home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1997 December
/
Internet_Info_CD-ROM_Walnut_Creek_December_1997.iso
/
drafts
/
draft_ietf_q_t
/
draft-ietf-roamops-dnsrr-03.txt
< prev
next >
Wrap
Text File
|
1997-03-10
|
37KB
|
859 lines
ROAMOPS Working Group Bernard Aboba
INTERNET-DRAFT Microsoft Corporation
<draft-ietf-roamops-dnsrr-03.txt >
7 March 1997
The Roaming Relationship (REL) Resource Record in the DNS
1. Status of this Memo
This document is an Internet-Draft. Internet-Drafts are working docu-
ments of the Internet Engineering Task Force (IETF), its areas, and
its working groups. Note that other groups may also distribute work-
ing documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference mate-
rial or to cite them other than as ``work in progress.''
To learn the current status of any Internet-Draft, please check the
``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow
Directories on ds.internic.net (US East Coast), nic.nordu.net
(Europe), ftp.isi.edu (US West Coast), or munnari.oz.au (Pacific Rim).
The distribution of this memo is unlimited. It is filed as <draft-
ietf-roamops-dnsrr-03.txt>, and expires September 15, 1997. Please
send comments to the authors.
2. Abstract
This document describes the use of the Roaming Relationship (REL)
record in the DNS for the description of roaming relationships. REL
resource records may be used for determining the existence of a roam-
ing relationship path between the local ISP and the user's home
domain, as well as the location of an appropriate accounting agent.
However, unless the roaming relationship path is authenticated by some
method (such as via tokens or certificates returned by the home
authentication server), hierarchical authentication routing must be
used in order to validate the path.
3. Introduction
Considerable interest has arisen recently in a set of features that
fit within the general category of "roaming capability" for dialup
Internet users. Interested parties have included:
Regional Internet Service Providers (ISPs) operating within a
particular state or province, looking to combine their efforts
with those of other regional providers to offer dialup service
over a wider area.
Aboba [Page 1]
INTERNET-DRAFT 7 March 1997
National ISPs wishing to combine their operations with those of
one or more ISPs in another nation to offer more comprehensive
dialup service in a group of countries or on a continent.
Businesses desiring to offer their employees a comprehensive
package of dialup services on a global basis. Those services may
include Internet access as well as secure access to corporate
intranets via a Virtual Private Network (VPN), enabled by tunnel-
ing protocols such as PPTP, L2F, or L2TP.
This document describes the use of the Roaming Relationship (REL)
record in the DNS for the description of roaming relationships. REL
resource records may be used for determining the existence of a roam-
ing relationship path between the local ISP and the user's home
domain, as well as the location of an appropriate accounting agent.
However, unless the roaming relationship path is authenticated by some
method (such as via tokens or certificates returned by the home
authentication server), hierarchical authentication routing must be
used in order to validate the path.
3.1. Terminology
This document frequently uses the following terms:
roaming relationship path
The roaming relationship path is the series of roaming rela-
tionships that link together a local ISP and user's home
domain. The roaming relationship path may or may not be the
same as the authentication route, depending on whether the
local proxy is able to directly contact the home authentica-
tion server.
authentication route
The route that an authentication will take in traveling
between the local ISP's authentication proxy and the home
authentication server. Where RADIUS proxy authentication is
used, the authentication route follows the roaming relation-
ship path.
Network Access Server
The Network Access Server (NAS) is the device that clients
dial in order to get access to the network.
RADIUS server
This is a server which provides for authentication/autho-
rization via the protocol described in [3], and for account-
ing as described in [4].
RADIUS proxy
In order to provide for the routing of RADIUS authentication
and accounting requests, a RADIUS proxy may employed. To the
NAS, the RADIUS proxy appears to act as a RADIUS server, and
to the RADIUS server, the proxy appears to act as a RADIUS
Aboba [Page 2]
INTERNET-DRAFT 7 March 1997
client.
