[Search] [txt|pdf|bibtex] [Tracker] [WG] [Email] [Nits]

Versions: 00 01 02                                                      
Internet Architecture Board                                 P. Faltstrom
Internet-Draft                                           G. Huston, Eds.
Expires: September 14, 2004                                          IAB
                                                          March 16, 2004

                    A Survey of Internet Identities

Status of this Memo

   By submitting this Internet-Draft, I certify that any applicable
   patent or other IPR claims of which I am aware have been disclosed,
   and any of which I become aware will be disclosed, in accordance with
   RFC 3667.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups. Note that other
   groups may also distribute working documents as Internet-Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time. It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at http://

   The list of Internet-Draft Shadow Directories can be accessed at

   This Internet-Draft will expire on September 14, 2004.

Copyright Notice

   Copyright (C) The Internet Society (2004). All Rights Reserved.


   This memo provides an overview of the various realms of
   identification used within the Internet protocol suite, with specific
   observations on the role and purpose of the Domain Name System within
   this environment.

1. Introduction

   In any communications domain where two parties wish to conduct a
   conversation across a network each party must specify to the network
   sufficient information for the network to identify the other party.

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 1]

Internet-Draft            Internet Identities                 March 2004

   When the conversation refers to a resource or service that is
   accessible through the network, the only effective way to refer to
   such a resource of service is to use an identifier that can
   subsequently be passed to the network to perform the access.

   Some networks use a single externally visible identifier structure
   for all parties and services, such as the numbering scheme used in
   the Public Switched Telephone Network (PSTN). Other networks use a
   variety of identifier domains, where each domain has a specific realm
   of discourse or application. The Internet is an example of a
   multiple-identifier network, where there are a number of identity
   realms, each referring to a particular function or area of
   application.  In terms of routing and forwarding IP packets the
   identity realm used is that of IP addresses, while in terms of
   identifying particular services or resources the URI form of identity
   is commonly used. In terms of human use of identities, the most
   common form of identity in the Internet is based upon the domain

   This document examines the role of identities and identifiers,
   together with an overview of the various realms of identity that are
   used in the Internet. The document then looks in more detail at the
   Domain Name System (DNS) and examines its role in relation to these
   identity realms.

1.1 Desirable properties of Internet Identities

   Before exploring the set of Internet-based identity realms, its
   useful to enumerate a set of desirable characteristics of any useful
   identity system. The following list is of characteristics and some
   related questions related to properties of the identifier is proposed
   as a useful, although not comprehensive, collection of identity


      In what realm is the identifier unique?

      Can the same identifier be associated with two or more distinct

      Can multiple identifiers be associated with the same object?

         An identifier can only be used reliably within the realm in
         which it is unique, and uniqueness is most useful when the
         association between identities and objects is a strict 1:1

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 2]

Internet-Draft            Internet Identities                 March 2004


      Is the identity asserted within a consistent identifier space?

         This avoids an assertion of identity being interpreted by
         another party in an unintended manner.


      Does the identity remain constant, or are gratuitous changes in
      the mapping from the identifier to the referenced object avoided?

         Constantly changing identities are, at the very least,
         difficult to track.


      Can a particular identity withstand a challenge as to its

         Other parties who would like to use this identity would like to
         be reassured that they are not being deceived.


      Is the identity realm capable of withstanding deliberate or
      unintentional attempts to corrupt it in various ways?


      If the identity is composed of a number of components, are only
      those components of the identity that are essential to support the
      communication exposed to other parties?

   Referential Consistency:

      If the identity is used in the context of a reference, then when
      the referenced object is altered or relocated, does the identifier
      remain a valid reference to the object?


      Is the token space from which identity values are drawn structured
      or unstructured?

         Structured token spaces allow various forms of retrieval
         operations based on the identity value to be undertaken
         efficiently, while unstructured token spaces allow for more

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 3]

Internet-Draft            Internet Identities                 March 2004

         flexible generation and use of identities within more
         restrictive realms of discourse.

   This list is not attempting to be a complete enumeration of required
   identifier properties, but instead list the most important desireable
   properties of identifier realms in the context of the Internet.

2. A Hierarchy of Identities

   In networking models there is a conceptual layering of functionality,
   starting at the layer of bits on the wire at the media access level
   and moving up a stack of layers through internetworking, end-to-end
   transport and application levels. Each one of these layers creates at
   least one context in which identifiers are used for the
   communication. It would appear that from this perspective an identity
   within the Internet is not just a single identity, but an collection
   of various identities, used in a variety of contexts.

2.1 Media Access Addresses

   There are two generic types of base media in this realm. One is a
   point- to-point media, a bilateral communications system where all
   protocol data units (PDUs) generated by one party are passed to the
   other party. In such environments use of media access addresses are
   not strictly required. The other form of environment is a
   multi-access environment, where a number of parties can communicate
   directly using a common media. In this environment the sender must
   specify the intended recipient of the PDU, and to achieve this all
   connected entities use a unique media access address, and the PDU
   contains the address of the intended recipient. The most common of
   these multi-access media are encompassed within the IEEE 802
   collection of media standards.

   These IEEE 802 technologies share a common structure of Media Access
   Control layer address (MAC address) to uniquely identity devices
   connected within a LAN. There are two forms of this identity space,
   one using a 48 bit identity space (EUI-48 [10]), and the other a 64
   bit space (EUI-64 [11]). Both identity spaces can be considered as
   partially-structured identity spaces, where a number of bits within
   this MAC address determines whether the address has been globally or
   locally assigned. Globally assigned values are globally unique, but
   are structured in such a way that there is no imposed hierarchy
   within the address that could be used for efficient searching, in
   contexts such as, for example, a routing or forwarding application.

   A global MAC address identity certainly passes one of the more basic
   tests of an identity domain, that of uniqueness. Two parties cannot
   assume the same MAC address value and use this same value as a unique

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 4]

Internet-Draft            Internet Identities                 March 2004

   identity. So in a LAN context, a collection of devices can
   distinguish between each other by virtue of this unique MAC address.
   A manufacturer of Ethernet devices is assigned a manufacturer's block
   of Ethernet MAC addresses and uniquely places one address in each
   device. The end consumer has no need to reconfigure the device with a
   new address, nor is there any need to alter existing MAC addresses
   each time the LAN changes with new devices being added. The identity
   space also has a high utilization capability, in that a manufacturer
   can assign individual values to devices sequentially so that the
   identity space can be tightly packed.

