P2PSIP Working Group                                            A. Knauf
Internet-Draft                                         T C. Schmidt, Ed.
Intended status: Standards Track                             HAW Hamburg
Expires: April 12, 2013                                          G. Hege
                                                             daviko GmbH
                                                            M. Waehlisch
                                                    link-lab & FU Berlin
                                                         October 9, 2012


             A Usage for Shared Resources in RELOAD (ShaRe)
                       draft-ietf-p2psip-share-00

Abstract

   This document defines a RELOAD Usage for managing shared write access
   to RELOAD Resources.  Shared Resources in RELOAD (ShaRe) form a basic
   primitive for enabling various coordination and notification schemes
   among distributed peers.  Access in ShaRe is controlled by a
   hierarchical trust delegation scheme maintained within an access
   list.  A new USER-CHAIN-ACL access policy allows authorized peers to
   write a Shared Resource without owning its corresponding certificate.
   This specification also adds mechanisms to store Resources with a
   variable name which is useful whenever peer-independent rendezvous
   processes are required.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 12, 2013.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.




Knauf, et al.            Expires April 12, 2013                 [Page 1]


Internet-Draft                    ShaRe                     October 2012


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Shared Resources in RELOAD . . . . . . . . . . . . . . . . . .  5
     3.1.  Mechanisms for Isolating Stored Data . . . . . . . . . . .  6
   4.  Access Control List Definition . . . . . . . . . . . . . . . .  7
     4.1.  Overview . . . . . . . . . . . . . . . . . . . . . . . . .  7
     4.2.  Data Structure . . . . . . . . . . . . . . . . . . . . . .  8
   5.  Extension for Variable Resource Names  . . . . . . . . . . . . 10
     5.1.  Overview . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.2.  Data Structure . . . . . . . . . . . . . . . . . . . . . . 10
     5.3.  Overlay Configuration Document Extension . . . . . . . . . 11
   6.  Access Control to Shared Resources . . . . . . . . . . . . . . 13
     6.1.  Granting Write Access  . . . . . . . . . . . . . . . . . . 13
     6.2.  Revoking Write Access  . . . . . . . . . . . . . . . . . . 14
     6.3.  Validating Write Access through an ACL . . . . . . . . . . 14
     6.4.  Operations of Storing Peers  . . . . . . . . . . . . . . . 15
     6.5.  Operations of Accessing Peers  . . . . . . . . . . . . . . 15
     6.6.  USER-CHAIN-ACL Access Policy . . . . . . . . . . . . . . . 15
   7.  ACL Kind Definition  . . . . . . . . . . . . . . . . . . . . . 17
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 18
     8.1.  Resource Exhaustion  . . . . . . . . . . . . . . . . . . . 18
     8.2.  Malicious or Misbehaving Storing Peer  . . . . . . . . . . 18
     8.3.  Privacy Issues . . . . . . . . . . . . . . . . . . . . . . 18
   9.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 19
   10. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 20
   11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 21
     11.1. Normative References . . . . . . . . . . . . . . . . . . . 21
     11.2. Informative References . . . . . . . . . . . . . . . . . . 21
   Appendix A.  Change Log  . . . . . . . . . . . . . . . . . . . . . 22
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 23








Knauf, et al.            Expires April 12, 2013                 [Page 2]


Internet-Draft                    ShaRe                     October 2012


1.  Introduction

   This document defines a RELOAD Usage for managing shared write access
   to RELOAD Resources and a mechanism to store Resources with a
   variable name.  The Usage for Shared Resources in RELOAD (ShaRe)
   enables overlay users to share their exclusive write access to
   specific Resource/Kind pairs with others.  Shared Resources form a
   basic primitive for enabling various coordination and notification
   schemes among distributed peers.  Write permission is controlled by
   an Access Control List (ACL) Kind that maintains a chain of
   Authorized Peers for a particular Shared Resource.  A newly defined
   USER-CHAIN-ACL access control policy enables shared write access in
   RELOAD.

   The Usage for Shared Resources in RELOAD is designed for jointly
   coordinated group applications among distributed peers (e.g., third
   party registration, or distributed conferencing,
   see[I-D.knauf-p2psip-disco]).  Of particular interest are rendezvous
   processes, where a single identifier is linked to multiple, dynamic
   instances of a distributed cooperative service.  Shared write access
   is based on a trust delegation mechanism.  It transfers the
   authorization to write a specific Kind data by storing logical Access
   Control Lists.  An ACL contains the ID of the Kind to be shared and
   contains trust delegations from one authorized to another (previously
   unauthorized) user.

