sp-tls-mapping-01.xml 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. <?xml version="1.0" encoding="US-ASCII"?>
  2. <!DOCTYPE rfc SYSTEM "rfc2629.dtd">
  3. <rfc category="info" docName="sp-tls-mapping-01">
  4. <front>
  5. <title abbrev="TLS/TCP mapping for SPs">
  6. TLS Mapping for Scalability Protocols
  7. </title>
  8. <author fullname="Garrett D'Amore" initials="G." surname="D'Amore" role="editor">
  9. <address>
  10. <email>garrett@damore.org</email>
  11. </address>
  12. </author>
  13. <date month="March" year="2014" />
  14. <area>Applications</area>
  15. <workgroup>Internet Engineering Task Force</workgroup>
  16. <keyword>TLS</keyword>
  17. <keyword>SP</keyword>
  18. <abstract>
  19. <t>This document defines the mapping for scalability protocols (SP)
  20. running on top of Transport Layer Security (TLS) v1.2 on top of TCP.</t>
  21. </abstract>
  22. </front>
  23. <middle>
  24. <section title = "Underlying protocol">
  25. <t>This mapping should be layered directly on the top of
  26. <xref target='TLS'>TLS</xref> secured
  27. connections. While it is possible to use TLS on top of other
  28. transports, this document specifically concerns itself with TLS
  29. running on top of <xref target='TCP'>TCP</xref>.</t>
  30. <t>Other combinations may be contemplated,
  31. and should follow the same details as discussed here.</t>
  32. <t>As when running SP over TCP directly, the TCP port number is
  33. determined by the application or user.</t>
  34. <t>This mapping follows the details of
  35. <xref target='SPoverTCP'>SP over TCP</xref>.</t>
  36. </section>
  37. <section title="Connection initiation">
  38. <t>An initial connection is first established using TCP, then performing
  39. a TLS handshake. This handshake establishes the security parameters
  40. of the connection, including negotiation of cipher suites, exchanging
  41. keys, and possibly performing one or two-way authentication.</t>
  42. <t>The specific details of the TLS negotiation are determined by the
  43. application(s) involved, and are not specified here. This includes
  44. selection of the specific version of TLS or possibly falling back to
  45. SSL version 3 (but not SSL version 1 or 2).</t>
  46. <t>TLS presents an encrypted channel that may be treated as a full duplex
  47. byte stream between peers. This mapping sits within that channel.</t>
  48. <t>Note also that TLS peers may rekey periodically. This happens in the
  49. without involving the upper protocol, and the details need not concern
  50. us here.</t>
  51. <t>Once the TLS layer connection has been established, the communication
  52. commences as detailed in <xref target='SPoverTCP'>SPoverTCP</xref>.
  53. This includes the exchange of the initial protocol headers identifying
  54. the version of SP in use, and the specific protocol type, as well as
  55. requirements to disconnect upon receipt of an invalid
  56. protocol header or an unrecognized SP version.</t>
  57. </section>
  58. <section anchor="IANA" title="IANA Considerations">
  59. <t>This memo includes no request to IANA.</t>
  60. </section>
  61. <section anchor="Security" title="Security Considerations">
  62. <t>Security considerations are explored in depth as part of
  63. <xref target='TLS'>TLS</xref>. This document does not provide
  64. any further implications beyond that in TLS itself.</t>
  65. <t>The use of SSLv2 is explicitly <xref target='RFC6176'>forbidden</xref>,
  66. as SSLv2 contains known weaknesses.</t>
  67. </section>
  68. </middle>
  69. <back>
  70. <references>
  71. <reference anchor='TCP'>
  72. <front>
  73. <title>Transmission Control Protocol</title>
  74. <author initials='J.' surname='Postel' fullname='Jon Postel'>
  75. </author>
  76. <date month='September' year='1981'/>
  77. </front>
  78. <seriesInfo name='STD' value='7'/>
  79. <seriesInfo name='RFC' value='793'/>
  80. <format type='TXT' target='http://tools.ietf.org/html/rfc793.txt'/>
  81. </reference>
  82. <reference anchor='TLS'>
  83. <front>
  84. <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
  85. <author initials='T.' surname='Dierks' fullname='T. Dierks'>
  86. <organization>Independent</organization>
  87. </author>
  88. <author initials='E.' surname='Rescorla' fullname='E. Rescorla'>
  89. <organization>RTFM, Inc.</organization>
  90. </author>
  91. <date month='August' year='2008'/>
  92. </front>
  93. <seriesInfo name='RFC' value='5246'/>
  94. <format type='TXT' target='http://tools.ietf.org/html/rfc5246.txt'/>
  95. </reference>
  96. <reference anchor='RFC6176'>
  97. <front>
  98. <title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title>
  99. <author initials='S.' surname='Turner' fullname='S. Turner'>
  100. <organization>IECA</organization>
  101. </author>
  102. <author initials='T.' surname='Polk' fullname='T. Polk'>
  103. <organization>NIST.</organization>
  104. </author>
  105. <date month='March' year='2011'/>
  106. </front>
  107. <seriesInfo name='RFC' value='6176'/>
  108. <format type='TXT' target='http://tools.ietf.org/html/rfc6176.txt'/>
  109. </reference>
  110. <reference anchor='SPoverTCP'>
  111. <front>
  112. <title>TCP mapping for SPs</title>
  113. <author initials='M.' surname='Sustrik' fullname='M. Sustrik'/>
  114. <date month='August' year='2013'/>
  115. </front>
  116. <format type='TXT' target='sp-tcp-mapping-01.txt'/>
  117. </reference>
  118. </references>
  119. </back>
  120. </rfc>