RADIUS domain
In order to provide for the routing of RADIUS authentication
and accounting requests, the userID field used in PPP and in
the subsequent RADIUS authentication and accounting
requests, may contain structure. This structure provides a
means by which the RADIUS proxy will locate the RADIUS
server that is to receive the request.
3.2. Requirements language
This specification uses the same words as [14] for defining the sig-
nificance of each particular requirement. These words are:
MUST This word, or the adjectives "REQUIRED" or "SHALL", means
that the definition is an absolute requirement of the speci-
fication.
MUST NOT This phrase, or the phrase "SHALL NOT", means that the defi-
nition is an absolute prohibition of the specification.
SHOULD This word, or the adjective "RECOMMENDED", means that there
may exist valid reasons in particular circumstances to
ignore a particular item, but the full implications must be
understood and carefully weighed before choosing a different
course.
SHOULD NOT
This phrase means that there may exist valid reasons in par-
ticular circumstances when the particular behavior is
acceptable or even useful, but the full implications should
be understood and the case carefully weighed before imple-
menting any behavior described with this label.
MAY This word, or the adjective "OPTIONAL", means that an item
is truly optional. One vendor may choose to include the
item because a particular marketplace requires it or because
the vendor feels that it enhances the product while another
vendor may omit the same item. An implementation which does
not include a particular option MUST be prepared to interop-
erate with another implementation which does include the
option, though perhaps with reduced functionality. In the
same vein an implementation which does include a particular
option MUST be prepared to interoperate with another imple-
mentation which does not include the option.(except, of
course, for the feature the option provides)
An implementation is not compliant if it fails to satisfy one or more
of the must or must not requirements for the protocols it implements.
An implementation that satisfies all the must, must not, should and
should not requirements for its protocols is said to be
Aboba [Page 3]
INTERNET-DRAFT 7 March 1997
"unconditionally compliant"; one that satisfies all the must and must
not requirements but not all the should or should not requirements for
its protocols is said to be "conditionally compliant."
4. The Roaming Relationship (REL) Record
In order to enable roaming, it is necessary for a local provider to be
able to determine whether a roaming relationship path exists between
itself and the user's home domain, so as to enable the local provider
to be paid for the use of its resources. These roaming relationships
are typically of two types: the relationship between a firm and a
provider, in which the firm delegates roaming authority to the
provider; or the relationship between a provider and a roaming associ-
ation, in which the provider agrees to allow members of the consortium
to access its network resources, in exchange for compensation. How-
ever, it is also possible for a company or even an individual to form
a direct relationship with a roaming consortia, or for consortia to
form a relationship with another consortia.
Inter-domain roaming relationships may extend to several levels. For
example, BIGCO may delegate roaming authority to ISPA, who may in turn
join roaming association ISPGROUP. When Fred dials into ISPB and
attempts to authenticate as fred@bigco.com, it is necessary for ISPB
to determine whether it has a means for being paid for the resources
consumed by Fred. This is accomplished by tracing the web of roaming
relationships backwards from the bigco.com domain, in order to deter-
mine whether a path of roaming relationships exists between ISPB and
BIGCO.
Please note that the task of determining the path of roaming relation-
ships is orthogonal to the issue of authentication routing. Where
authentication proxy chaining is used, authentication routing is
required in order to improve scalability. However, when public key
authentication is available, it is possible for an authentication
proxy to directly contact a home authentication server. However,
regardless of how the authentication is routed, it is still necessary
for the local ISP to determine the path of roaming relationships so
that it can determine whether it can be paid for the transaction.
The purpose of the Roaming Relationship (REL) resource record is to
document inter-domain roaming relationships. When hierarchical authen-
tication routing is being used, REL resource records are typically
retrieved by the local ISP's authentication proxy, and used both for
determination of the roaming relationship path as well as for use in
authentication routing. If public key authentication technology is
available, it may be possible for the local ISP's authentication proxy
to contact the home domain's authentication server directly. In this
case, hierarchical authentication routing will not be required, and
the home authentication server may return tokens or certificates in
order to validate the roaming relationship path. If this is done, then
the local ISP's authentication proxy may not need to look up any REL
resource records itself, and as a result, the total time required for
the authentication will be decreased. This will lessen the probability
Aboba [Page 4]
INTERNET-DRAFT 7 March 1997
of a timeout.