   Beyond these attributes there are some real weaknesses in using a MAC
   address as an identity outside the context of a LAN environment. The
   identity space is structured so that it can be readily asserted to be
   globally unique, but has few other distinguishing properties. The
   structure of the identity space reflects the manufacturer of the
   device, not its location within a particular network topology, so its
   of no assistance as a location token. In the context of equating a
   device identity to this network interface identity, the identity has
   limited persistence, in that it follows the interface hardware, not
   the host computer or its use. For example, switching a device from a
   wireless to a wired connection changes its MAC identity. The identity
   has no capability to express any linkage to any other identity
   domain. It has no internal structure of sub-fields that could be
   interpreted as pointers into other identity fields. Its precise
   semantics are to define an interface to a network rather than the
   device itself. This issue of identifier scope comes up in link layer
   security discussions where it may not be the best possible approach
   to bind master session keys to MAC addresses, rather than some other
   identity. Another example, in IEEE 802.11i it is possible for a host
   to have multiple interfaces and therefore there is a significant
   difference between binding an Master Session Key to a MAC address and
   binding to a host identity.

   This lack of a direct association between an interface's MAC address
   and a host device has undesirable effects when it has been assumed
   that a MAC address equates to a host identity. In "Authentication for
   DHCP Messages " [7] where the MAC address takes on the role of the
   DHCP client-identifier, or in the administrative model of IEEE
   802.11-1999 Wired Equivalent Privacy (WEP) [12] it can be an
   administrative burden to keep track of all the network interface
   cards, their MAC addresses and their associated secrets.

   The use of a MAC address in the context of IP is when one node wants
   to send a packet to another local node (with a given IP address). The
   node uses a broadcast query packet with an enclosed address request
   (an ARP request). This query can be interpreted as "Would the device
   that has this particular IP address please respond so that I can

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 5]

Internet-Draft            Internet Identities                 March 2004

   learn its MAC address". The resulting association of IP address to
   MAC address can be cached for a short period of time, and for
   communication over the LAN, using the MAC address is used. In other
   words resolution of a MAC identity is via local dynamic discovery.

   Even despite these limitations, the MAC address is regarded as a
   useful identity mechanism in the context of an identity space. The
   original 48 bit identity specification has been augmented with 16
   padding bits in order to be incorporated into the IEEE 64-bit EUI-64
   global identifier structure, which in turn has been incorporated into
   the IPv6 address architecture as the interface identifier component
   of the unicast address [4].

   It should be noted that this latter action of embedding one identity
   (a MAC address) in another (the IPv6 address) lifts the original
   identity outside its original context. There have been some concerns
   noted where public disclosure of the MAC address within every IPv6
   address also discloses both the unique identifier and, potentially,
   the role of the device. For example, a device manufactured by a
   specialized storage manufacturer is more likely to be a very
   expensive storage subsystem housing mission-critical data. This may
   not be information that is intended to be made public, and a
   follow-up proposal advocated the ability for the interface identifier
   within an IPv6 address to be a temporary randomized value [6].

2.2 IP Addresses

   Moving up one level in the protocol stack model provides an identity
   based on the internetworking layer, namely the IP address. The IPv4
   address is a 32 bit field providing each Internet-connected interface
   with a unique value. IPv6 uses effectively the same construct, using
   a 128 bit identity domain rather than a 32 bit domain. In both cases
   the IP address is a structured identity space where there is a
   globally significant prefix that is used in the context of routing
   and forwarding outside to a particular local domain, and a local part
   that is used to deliver the packet to the correct interface of the
   associated device within the local network. The fact that the
   structure of the address is based on the requirements of routing and
   is therefore topologically sensitive implies that the underlying
   semantics of the IP identity can be most reasonably assumed to be
   temporal rather than persistent.

   As an identity token, an IP address should be unique. It is
   structured to be useful to forward packets to the addressed device,
   and it's well known, in that it's not a secret value.

   An IP address is not everything one could hope for in an identity.
   The IP address identifies an interface, not a device or its user. A

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 6]

Internet-Draft            Internet Identities                 March 2004

   device with multiple active interfaces has multiple IP addresses, and
   while it's obvious to the device itself that it has multiple
   identities, no remote party can tell that the multiple identities are
   in fact pseudonyms, and that the multiple addresses simply reflect
   the potential for multiple paths to reach the same endpoint.

   Furthermore, the IP address is an information-bearing identifier,
   which is structured in such a way that it can be used in routing and
   forwarding. This is helpful in the sense that there is no need to
   deploy a second identity system that refers only to locality within a
   network, however it compromises the use of the address as an
   identity, since in some circumstances a change in the connectivity of
   a local network will require a renumbering of that network, such that
   the address of each individual device will change.

   This is a specific example of the more generic observation about IP
   addresses, namely that the IP address carries both the identity of
   the endpoint in the IP realm and the location of the endpoint in the
   IP network. It is a matter of longstanding study that continues today
   as to the merits of delineating these two roles of identity at the IP
   level, creating one identity realm as a means of uniquely identifying
   an instance of a protocol stack within an end device (variously
   called a " stack identifier" or "endpoint identifier" in previous
   studies) and a second identity realm that is used to identify the
   current location of the identity element within the network
   (typically called a "locator" identity) [1][13].

2.3 Service and Session Identities

   In the TCP/IP protocol suite the next level of identity is that of
   the transport session. In order for a system to advertise a
   particular service that is a point of attachment for clients it
   combines three fields: IP server address, transport protocol
   identity, and the address of the local service identity (port number)
   into a compound identity that describes a particular service port on
   a particular device.

   The port address concept, used in TCP and UDP, represent generic
   identities for service rendezvous points. When combined with an IP
   address they become particular service points, or, identified service
   points, and these compound identification objects (IP address,
   Transport Protocol, Port) are service identifiers.

   The identity concept for transport is further extended by including
   the sender's IP address and port address. The corresponding 5-tuple
   of (Source IP address, Destination IP address, Transport Protocol,
   Source Port, Destination Port) is an identifier for a particular
   instance of a session. Not only is this 5-tuple used at the

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 7]

Internet-Draft            Internet Identities                 March 2004

   destination point to correctly de-multiplex an incoming packet stream
   and send each packet to the correct local instance of the
   application, the session identity can also be used within the network
   to recognize a 'flow' of packets that require identical forwarding
   treatment and may require identical service treatment, if so
   configured. In the latter case the session identity is being used to
   trigger a particular service response within the network, and the
   assumption being made within such contexts is that this 5-tuple is
   sufficiently unique to identify particular sessions to the relevant
   network elements. (SCTP also has a port address, but uses a set of IP
   addresses to identify the remote end. At the network level a 'flow'
   or 'stream' is identified as a collection of 5-tuples, rathar than as
   a single 5-tuple.)

   Session identities are intended to be unique at any point in time, in
   that two distinct sessions will not share a common session identity.
   But their association over time is not unique, in that at a
   subsequent time a different session may use the same 5-tuple. As well
   as impermanence, session level identifiers exhibit a very fine level
   of granularity, and as such are often at a level of detail which is
   too fine to be a useful general identity token across the entire
   Internet realm. One use is to allow a session to construct an
   identity that refers to itself or its correspondant that can then be
   handed into a quality of service policy controller to request a
   specialized service response for the session. Other uses of session
   identities can be found in filters, firewalls and network address
   translators, as well as various forms of middleware applications.

