  It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   The list of current Internet-Drafts can be accessed at 
        http://www.ietf.org/ietf/1id-abstracts.txt 
    
   The list of Internet-Draft Shadow Directories can be accessed at 
        http://www.ietf.org/shadow.html. 
    
Abstract 
    
   This document discusses some of the issues posed by firewalls and 
   other intermediaries to deployment of some basic IETF technologies.   
    
   The intent of this document is to track such issues, explore possible 
   approaches elegant or not that have been proposed so far to address 
   them and initiate discussion on how such issues should be 
   appropriately addressed by IETF. 
    
   This first version 00 is provided to initiate discussion. Most of the 
   content should be considered as initial place holders. 
 
Conventions used in this document 
    
 
 
Maes                     Expires - April 2006                [Page 1] 





                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   In examples, "C:" and "S:" indicate lines sent by the client server 
   respectively. 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in [RFC2119]. 
 
 
Table of Contents 
          
   Status of this Memo ........................................... 1 
   Abstract....................................................... 1 
   Conventions used in this document.............................. 1 
   Table of Contents.............................................. 2 
   1. Introduction................................................ 2 
   2. Description of the problem.................................. 3 
      2.1. Mobile e-mail with IMAP4, POP3 and SMTP................ 3 
      2.2. Lemonade............................................... 4 
      2.3. Some challenges met with P-IMAP........................ 5 
         2.3.1. HTTP / HTTPS firewalls............................ 5 
         2.3.2. Time-outs......................................... 5 
         2.3.3. Deployment challenges............................. 5 
   3. Analysis.................................................... 5 
   4. Initial considerations: A wish list for Lemonade............ 6 
   5. HTTP Binding................................................ 6 
   Security Considerations........................................ 7 
   References..................................................... 8 
   Future Work.................................................... 8 
   Version History................................................ 8 
   Acknowledgments................................................ 9 
   Authors Addresses.............................................. 9 
   Intellectual Property Statement................................ 9 
   Full Copyright Statement.......................................10 
    
    
1. 
   Introduction 
    
   Lemonade provides enhancements to Internet email to support diverse 
   service environments.  
    
   As discussions started to understand broader challenges of e-mail, 
   the case of mobile e-mail was discussed. This discussion found at 
   [MEMAIL] and [OMA-ME -AD]. 
    
   In these documents, it was pointed out that numbers of (mobile) email 
   deployment based on existing IETF specifications are not usable or 
   encounter difficulties because the protocols often can not traverse 
   firewalls with constrained settings (e.g. only allow HTTP or HTTPS).  
    
 
 
Maes                     Expires - April 2006                [Page 2] 




                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   Unavailability of submit port (e.g. SMTP) are other problems. 
 
   In addition, many intermediaries found in mobile deployments between 
   clients and servers are often set with limited timeout for pinholes, 
   sessions etc... 
    
   In particular, in the context of mobile network, it has been observed 
   that IDLE sessions on TCP are much less stable than IDLE sessions 
   over HTTP Binding. 
    
2. 
  Description of the problem 
    
2.1. 
    Mobile e-mail with IMAP4, POP3 and SMTP  
    
   Following the analysis presented in [MEMAIL], [OMA-ME-RD] and [OMA-
   ME-AD], a typical context for mobile users trying to access their e-
   mail is the following: 
   - The user is on a mobile network, using a mobile device 
   - The mobile device presents limitations in terms of the type of 
   software / client that it can run 
   - The device has limited resource capabilities and in particular is 
   constrained by consideration on its battery life 
   - The network provided by one or multiple service providers 
   (operator) may present additional constraints, unreliability or other 
   typical mobile behavior.  
   - In general traffic is expensive. 
   - The e-mail server is located in a corporation, behind a firewall. 
   - The corporation has issued strict security and usage guidelines. 
   - Multiple intermediaries and firewalls may exist between the mobile 
   server and the corporate domain. 
    
   Accordingly, users are often reduced to using the available e-mail 
   clients on the mobile device (e.g. POP3 or IMAP4 and SMTP). 
    
   For the sake of argument, let us assume that he or she uses a 
   IMAP4/SMTP e-mail client. 
    
   In order to receive and send e-mail, while satisfying its corporate 
   guidelines, the user must be able to connect via IMAP4 and SMTP to 
   its corporate server. We have observed the following challenges: 
   - Some corporations guidelines prevent open in the firewall the ports 
   used by IMAP 4 or SMTP, therefore preventing the user to access his 
   or her e-mail just using this code. 
   - Some corporations rightfully forbid using these protocols outside 
   of secure connections (e.g. TLS, VPN). 
    
