< draft-ietf-wrec-taxonomy-04.txt   draft-ietf-wrec-taxonomy-05.txt >
Network Working Group I. Cooper Network Working Group I. Cooper
Internet-Draft Mirror Image Internet-Draft Mirror Image
Expires: December 22, 2000 I. Melve Expires: January 2, 2001 I. Melve
UNINETT UNINETT
G. Tomlinson G. Tomlinson
Novell Novell
June 23, 2000 July 4, 2000
Internet Web Replication and Caching Taxonomy Internet Web Replication and Caching Taxonomy
draft-ietf-wrec-taxonomy-04.txt draft-ietf-wrec-taxonomy-05.txt
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as other groups may also distribute working documents as
Internet-Drafts. Internet-Drafts.
skipping to change at page 1, line 35 skipping to change at page 1, line 35
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as reference at any time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 22, 2000. This Internet-Draft will expire on January 2, 2001.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2000). All Rights Reserved. Copyright (C) The Internet Society (2000). All Rights Reserved.
Abstract Abstract
This memo specifies standard terminology and the current taxonomy of This memo specifies standard terminology and the current taxonomy of
web replication and caching infrastructure deployed today. It web replication and caching infrastructure deployed today. It
introduces standard concepts and protocols used today within this introduces standard concepts and protocols used today within this
skipping to change at page 2, line 11 skipping to change at page 2, line 11
document[23], and are not part of this document. This document document[23], and are not part of this document. This document
presents open protocols and points to published material for each presents open protocols and points to published material for each
protocol. protocol.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 4 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Base Terms . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1 Base Terms . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 First order derivative terms . . . . . . . . . . . . . . . 7 2.2 First order derivative terms . . . . . . . . . . . . . . . 7
2.3 Second order derivatives . . . . . . . . . . . . . . . . . 7 2.3 Second order derivatives . . . . . . . . . . . . . . . . . 8
2.4 Topological terms . . . . . . . . . . . . . . . . . . . . 8 2.4 Topological terms . . . . . . . . . . . . . . . . . . . . 8
2.5 Automatic use of proxies . . . . . . . . . . . . . . . . . 8 2.5 Automatic use of proxies . . . . . . . . . . . . . . . . . 9
3. Distributed System Relationships . . . . . . . . . . . . . 10 3. Distributed System Relationships . . . . . . . . . . . . . 11
3.1 Replication Relationships . . . . . . . . . . . . . . . . 10 3.1 Replication Relationships . . . . . . . . . . . . . . . . 11
3.1.1 Client to Replica . . . . . . . . . . . . . . . . . . . . 10 3.1.1 Client to Replica . . . . . . . . . . . . . . . . . . . . 11
3.1.2 Inter-Replica . . . . . . . . . . . . . . . . . . . . . . 10 3.1.2 Inter-Replica . . . . . . . . . . . . . . . . . . . . . . 11
3.2 Proxy Relationships . . . . . . . . . . . . . . . . . . . 11 3.2 Proxy Relationships . . . . . . . . . . . . . . . . . . . 12
3.2.1 Client to Non-Interception Proxy . . . . . . . . . . . . . 11 3.2.1 Client to Non-Interception Proxy . . . . . . . . . . . . . 12
3.2.2 Client to Surrogate to Origin Server . . . . . . . . . . . 11 3.2.2 Client to Surrogate to Origin Server . . . . . . . . . . . 12
3.2.3 Inter-Proxy . . . . . . . . . . . . . . . . . . . . . . . 12 3.2.3 Inter-Proxy . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.3.1 (Caching) Proxy Meshes . . . . . . . . . . . . . . . . . . 12 3.2.3.1 (Caching) Proxy Meshes . . . . . . . . . . . . . . . . . . 13
3.2.3.2 (Caching) Proxy Arrays . . . . . . . . . . . . . . . . . . 13 3.2.3.2 (Caching) Proxy Arrays . . . . . . . . . . . . . . . . . . 14
3.2.4 Network Element to Caching Proxy . . . . . . . . . . . . . 13 3.2.4 Network Element to Caching Proxy . . . . . . . . . . . . . 14
4. Replica Selection . . . . . . . . . . . . . . . . . . . . 15 4. Replica Selection . . . . . . . . . . . . . . . . . . . . 16
4.1 Navigation Hyperlinks . . . . . . . . . . . . . . . . . . 15 4.1 Navigation Hyperlinks . . . . . . . . . . . . . . . . . . 16
4.2 HTTP Redirection . . . . . . . . . . . . . . . . . . . . . 15 4.2 HTTP Redirection . . . . . . . . . . . . . . . . . . . . . 16