   Shared write access augments the RELOAD security model, which is
   based on the restriction that peers are only allowed to write
   resources at a small set of well defined locations (Resource-IDs) in
   the overlay.  Using the standard access control rules in RELOAD,
   these locations are bound to the username or Node-ID in the peer's
   certificate.  This document extends the base policies to enable a
   controlled write access for multiple users to a common Resource Id.

   Additionally, this specification defines an optional mechanism to
   store Resources with a variable Resource Name.  It enables the
   storage of Resources whose name complies to a specific pattern.
   Definition of the pattern is arbitrary, but must contain the username
   of the Resource creator.












Knauf, et al.            Expires April 12, 2013                 [Page 3]


Internet-Draft                    ShaRe                     October 2012


2.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].


   This document uses the terminology and definitions from the RELOAD
   base [I-D.ietf-p2psip-base]and the peer-to-peer SIP concepts draft
   [I-D.ietf-p2psip-concepts].  Additionally, the following terms are
   used:

   Shared Resource:  The term Shared Resource in this document defines a
      RELOAD Resource with its associated Kinds, that can be written or
      overwritten by multiple RELOAD users following the specifications
      in this document.

   Access Control List:  The term Access Control List in this document
      defines a logical list of RELOAD users allowed to write a specific
      RELOAD Resource/Kind pair by following the specifications in this
      document.  The list items are stored as Access Control List Kinds
      that map trust delegations from user A to user B, where A is
      allowed to write a Shared Resource and the Access Control List,
      while B is a user that obtains write access to specified Kinds
      from A.

   Resource Owner:  The term Resource Owner in this document defines a
      RELOAD peer that initially stored a Resource to be shared.  The
      Resource Owner possesses the RELOAD certificate that grants write
      access to a specific Resource/Kind pair using the RELOAD
      certificate-based access control policies.

   Authorized Peer:  The term Authorized Peer in this document defines a
      RELOAD peer that was granted write access to a Shared Resource by
      permission of the Resource Owner or another Authorized Peer.
















Knauf, et al.            Expires April 12, 2013                 [Page 4]


Internet-Draft                    ShaRe                     October 2012


3.  Shared Resources in RELOAD

   A RELOAD user that owns a certificate for writing at a specific
   overlay location can maintain one or more RELOAD Kinds that are
   designated for a non-exclusive write access shared with other RELOAD
   users.  The mechanism to share those Resource/Kind pairs with a group
   of users consists of two basic steps.

   1.  Storage of the Resource/Kind pairs to be shared.

   2.  Storage of an Access Control List (ACL) associated with those
       Kinds.

   ACLs are created by the Resource Owner and contain ACL items, each
   delegating the permission of writing the shared Kind to a specific
   user called Authorized Peer.  For each shared Kind data, its Resource
   owner stores a root item that initiates an Access Control List.
   Trust delegation to the Authorized Peer can include the right to
   further delegate the write permission, enabling a tree of trust
   delegations with the Resource Owner as trust anchor at its root.

   The Resource/Kind pair to be shared can be any RELOAD Kind that
   complies to the following specifications:

   Isolated Data Storage:  To prevent concurrent writing from race
      conditions, each data item stored within a Shared Resource SHALL
      be exclusively maintained by the RELOAD user who created it.
      Hence, Usages that allow the storage of Shared Resources are
      REQUIRED to use either the array or dictionary data model and
      apply additional mechanisms for isolating data as described in
      Section 3.1.

   Access Control Policy:  To ensure write access to Shared Resource by
      Authorized Peers, each Usage MUST use the USER-CHAIN-ACL access
      policy as described in Section 6.6.

   Resource Name Extension:  To enable Shared Resources to be stored
      using a variable resource name, this document defines an optional
      ResourceNameExtension structure.  It contains the Resource Name of
      the Kind data to be stored and allows any receiver of a shared
      data to validate whether the Resource Name hashes to the
      Resource-ID.  The ResourceNameExtension is made optional by
      configuration.  The ResourceNameExtension field is only present in
      the Kind data structure when configured in the corresponding kind-
      block of the overlay configuration document (for more details see
      Section 5.3).  If the configuration allows variable resource
      names, a Kind using the USER-CHAIN-ACL policy MUST use the
      ResourceNameExtension as initial field within the Kind data



Knauf, et al.            Expires April 12, 2013                 [Page 5]


Internet-Draft                    ShaRe                     October 2012


      structure definition.  Otherwise the Kind data structure does not
      contain the ResourceNameExtension structure.

