DTN Research Group                                          S. Symington
Internet-Draft                                     The MITRE Corporation
Intended status: Experimental                             August 3, 2007
Expires: February 4, 2008


           Delay-Tolerant Networking Metadata Extension Block
             draft-symington-dtnrg-bundle-metadata-block-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on February 4, 2008.

Copyright Notice

   Copyright (C) The IETF Trust (2007).














Symington               Expires February 4, 2008                [Page 1]


Internet-Draft        DTN Metadata Extension Block           August 2007


Abstract

   This document defines an extension block that may be used with the
   Bundle Protocol [2] within the context of a Delay-Tolerant Network
   architecture [4].  This Metadata Extension Block is designed to be
   used to carry metadata that forwarding nodes can use to make routing
   and other decisions regarding the bundle.  This block is defined to
   enable the actual metadata that is inserted into the block to have
   any content and format, providing the format has been documented as a
   metadata ontology.  Specific metadata ontologies may be defined in
   additional documents.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Metadata Block Format  . . . . . . . . . . . . . . . . . . . .  4
   3.  Metadata Block Processing  . . . . . . . . . . . . . . . . . .  6
     3.1.  Bundle Transmission  . . . . . . . . . . . . . . . . . . .  6
     3.2.  Bundle Forwarding  . . . . . . . . . . . . . . . . . . . .  6
     3.3.  Bundle Reception . . . . . . . . . . . . . . . . . . . . .  6
   4.  Security Considerations  . . . . . . . . . . . . . . . . . . .  7
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . .  9
   6.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     6.1.  Normative References . . . . . . . . . . . . . . . . . . . 10
     6.2.  Informative References . . . . . . . . . . . . . . . . . . 10
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 11
   Intellectual Property and Copyright Statements . . . . . . . . . . 12























Symington               Expires February 4, 2008                [Page 2]


Internet-Draft        DTN Metadata Extension Block           August 2007


1.  Introduction

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [1].

   The DTN bundle protocol [2] defines the bundle as its protocol data
   unit.  A bundle consists of a primary bundle block, which is defined
   in the Bundle Protocol, followed by at least one other type of bundle
   block.  The Bundle Protocol defines a single other type of bundle
   block, called a Bundle Payload block.  This document defines an
   additional, optional, bundle block called a Metadata Block.  This
   block is designed to be used to carry metadata that is associated
   with the bundle so that forwarding nodes can use this metadata to
   make routing and other decisions regarding the bundle.

   The actual metadata to be inserted into the block may have any
   content and format, providing the content and format have been
   defined and documented as part of an ontology in order to enable the
   metadata to be interpreted.  In this document we define the general
   format of and the processing required to support the Metadata Block.
   Separate documents will define specific metadata ontologies that are
   expected to consist of various record format types.

   The capabilities described in this document are OPTIONAL for
   deployment with the Bundle Protocol.  Bundle Protocol implementations
   claiming to support the Metadata Block MUST be capable of:

      -Generating a Metadata Block and inserting it into a bundle,

      -Receiving bundles containing a Metadata Block and making the
      information contained in this Metadata Block's ontology-specific
      metadata field available for use, e.g., in forwarding decisions,
      and

      -Modifying the ontology-specific metadata in a received metadata
      block and forwarding the modified block with the bundle

   as defined in this document.

   Bundle Protocol implementations claiming to support a specific
   metadata ontology must both support the metadata block as defined
   above and be capable of parsing and processing the metadata itself
   according to the specific ontology in which the metadata is
   expressed.






Symington               Expires February 4, 2008                [Page 3]


Internet-Draft        DTN Metadata Extension Block           August 2007


2.  Metadata Block Format

   The Metadata Block uses the Canonical Bundle Block Format as defined
   in the bundle protocol [2].  That is, it is comprised of the
   following elements:

      -Block-type code (1 byte) - defined as in all bundle protocol
      blocks except the primary bundle block (as described in the Bundle
      Protocol).  The block type code for the Metadata Block is 0x08.

      -Block processing control flags (SDNV) - defined as in all bundle
      protocol blocks except the primary bundle block.  SDNV encoding is
      described in the Bundle Protocol.  There are no constraints on the
      use of the Block Processing Control Flags.

      -EID references (optional) - composite field defined in the bundle
      protocol that is present if and only if the metadata block
      references EID elements in the primary block's dictionary.
      Presence of this field is indicated by the setting of the "Block
      contains an EID-reference field" bit of the block processing
      control flags.  If EIDs are referenced in the metadata block, then
      their interpretation is defined by the particular ontology that is
      being used in this metadata block, as indicated in the metadata
      ontology field.

      -Block data length (SDNV) - defined as in all bundle protocol
      blocks except the primary bundle block.  SDNV encoding is
      described in the bundle protocol.

      -Block-type-specific data fields as follows:

         - Metadata Ontology field (SDNV) - indicates which ontology is
         to be used to interpret both the metadata in the metadata field
         and the EID references in the optional EID references field (if
         present).  Specific ontologies are defined in separate
         documents.

         - Metadata field - contains the metadata itself, formatted
         according to the metadata ontology that has been specified for
         this block.

   The Structure of a Metadata Block is as follows:









Symington               Expires February 4, 2008                [Page 4]


Internet-Draft        DTN Metadata Extension Block           August 2007


   Metadata Block Format:
   +-----+------+----+----------+----------|
   |Type |Flags |Len | Ontology | Metadata |
   |     |      |    |          |          |
   +-----+------+----+----------+----------+

                                 Figure 1












































Symington               Expires February 4, 2008                [Page 5]


Internet-Draft        DTN Metadata Extension Block           August 2007


3.  Metadata Block Processing

   The following are the processing steps that a bundle node must take
   relative to generation, reception, and processing of Metadata Blocks.