2.4 Routing and Forwarding Identities

   As mentioned above, IP addresses provide information required by
   routing and forwarding systems. Forwarding is undertaken using the
   entire address as the lookup function into a forwarding table, using
   the best match of the address against a table entry as the basis of
   the forwarding decision (where 'best' refers to a precise match
   across the longest sequence of leading bits). Routing within the
   Internet uses a hierarchy of environments, ranging from a non-routed
   multi-access local network, through a set of locally routed networks
   where routing is based on comprehensive knowledge of local network
   topology, through to the interdomain routing environment, where
   routing is based on a sequence of edge-to-edge transits across

   This hierarchy of routing is reflected in the structure of addresses.
   At any point in the routing hierarchy an address is divided into two
   parts, a routing network part and a subnet address part. Early
   definitions of this address structure used a fixed division, while
   later refinements of classless IPv4 addresses and IPv6 both use an

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 8]

Internet-Draft            Internet Identities                 March 2004

   explicit prefix length value that is combined with an IP address
   prefix to form the routing identifier.

   Interdomain IP routing incorporates both routing identifiers and
   routing domains, or "autonomous systems". Within a given routing
   domain, IP routing is performed using only routing identifiers.
   However for routing between domains, IP routing is performed using a
   new identity, the Autonomous System number. The most common
   implementation of inter-domain routing is a distance vector
   distributed computation of inter-domain topology using vectors of AS
   numbers as both a loop detection and a path preference mechanism.
   The AS identity space is an unstructured space of numeric values,
   allocated from a single 16-bit identifier space.

   An IP address is located within a routing system by identifying the
   most specific enclosing routing identifier. Forwarding a packet to a
   specific IP address involves an algorithm of locating the associated
   routing identifier and undertaking the forwarding action associated
   with that object. Coherency of the routing system demands that
   routing identifiers are managed in a consistent fashion. The
   overloading of an IP address as both an IP identity and a component
   of a routing identifier implies that a device's location is
   implicitly described by its IP address. As noted earlier, relocating
   a device to a new network location, or relocating a network to a
   different point in the overall Internet topology necessarily implies
   associating a new IP address with the device. In the absence of any
   other mechanisms, this new IP address replaces the previous IP
   address, changing the device's IP identity, the device's service
   identities and the device's session identities.

2.5  Mobile Identities

   Device and network mobility adds an additional dimension to identity,
   in that mobility implies some level of decoupling of the notion of
   location with that of identity. In one form of approach to this
   generic space, that of device mobility, a device has an additional IP
   address that acts as a 'current locator' that describes the device's
   current location within the network, while the device also retains a
   constant 'home address' that in effect acts as the device's constant
   identity and also acts as the discovery service point for its current
   location. With this approach a 'home agent' acts as a proxy agent for
   the device when it is roaming beyond the confines of its local
   network.  The home agent tunnels traffic sent to the home address to
   an address at the host's current topological location, called the
   'care of' address in Mobile IP. The host is responsible for updating
   the binding between the home address and the care of address in the
   home agent, by sending a binding update message when the care of
   address changes. The mechanism involved in mapping between the home

Faltstrom & Huston, Eds.    Expires September 14, 2004          [Page 9]

Internet-Draft            Internet Identities                 March 2004

   address and care of address is very similar to the mechanism used on
   the local link for the ARP neighbour cache, except IP addresses are
   involved for both.

   This approach raises a critical issue for identities, namely that of
   robustness.  Approaches to mobility need to be aware of a potentially
   hostile environment where third parties may attempt to subvert the
   implicit redirection of traffic by assuming the identity of the
   mobile element through the generation of false updates of the current

2.6 Opportunistic Identities

   This concept of maintaining some form of identity association in the
   face of a communicating within a potentially hostile environment has
   lead to a proposal for an identity token that has its roots in the
   public / private key pairs. In this approach the identity token is
   associated with the public key value of a public / private key pair.
   A message encrypted with a private key can be passed to the other
   party where only the originating party's asserted identity (or public
   key) can decrypt the message.

   Such identity realms can serve to support a reliable assertion that
   the received message originated from the same party that originated
   the communication and that the message has not been tampered with
   while in transit. The identity systems are opportunistic in that they
   are self- generated identities, and have no external structure. The
   implication is that such identities have no particular structure and
   may not be completely unique. For this reason their utility in other
   identity applications where persistence or referential integrity is
   required, such as acting as a persistent reference to other
   attributes of a named object, is limited.

2.7 Domain Names

   The set of identities described so far have no particular
   human-visible aspects of their function. The identity tokens are
   structured to meet a particular purpose, and are not intended, as
   their primary purpose, to be manipulated by humans nor are they
   intended to be used primarily within the realm of human discourse. By
   contrast, the Domain Name System (DNS) was specifically intended to
   be a name realm that is suitable to be included in human discourse,
   yet at the same time to admit enough structure to be manipulated by
   computer applications in a deterministic fashion. In its original
   incarnation the DNS was a simple replacement for the earlier '
   hosts.txt' file, a single replicated host file which was used in the
   early Internet to map a every name in use to its associated IP

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 10]

Internet-Draft            Internet Identities                 March 2004

   The DNS is essentially a hierarchical name space, where the
   hierarchical name structure allows the space to be efficiently
   searched and managed in a distributed fashion, but also supports one
   of the most desirable attributes for an identity space. The explicit
   hierarchy also assists in ensuring uniqueness, as DNS names are
   intended to be unique across the entire name string rather than just
   at the first component, so that "a.b.c" is a different identifier to
   "a.d.e " even though the first token in the domain names, "a", is the
   same in both cases.

   The most common use of the DNS is to map domain names to IP
   addresses, but other uses are possible via mapping a name to a number
   of other defined 'resources'. The core of the DNS is a unique name
   space and a mapping capability that allows a query to be performed to
   retrieve the mapping information for a DNS name for a particular
   class of resource mapping.

   The Domain Name System is more than a set of syntactic rules for
   constructing a well-formed DNS name. The resultant name, if well
   constructed and properly implemented, can be used as a referral token
   to a service environment. In this fashion the DNS encompasses a
   translation service that maps from domain names to defined resources,
   including IP addresses. For example, given a well formed DNS name, a
   DNS lookup can query for a corresponding IP address.  The DNS
   describes a data model, a set of relationships between data objects
   as well as a protocol used to send queries and receive answers.