3.1.  Mechanisms for Isolating Stored Data

   This section defines mechanisms to avoid race conditions while
   concurrently writing an array or dictionary of a Shared Resource.

   If a dictionary is used in the Shared Resource, the dictionary key
   MUST be the Node-ID of the certificate that will be used to sign the
   stored data.  Thus data access is bound to the unique ID-holder.

   If the data model of the Shared Resource is an array, the following
   algorithm will generate an array index that avoids collisions.

   1.  Obtain the Node-ID of the certificate that will be used to sign
       the stored data

   2.  Take the least significant 24 bits of that Node-ID

   3.  Concatenate an 8 bit long short individual index value to those
       24 bit of the Node-ID

   The resulting 32 bits long integer MUST be used as the index for
   storing an array entry in a Shared Resource.  The 8 bit individual
   index can be incremented individually for further array entries and
   allows for 256 distinct entries per Peer.

   The mechanism to create the array index is related to the pseudo-
   random algorithm to generate an SSRC identifier in RTP, see Section
   8.1 in [RFC3550] for calculating the probability of a collision.




















Knauf, et al.            Expires April 12, 2013                 [Page 6]


Internet-Draft                    ShaRe                     October 2012


4.  Access Control List Definition

4.1.  Overview

   An Access Control List (ACL) is a (self-managed) shared resource that
   contains a list of AccessControlListItem structures as defined in
   Section 4.2.  Each entry delegates write access for a specific Kind
   data to a single RELOAD user.  An ACL enables the RELOAD user who is
   authorized to write a specific Resource-ID to delegate his exclusive
   write access to a specific Kind to further users of a RELOAD
   instance.  Each Access Control List data structure therefore carries
   the information about who obtains write access, the Kind-ID of the
   Resource to be shared, and whether delegation includes write access
   to the ACL itself.  The latter condition grants the right to delegate
   write access further for the Authorized Peer.  Access Control Lists
   are stored at the same overlay location as the Shared Resource and
   use the RELOAD array data model.  They are initially created by the
   Resource Owner.

   Figure 1 shows an example of an Access Control List.  We omit the
   res_name_ext field to simplify illustration.  The array entry at
   index 0x123abc001 displays the initial creation of an ACL for a
   Shared Resource of Kind-ID 1234 at the same Resource-ID.  It
   represents the root item of the trust delegation tree for this shared
   RELOAD Kind.  The root entry MUST contain the username of the
   Resource owner in the "to_user" field and can only be written by the
   owner of the public key certificate associated with this Resource-ID.
   The allow_delegation (ad) flag for a root ACL item is set to 1 by
   default.  The array index is generated by using the mechanism for
   isolating stored data as described in Section 3.1.  Hence, the most
   significant 24 bits of the array index (0x123abc) are the least
   significant 24 bits of the Node-ID of the Resource Owner.

   The array item at index 0x123abc002 represents the first trust
   delegation to an Authorized Peer that is thus permitted to write to
   the Shared Resource of Kind-ID 1234.  Additionally, the Authorized
   peer Alice is also granted (limited) write access to the ACL as
   indicated by the allow_delegation flag (ad) set to 1.  This
   configuration authorizes Alice to store further trust delegations to
   the Shared Resource, i.e., add items to the ACL.  On the contrary,
   index 0x456def001 illustrates trust delegation for Kind-ID 1234, in
   which the Authorized Peer Bob is not allowed to grant access to
   further peers (ad = 0).  Each Authorized Peer signs its ACL items
   with its own private key, which makes the item ownership transparent.

   To manage Shared Resource access of multiple Kinds at a single
   location, the Resource Owner can create new ACL entries that refer to
   another Kind-ID as shown in array entry index 0x123abc003.  Note that



Knauf, et al.            Expires April 12, 2013                 [Page 7]


Internet-Draft                    ShaRe                     October 2012


   overwriting existing items in an Access Control List that reference a
   different Kind-ID revokes all trust delegations in the corresponding
   subtree (see Section 6.2).  Authorized Peers are only enabled to
   overwrite existing ACL item they own.  The Resource Owner is allowed
   to overwrite any existing ACL item, but should be aware of its
   consequences.