3.1.  Bundle Transmission

   When an outbound bundle is created per the parameters of the bundle
   transmission request, this bundle MAY (as influenced by local policy)
   include one or more Metadata Blocks (as defined in this
   specification).

3.2.  Bundle Forwarding

   The node MAY insert one or more Metadata Blocks into the bundle
   before forwarding it, as dictated by local policy.  The node MAY
   modify the ontology-specific metadata in a received bundle before
   forwarding the modified bundle, as dictated by local policy.

3.3.  Bundle Reception

   If the bundle includes one or more Metadata Blocks, the metadata
   information records in these blocks SHALL be made available for use
   at this node (e.g., in forwarding decisions).



























Symington               Expires February 4, 2008                [Page 6]


Internet-Draft        DTN Metadata Extension Block           August 2007


4.  Security Considerations

   The DTN Security Overview [5] and the Bundle Security Protocol [3]
   define three security-related blocks to provide hop-by-hop
   authentication, end-to-end authentication, and end-to-end
   confidentiality of bundles or parts of bundles, as well as a set of
   mandatory ciphersuites that may be used to calculate security results
   carried in these security blocks.  All ciphersuites that use the
   strict canonicalisation algorithm [3] to calculate and verify
   security results (e.g., many hop-by-hop authentication ciphersuites)
   apply to all blocks in the bundle, and so would apply to bundles that
   include an optional Metadata Block and would include that block in
   the calculation of their security result.  In particular, bundles
   including the optional Metadata Block would be protected in their
   entirety for the duration of a single hop, from a forwarding node to
   an adjacent receiving node (but not from source to destination),
   using the mandatory BAH-HMAC ciphersuite defined in the Bundle
   Security Protocol.  Ciphersuites that use the mutable
   canonicalisation algorithm to calculate and verify security results
   (e.g., the mandatory PSH-RSA-SHA256 ciphersuite and most end-to-end
   authentication ciphersuites) will omit the Metadata Block from their
   calculation.  The fact that one or more records in the metadata block
   may be modified as the bundle transits the network will not interfere
   with end-to-end security protection when using ciphersuites that use
   mutable canonicalisation.  Lastly, the Metadata Block will not be
   encrypted by the mandatory CH-RSA-AES-PAYLOAD-PSH end-to-end
   confidentiality ciphersuite, which only allows for payload and PSH
   encryption.

   In order to provide the metadata block with confidentiality and
   authentication independent of any confidentiality/authentication that
   is provided for the payload or other parts of the bundle, new
   ciphersuites would need to be defined for this purpose.  In
   particular, in order to provide confidentiality for the Metadata
   Block in isolation from the rest of the bundle, a new end-to-end
   confidentiality ciphersuite for use with the Confidentiality Block
   (CB) that encrypts the metadata block and places the encrypted
   metadata block in the security result field of the CB would need to
   be defined.  In order to provide authentication for the Metadata
   Block in isolation from the rest of the bundle, a similar end-to-end
   authentication ciphersuite for use with the Payload Security Block
   (PSB) that acts only upon the Metadata Block would need to be
   defined.  While the definition of these ciphersuites remains to be
   specified in a separate security document, the use of such
   ciphersuites has been planned for in the design of the Bundle
   Security Protocol.

   Given that metadata can be modified by forwarding nodes, it may be



Symington               Expires February 4, 2008                [Page 7]


Internet-Draft        DTN Metadata Extension Block           August 2007


   desirable to eventually support the ability to audit changes to the
   metadata at the individual record level.  No such capability has been
   provided in this specification as currently written.
















































Symington               Expires February 4, 2008                [Page 8]


Internet-Draft        DTN Metadata Extension Block           August 2007


5.  IANA Considerations

   We may want to consider having IANA establish a register of Bundle
   Protocol header types, with the Metadata Extension Block header
   identified as type 0x08.  In association with the Metadata Extension
   block, we may want IANA to establish a separate register of
   ontologies.












































Symington               Expires February 4, 2008                [Page 9]


Internet-Draft        DTN Metadata Extension Block           August 2007


6.  References

6.1.  Normative References

   [1]  Bradner, S. and J. Reynolds, "Key words for use in RFCs to
        Indicate Requirement Levels", RFC 2119, October 1997.

   [2]  Scott, K. and S. Burleigh, "Bundle Protocol Specification",
        draft-irtf-dtnrg-bundle-spec-08.txt, work-in-progress,
        December 2006.

   [3]  Symington, S., Farrell, S., and H. Weiss, "Bundle Security
        Protocol Specification",
        draft-irtf-dtnrg-bundle-security-02.txt, work-in-progress,
        October 2006.

6.2.  Informative References

   [4]  Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R.,
        Scott, K., Fall, K., and H. Weiss, "Delay-Tolerant Network
        Architecture", draft-irtf-dtnrg-arch-08.txt, work-in-progress,
        December 2006.

   [5]  Farrell, S., Symington, S., and H. Weiss, "Delay-Tolerant
        Network Security Overview",
        draft-irtf-dtnrg-sec-overview-02.txt, work-in-progress,
        October 2006.
























Symington               Expires February 4, 2008               [Page 10]


Internet-Draft        DTN Metadata Extension Block           August 2007


Author's Address

   Susan Flynn Symington
   The MITRE Corporation
   7515 Colshire Drive
   McLean, VA  22102
   US

   Phone: +1 (703) 983-7209
   Email: susan@mitre.org
   URI:   http://mitre.org/








































Symington               Expires February 4, 2008               [Page 11]


Internet-Draft        DTN Metadata Extension Block           August 2007


Full Copyright Statement

   Copyright (C) The IETF Trust (2007).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Symington               Expires February 4, 2008               [Page 12]