< draft-ietf-ips-iscsi-nodearch-key-02.txt   draft-ietf-ips-iscsi-nodearch-key-03.txt >
IP Storage Working Group D. Wysochanski IP Storage Working Group D. Wysochanski
Internet-Draft September 2006 Internet-Draft November 21, 2006
Intended status: Informational Updates: 3720 (if approved)
Expires: March 5, 2007 Intended status: Standards Track
Expires: May 25, 2007
Declarative Public Extension Key for iSCSI Node Architecture Declarative Public Extension Key for iSCSI Node Architecture
draft-ietf-ips-iscsi-nodearch-key-02.txt draft-ietf-ips-iscsi-nodearch-key-03.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 34 skipping to change at page 1, line 35
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on March 5, 2007. This Internet-Draft will expire on May 25, 2007.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2006). Copyright (C) The Internet Society (2006).
Abstract Abstract
The iSCSI protocol, described in RFC 3720 [2], allows for extension The iSCSI protocol, described in RFC 3720 [2], allows for extension
items to the protocol in the form of Private or Public Extension items to the protocol in the form of Private or Public Extension
Keys. This Internet-Draft describes a Public Extension Key for the Keys. This Internet-Draft describes a Public Extension Key for the
purpose of enhancing iSCSI supportability. The key accomplishes this purpose of enhancing iSCSI supportability. The key accomplishes this
objective by allowing iSCSI nodes to communicate architecture details objective by allowing iSCSI nodes to communicate architecture details
during the iSCSI login sequence. The receiving node can then use during the iSCSI login sequence. The receiving node can then use
this information for enhanced logging and support. this information for enhanced logging and support. This document
updates RFC 3720 to allow iSCSI extension items to be defined by
standards track RFCs and experimental RFCs in addition to
informational RFCs.
1. Introduction 1. Introduction
1.1. Terminology 1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [1]. document are to be interpreted as described in RFC 2119 [1].
1.2. Overview 1.2. Overview
skipping to change at page 3, line 33 skipping to change at page 3, line 33
The key has been modeled after the HTTP "Server" and "User-Agent" The key has been modeled after the HTTP "Server" and "User-Agent"
header fields as specified in sections 14.38 and 14.43 of RFC 2616 header fields as specified in sections 14.38 and 14.43 of RFC 2616
[3], with the text-value(s) of the key roughly equivalent to Product [3], with the text-value(s) of the key roughly equivalent to Product
Tokens in section 3.8 of RFC 2616 [3]. Note however that the text- Tokens in section 3.8 of RFC 2616 [3]. Note however that the text-
value(s) in the key's list-of-values MUST conform to the Text Format value(s) in the key's list-of-values MUST conform to the Text Format
as specified in section 5.1 of RFC 3720 [2]. as specified in section 5.1 of RFC 3720 [2].
The key is sent during operational parameter negotiation of an iSCSI The key is sent during operational parameter negotiation of an iSCSI
session's login phase. The intended use of this key is to provide session's login phase. The intended use of this key is to provide
enhanced logging and support capabilities, and to enable collection enhanced logging and support capabilities, and to enable collection
of iSCSI implementation and usage information. Functional behavior of iSCSI implementation and usage information.
of the iSCSI node (this includes the iSCSI protocol logic -- the
SCSI, iSCSI, and TCP/IP protocols) MUST NOT depend on the presence,
absence, or content of the key. The key MUST NOT be used by iSCSI
nodes for interoperability, or exclusion of other nodes. To ensure
proper use, key values SHOULD be set by the node itself, and there
SHOULD NOT be provisions for the key values to contain user-defined
text.
2. Definition 2. Definition
The definition of the key is as follows, conforming to sections 11 The definition of the key is as follows, conforming to sections 11
and 12 of RFC 3720 [2], with example list-of-values conforming to and 12 of RFC 3720 [2], with example list-of-values conforming to
section 5.1 of RFC 3720 [2]. section 5.1 of RFC 3720 [2].
The key is defined with a Use of "LO", making it a Leading Only key, The key is defined with a Use of "LO", making it a Leading Only key,
and does not modify sections 11 or 12 of RFC 3720 [2]. Thus, the key and does not modify sections 11 or 12 of RFC 3720 [2]. Thus, the key
MUST only be sent on the leading connection, MUST NOT be changed MUST only be sent on the leading connection, MUST NOT be changed
skipping to change at page 5, line 7 skipping to change at page 5, line 7
are not limited to, iSCSI vendor software, firmware, or hardware are not limited to, iSCSI vendor software, firmware, or hardware
versions, the OS version, or hardware architecture. versions, the OS version, or hardware architecture.
The length of the key value (total length of the list-of-values) MUST The length of the key value (total length of the list-of-values) MUST
NOT be greater than 255 bytes. NOT be greater than 255 bytes.
X#NodeArchitecture MUST NOT be redeclared. X#NodeArchitecture MUST NOT be redeclared.
3. Implementation 3. Implementation
Functional behavior of the iSCSI node (this includes the iSCSI
protocol logic -- the SCSI, iSCSI, and TCP/IP protocols) MUST NOT
depend on the presence, absence, or content of the key. The key MUST
NOT be used by iSCSI nodes for interoperability, or exclusion of
other nodes. To ensure proper use, key values SHOULD be set by the
node itself, and there SHOULD NOT be provisions for the key values to
contain user-defined text.