          +------------------------------------------------------+
          |                Access Control List                   |
          +-----------+------------------------------+-----------+
          |  #Index   |       Array Entries          | signed by |
          +-----------+------------------------------+-----------+
          | 123abc001 | to_user:Owner Kind:1234 ad:1 |   Owner   |
          +-----------+------------------------------+-----------+
          | 123abc002 | to_user:Alice Kind:1234 ad:1 |   Owner   |
          +-----------+------------------------------+-----------+
          | 123abc003 | to_user:Owner Kind:4321 ad:1 |   Owner   |
          +-----------+------------------------------+-----------+
          | 123abc004 | to_user:Carol Kind:4321 ad:0 |   Owner   |
          +-----------+------------------------------+-----------+
          |    ...    |           ...                |    ...    |
          +-----------+------------------------------+-----------+
          | 456def001 | to_user:Bob   Kind:1234 ad:0 |   Alice   |
          +-----------+------------------------------+-----------+
          |    ...    |           ...                |    ...    |
          +-----------+------------------------------+-----------+

    Figure 1: Simplified example of an Access Control including entries
   for two different Kind-IDs and varying delegation (ad) configurations

   Implementations of ShaRe should be aware that the trust delegation in
   an Access Control List need not be loop free.  Self-contained
   circular trust delegation from A to B and B to A are syntactically
   possible, even though not very meaningful.

4.2.  Data Structure

   The Kind data structure for the Access Control List is defined as
   follows:


   struct {
        /* res_name_ext is optional, see documentation */
        ResourceNameExtension  res_name_ext;
        opaque                 to_user<0..2^16-1>;
        KindId                 kind;
        Boolean                allow_delegation;
   } AccessControlListItem;



Knauf, et al.            Expires April 12, 2013                 [Page 8]


Internet-Draft                    ShaRe                     October 2012


   The AccessControlListItem structure is composed of:

   res_name_ext:  This optional field contains the Resource Name of a
      ResourceNameExtension (see Section 5.2) to be used by a Shared
      Resource with variable resource name.  This name serves the
      storing peer for validating, whether a variable resources name
      matches one of the predefined naming pattern from the
      configuration document for this Kind.  The presence of this field
      is bound to a variable resource name element in the corresponding
      kind-block of the configuration document whose "enable" attribute
      is set to true (see Section 5.3).  Otherwise, if the "enable"
      attribute is false, the res_name_ext field SHALL NOT be present in
      the Kind data structure.

   to_user:  This field contains the username of the RELOAD peer that
      obtains write permission to the Shared Resource.

   kind:  This field contains the Kind-ID of the Shared Resource.

   allow_delegation:  If true, this Boolean flag indicates that the
      Authorized Peer in the 'to_user' field is allowed to add
      additional entries to the ACL for the specified Kind-ID.





























Knauf, et al.            Expires April 12, 2013                 [Page 9]


Internet-Draft                    ShaRe                     October 2012


5.  Extension for Variable Resource Names

5.1.  Overview

   In certain use cases such as conferencing (c.f.
   [I-D.knauf-p2psip-disco]) it is desirable to increase the flexibility
   of a peer in using Resource Names beyond those defined by the
   username or Node-ID fields in its certificate.  For this purpose,
   this document presents the concept for variable Resources Names that
   enables providers of RELOAD instances to define relaxed naming
   schemes for overlay Resources.

   Each RELOAD node uses a certificate to identify itself using its user
   name (or Node-ID) while storing data under a specific Resource-ID.
   The specifications in this document scheme adhere to this paradigm,
   but enable a RELOAD peer to store values of Resource Names that are
   derived from the username in its certificate.  This is done by using
   a Resource Name with a variable substring that still matches the
   username in the certificate using a pattern defined in the overlay
   configuration document.  Thus despite being variable, an allowable
   Resource Name remains tied to the Owner's certificate.  A sample
   pattern might be formed as follows.

   Example Pattern:
   .*-conf-$USER@$DOMAIN

   When defining the pattern, care must be taken to avoid conflicts
   arising from two usernames of witch one is a substring of the other.
   In such cases, the holder of the shorter name could threaten to block
   the resources of the longer-named peer by choosing the variable part
   of a Resource Name to contain the entire longer username.  This
   problem can easily be mitigated by delimiting the variable part of
   the pattern from the username part by some fixed string, that by
   convention is not part of a username (e.g., the "-conf-" in the above
   Example).

