A new IETF working group has been proposed in the Transport Area.
The IESG has not made any determination as yet. 

The following Description was submitted, and is provided for
informational purposes only:

Middlebox Communication (midcom)
--------------------------------

 Current Status: Proposed Working Group
 
Description of Working Group:
 
As trusted third parties are increasingly being asked to make policy
decisions on behalf of the various entities participating in an
application's operation, a need has developed for applications to be 
able to communicate their needs to the devices in the network that 
provide transport policy enforcement. Examples of these devices include 
firewalls, network address translators (both within and between address 
families), signature management for intrusion detection systems, and 
multimedia buffer management. These devices are a subset of what can be 
referred to as 'middle boxes.'

Decomposing applications requiring policy decisions by removing 
application logic from the middle box and instead providing a 
generalized communications interface provides a number of benefits, 
including improved performance, lower software development and 
maintenance costs, improved ability to support traversal of packet 
filters by complex protocols, easier deployment of new applications, and 
the ability to consolidate management functions.  For example, by moving 
stateful inspection of protocols such as H.323 and SIP out of firewalls, 
it is possible to improve performance and scalability and reduce 
development and costs.

The elements of this architecture include

    . one or more middle boxes in the data path

    . an external requesting entity

    . a policy entity for consultation purposes when the
      requesting entity is untrusted.

The requesting entity may be trusted or untrusted. In the case where it 
is trusted, the middle box will treat the request from the entity as
authoritative.  In the case where it is not trusted, the intermediate
device will have to verify that it is authorized to complete the 
request. That authorization could come from a separate or a built in 
policy server.

The primary focus of the working group will be the application of this
architecture to communicating requests between applications and 
firewalls or NATs.  This will not preclude other uses, and care will be 
taken to ensure that the framework is extensible.

The focus of the working group will be the architectural framework and 
the requirements for the protocol between the requesting device and the 
middle box and the architectural framework for the interface between the 
middle box and the policy entity.  In both cases we intend to reuse 
existing or in process IETF protocols if possible.

The security of the interfaces will be one of the primary focuses of the
work, and potential vulnerabilities on the interfaces and in the
architecture along with defenses against those threats will be 
identified.

Discovery of middle boxes is out of scope.

The deliverables will be

o a document specifying the architecture and interfaces on

  . a requesting entity

  . a middle box

o a document the requirements for both the
  architecture and the control language

o a document describing the requirements for a policy enity

Once these deliverables are complete, the Area Directors will decide if 
the working group should be rechartered.  If rechartered the working 
group could undertake protocol development  or development of profiles 
of existing protocols.
 

Reply via email to