   As DNS names provide a mapping from a name to a resource, the name
   does not need to change when the resource changes location or some
   other identifying attribute. The mapping changes, but the name
   remains constant, and for this reason domain names can be considered
   to be stable unique identifiers, residing within a structured space
   that can be efficiently searched and managed in a highly distributed

2.8 Uniform Resource Identifiers

   When communicating, applications often need more information than a
   domain name. For electronic mail, for example, the sending
   application must use a combination of the domain name, the TCP
   protocol, the mail delivery or mail agent's service port and the
   mailbox name of the recipient. Other applications require different
   compound identification objects, in accordance with their

   Uniform Resource Locators (URLs) are a subset of a more generic form
   of resource identification, Uniform Resource Identifiers (URIs). As
   an identity space, the URI space is very loosely defined, and it's

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 11]

Internet-Draft            Internet Identities                 March 2004

   quite remarkable as to the extent to which it has spread across the
   world as a form of object identifier, or identity token. URLs refer
   to the subset of URIs that identify resources via a representation of
   their primary access mechanism. Other forms of URIs provide resource
   identification through a name scheme or by other attributes of the

   There are few syntax rules to the Universal Resource Identifier
   space, and only a small amount of common semantic structure. The
   original IETF documentation, RFC 1630 [2], refers quite simply to a
   syntax of a prefix word, a colon, and a following string. Where there
   is hierarchy in the following string, slashes are used to delineate
   the hierarchical levels, and the hierarchy runs from left to right.
   The current generic syntax of URIs is described in RFC 2396 [3], and
   the only change to this generic syntax is to refer to 'schemes', as
   in "<scheme>:<scheme-specific-part>".

   The common usage of URIs has been more structured than this general
   specification, and most URI schemes do not provide a single string
   that is an alias for an identity, but instead form an identity from
   the instructions that specify how to access the resource, in the same
   way as a postal address is often constructed from the instructions as
   to how to deliver a postal letter to you. This form of a URI, which
   can be viewed as a location specification, is the basis of the URL
   scheme. In other words such protocol-scheme URLs consist of what
   could be interpreted as a device selector, an application selector
   and an application-specific string that acts as an object reference.

   Within such protocol-scheme URLs the scheme prefix is an identifier
   that uniquely identifies the service being referenced, or in terms of
   access it references the protocol and port address to be used. The
   first, or top, level of the hierarchical following string is either
   the DNS name of the server, or the DNS name coupled with some
   specific qualification, such as a mail address. Any subsequent
   hierarchical components represent service-specific instructions to be
   specified that lead you to the referenced object.  Thus we have
   "mailto:user@domain.example.com" for a mail specification, where the
   scheme prefix "mailto" identifies the use of the TCP transport
   protocol, a port address of 25 and a protocol of SMTP. The following
   string, "user@domain.example.com" references the mail agent (a DNS
   lookup of "domain.example.com" for an MX resource record) and a value
   to be used in the protocol exchange (delivery to the mailbox
   "user@domain.  example.com"). Similarly, " http://www.example.com/
   directory/hierarchy/index.html" for a specific web page uses "http"
   as a scheme identifier for TCP, port 80, protocol HTTP, the initial
   part of the following string to reference the server (a DNS lookup
   for an A or AAAA resource record for "www.example.com") and an HTTP
   protocol request for "www.example.com/directory/hierarchy/

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 12]

Internet-Draft            Internet Identities                 March 2004


   In this form of the URL identity system uniqueness is keyed from the
   general use of a DNS name within the URL, and the wrapping around the
   DNS string is taking the general form of the DNS as an alias for an
   IP address, and specifying a service point, and then arguments that
   are needed to provide to this service point to retrieve the
   referenced resource. In that way a protocol-scheme URL is closer to a
   description of an algorithm than to an identifier whose structure of
   the identifier is adapted to tasks such as sorting, searching or
   equivalence operations. There are issues with consistency here in
   that while the hierarchically structured string set makes sense to
   one application it may not make any sense in the context of a
   different application.

   The persistence of protocol-scheme URLs is also an issue, in that the
   resource may change location over time, and the corresponding
   algorithm to locate the resource, or URL, must necessarily change as
   well. The other major difference between a structured identifier
   space and the protocol-scheme URL approach is that the structured
   identifier space requires some form of lookup to apply the identity
   into a retrieval system. By changing the outcomes from the lookup
   operation, the identity owner can track changes in the location of
   the resource. In the protocol-scheme URL approach there is no way to
   understand how widely the identity has circulated, and it is not
   possible to update the in-circulation copies of the URL. The property
   of the DNS is that in itself, the DNS identities are simple
   structured tokens, and they require a lookup operation to be
   performed in order to produce an algorithm that allows an application
   to refer to a particular object.  While such protocol-scheme URLs are
   widely used as service and resource identities, they pale in
   significance, persistence and utility when compared with DNS names.
   In other words URLs specify "how" to access a service, while generic
   DNS names can be interpreted as identity tokens that can be used to
   identify a resource (or "who").

   It is also not surprising from this perspective to see the emergence
   of DNS resource records that refer to URLs, such as NAPTR records
   [RFC2915]. In this approach the first DNS lookup retrieves one or
   more URLs that have been associated with the DNS name, and a second
   lookup is used to resolve any DNS names as may be referenced in the
   URL strings. In this framework a service may change its location, or
   the access algorithm may be altered (and by necessity, the URL
   changed), but the DNS identity that maps to this URL remains
   constant. This is one of the clearer forms of delineating identity
   from access mechanisms.

   This mapping can also be used for service discovery. Given the name

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 13]

Internet-Draft            Internet Identities                 March 2004

   of a domain it is possible to look up NAPTR records to discover what
   URLs can be used for communication with that domain. This is for
   example used in the ENUM specification [5]. In ENUM a lookup in DNS
   of NAPTR records for a domain name created from an E.164 number is
   via transformation turned into a list of URLs. This give an ability
   to know what URLs one can use in order to contact the entity referred
   to by a given E.164 number. The more general form of this approach
   can use NAPTR resource records to associate a DNS name with one or
   more resources. The name that has the NAPTR records can be considered
   as an identity token, while the associated NAPTR records provide a
   mapping from this identity to the instantiation of the identified
   service. This approach has been used in the Archive Resource Key
   (ARK) proposal [14].

   Of course not all URIs are protocol-scheme URLs of the form outlined
   above. URIs are a very general construct where the initial "scheme"
   part of the URI determines the structure and semantics of the
   remainder of the URI string. The next section examines that class of
   URIs where persistence of the identity is a specific feature of the
   identity realm, the Uniform Resource Name.