5.2.  Data Structure

   This section defines the optional ResourceNameExtension structure for
   every Kind that uses the USER-CHAIN-ACL access control policy.











Knauf, et al.            Expires April 12, 2013                [Page 10]


Internet-Draft                    ShaRe                     October 2012


   enum { pattern  (1),
   (255)} ResourceNameType;

   struct {
     ResourceNameType type;
     uint16           length;
     select(type) {
         case pattern:
           opaque resource_name<0..2^16-1>;

         /* Types can be extended */
     }
   } ResourceNameExtension

   The content of the ResourceNameExtension consist of

   length:  This field contains the length of the remaining data
      structure.  It is only used to allow for further extensions to
      this data structure.

   The content of the rest of the data structure depends of the
   ResourceNameType.  Currently, the only defined type is "pattern".

   If the type is "pattern", then the following data structure contains
   an opaque <0..2^16-1> field containing the Resource Name of the Kind
   being stored.  The type "pattern" further indicates that the Resource
   Name MUST match to one of the variable resource name pattern defined
   for this Kind in the configuration document.

   The ResourceNameType enum and the ResourceNameExtension structure can
   be extended by further Usages to define other naming schemes.

5.3.  Overlay Configuration Document Extension

   This section extends the overlay configuration document by defining
   new elements for patterns relating resource names to user names.

   The <variable-resource-names> element serves as a container for one
   or multiple <pattern> sub-elements.  It is an additional parameter
   within the kind block and has a boolean "enable" attribute that
   indicates, if true, that the overlay provider allows variable
   resource names for this Kind.  The default value of the "enable"
   attribute is "false".  In the absence of a <variable-resource-names>
   element for a Kind using the USER-CHAIN-ACL access policy (see
   Section 6.6), implementors SHOULD assume this default value.

   A <pattern> element MUST be present if the "enabled" attribute of its
   parent element is set to true.  Each <pattern> element defines a



Knauf, et al.            Expires April 12, 2013                [Page 11]


Internet-Draft                    ShaRe                     October 2012


   pattern for constructing extended resource names for a single Kind.
   It is of type xsd:string and interpreted as a regular expression.  In
   this regular expression, $USER and $DOMAIN are used as variables for
   the corresponding parts of the string in the certificate username
   field (with $USER preceding and $DOMAIN succeeding the '@').  Both
   variables MUST be present in any given pattern definition.  If no
   pattern is defined for a Kind or the "enabled" attribute is false,
   allowable Resource Names are restricted to the username of the signer
   for Shared Resource.

   The Relax NG Grammar for the Variable Resource Names Extension reads:

   <!-- VARIABLE RESOURCE URN SUB-NAMESPACE -->

   namespace share = "urn:ietf:params:xml:ns:p2p:config-base:share"

   <!-- VARIABLE RESOURCE NAMES ELEMENT -->

   kind-parameter &= element share:variable-resource-names {

       attribute enable { xsd:boolean }

       <!-- PATTERN ELEMENT -->

       element pattern { xsd:string }*
   }?

























Knauf, et al.            Expires April 12, 2013                [Page 12]


Internet-Draft                    ShaRe                     October 2012


6.  Access Control to Shared Resources

6.1.  Granting Write Access

   Write access to a Kind that is intended to be shared with other
   RELOAD users can solely be issued by the Resource Owner.  A Resource
   Owner can share RELOAD Kinds by using the following procedure.

   o  The Resource Owner stores an ACL root item at the Resource-ID of
      the Shared Resource.  The root item contains the resource name
      extension field (see Section 5.2), the username of the Resource
      Owner and Kind-ID of the Shared Resource.  The allow_delegation
      flag is set to 1.  The index of array data structure MUST be
      generated as described in Section 3.1

   o  Further ACL items for this Kind-ID stored by the Resource Owner
      will delegate write access to Authorized Peers.  These ACL items
      contain the same resource name extension field, the username of
      the Authorized Peer and the Kind-Id of the Shared Resource.
      Optionally, the Resource Owner sets the "ad" to 1 (the default
      equals 0) to enable the Authorized Peer to further delegate write
      access.  Each succeeding ACL item created by the Resource Owner
      can be stored in the numerical order of the array index starting
      with the index of the root item incremented by one.