4.1. REL resource record RDATA format
The RDATA for a REL resource record is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Preference | Flags |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
/ /
/ Domain /
/ /
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
4.1.1. Preference
The Preference field, which is two octets, specifies the preference
given to this record versus other records of the same type and owner.
Lower values are preferred.
4.1.2. Flags
The flags field, which is two octets, is as follows:
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|U P C A I F H R R R R R R R R R|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
U = User. If U=1, then the REL resource record represents an individ-
ual user or account. The user name is represented the same way as in
the SOA or RP resource records. As a result, fred@bigco.com will be
represented as fred.bigco.com. Since the DNS was not intended for use
as a user database, it is expected that this flag will only be set on
rare occasions.
P = Provider. If P=1, then the REL resource record represents delega-
tion of roaming authority from a non-ISP to an ISP or a roaming con-
sortia.
C = Consortia. If C=1, then the REL resource record represents delega-
tion of roaming authority from an ISP to a roaming consortia.
A = Accounting agent. If A=1, then a accounting agent exists within
the domain.
I = Internet access. If I=1, then the REL resource record may be used
for provisioning of Internet access. In roaming applications this bit
MUST be set.
Aboba [Page 5]
INTERNET-DRAFT 7 March 1997
F = Fax. If F=1, then the REL resource record may be used for provi-
sioning of Internet fax.
H = H.323. If H=1, then the REL resource record may be used for provi-
sioning of H.323 conferencing.
R = Reserved.
4.1.3. Domain
The domain field represents the domain name to which roaming authority
has been delegated by the owner name.
4.2. Use of the Roaming Relationship (REL) Resource Record
The Roaming Relationship (REL) resource record uses semantics similar
to that of the Mail Exchange (MX) record, in that it includes a prior-
ity as well as the domain to which roaming authority has been dele-
gated. The REL resource record is of the form:
bigco.com. IN REL 10 (; priority
ispa.com. ;domain with roaming authority
P I ;flags. P = Provider, I = Internet Access
)
Here 10 refers to the priority of the REL resource record, and
ispa.com is the domain to which BIGCO has delegated roaming responsi-
bilities. The use of a priority field allows multiple relationships to
be represented, with authenticating ISPs checking the relationships in
ascending order of priority. Thus, an REL resource record of priority
10 would be checked before a REL resource record of priority 20. As
described in the previous section, letters are used to denote flag
bits.
Routes for a given domain SHOULD be given different priorities, so as
to allow for predictable behavior. Since routes at the same priority
will be round-robined, this will result in alternation of routes.
Unless there is a good reason for balancing the load this way, this
approach SHOULD NOT be used.
5. Examples
5.1. Example One
Let us assume that Fred is an employee of BIGCO, who has established
roaming relationships with ISPA and ISPC, both of which are members of
roaming consortia ISPGROUP1. BIGCO also has a relationship with clear-
ing houses ISPGROUP2 and ISPGROUP3. ISPB is a member of the ISPGROUP1
roaming consortia.