   More and more often, mobile device support TLS [RFC2246], not 
   necessarily the latest version. We have observed the following 
   challenges: 
 
 
Maes                     Expires - April 2006                [Page 3] 



                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   - Some corporation guidelines prevent open in the firewall the ports 
   used by IMAP 4 over TLS or SMTP over TLS, therefore preventing the 
   user to access his or her e-mail. 
    
   As a result only user equipped with VPN clients compatible with their 
   corporate VPN will be able to access their e-mail. Unfortunately, VPN 
   clients on mobile devices are still rare. Installation on mobile 
   device is difficult if not often impossible. As a result employees of 
   corporation that use customized VPN clients are totally unable to use 
   their IMAP4 / SMTP client to access e-mail. 
    
   Note also that even when using VPN, drops of connectivity, time outs 
   of the intermediaries etc ... often disconnect the VPN. This is 
   expensive and inefficient, especially if this forces applications 
   like e-mail to re-send the same data multiple times. As corporation 
   guidelines also prevent VPN automatic reconnect and password saving 
   on the mobile device, users are rapidly very frustrated. 
    
   The only user friendly and viable solutions to access corporate e-
   mail that remain are typically based on proprietary solutions 
   available only on particular devices and network and compatible only 
   with certain e-mail servers. These are typically costly, not widely 
   available to most users. They establish their own secure reliable 
   channel with push capability between the client and the device, 
   sometimes involving network specific intermediaries (E.g. NOC – 
   Network Operating Center). Proposals like Push IMAP [P-IMAP] attempt 
   to address this with a more open standard oriented approach. 
    
   In addition, IMAP IDLE over TCP (TLS) turns out to be very instable 
   over mobile networks (2.5G / GPRS as well as 3G); much more than IDLE 
   over HTTP [HTTPBinding]. It is conjectured that this results from the 
   properties and settings of the gateways and equipment in the 
   operators core network infrastructure that have HTTP / HTTPS port 
   time out different that other ports... It is unclear if this is 
   easily addressable by changing settings or configurations. 
    
2.2. 
    Lemonade 
    
   Time outs of intermediaries are one of the fact or that contribute to 
   the frequent losses of connectivity of mobile devices.  
    
   In order to more efficiently address these issues with e-mail, and 
   assuming that the firewall issue is not an issue, Lemonade introduced 
   it its profile [LEMONADEPROFILE] a quick reconnect scheme 
   [RECONNECT]. 
 



 
 
Maes                     Expires - April 2006                [Page 4] 




                <Lemonade and Intermediary Challenges>   October 2005 
 
 
2.3. 
    Some challenges met with P-IMAP 
 
2.3.1. HTTP / HTTPS firewalls 
    
   Among the solutions to address the firewall issues, Push_IMAP [P-
   IMAP], describes and allows binding to HTTP [RFC2616] as a possible 
   option. 
    
   P-IMAP proposes also mechanisms to handle losses of connections. 
   However time-out and intermediaries still lead to challenges. 
    
2.3.2. Time-outs 
    
   For example, use of HTTP long live session / chunk encoding 
   ([RFC2616]) described in [P-IMAP], [HTTPBinding] to support exchange 
   of asynchronous events from the server to the client; while 
   technically sound, in practice does not work very well if 
   intermediaries time-out too rapidly; hence the good performances over 
   mobile network. It is very difficult to assess such time out in 
   general. 
    
2.3.3. Deployment challenges 
    
   In general intermediaries also introduce additional security threats, 
   especially if they perform protocol transformations while located 
   across domains of trust. When such intermediaries are used across 
   domains, it is possible that additional application level 
   confidentiality, integrity and signature mechanisms must be 
   introduced. In P-IMAP for example, emails and notification may be 
   encrypted at the e-mail application level. Of course using SMIME 
   [RFC2633] is another viable approach. 
    
   << Editor’s note: Add any additional discussions, examples...>> 
    
3. 
  Analysis 
    
   Based on the examples discussed above, it seems clear that while 
   there may not be any conceptual or design problem with the core 
   protocol involved, there are issues with using them in real life 
   deployments. 
    
   In particular, it seems that we need to better understand: 
   - How to deal with the issues posed by intermediaries?  
   - How to appropriately separate the role of lower layers versus 
   application level to provide transport and security when 
   intermediaries are involved and such problems are met. 
    
   At this stage, this may involve the design of IETF protocols, 
   guidelines for implementation and deployment of these protocols and 
 
 
Maes                     Expires - April 2006                [Page 5] 



                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   guidelines for implementation and deployments of intermediaries and 
   in particular firewalls. 
    
   Note also that the Lemonade discussions on traffic compression for 
   (mobile e-mail) may also warrant compression in such discussions. 
    