2.9 Uniform Resource Names

   To solve the problem of lack of long term stability for references,
   URNs can be used as an alternative to recursive references into the
   DNS. URNs are generally considered not to be entirely within a human
   realm as they often include what would appear to be long random
   combination of characters. URNs are intended to be globally unique,
   and never reused. As long as a named object exists, it retains that
   name. An object can have many names. The object may cease to exist,
   in which case the URN can no longer be resolved, because the
   resolution service (from URN to URI) is no longer working, but, as
   the name exists (virtually), a new service can be created and the
   object re-established if there is need for it. RFC 3305 [8] talks in
   more detail about the different views which exists on the
   relationship between URIs, URLs and URNs.

2.10 Human Friendly Strings

   URIs have a problem that URNs didn't solve, and that is the ability
   for humans to remember them.  Humans act in a context, so global
   uniqueness is not important at this level of abstraction. Instead,
   when a human uses a name, they normally want a resolution service
   that "does what they want". In this realm the context of the name is
   an important factor in resolving the name to an object, and global
   uniqueness is neither necessary nor assumed.

   This area of human friendly strings is a topic of ongoing work. One

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 14]

Internet-Draft            Internet Identities                 March 2004

   possible goal for a working system is to be able to handle the
   so-called "side of the bus" problem. A human sees something in an
   advertisement on the side of a bus, remembers it (or remembers part
   of it), and when they come to a computer they try to get more
   information about what they have seen. This involves complex language
   and localization (and internationalization) problems.

   No real human friendly naming system exists today on the Internet.

   There has been various ideas connected to "layers above DNS", for
   example mentioned in RFC 3467 [9] (subject of the SIREN Research
   Group in the IRTF). This topic encompasses an effort to decouple the
   naming realms that makes sense to humans, with their various forms of
   implied context for resolution, from the naming realms that work for
   computers, with the implication of explicit specification of
   resolution, and define a mapping between them. The DNS can't handle
   the types of names that often make sense to people, because people
   always work in a context (such as a geographical context of '
   locality'), and it's no longer sufficient for people to fit their
   needs into what DNS can handle. For a long time, it was considered
   possible to overload the semantics of the DNS label
   (machine-parseable, vaguely human- recognizable) but it is becoming
   evident that this is not a tenable approach, and some distinction
   needs to be drawn between DNS names and context-sensitive
   human-friendly strings.

3.  Issues with Identities

3.1 Overloading the IP Address

   An IP address suffers from semantic overload in attempting to carry
   both location and some form of constant identity. If a network or
   individual device changes access providers then this is, in effect, a
   change in network location, and if provider-based address aggregation
   is being used, then the local IP address will change. The same issue
   applies with mobile devices. This implies that an IP address is not
   necessarily a permanent or truly persistent association with a
   device, and such impermanence is a weakness in any persistent
   identity system.

   Another issue with IP addresses, at least in version 4 of the
   protocol, is that of their total span. While 32 bits is still a large
   size, encompassing some 4.4 billion unique addresses, there is an
   inevitable level of wastage in deployment, and a completely exhausted
   32 bit address space may only encompass a connectivity realm of
   perhaps only 1 or 2 billion IP devices. When this is coupled with a
   world of embedded IP devices in all kinds of industrial and consumer
   applications, 1 or 2 billion addresses is insufficient to provide

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 15]

Internet-Draft            Internet Identities                 March 2004

   unique addressing to every possible device.

   In response to these address pressures there has been the
   introduction of a number of technologies that dilute the strong
   binding of IP address with identity. Such approaches tend to treat
   the IP address purely as a routing and forwarding token without any
   of the other attributes of identity, including persistence and public
   association. For example, DHCP, or address-lending, is a commonly
   used method of extending a fixed pool of IP addresses over a domain
   where not every device is connected to the network at any given time,
   or when devices enter and leave a local network over time and need
   addresses only for the time they are within the local network's
   domain. In this form of identity, the association of the device with
   a particular IP address is temporary, and hence there is some
   weakening of the identity concept, as the dynamically-assigned IP
   address is being used primarily for routing and forwarding. This has
   been taken a further step with the use of dynamic Network Address
   Translation (NAT) approaches, where a single device has a pool of
   public addresses to use, and maps a privately used address to one of
   its public addresses when the private device initiates a session with
   a remote public device. The private-side device has no direct
   knowledge of the public address that the NAT edge will use for the
   session, nor does the corresponding public-side device necessarily
   know that it is using a temporary identity association to address the
   private device.

   These forms of changes to the original semantics of an IP address are
   significant architectural changes to the concept of identity at the
   level of IP, particularly in the presence of NATs. The widespread
   deployment of such approaches continues to underline the concept that
   as an identity token there is a lack of persistence in an IP address,
   and the various forms of aliasing weaken its utility as an identity
   system.  The conclusion drawn from these observations is that,
   increasingly, an IP address, in the world of the IPv4 Internet, is
   being seen primarily as a locality token with a very weak association
   with some form of identity.

   Version 6 of IP represents an effort to restructure the address
   field, and the 128 bits of address space represents a very large
   space in which to attempt to place structure. One of the more
   innovative concepts that was discussed within the development of IPv6
   was extending the concept of the IPv6 interface identifier field of
   the address to be a globally unique identifier. This had some obvious
   connotations in being able to identify when the connectivity for a
   device has changed, as in such cases the globally unique interface
   identifier could remain constant while the routing prefix may have
   changed. There was also some potential applications in the area of
   supporting multi-homed networks, where a local network could be seen

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 16]

Internet-Draft            Internet Identities                 March 2004

   via different routing prefixes. At present these aspects of IPv6
   address architecture are the topic of ongoing work in the IETF. One
   of the fundamental issues with this form of approach is management of
   an interface identifier space that is globally unique and persistent,
   as well as being adequately robust.  Current directions of activity
   in this area indicate that the self- assertion of identity using this
   field within IPv6 are insufficiently robust to prevent various forms
   of redirection attacks. Mechanisms currently being investigated are
   looking deeper into various aspects of mechanisms to provide
   corroboration of identity assertion in the face of locator change and
   additional protocol mechanisms appear to be a common feature of the
   current proposals relating to multi-homing and aspects of mobility.

3.2 Dynamic DNS Updates and Nomadism

   An alternative mechanism to revising the semantics of the IP address
   is looking at the concept of moving the role of completing the
   transition of persistent identity into the DNS. Here the constant
   identity of the device is its DNS name. In a mobile context, as the
   device or network it roams across the network, and by using a
   sequence of secure dynamic incremental updates to the DNS, update the
   association of the constant DNS name to the new local IP address.
   This approach has possible applications in various multi-homing

   However, this approach is not without attendant considerations. Much
   of the leverage of the DNS as an efficient lookup mechanism is based
   on extensive use of local caching of DNS information.  Increasing the
   responsiveness of the DNS to dynamic updates implies that the extent
   to which cached information can be retained is compromised, and any
   cache has to refer more frequently to the primary source to refresh
   the currency of the local cached copy. The tradeoff here is greater
   DNS traffic loads and increased DNS server query loads in order to
   get a more responsive name system. Such a mechanism also requires an
   "always available" primary DNS server to accept the incremental
   updates, so that the failure backup mechanism of the DNS with primary
   and secondary servers is compromised in this nomadic model with the
   requirement for primary server availability in order to undertake an
   authoritative update to the DNS.