Aboba [Page 6]
INTERNET-DRAFT 7 March 1997
The REL resource records for BIGCO appear as follows:
bigco.com. IN REL 10 ispa.com. P I
bigco.com. IN REL 20 ispc.com. P I
bigco.com. IN REL 30 ispgroup3.com. P I
bigco.com. IN REL 40 ispgroup2.com. P I
The REL resource records for ISPA, ISPB, ISPC, ISPGROUP1, ISPGROUP2
and ISPGROUP3 appear as follows:
ispa.com. IN REL 10 ispgroup1.com. C I
ispb.com. IN REL 10 ispgroup1.com. C I
ispc.com. IN REL 10 ispgroup1.com. C I
ispgroup1.com. IN REL 10 ispgroup1.com. C I A
ispgroup2.com. IN REL 10 ispgroup2.com. C I A
ispgroup3.com. IN REL 10 ispgroup3.com. C I A
5.1.1. Sequence of events
Fred logs into ISPB as fred@bigco.com; as a result the ISPB authenti-
cation proxy receives this NAI. ISPB's authentication proxy first
checks for the presence of a user record for fred.bigco.com. If so,
then it retrieves the REL resource records for the domain to whom Fred
has delegated roaming authority. If there is no user record, then it
checks its configuration files to see whether bigco.com is one of the
domains with whom it has a direct roaming relationship. This check
will fail since BIGCO has no direct roaming relationship with ISPB. As
a result, ISPB's authentication proxy will need to retrieve REL
resource records either from its own cache or from the bigco.com zone.
Assuming that ISPB's authentication proxy does not support public key
authentication, then hierarchical authentication routing will be used.
In this case, ISPB's authentication proxy will need to retrieve REL
resource records from the bigco.com zone. If ISPB's authentication
proxy supports public key authentication and ISPEC, then rather than
immediately retrieving REL resource records, it will retrieve the SRV,
KEY and SIG resource records for the bigco.com zone. Using the SRV
resource record, ISPB's authentication proxy can locate the authenti-
cation proxy for the bigco.com domain. The SIG resource records for
the bigco.com zone can then be retrieved in order to determine whether
the bigco.com authentication server supports public key authentica-
tion. If so, then ISPB's authentication proxy may contact the
bigco.com authentication server directly. In its authentication reply,
the bigco.com authentication server may return the REL resource
records for its zone as well as those of the zones to which it has
delegated roaming authority, in the form of attributes within the
Access-Reply. If so, then ISPB's authentication proxy will be saved
the work of having to retrieve these resource records itself prior to
Aboba [Page 7]
INTERNET-DRAFT 7 March 1997
forwarding the authentication reply on to the NAS.
Once the REL resource records have been retrieved by one mechanism or
another, a depth first search is performed in order to select the
roaming relationship path. In this case, ISPB determines whether it
has a direct roaming relationship with ISPA (priority 10 record from
the bigco.com zone). If not, then it looks at the REL resource records
for the ispa.com domain, and determines whether it has a direct roam-
ing relationship with any of the domains to whom ISPA has delegated
roaming responsibility. In this case, ISPB determines that it has a
direct roaming relationship with ISPGROUP1 (priority 10 record from
the ispa.com zone). As a result, the roaming relationship path
bigco.com/ispa.com/ispgroup1.com/ispb.com is selected. Since ISPGROUP1
operates an accounting agent within its domain, accounting records for
the transaction will be sent to ISPGROUP1's accounting agent.
If ISPA had not been a member of the ISPGROUP1 roaming consortia, then
the depth-first search would have terminated, and ISPB would proceed
to check for a business relationship on the branch represented by the
priority 20 REL resource record in the bigco.com zone (ispc.com). In
this case the roaming relationship path bigco.com/ispc.com/isp-
group1.com/ispb.com would have been selected.
If ISPB were a member of the ISPGROUP3 roaming consortia, and not a
member of the ISPGROUP1 or ISPGROUP2 consortia, then the breadth-first
search would fail on both the priority 10 and 20 branches of the
bigco.com tree. In this case, the business relationship path
bigco.com/ispgroup3.com/ispb.com would have been selected.
5.2. Example Two
Let us assume that BIGCO has branch offices in multiple locations. The
BIGCO branch office in Illinois has a contract with ISPA, which is a
member of ISPGROUP1. However, ISPGROUP1 does not have coverage in
Israel. As a result, the branch office in Israel has a contract with
ISPC, which is a member of ISPGROUP2, which does have coverage in
Israel. It is desired that Fred be able to login either from Illinois
or from Israel, with the authentication being done by the appropriate
ISP. When logging in from Illinois, Fred uses the POPs of ISPB, while
in Israel, he uses the POPs of ISPD. It should be noted that ISPA and
ISPC can be located anywhere; they need not necessarily reside in
Illinois or Israel.