   An Authorized Peer with delegation allowance ("ad"=1) can extend the
   access to an existing Shared Resource as follows.

   o  An Authorized Peer can store additional ACL items at the
      Resource-ID of the Shared Resource.  These ACL items contain the
      resource name extension field, the username of the newly
      Authorized Peer, and the Kind-Id of the Shared Resource.
      Optionally, the "ad" flag is set to 1 for allowing the Authorized
      Peer to further delegate write access.  The array index MUST be
      generated as described in Section 3.1.  Each succeeding ACL item
      can be stored in the numerical order of the array index.

   A store request by an Authorized Peer that attempts to overwrite any
   ACL item signed by another Peer is unauthorized and causes an
   Error_Forbidden response from the Storing Peer.  Such access
   conflicts could be caused by an array index collision.  However, the
   probability of a collision of two or more identical array indices
   will be negligibly low using the mechanism for isolating stored data
   (see Section 3.1)







Knauf, et al.            Expires April 12, 2013                [Page 13]


Internet-Draft                    ShaRe                     October 2012


6.2.  Revoking Write Access

   Write permissions are revoked by storing a non-existent value
   [I-D.ietf-p2psip-base] at the corresponding item of the Access
   Control List.  Revoking a permission automatically invalidates all
   delegations performed by that user including all subsequent
   delegations.  This allows to invalidate entire subtrees of the
   delegations tree with only a single operation.  Overwriting the root
   item with a non-existent value of an Access List invalidates the
   entire delegations tree.

   An existing ACL item MUST only be overwritten by the user who
   initially stored the corresponding entry, or by the Resource Owner
   that is allowed to overwrite all ACL items for revoking write access.

6.3.  Validating Write Access through an ACL

   Access Control Lists are used to transparently validate authorization
   of peers for writing a data value at a Shared Resource.  Thereby it
   is assumed that the validating peer is in possession of the complete
   and most recent ACL for a specific Resource/Kind pair.  The
   corresponding procedure consists of recursively traversing the trust
   delegation tree and proceeds as follows.

   1.  Obtain the username of the certificate used for signing the data
       stored at the Shared Resource.

   2.  Validate that an item of the corresponding ACL (i.e., for this
       Resource/Kind pair) contains a "to_user" field whose value equals
       the username obtained in step 1.  If the Shared Resource under
       examination is an Access Control List Kind, further validate if
       the "ad" flag is set to 1.

   3.  Select the username of the certificate that was used to sign the
       ACL item obtained in step 2.

   4.  Validate that an item of the corresponding ACL contains a
       "to_user" field whose value equals the username obtained in step
       3.  Additionally validate that the "ad" flag is set to 1.

   5.  Repeat steps 3 and 4 until the "to_user" value is equal to the
       username of the signer of the previously selected ACL item.  This
       final ACL item is expected to be the root item of this ACL which
       SHALL be further validated by verifying that the root item was
       signed by the owner of the ACL Resource.

   The trust delegation chain is valid if and only if all verification
   steps succeed.  In this case, the creator of the data value of the



Knauf, et al.            Expires April 12, 2013                [Page 14]


Internet-Draft                    ShaRe                     October 2012


   Shared Resource is an Authorized Peer.

   Note that the ACL validation procedure can be omitted whenever the
   creator of data at a Shared Resource is the Resource Owner itself.
   The latter can be verified by its public key certificate as defined
   in Section 6.6.

6.4.  Operations of Storing Peers

   Storing peers, i.e., peers at which Shared Resource and ACL are
   physically stored, are responsible for controlling storage attempts
   to a Shared Resource and its corresponding Access Control List.  To
   assert the USER-CHAIN-ACL access policy (see Section 6.4), a storing
   peer MUST perform the access validation procedure described in
   Section 6.3 on any incoming store request using the most recent
   Access Control List for every Kind that uses the USER-CHAIN-ACL
   policy.  It SHALL further ensure that only the Resource Owner stores
   new ACL root items for Shared Resources.

6.5.  Operations of Accessing Peers

   Accessing peers, i.e., peers that fetch a Shared Resource, MAY
   validate that the originator of a Shared Resource was authorized to
   store data at this Resource-ID by processing the corresponding ACL.
   To enable an accessing peer to perform the access validation
   procedure described in Section 6.3, it first needs to obtain the most
   recent Access Control List in the following way.