   An alternative approach is to equip the DNS with an additional
   resource record that contains an identity value in addition to the
   current A or AAAA address values. This approach can be used in
   conjunction with an additional element within the protocol stack that
   could allow the transport layer to operate using this identity field,
   and a new stack element provides a dynamic mapping between this
   identity and a 'current' locator value, where the equivalent current
   locator is passed into the IP protocol element.

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 17]

Internet-Draft            Internet Identities                 March 2004

   An alternative to this approach of changing mappings is to place the
   responsibility for the redirection into the application protocol.
   For example, with SIP, the mobile node could use the REGISTER method
   to change its registration for session setup. This may not be fast,
   but may be faster than dynamic DNS updates and perhaps even fast
   enough for handling initiating new sessions. A mobile HTTP server, on
   the other hand, would have to use HTTP Redirect from a fixed server
   whose address was in the DNS.

3.3 URLs and Persistent Identifiers

   URLs are, as their name suggests, locators rather than location
   independent identifiers. When the resource is relocated, or when
   multiple copies of the same resource exist, the URL scheme cannot
   persist across the change.  Despite the almost universal use of the
   URL within web browsers, URLs are not an ideal candidate for a
   persistent identity.

   This weakness in the URL scheme has lead to the consideration of many
   alternate naming schemes, although the underlying requirements for
   any candidate naming scheme is that it is cleanly mappable into a
   URI-styled format and that there is a robust resolution system
   associated with the name scheme. Resolution is a critical factor
   here, as without the ability operate in a predictable, robust,
   scaleable, trustable and reliable manner when translating an
   identifier into a resource, entity or service access description, the
   identifier scheme is of dubious value.

   The requirement for persistent identifiers is not to dispense with
   URLs, or similar forms of locators and service descriptors, but to
   separate the notions of identification and location, and to use
   distinct label space for each concept, and to use a resolution
   mechanism to map from the identifier to the location descriptor.

   Work on the development of a unique permanent identifier space has
   proceeded concurrently with the formalization of URL schemes, using
   the name of URN (Uniform Resource Name) schemes. A specification
   outlining the minimum requirements of the URN can be found at [RFC
   1737]. The syntax of the URN as expressed in RFC 2141 is as follows:
      urn:<Namespace Identifier (NID)>:<Namespace Specific String (NSS)>
      The NID ensures the global uniqueness of the identifier. The NSS
      can take any form specified by the naming authority provided that
      it is unique within that namespace.

   The simple structure of the identifier reflects recognition of the
   need to accommodate different requirements and different schemes.
   Because the local, or namespace specific, string can be in any form,
   the identifier structure allows maximum flexibility in the identifier

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 18]

Internet-Draft            Internet Identities                 March 2004

   while providing a mechanism to assure global uniqueness and
   facilitating interoperability between discrete systems.

   There is a need to distinguish between naming schemes and resolution
   systems. A naming scheme, as a procedure for creating unique URNs
   that conform to a specific syntax, is independent of the resolution
   service which resolves the URN to locate the resource.  Ideally, a
   naming scheme should not be tied to any specific resolution system
   and a resolution service should be capable of resolving a URN from
   any given name scheme.

   This objective is consistent with the intentions behind the
   development of the URN. A persistent identifier, especially when used
   for archival data must of necessity be capable of outlasting any
   systems and protocols that are currently in use. However the lack of
   a commonly agreed upon resolution system is also a major obstacle to
   the wide deployment of URNs.

   A variety of solutions have been proposed, including the NAPTR
   (Naming Authority PoinTeR) DNS resource record [RFC 2915], that
   provides rules for mapping parts of URIs to domain names and then
   using these domain names as DNS lookup queries to find mapped URIs.
   This was specification has been further refined as the Dynamic
   Delegation Discovery System (DDDS) [ RFC3401, RFC3402, RFC3403,
   RFC3404]. As noted in [RFC3404], " For the short term, the Domain
   Name System (DNS) is the obvious candidate for the resolution
   framework, since it is widely deployed and understood. However, it is
   not appropriate to use DNS to maintain information on a per-resource
   basis.  First of all, DNS was never intended to handle that many
   records.  Second, the limited record size is inappropriate for
   catalogue information. Third, domain names are not appropriate as
   URNs. Therefore our approach is to use the DDDS to locate "resolvers"
   that can provide information on individual resources, potentially
   including the resource itself."

   There appears to be some residual issues over the status of URNs. For
   URNs to achieve widespread deployment, not only is consensus on
   functional requirements and syntax needed, but the ability to
   recognise and resolve URNs should be incorporated into the
   application realm. For example, it would be a reasonable objective to
   incorporate URN support in standard Web browsers. However a
   pre-requisite for this step is the definition and construction of the
   necessary resolving infrastructure, developed either by leveraging
   off the existing Domain Name System or by some other route. As long
   as application developers are uncertain of what is to be accepted as
   a standard resolution mechanism, and while naming scheme developers
   are uncertain of how to register their name and resolution schemes
   these issues will not be fully resolved.

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 19]

Internet-Draft            Internet Identities                 March 2004

   Until the resolution issues are clarified and there is clear
   consensus to adopt a particular specification, implementation of URN
   systems will require some form of application level assistance by way
   of proxy servers. The implication is that use of URNs will require
   encapsulation in a URL in order to specify the appropriate proxy
   server address.

   This approach has already been undertaken in the specification of
   PURLS [PURLS], which is a naming scheme that incorporates within the
   PURL a conventional URL reference to a resolver to specify a PURL
   resolution service and a name part of the URL that the resolution
   service translates to the resource URL. In a web-based context this
   is handed back to the client as an HTTP redirect.

   In comparison, the Handle system [Handles] uses a non-URL name
   scheme, and resolution in applications requires modification of the
   application. The 'handle' itself is a persistent identifier
   consisting of two parts. The syntax is a two part identifier of
   "<naming authority>/< name>" where the naming authority is an
   administrative unit authorised to create and maintain handles and the
   name of the resource is a string which must be unique to that
   authority but which has no prescribed syntax. Use of handles can be
   through standard web browsers using a plug-in, or through unmodified
   web clients using proxy servers and embedding the handle within a URL
   that specifies a handle resolver in a manner similar to the PURL
   approach. The specification of a distinct handle syntax allows
   handles to be used in a broader set of contexts than web browsing as
   there is independence of the identifier to a particular access
   protocol and server location.