In this case, the REL records for BIGCO will appear as follows:
bigco.com. IN REL 10 ispa.com. P I
bigco.com. IN REL 20 ispc.com. P I
The records for ISPA, ISPB, ISPC, ISPD, ISPGROUP1 and ISPGROUP2 appear
as follows:
ispa.com. IN REL 10 ispgroup1.com. C I
Aboba [Page 8]
INTERNET-DRAFT 7 March 1997
ispb.com. IN REL 10 ispgroup1.com. C I
ispc.com. IN REL 10 ispgroup2.com. C I
ispd.com. IN REL 10 ispgroup2.com. C I
ispgroup1.com. IN REL 10 ispgroup1.com. C I A
ispgroup2.com. IN REL 10 ispgroup2.com. C I A
5.2.1. Sequence of events
While in the United States, Fred logs into ISPB as fred@bigco.com; as
a result the ISPB authentication proxy receives this NAI. ISPB's
authentication proxy first checks for the presence of a user record
for fred.bigco.com. If so, then it retrieves the REL resource records
for the domain to whom Fred has delegated roaming authority. If there
is no user record, then it checks its configuration files to see
whether bigco.com is one of the domains with whom it has a direct
roaming relationship. This check will fail since BIGCO has no direct
roaming relationship with ISPB. As a result, ISPB's authentication
proxy will need to retrieve resource records either from its own cache
or from the bigco.com zone.
Once the REL resource records have been retrieved by one mechanism or
another, a depth first search is performed in order to select the
roaming relationship path. In this case, ISPB determines whether it
has a direct roaming relationship with ISPA (priority 10 record from
the bigco.com zone). If not, then it looks at the REL resource records
for the ispa.com domain, and determines whether it has a direct roam-
ing relationship with any of the domains to whom ISPA has delegated
roaming responsibility. In this case, ISPB determines that it has a
direct roaming relationship with ISPGROUP1 (priority 10 record from
the ispa.com zone). As a result, the roaming relationship path
bigco.com/ispa.com/ispgroup1.com/ispb.com is selected. Since ISPGROUP1
operates a accounting agent within its domain, accounting records for
the transaction will be sent to ISPGROUP1's accounting agent.
While in Israel, Fred logs into ISPD as fred@bigco.com; as a result,
the ISPD authentication proxy receives this NAI. ISPD's authentication
proxy then checks its configuration files to see whether bigco.com is
one of the domains with whom it has a direct roaming relationship.
This check will fail since BIGCO has no direct roaming relationship
with ISPD. As a result, ISPD's authentication proxy will need to
retrieve REL resource records either from its own cache or from the
bigco.com zone.
Once the REL resource records have been retrieved by one mechanism or
another, a depth first search is performed in order to select the
roaming relationship path. In this case, ISPD determines whether it
has a direct roaming relationship with ISPA (priority 10 record from
the bigco.com zone). If not, then it looks at the REL resource records
for the ispa.com domain, and determines whether it has a direct
Aboba [Page 9]
INTERNET-DRAFT 7 March 1997
roaming relationship with any of the domains to whom ISPA has dele-
gated roaming responsibility. In this case, ISPD determines that no
roaming relationship path exists passing through ISPA.
As a result, ISPD checks for a roaming relationship path on the ISPC
branch (priority 20 REL resource record from the bigco.com zone).
First, it determines whether there is a direct roaming relationship
between ISPD and ISPC (there is not). Then it looks at the REL records
for the ispc.com domain, and determines whether it has a direct roam-
ing relationship with any of the domains to whom ISPC has delegated
roaming responsibility. In this case, ISPD determines that it has a
direct roaming relationship with ISPGROUP2 (priority 10 REL resource
record from the ispc.com zone). As a result, the roaming relationship
path bigco.com/ispc.com/ispgroup2.com/ispd.com is selected. Since ISP-
GROUP2 operates a accounting agent within its domain, accounting
records for the transaction will be sent to ISPGROUP2's accounting
agent.