Nodes implementing this key MAY choose to only transmit the key, only Nodes implementing this key MAY choose to only transmit the key, only
log the key values received from other nodes, or both transmit and log the key values received from other nodes, or both transmit and
log the key values. Each node choosing to implement transmission of log the key values. Each node choosing to implement transmission of
the key values MUST be prepared to handle the response of RFC 3720 the key values MUST be prepared to handle the response of RFC 3720
[2] compliant nodes that do not understand the key (RFC 3720 [2] [2] compliant nodes that do not understand the key (RFC 3720 [2]
states that compliant nodes MUST respond with states that compliant nodes MUST respond with
X#NodeArchitecture=NotUnderstood). X#NodeArchitecture=NotUnderstood).
Nodes that implement transmission and/or logging of the key values Nodes that implement transmission and/or logging of the key values
may also implement administrative mechanisms that disable and/or may also implement administrative mechanisms that disable and/or
skipping to change at page 8, line 7 skipping to change at page 8, line 7
vulnerability level is viewed as high, since there are many well- vulnerability level is viewed as high, since there are many well-
known vulnerabilities to the general-purpose operating system. known vulnerabilities to the general-purpose operating system.
For the above target, an appropriate implementation might be logging For the above target, an appropriate implementation might be logging
of received key values, but no transmission of the key. For the of received key values, but no transmission of the key. For the
initiators, an appropriate implementation might be transmission of initiators, an appropriate implementation might be transmission of
the key, but no logging of received key values. the key, but no logging of received key values.
5. IANA Considerations 5. IANA Considerations
This document defines the iSCSI Extension Key NodeArchitecture to be The standards action of this document updates RFC 3720 to allow any
registered in the IANA iSCSI extended key registry. iSCSI extension item, specifically X# extension text keys, Y# digest
algorithms, and Z# authentication methods, to be defined by a
standards track RFC or experimental RFC in addition to an
informational RFC. This document is a standards track RFC that
defines an X# extension text key.
The IANA iSCSI Extended Key registry does not correspond to RFC 3720 The IANA iSCSI Extended Key registry does not correspond to RFC 3720
that defined it. The registry should contain three fields for each that defined it. The registry should contain three fields for each
extended key: extended key:
o Key Name o Key Name
o Description o Description
o Reference o Reference
IANA should modify the registry accordingly, and then register this IANA should modify the registry accordingly.
key as follows:
IANA should register this key as follows:
o Key Name: X#NodeArchitecture o Key Name: X#NodeArchitecture
o Description: Node architecture details o Description: Node architecture details
o Reference: [this RFC-to-be] o Reference: [this RFC-to-be]
-- RFC Editor: The paragraph starting from "The IANA iSCSI Extended -- RFC Editor: The text from "The IANA iSCSI Extended Key" through
Key" should be removed prior to RFC publication. "modify the registry accordingly." should be removed after the IANA
actions for this document are performed prior to RFC publication.
6. References 6. References
6.1. Normative References 6.1. Normative References
[1] Bradner, S., "Key words for use in RFCs to Indicate Requirement [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March 1997. Levels", BCP 14, RFC 2119, March 1997.
[2] Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M., and E. [2] Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M., and E.
Zeidner, "Internet Small Computer Systems Interface (iSCSI)", Zeidner, "Internet Small Computer Systems Interface (iSCSI)",
skipping to change at page 10, line 5 skipping to change at page 10, line 5
6.2. Informative References 6.2. Informative References
[3] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., [3] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L.,
Leach, P., and T. Berners-Lee, "Hypertext Transfer Protocol -- Leach, P., and T. Berners-Lee, "Hypertext Transfer Protocol --
HTTP/1.1", RFC 2616, June 1999. HTTP/1.1", RFC 2616, June 1999.
[4] Aboba, B., Tseng, J., Walker, J., Rangan, V., and F. Travostino, [4] Aboba, B., Tseng, J., Walker, J., Rangan, V., and F. Travostino,
"Securing Block Storage Protocols over IP", RFC 3723, "Securing Block Storage Protocols over IP", RFC 3723,
April 2004. April 2004.
Appendix A. Acknowledgements Appendix A. Acknowledgments
The IP Storage (ips) Working Group in the Transport Area of IETF has The IP Storage (ips) Working Group in the Transport Area of IETF has
been responsible for defining the iSCSI protocol (apart from a host been responsible for defining the iSCSI protocol (apart from a host
of other relevant IP Storage protocols). The editor acknowledges the of other relevant IP Storage protocols). The editor acknowledges the
contributions of the entire working group. contributions of the entire working group.
The following individuals directly contributed to identifying issues The following individuals directly contributed to identifying issues
and/or suggesting resolutions to the issues found in this document: and/or suggesting resolutions to the issues found in this document:
David Black, Mallikarjun Chadalapaka, Paul Koning, Julian Satran, David Black, Mallikarjun Chadalapaka, Paul Koning, Julian Satran,
John Hufferd, Claire Kraft, Ranga Sankar, Joseph Pittman, Greg Berg, John Hufferd, Claire Kraft, Ranga Sankar, Joseph Pittman, Greg Berg,
 End of changes. 10 change blocks. 
21 lines changed or deleted 32 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/