   The issue of resolution of the compound identifiers remains
   problematic, and the use of embedding the URN into a proxy URL to
   undertake redirection can be argued as defeating the purpose of
   having location and protocol independent identifiers, since the
   resultant identifier includes the location of the proxy agent. The
   full value of persistent identifiers to ensure persistence in
   citations can only be realised if they are actually useful when
   citing documents and objects.  In order to use them, the user must
   know that there is a persistent identifier and must be able to
   discover what it is and how to resolve the identity. At present this
   is difficult because of the nature of the redirects used in most
   existing systems.

4. The DNS in Identity Spaces

   How good are any of these identities? Which one should be used in
   which context?

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 20]

Internet-Draft            Internet Identities                 March 2004

   Each of these digital identities have a context of usage, or realm of
   discourse, and outside of that realm they tend to break down as a
   cohesive and useful identity tool. Offering a MAC address as an email
   point of contact makes little sense, even though it could conceivably
   be used to form a unique identity in the mail realm. Offering an
   identification at the appropriate level of abstraction that provides
   a description of the mode of contact and identity in a form that
   matches the actions at this level is often used to distinguish
   between identities. At the level of human interaction we commonly
   identify email addresses using a domain and user name part. We do
   this because this is what you need to enter into your mail
   application in order to send me a message.

   There are considerations when generating identity spaces based on
   generic descriptions of algorithms of how to access the specific
   resource, trigger the particular application or contact a particular
   individual or role's network point of presence. These considerations,
   commonly found in conjunction with URI's, raise consideration of
   maintaining referential integrity, allowing efficient searching and
   persistence of the identity. The human world, and its digital
   counterpart, is far from static. Any identity system that aspires to
   be useful in a human space needs to be able to support a maintenance
   function that allows any implicit reference that is contained in an
   identity space to be updated and refreshed in a reliable, trustable
   and timely manner. Knowing who you were is a less important piece of
   information as compared to knowing who you are right now. That leads
   to consideration of structured identity spaces whose two major
   attributes are:
   o  sufficient structure to ensure that specific instances of the
      identity are unique, and

   o  appropriate structure to allow rapid lookup of the identity to be
      able to retrieve the current set of associated pointers within
      various specified realms.

   There is a good match between these desired attributes and those of
   the DNS, and one perspective to be drawn from this is that the major
   underpinning of useful and lasting digital identities rests within
   the framework of the DNS. In other words any useful identity space is
   highly likely to have managerial and operational characteristics that
   would largely parallel that of the DNS.

4.1 The role of the DNS

   Different identities are used in the Internet for different purposes.
   IP addresses are essential at the level of forwarding protocol data
   units across the network, but are unwieldy to use in the context of

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 21]

Internet-Draft            Internet Identities                 March 2004

   naming resources and services at the level of human operation of
   applications. In the context of URIs, the use of a DNS identity
   within a URI ensures that the identity of a service doesn't have to
   be changed when the IP address changes. The domain name creates an
   abstraction layer above the IP addresses that allows a service to be
   identified without particular reference to its current location
   within the Internet, and using a name realm that has better
   properties for human use.

   We could use something else, like static tables, databases or more
   similar systems like X.500. But, none of these alternatives have been
   able to prove they scale as well as DNS. Both the protocol itself and
   the data model with the distributed delegation has proven to be
   extremely efficient (even though some things could be "better").

   The perspective being espoused here is that we don't have any current
   viable alternative to the DNS in terms of a structured identity space
   that supports mapping across identity realms. Even if we stop using
   domain names in URI's and instead using something else, deploying a
   translation service from this other name to IP addresses would
   inevitably involve recreating much of the functionality of the DNS.

4.2 Changing the DNS

   Because DNS is the service we use for mapping between many of the
   namespaces we use on the Internet, it is extremely important it
   works. Because of this, changes to DNS must be made with care. This
   refers to both changes to the protocol as well as the DNS data model.

   Example of changes to the protocol include the need for DNSSEC
   (signed record sets) which makes it possible for a recipient of a DNS
   response to verify whether it comes from an authoritative source.
   This has been discussed in the IETF for some years, and is
   illustrative of the required level of care in the design of changes
   to the DNS.

   Example of a change to the database structure include a move from an
   hierarchical to a flatter namespace.  The result might be a
   disruptive change of DNS traffic on the global Internet which in turn
   might make further scaling difficult. Another similar change is
   allocation of names which are not registered properly.  Especially in
   the root zone, this leads to problems such as the inability to later
   allocate and set a policy for the domain, and increased number of
   queries for non-existing names in the root zone when leakage of names
   happens from presumed to be closed networks. Example of the former
   are the very large TLDs like .com and .de. Example of the latter is
   the use of the pseudo TLDs '.local' and '.gprs' which are being used
   in private or enterprise contexts without any proper definition or

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 22]

Internet-Draft            Internet Identities                 March 2004

   registration and their consequent leakage of queries into the
   'public' DNS.

4.3 The DNS is a strict lookup service

   When sending a query to a server, the server is to send the same data
   back regardless of context. Further, the server should send either a
   "match" which consists of one or more resource records, or a
   "failure" which include the special response "no such domain".

   This implies that two users sending the same query from two different
   locations at the same time should receive the same data in response.
   Or, the same user using two different computers with different
   operating system should receive the same data.

   Having the DNS server doing a "search" or "fuzzy matching" is ill-
   advised, because the DNS server can not know the context of the
   query, nor what the DNS response is to be used for. It is always easy
   to guess that the response is to be used by the most popular
   operating system, for the most popular application. It must though be
   remembered that other operating systems and other applications might
   break when fuzzy matching happens. For example, instead of giving
   back a "no such response" it is conceivable to give back something
   which pushes a potential error to the application layer by returning
   a synthesized answer that has resource records pointing to some form
   of application- level service. This implies the DNS server must know
   what application layer protocol is in use, and that a "no" at the
   application layer has the same semantics as a "no" on the DNS
   (naming) layer. Often TCP is used at the application layer which
   implies a "no" might only be signalled to the other end by not
   accepting the connection, which means the querying client cannot
   differentiate between "no such (dns) name" and "no response in
   application protocol".

4.4  Coherency of the DNS

   DNS is a bootstrap mechanism that publishes your data in a manner
   that allows queries from others to be answered. If you make mistakes
   in your local DNS configuration then you don't destroy the utility of
   the DNS for yourself, but you destroy the ability for others to
   contact you. Someone trying to reach your webpage might not be able
   to do so as they can not find the proper translation from your domain
   name to the IP address of the web server. It is also the case that
   mis-configurations most often happen in the glue between parent zone
   and child zone, and not in the child zone itself. Because of this, if
   you know where your nameserver is, you might not see the errors, as
   they have to do with finding the nameserver, and not the content of

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 23]

Internet-Draft            Internet Identities                 March 2004

   As mentioned before, it is very important the same response is sent
   back regardless of from where it is sent. The assumption within the
   DNS is that you should be able to pass a URI with an embedded domain
   name in it to all of your friends, and they all should be able to
   resolve it in an identical fashion. It is extremely important the
   domain names are globally unique, and lead to the same result every
   time, and from every location.