5.3. Example Three
Let us assume that Fred wishes to travel to a country which is not
served by the roaming consortia that BIGCO's provider ISPA has joined.
In this case, Fred will wish to make use of the user REL resource
record.
In this case, the REL resource records for BIGCO will appear as fol-
lows:
bigco.com. IN REL 10 ispa.com. P I
fred.bigco.com. IN REL 10 ispe.com. U I
The records for ISPA, ISPB, ISPD, ISPGROUP1 and ISPGROUP2 appear as
follows:
ispa.com. IN REL 10 ispgroup1.com. C I
ispb.com. IN REL 10 ispgroup1.com. C I
ispb.com. IN REL 10 ispgroup2.com. C I
ispe.com. IN REL 10 ispgroup2.com. C I
ispgroup1.com. IN REL 10 ispgroup1.com. C I A
ispgroup2.com. IN REL 10 ispgroup2.com. C I A
5.3.1. Sequence of events
While traveling, Fred logs into ISPB as fred@bigco.com; as a result
the ISPB authentication proxy receives this NAI. ISPB's authentication
proxy first checks for the presence of a user record for
fred.bigco.com. If so, then it retrieves the REL resource records for
Aboba [Page 10]
INTERNET-DRAFT 7 March 1997
the domain to whom Fred has delegated roaming authority. In this case,
a user record exists for fred@bigco.com, so that the authentication
proxy determines whether it has a direct roaming relationship with
ISPE (priority 10 REL resource record from the fred.bigco.com zone).
If not, then it looks at the REL resource records for the ispe.com
domain, and determines whether it has a direct roaming relationship
with any of the domains to whom ISPE has delegated roaming responsi-
bility. In this case, ISPB determines that it has a direct roaming
relationship with ISPGROUP2 (priority 10 REL resource record from the
ispe.com zone). As a result, the roaming relationship path
fred.bigco.com/ispe.com/ispgroup2.com/ispb.com is selected. Since ISP-
GROUP2 operates a accounting agent within its domain, accounting
records for the transaction will be sent to ISPGROUP2's accounting
agent.
Please note that even though Fred has a user REL resource record, the
authentication conversation will still be conducted between ISPB's
authentication proxy and BIGCO's authentication server.
6. Prevention of looping topologies
Since it is possible to create looping topologies using REL resource
records, a mechanism must be provided to prevent endless loops. As a
result, it is recommended that authentication proxies be configured
with a default maximum of four hops. This would support the scenario
of an authentication passing from a NAS to an authentication proxy,
from the proxy to ISPGROUP, from ISPGROUP to ISPA, and from ISPA to
BIGCO.
7. Use of the REL RR
When REL resource records are utilized, no assurance can be provided
as to the authenticity of the roaming relationships represented by
these records. As a result, it is necessary to verify the validity of
the roaming relationship path by another means. This can be accom-
plished by causing the authentication to be routed along the roaming
relationship path, or by verifying the authenticity of a certificate
or token returned by the home authentication server.
As an example, let us assume that the roaming relationship path
bigco.com/ispc.com/ispgroup2.com/ispd.com is selected. If this path
has not been authenticated, then ISPD's authentication proxy will for-
ward it's authentication request to ISPGROUP2, including the roaming
relationship path as a source route. ISPGROUP2 will then in turn for-
ward the authentication to ISPC, who will forward it to BIGCO. At each
step of the way, a pre-existing relationship will need to exist
between hops in order for this authentication forwarding to proceed.
As a result, the act of authenticating Fred via the roaming relation-
ship path acts to validate the roaming relationship as determined from
the REL resource records.
Aboba [Page 11]
INTERNET-DRAFT 7 March 1997
Note that such hop by hop forwarding may be required even if public
key authentication is available for use between the local ISP's
authentication proxy and the home authentication server. As long as
the roaming relationship path has not been authenticated, the local
ISP will still need to validate the roaming relationship path. This
can be accomplished by forcing the authentication to follow the roam-
ing relationship path, validating the relationships between the prox-
ies at each hop.
