Skip to main content

Ethernet over HTTPS Protocol
draft-bouaram-ethernet-over-https-01

Document Type Active Internet-Draft (individual)
Author SALIM-AMINE Bou ARAM
Last updated 2023-12-28
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-bouaram-ethernet-over-https-01
INTAREA (Internet Area Working Group)                         S. B. ARAM
Internet-Draft                                                   SKELDUS
Intended status: Informational                          27 December 2023
Expires: 29 June 2024

                      Ethernet over HTTPS Protocol
                  draft-bouaram-ethernet-over-https-01

Abstract

   This document defines a protocol for encapsulating Ethernet frames
   over HTTPS, allowing secure communication between a client and
   internal web servers.  The protocol includes authentication using
   strong API keys encrypted with the server's public key.  The
   communication is secured using TLS for privacy and integrity.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 29 June 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

ARAM                      Expires 29 June 2024                  [Page 1]
Internet-Draft                     EOH                     December 2023

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  TLS Considerations  . . . . . . . . . . . . . . . . . . .   2
     1.2.  Flow and Scenarios  . . . . . . . . . . . . . . . . . . .   2
       1.2.1.  Client Authentication . . . . . . . . . . . . . . . .   2
       1.2.2.  Internal Webpage Request  . . . . . . . . . . . . . .   3
       1.2.3.  Server-Side Processing  . . . . . . . . . . . . . . .   3
       1.2.4.  Response to the Client  . . . . . . . . . . . . . . .   3
   2.  FLow summary  . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   4

1.  Introduction

   Ethernet over HTTPS (EOH) extends traditional networking by allowing
   communication between a web client and internal resources over the
   HTTPS protocol.  This document outlines the procedures for
   authentication, encapsulation of Ethernet frames, and communication
   between the client and internal web servers.  TLS is employed to
   secure the communication channel and ensure privacy and integrity.

1.1.  TLS Considerations

   To ensure the security of the Ethernet-over-HTTPS communication, TLS
   must be used to encrypt and authenticate the data exchanged between
   the client and server.  Implementations MUST follow best practices
   for TLS configuration, including the use of strong cipher suites,
   secure protocols, and proper certificate validation.

1.2.  Flow and Scenarios

1.2.1.  Client Authentication

   If the client specifies an internal URL (e.g., internal.url), the
   browser recognizes that Ethernet over HTTPS should be used for the
   communication.  The client browser, pre-configured with the IP
   address and port of the HTTP Server acting as the gateway to the LAN,
   automatically recognizes the internal URL (e.g., internal.url).  It
   then initiates the Ethernet-over-HTTPS protocol and sends an
   authentication request.

   *  The client initiates the connection by sending an authentication
      request to the server.

ARAM                      Expires 29 June 2024                  [Page 2]
Internet-Draft                     EOH                     December 2023

   plaintext
   POST /authenticate HTTP/1.1
   Host: server.example.com
   Content-Type: application/json

   {
   "api_key": "encrypted_api_key"
   }

   ### Server Authentication and LAN Information The server decrypts the
   API key, authenticates the client, and responds with the MAC address
   or IP address of the target server (or both) based on the LAN layer
   architecture.

   HTTP/1.1 200 OK
   Content-Type: application/json

   {
     "target_server_mac_address": "xx:xx:xx:xx:xx:xx",
     "target_server_ip_address": "192.168.1.2"
     "dhcp_ip_address": "192.168.1.10"
   }

1.2.2.  Internal Webpage Request

   The client, now authenticated, sends an Ethernet frame encapsulated
   within an HTTPS request for an internal webpage

1.2.3.  Server-Side Processing

   The server decapsulates the Ethernet frame, extracts the original
   HTTP request, and routes it to the internal web server.

1.2.4.  Response to the Client

   The server encapsulates the response from the internal web server

POST /ethernet-over-https HTTP/1.1
Host: server.example.com
Content-Type: application/octet-stream
Content-Length: length_of_payload_in_bytes

{
  "http_response": "HTTP/1.1 200 OK\r\nContent-Type: text/html\r\n\r\n<html>Internal Webpage</html>"
}

2.  FLow summary

ARAM                      Expires 29 June 2024                  [Page 3]
Internet-Draft                     EOH                     December 2023

     +----------------------+       +----------------------+
     |                      |       |                      |
     |      Web Client      |       |        EOH Server     |
     |                      |       |                      |
     +----------------------+       +----------------------+
              |                             |
              | 1. Browser Recognizes       |
              |    Internal URL             |
              | --------------------------> |
              |                             |
              | 2. Authentication Request   |
              | --------------------------> |
              |                             |
              |                             |
              | 3. Browser Initiates        |
              |    Ethernet over HTTPS      |
              |                             |
              |                             |
              | 4. Server Authenticates     |
              |    and Responds             |
              | <-------------------------- |
              |                             |
              | 5. Internal Webpage Request |
              |    as Encapsulated Frame    |
              | --------------------------> |
              |                             |
              | 6. Server Decapsulation     |
              |    and Routing              |
              | <-------------------------- |
              |                             |
              | 7. Response to Client       |
              |    as Encapsulated Frame    |
              | --------------------------> |
              |                             |

   # Security Considerations The security of the Ethernet-over-HTTPS
   protocol relies on the implementation of TLS.  It ensures the
   confidentiality, integrity, and authenticity of the communication
   between the client and server.  Implementers should adhere to best
   practices for TLS configuration, including the use of strong cipher
   suites, secure protocols, and proper certificate validation.

3.  IANA Considerations

   This document has no IANA actions.

Author's Address

ARAM                      Expires 29 June 2024                  [Page 4]
Internet-Draft                     EOH                     December 2023

   Salim-Amine BOU ARAM
   SKELDUS
   Email: salim@mycio.io

ARAM                      Expires 29 June 2024                  [Page 5]