   1.  Send a Stat request to the Resource-ID of the Shared Resource to
       obtain all array indexes of stored ACL Kinds.

   2.  Fetch all indexes of existing ACL items at this Resource-ID by
       using the array ranges retrieved in the Stat request answer.

   Peers can cache previously fetched Access Control Lists up to the
   maximum lifetime of an individual item.  Since stored values could
   have been modified or invalidated prior to their expiration, an
   accessing peer SHOULD use a Stat request to check for updates prior
   to using the data cache.

6.6.  USER-CHAIN-ACL Access Policy

   This document specifies an additional access control policy to the
   RELOAD base draft [I-D.ietf-p2psip-base].  The USER-CHAIN-ACL policy
   allows Authorized Peers to write a Shared Resource, even though they
   do not own the corresponding certificate.  Additionally, the USER-
   CHAIN-ACL allows the storage of Kinds with a variable resource name
   that are following one of the specified naming pattern.  Hence, on an



Knauf, et al.            Expires April 12, 2013                [Page 15]


Internet-Draft                    ShaRe                     October 2012


   inbound store request on a Kind that uses the USER-CHAIN-ACL access
   policy, the following rules MUST be applied:

   In the USER-CHAIN-ACL policy, a given value MUST be written or
   overwritten, if either one of USER-MATCH or USER-NODE-MATCH
   (mandatory if the data model is dictionary) access policies of the
   base document [I-D.ietf-p2psip-base] applies.

   Otherwise, the value MUST be written if the certificate of the signer
   contains a username that matches to one of the variable resource name
   pattern (c.f.  Section 5) specified in the configuration document
   and, additionally, the hashed Resource Name matches the Resource-ID.
   The Resource Name of the Kind to be stored MUST be taken from the
   mandatory ResourceNameExtension field in the corresponding Kind data
   structure.

   Otherwise, the value MUST be written if the ACL validation procedure
   described in Section 6.3 has been successfully applied.

































Knauf, et al.            Expires April 12, 2013                [Page 16]


Internet-Draft                    ShaRe                     October 2012


7.  ACL Kind Definition

   This section defines the ACCESS-CONTROL-LIST Kind previously
   described in this document.

   Name:  ACCESS-CONTROL-LIST

   Kind IDs:  The Resource Name for ACCESS-CONTROL-LIST Kind-ID is the
      Resource Name of the Kind that will be shared by using the ACCESS-
      CONTROL-LIST Kind.

   Data Model:  The data model for the ACCESS-CONTROL-LIST Kind-ID is
      array.  The array indexes are formed by using the mechanism for
      isolated stored data as described in Section 3.1

   Access Control:  USER-CHAIN-ACL (see Section 6.6)



































Knauf, et al.            Expires April 12, 2013                [Page 17]


Internet-Draft                    ShaRe                     October 2012


8.  Security Considerations

   In this section we discuss security issues that are relevant to the
   usage of shared resources in RELOAD.

8.1.  Resource Exhaustion

   Joining a RELOAD overlay inherently poses a certain resource load on
   a peer, because it has to store and forward data for other peers.  In
   common RELOAD semantics, each Resource ID and thus position in the
   overlay may only be written by a limited set of peers - often even
   only a single peer, which limits this burden.  In the case of Shared
   Resources, a single resource may be written by multiple peers, who
   may even write an arbitrary number of entries (e.g., delegations in
   the ACL).  This leads to an enhanced use of resources at individual
   overlay nodes.  The problem of resource exhaustion can easily be
   mitigated for Usages based on the ShaRe-Usage by imposing
   restrictions on size, i.e., <max-size> element for a certain Kind in
   the configuration document.

8.2.  Malicious or Misbehaving Storing Peer

   The RELOAD overlay is designed to operate despite the presence of a
   small set of misbehaving peers.  This is not different for Shared
   Resources since a small set of malicious peers does not disrupt the
   functionality of the overlay in general, but may have implications
   for the peers needing to store or access information at the specific
   locations in the ID space controlled by a malicious peer.  A storing
   peer could withhold stored data which results in a denial of service
   to the group using the specific resource.  But it could not return
   forged data, since the validity of any stored data can be
   independently verified using the attached signatures.

8.3.  Privacy Issues

   All data stored in the Shared Resource is publicly readable, thus
   applications requiring privacy need to encrypt the data.  The ACL
   needs to be stored unencrypted, thus the list members of a group
   using a Shared Resource will always be publicly visible.