Please also note that public key authentication will also typically be
used in order to enable signed receipts to be returned by the account-
ing agent in response to receipt of digitally signed accounting record
bundles. DNS security can assist in determining what security features
are implemented at a given home authentication server or accounting
agent. Accounting agent support for MIME Security Multiparts is indi-
cated via use of the Email bit within the KEY resource record flag
field. DNS security may also be used to indicate that a home authenti-
cation server supports IPSEC. This is indicated via use of the IPSEC
bit within the KEY resource record flag field.
8. Acknowledgements
Thanks to Glen Zorn of Microsoft, Pat Calhoun of USR, and Michael
Robinson of Global One for many useful discussions of this problem
space.
9. References
[1] B. Aboba, J. Lu, J. Alsop, J. Ding. "Review of Roaming Implemen-
tations." draft-ietf-roamops-imprev-01.txt, Microsoft, Aimnet, i-Pass
Alliance, Asiainfo, January, 1997.
[2] B. Aboba, G. Zorn. "Dialing Roaming Requirements." draft-ietf-
roamops-roamreq-02.txt, Microsoft, January, 1997.
[3] C. Rigney, A. Rubens, W. Simpson, S. Willens. "Remote Authenti-
cation Dial In User Service (RADIUS)." RFC 2058, Livingston, Merit,
Daydreamer, January, 1997.
[4] C. Rigney. "RADIUS Accounting." RFC 2059, Livingston, January,
1997.
[5] R. Fajman. "An Extensible Message Format for Message Disposition
Notifications." draft-ietf-receipt-mdn-02.txt, National Institute of
Health, November, 1996.
[6] M. Elkins. "MIME Security with Pretty Good Privacy (PGP)." RFC
2015, The Aerospace Corporation, October, 1996.
[7] G. Vaudreuil. "The Multipart/Report Content Type for the Reporting
of Mail System Administrative Messages." RFC 1892, Octel Network Ser-
vices, January, 1996.
Aboba [Page 12]
INTERNET-DRAFT 7 March 1997
[8] J. Galvin., et al. "Security Multiparts for MIME: Multipart/Signed
and Multipart/Encrypted." RFC 1847, Trusted Information Systems, Octo-
ber, 1995.
[9] D. Crocker. "MIME Encapsulation of EDI Objects." RFC 1767, Bran-
denburg Consulting, March, 1995.
[10] M. Jansson, C. Shih, N. Turaj, R. Drummond. "MIME-based Secure
EDI." draft-ietf-ediint-as1-02.txt, LiNK, Actra, Mitre Corp, Drummond
Group, November, 1996.
[11] C. Shih, M. Jansson, R. Drummond, L. Yarbrough. "Requirements for
Inter-operable Internet EDI." draft-ietf-ediint-req-01.txt, Actra,
LiNK, Drummond Group, May, 1995.
[12] A. Gulbrandsen, P. Vixie. "A DNS RR for specifying the location
of services (DNS SRV)." RFC 2052, Troll Technologies, Vixie Enter-
prises, October 1996.
[13] D. Eastlake, 3rd, C. W. Kaufman. "Domain Name System Security
Extensions." Draft-ietf-dnnsec-secext-10.txt, CyberCash, Iris, August,
1996.
[14] S. Bradner. "Key words for use in RFCs to Indicate Requirement
Levels." draft-bradner-key-words-02.txt, Harvard University, August,
1996.
[15] C. Malmud, M. Rose. "Principles of Operation for the TPC.INT
Subdomain: General Principles and Policy." RFC 1530, Internet Multi-
casting Service, Dover Beach Consulting, Inc., October, 1993.
10. Authors' Addresses
Bernard Aboba
Microsoft Corporation
One Microsoft Way
Redmond, WA 98052
Phone: 206-936-6605
EMail: bernarda@microsoft.com
Aboba [Page 13]