4. 
  Initial considerations: A wish list for Lemonade 
 
   << Editor’s note: This section is expected to contain a discussion of 
   what lemonade would like to see addressed. As a first stab this may 
   include the following.>> 
    
   We propose to collect feedback and to study feasibility and 
   appropriateness of defining: 
   - Ways to deal at the transport level with firewalls with constrained 
   settings. 
   - Ways to deal at the transport level with implementation or 
   deployment based time-outs; even if no such time outs are built in 
   the underlying protocols. 
   - Ways or guidelines to perform some of these functions at the 
   application level, when there are no transport level viable approach 
   and when it is judged that this does not warrant changes at the 
   transport level or below. 
   - Guidelines for implementation and deployment of intermediaries to 
   mitigate the issues identified in this document. 
   - Ways and guidelines to deal with the instabilities and time out 
   observed over mobile networks. 
 
    
5. 
  HTTP Binding 
 
   As part of the LEMONADE goal to define extensions to the IMAPv4 Rev1 
   protocol [RFC3501] for providing optimizations in a variety of 
   settings, this document describes how HTTP can optionally be used to 
   transfer IMAP commands and responses. This binding is intended to 
   facilitate the use of IMAP in deployments involving a variety of 
   intermediaries, and offers a standardized alternative to de facto 
   proprietary implementations of such a feature.  
    
   The need for an optional HTTP binding is driven by the needs of the 
   mobile network operator community (see [MEMAIL],[OMA-ME-RD]), where 
   the reuse of an existing and well-understood technology will allow 
   operators to apply their experience in solving practical deployment 
   issues. Specifically, HTTP allow operators to reuse a similar setup 
   and model that is already used for many other similar and related 
   services, such as certain proprietary push e-mail and synchronization 
   offerings, OMA Data Synchronization, Web services and Web access.  
    

 
 
Maes                     Expires - April 2006                [Page 6] 



                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   Using HTTP/HTTPS can simplify deployment in a corporate network 
   through the potential use of a reverse proxy to achieve end-to-end 
   encryption. This also has the advantage of not requiring changes to 
   any firewall configurations and reduces the concerns that this often 
   presents to corporation. In general the solution is compatible with 
   any existing firewall. A reverse proxy can also support deployment 
   models that offer roles to other service providers in the value 
   chains, as discussed in [OMA-ME-AD].  
    
   The security, encryption and compression capabilities used with HTTP 
   and already implemented in a wide range of existing mobile device, 
   which be also be reused. 
    
   Studies have also shown that a persistent HTTP session has usually 
   proven more resilient than an IMAP IDLE over TCP connection over an 
   unreliable bearer such as a GPRS-based mobile network. 
 
   The use of HTTP as an underlying protocol for other application 
   protocols has received much attention (see [RFC3205]). In particular, 
   the concern exists that this circumvents firewall security policies. 
   Another concern is the potential misuse or neglect of HTTP semantics 
   by the application protocol that uses HTTP as a substrate. 
    
   Note that if the suppression of IMAP (or indeed any other 
   application) traffic on HTTP/HTTPS is an issue, firewall 
   administrators can still prevent such passage and this can provide 
   incentives to re-configure firewalls to allow solutions on other 
   transports (e.g. TLS) or offer the HTTP-based solution using another 
   provisioned port (e.g. manually, out of band or via instructions like 
   XGETLPREFS (see [NOTIFICATIONS])). The aim, therefore, is to allow 
   for the use of this solution in the widest possible set of 
   circumstances by codifying a standard way to do so that works with 
   existing, deployed (i.e., HTTP only) firewalls, while explicitly 
   allowing the possibility of detecting and filtering such traffic in 
   deployments using the HTTP Content-Type in deployments where this is 
   not permitted. 
 
   Alternative HTTP bindings can be considered: 
   - SOAP binding 
   - REST binding 
   - WebDAV binding 
 
    
Security Considerations 
    
   Security considerations are discussed throughout section 2 with 
   respect to firewalls, confidentiality, integrity and the risk posed 
   by intermediaries. 
    
 
 
Maes                     Expires - April 2006                [Page 7] 





                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   Additional issues relate to how firewall issues are resolved. 
    
   << Editor’s note: More to be added as document expands.>> 
    
References 
    
   [HTTPBINDING] Maes, S.H., "Lemonade HTTP Binding", draft-maes-
      lemonade-http-binding-02.txt, (work in progress). 
    
   [LEMONADEPROFILE] Maes, S.H. and Melnikov, A., "Lemonade Profile", 
      draft-ietf-lemonade-profile-xx.txt, (work in progress) 
    
   [MEMAIL] Maes, S.H., “Lemonade and Mobile e-mail", draft-maes-
      lemonade-mobile-email-xx.txt, (work in progress). 
    