   Part of the coherence requirement is that the servers must be able to
   give back the same response to the same query.  The implication is
   that all servers have to use the same matching algorithms when
   attempting to locate a match between a query and the local data used
   to form a response. What matching algorithm is used when looking in
   the data cannot change between servers because then they will give
   back different results for the same query.

   Complications arise when considering this in the context of use of
   various character sets within the DNS. Having each server use a local
   set of rules that defines equivalence of characters generates the
   situation of the same query generating different responses. The
   implication is that the consideration of different matching/equality
   rules can be solved by creating "bundles" of characters which are to
   be treated as equal, and solving the problem at the time of
   registration. This gives a greater choice for the registrant, and it
   can also give a higher freedom regarding context, as the bundles
   possibly look differently depending on such things like (parent)
   domain and language.

4.5 The DNS as an Identity Glue

   When comparing the desired attributes of a useful identity system to
   the properties of the DNS it is evident that there is a reasonable
   level of fit between the DNS and a generic identity realm. The DNS
   provides a namespace that ensures uniqueness, is consistent, can
   support persistence, and referential consistency. There are a number
   of compromises that have, necessarily, been made in the design of the
   DNS. The space is structured in a manner that supports relatively
   efficient lookup over a large name space that has both hierarchical
   structuring and within that some areas of large flat name spaces. The
   DNS can support trust models in terms of being able to validate the
   authenticity of responses. The DNS can support a variety of resource
   records that allow a DNS name token to be used as a search object
   that can map to related values drawn from other identifier realms, as
   well as supporting indirect self-reference through the use of NAPTR
   records and URIs.

   There are obvious trade-offs in the design, protocol and deployment
   of the DNS in terms of resiliency, dynamic behaviours and

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 24]

Internet-Draft            Internet Identities                 March 2004

   scalability. While it is not argued here that the DNS represents the
   only optimal trade-off between these properties, it is argued that
   any other identity space with similar properties will be faced with
   precisely the same set of trade-offs. It is also probable that any
   similar identity space faced with the same requirements of
   scalability, operational performance, accuracy and validity of
   responses and flexibility of mapping the identity space to related
   objects in other identity realms would find a resolution between
   these requirements in a manner that would not differ markedly from
   the DNS.

   The salient observation here is that an identity system acts
   generically as a reference to an initial point of rendezvous in a
   communication transaction. In this vein the role of the identity
   system is to identify how other parties in the network can refer to
   the identified element using an identity token that is persistent,
   with associated referential mappings into other identity realms that
   reflect the current status of the element. Once a communications
   state has been established using the rendezvous points, if there are
   characteristics of the application that require the subsequent
   exchange of information (such as location changes in a mobility
   environment, or a server hand-over at the application level) this is
   generally the task of components within the protocol stack, using a
   trust relationship between the communicating parties to alter the
   identity elements used within the stack to match the changing

5. Security Considerations

   [To be completed. Topics include wrong domain, napping, grabbing
   misspellings, multiple roots, etc. ]

   [Also note that: identity realms need to operate with authenticity
   that can be verified in a trustable manner. DNNSEC is your friend.]

6. Acknowledgements

   The editors acknowledge the contributions made by Leslie Daigle and
   James Kempf.

Normative References

Informative References

   [1]   Saltzer, J., "On the Naming and Binding of Network
         Destinations", RFC 1498, August 1993.

   [2]   Berners-Lee, T., "Universal Resource Identifiers in WWW: A

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 25]

Internet-Draft            Internet Identities                 March 2004

         Unifying Syntax for the Expression of Names and Addresses of
         Objects on the Network as used in the World-Wide Web", RFC
         1630, June 1994.

   [3]   Berners-Lee, T., Fielding, R. and L.  Masinter, "Uniform
         Resource Identifiers (URI): Generic Syntax", RFC 2396, August

   [4]   Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6)
         Specification", RFC 2460, December 1998.

   [5]   Faltstrom, P., "E.164 number and DNS", RFC 2916, September

   [6]   Narten, T. and R. Draves, "Privacy Extensions for Stateless
         Address Autoconfiguration in IPv6", RFC 3041, January 2001.

   [7]   Droms, R. and W. Arbaugh, "Authentication for DHCP Messages",
         RFC 3118, June 2001.

   [8]   Mealling, M. and R. Denenberg, "Report from the Joint W3C/IETF
         URI Planning Interest Group: Uniform Resource Identifiers
         (URIs), URLs, and Uniform Resource Names (URNs): Clarifications
         and Recommendations", RFC 3305, August 2002.

   [9]   Klensin, J., "Role of the Domain Name System (DNS)", RFC 3467,
         February 2003.

   [10]  IEEE, "Guidelines for use of a 48-bit Global Identifier
         (EUI-48)", December 2003, <http://standards.ieee.org/regauth/

   [11]  IEEE, "Guidelines for 64-bit Global Identifier (EUI-64)
         Registration Authority", December 2003, <http://

   [12]  IEEE, "802.11 Wireless", December 2003, <http://

   [13]  Shoch, J., "Internetwork Naming, Addressing, and Routing",
         Proceedings of the 17th IEEE Computer Society International
         Conference pp. 72-79, December 1978.

   [14]  Kunze, J. and R. Rodgers, "The ARK Persistent Identifier
         Scheme", draft-kunze-ark-07 (work in progress), February 2004.

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 26]

Internet-Draft            Internet Identities                 March 2004

Authors' Addresses

   Patrik Faltstrom
   Internet Architecture Board

   Geoff Huston
   Internet Architecture Board

Appendix A. IAB Members

   Internet Architecture Board Members at the time this document was
   completed were:

      Bernard Aboba
      Harald Alvestrand
      Rob Austein
      Leslie Daigle
      Patrik Faltstrom
      Sally Floyd
      Jun-ichiro Itojun Hagino
      Mark Handley
      Geoff Huston
      Pete Resnick
      Bob Hinden
      Eric Rescorla
      Jonathan Rosenberg

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 27]

Internet-Draft            Internet Identities                 March 2004

Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights. Information
   on the IETF's procedures with respect to rights in IETF Documents can
   be found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard. Please address the information to the IETF at

Disclaimer of Validity

   This document and the information contained herein are provided on an

Copyright Statement

   Copyright (C) The Internet Society (2004). This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


   Funding for the RFC Editor function is currently provided by the
   Internet Society.

Faltstrom & Huston, Eds.    Expires September 14, 2004         [Page 28]