Knauf, et al.            Expires April 12, 2013                [Page 18]


Internet-Draft                    ShaRe                     October 2012


9.  IANA Considerations

   TODO: register Kind-ID code point at the IANA
















































Knauf, et al.            Expires April 12, 2013                [Page 19]


Internet-Draft                    ShaRe                     October 2012


10.  Acknowledgments

   This work was stimulated by fruitful discussions in the P2PSIP
   working group and SAM research group.  We would like to thank all
   active members for constructive thoughts and feedback.  In
   particular, the authors would like to thank (in alphabetical order)
   Lothar Grimm, Cullen Jennings, Peter Musgrave, Joerg Ott, Marc Petit-
   Huguenin, Peter Pogrzeba, and Jan Seedorf.  This work was partly
   funded by the German Federal Ministry of Education and Research,
   projects HAMcast and Mindstone.









































Knauf, et al.            Expires April 12, 2013                [Page 20]


Internet-Draft                    ShaRe                     October 2012


11.  References

11.1.  Normative References

   [I-D.ietf-p2psip-base]
              Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., and
              H. Schulzrinne, "REsource LOcation And Discovery (RELOAD)
              Base Protocol", draft-ietf-p2psip-base-22 (work in
              progress), July 2012.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

11.2.  Informative References

   [I-D.ietf-p2psip-concepts]
              Bryan, D., Willis, D., Shim, E., Matthews, P., and S.
              Dawkins, "Concepts and Terminology for Peer to Peer SIP",
              draft-ietf-p2psip-concepts-04 (work in progress),
              October 2011.

   [I-D.knauf-p2psip-disco]
              Knauf, A., Hege, G., Schmidt, T., and M. Waehlisch, "A
              RELOAD Usage for Distributed Conference Control (DisCo)",
              draft-knauf-p2psip-disco-05 (work in progress), May 2012.

   [RFC3550]  Schulzrinne, H., Casner, S., Frederick, R., and V.
              Jacobson, "RTP: A Transport Protocol for Real-Time
              Applications", STD 64, RFC 3550, July 2003.






















Knauf, et al.            Expires April 12, 2013                [Page 21]


Internet-Draft                    ShaRe                     October 2012


Appendix A.  Change Log

   The following changes have been made from version
   draft-knauf-p2psip-share-02:

   1.  Editorial improvements

   2.  Updated References

   The following changes have been made from version
   draft-knauf-p2psip-share-01:

   1.  Simplified the ACL data structure in response to WG feedback

   2.  Added ResourceNameExtension data structure to simplify the use of
       variable resource names

   3.  Restructured document

   4.  Many editorial improvements

   The following changes have been made from version
   draft-knauf-p2psip-share-00:

   1.  Integrated the USER-PATTERN-MATCH access policy into USER-CHAIN-
       ACL

   2.  Access Control List Kind uses USER-CHAIN-ACL exclusively

   3.  Resources to be shared use USER-CHAIN-ACL exclusively

   4.  More precise specification of mandatory User_name and
       Resource_name fields for Shared Resources

   5.  Added mechanism for isolating stored data to prevent race
       conditions while concurrent storing

   6.  XML Extension for variable resource names uses its own namespace

   7.  Many editorial improvements











Knauf, et al.            Expires April 12, 2013                [Page 22]


Internet-Draft                    ShaRe                     October 2012


Authors' Addresses

   Alexander Knauf
   HAW Hamburg
   Berliner Tor 7
   Hamburg  D-20099
   Germany

   Phone: +4940428758067
   Email: alexanderknauf@gmail.com
   URI:


   Thomas C. Schmidt
   HAW Hamburg
   Berliner Tor 7
   Hamburg  D-20099
   Germany

   Email: schmidt@informatik.haw-hamburg.de
   URI:   http://inet.cpt.haw-hamburg.de/members/schmidt


   Gabriel Hege
   daviko GmbH
   Am Borsigturm 50
   Berlin  D-13507
   Germany

   Phone: +493043004344
   Email: hege@daviko.com
   URI:


   Matthias Waehlisch
   link-lab & FU Berlin
   Hoenower Str. 35
   Berlin  D-10318
   Germany

   Email: mw@link-lab.net
   URI:   http://www.inf.fu-berlin.de/~waehl









Knauf, et al.            Expires April 12, 2013                [Page 23]