   [OMA-ME-AD] Open Mobile Alliance Mobile Email Architecture Document, 
      (Work in progress).  http://www.openmobilealliance.org/  
    
   [OMA-ME-RD] Open Mobile Alliance Mobile Email Requirement Document, 
      (Work in progress).  http://www.openmobilealliance.org/  
    
   [P-IMAP] Maes, S.H., Lima R., Kuang, C., Cromwell, R., Ha, V. and 
      Chiu, E., Day, J. and Sini, J., "Push Extensions to the IMAP 
      Protocol (P-IMAP)", draft-maes-lemonade-p-imap-xx.txt, (work in 
      progress). 
    
   [RECONNECT] Melnikov, A. and C. Wilson, "IMAP4 extension for quick 
      reconnect", draft-ietf-lemonade-reconnect-XX.txt, work in 
      progress). 
    
   [RFC2246] Dierks, T. et al., "The TLS Protocol", version 1.0 RFC2246, 
      January 1999. ftp://ftp.ietf.org/rfc/rfc2246.txt 
    
   [RFC2616] Fielding, R. et al.  "Hypertext Transfer Protocol -- 
      HTTP/1.1", RFC 2616, June 1999. http://www.ietf.org/rfc/rfc2616 
    
   [RFC2633] Ramsdell, B. et al., "S/MIME Version 3 Message 
      Specification", RFC2633, June 1999. 
      http://www.ietf.org/rfc/rfc2633.txt. 
    
Future Work 
    
   - Complete analysis of issues over mobile network (time-out) 
   - Complete analysis of all options for HTTP bindings 
   - Address all editor’s notes 
    
    
Version History 
    
 
 
Maes                     Expires - April 2006                [Page 8] 





                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   Revision 02: 
   [1] Editorial fixes. 
   [2] Details on IDLE instabilities in introduction and sections 2, 
   2.3.2 and 4. 
   [3] New references in section 2.1 
   [4] New HTTP binding section 
   [5] Updates in Security section 
   [6] Additional references 
   [7] New future work section 
    
    
    
   Revision 01: 
   [1] Editorial fixes. 
    
    
Acknowledgments 
    
   This document is based on the discussions that took place within the 
   Lemonade working group. Acknowledgment to Dave Crocker who co-
   authored the first two versions of this draft. 
 
Authors Addresses 
    
   Stephane H. Maes 
   Oracle Corporation 
   500 Oracle Parkway 
   M/S 4op634 
   Redwood Shores, CA 94065 
   USA 
   Phone: +1-650-607-6296 
   Email: stephane.maes@oracle.com 
    
Intellectual Property Statement 
    
   The IETF takes no position regarding the validity or scope of any 
   intellectual property or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
   might or might not be available; neither does it represent that it 
   has made any effort to identify any such rights.  Information on the 
   IETF's procedures with respect to rights in standards-track and 
   standards-related documentation can be found in BCP-11.  Copies of 
   claims of rights made available for publication and any assurances of 
   licenses to be made available, or the result of an attempt made to 
   obtain a general license or permission for the use of such 
   proprietary rights by implementors or users of this specification can 
   be obtained from the IETF Secretariat.  
            
 
 
Maes                     Expires - April 2006                [Page 9] 





                <Lemonade and Intermediary Challenges>   October 2005 
 
 
   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights which may cover technology that may be required to practice  
   this standard.  Please address the information to the IETF Executive  
   Director. 
    
Acknowledgement 
    
   Funding for the RFC Editor function is currently provided by the 
   Internet Society. 
    
    
Full Copyright Statement 
    
   Copyright (C) The Internet Society (2005). This document is subject 
   to the rights, licenses and restrictions contained in BCP 78, and 
   except as set forth therein, the authors retain all their rights. 
    
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
        
   This document and translations of it may be copied and furnished to 
   others, and derivative works that comment on or otherwise explain it 
   or assist in its implementation may be prepared, copied, published 
   and distributed, in whole or in part, without restriction of any 
   kind, provided that the above copyright notice and this paragraph are 
   included on all such copies and derivative works.  However, this 
   document itself may not be modified in any way, such as by removing 
   the copyright notice or references to the Internet Society or other 
   Internet organizations, except as needed for the purpose of 
   developing Internet standards in which case the procedures for 
   copyrights defined in the Internet Standards process must be 
   followed, or as required to translate it into languages other than 
   English. 
        
   The limited permissions granted above are perpetual and will not be 
   revoked by the Internet Society or its successors or assigns. 
     






 
 
Maes                     Expires - April 2006               [Page 10]