4.3 DNS Redirection . . . . . . . . . . . . . . . . . . . . . 16 4.3 DNS Redirection . . . . . . . . . . . . . . . . . . . . . 17
5. Inter-Replica Communication . . . . . . . . . . . . . . . 17 5. Inter-Replica Communication . . . . . . . . . . . . . . . 18
5.1 Batch Driven Replication . . . . . . . . . . . . . . . . . 17 5.1 Batch Driven Replication . . . . . . . . . . . . . . . . . 18
5.2 Demand Driven Replication . . . . . . . . . . . . . . . . 17 5.2 Demand Driven Replication . . . . . . . . . . . . . . . . 18
5.3 Synchronized Replication . . . . . . . . . . . . . . . . . 18 5.3 Synchronized Replication . . . . . . . . . . . . . . . . . 19
6. User Agent to Proxy Configuration . . . . . . . . . . . . 19 6. User Agent to Proxy Configuration . . . . . . . . . . . . 20
6.1 Manual Proxy Configuration . . . . . . . . . . . . . . . . 19 6.1 Manual Proxy Configuration . . . . . . . . . . . . . . . . 20
6.2 Proxy Auto Configuration (PAC) . . . . . . . . . . . . . . 19 6.2 Proxy Auto Configuration (PAC) . . . . . . . . . . . . . . 20
6.3 Cache Array Routing Protocol (CARP) v1.0 . . . . . . . . . 20 6.3 Cache Array Routing Protocol (CARP) v1.0 . . . . . . . . . 21
6.4 Web Proxy Auto-Discovery Protocol (WPAD) . . . . . . . . . 20 6.4 Web Proxy Auto-Discovery Protocol (WPAD) . . . . . . . . . 21
7. Inter-Proxy Communication . . . . . . . . . . . . . . . . 22 7. Inter-Proxy Communication . . . . . . . . . . . . . . . . 23
7.1 Loosely coupled Inter-Proxy Communication . . . . . . . . 22 7.1 Loosely coupled Inter-Proxy Communication . . . . . . . . 23
7.1.1 Internet Cache Protocol (ICP) . . . . . . . . . . . . . . 22 7.1.1 Internet Cache Protocol (ICP) . . . . . . . . . . . . . . 23
7.1.2 Hyper Text Caching Protocol . . . . . . . . . . . . . . . 22 7.1.2 Hyper Text Caching Protocol . . . . . . . . . . . . . . . 23
7.1.3 Cache Digest . . . . . . . . . . . . . . . . . . . . . . . 23 7.1.3 Cache Digest . . . . . . . . . . . . . . . . . . . . . . . 24
7.1.4 Cache Pre-filling . . . . . . . . . . . . . . . . . . . . 24 7.1.4 Cache Pre-filling . . . . . . . . . . . . . . . . . . . . 25
7.2 Tightly Coupled Inter-Cache Communication . . . . . . . . 25 7.2 Tightly Coupled Inter-Cache Communication . . . . . . . . 26
7.2.1 Cache Array Routing Protocol (CARP) v1.0 . . . . . . . . . 25 7.2.1 Cache Array Routing Protocol (CARP) v1.0 . . . . . . . . . 26
8. Network Element Communication . . . . . . . . . . . . . . 26 8. Network Element Communication . . . . . . . . . . . . . . 27
8.1 Web Cache Control Protocol (WCCP) . . . . . . . . . . . . 26 8.1 Web Cache Control Protocol (WCCP) . . . . . . . . . . . . 27
8.2 Network Element Control Protocol (NECP) . . . . . . . . . 26 8.2 Network Element Control Protocol (NECP) . . . . . . . . . 27
8.3 SOCKS . . . . . . . . . . . . . . . . . . . . . . . . . . 27 8.3 SOCKS . . . . . . . . . . . . . . . . . . . . . . . . . . 28
9. Security Considerations . . . . . . . . . . . . . . . . . 28 9. Security Considerations . . . . . . . . . . . . . . . . . 29
9.1 Authentication . . . . . . . . . . . . . . . . . . . . . . 28 9.1 Authentication . . . . . . . . . . . . . . . . . . . . . . 29
9.1.1 Man in the middle attacks . . . . . . . . . . . . . . . . 28 9.1.1 Man in the middle attacks . . . . . . . . . . . . . . . . 29
9.1.2 Trusted third party . . . . . . . . . . . . . . . . . . . 28 9.1.2 Trusted third party . . . . . . . . . . . . . . . . . . . 29
9.1.3 Authentication based on IP number . . . . . . . . . . . . 28 9.1.3 Authentication based on IP number . . . . . . . . . . . . 29
9.2 Privacy . . . . . . . . . . . . . . . . . . . . . . . . . 29 9.2 Privacy . . . . . . . . . . . . . . . . . . . . . . . . . 30
9.2.1 Trusted third party . . . . . . . . . . . . . . . . . . . 29 9.2.1 Trusted third party . . . . . . . . . . . . . . . . . . . 30
9.2.2 Logs and legal implications . . . . . . . . . . . . . . . 29 9.2.2 Logs and legal implications . . . . . . . . . . . . . . . 30
9.3 Service security . . . . . . . . . . . . . . . . . . . . . 29 9.3 Service security . . . . . . . . . . . . . . . . . . . . . 30
9.3.1 Denial of service . . . . . . . . . . . . . . . . . . . . 30 9.3.1 Denial of service . . . . . . . . . . . . . . . . . . . . 31
9.3.2 Replay attack . . . . . . . . . . . . . . . . . . . . . . 30 9.3.2 Replay attack . . . . . . . . . . . . . . . . . . . . . . 31
9.3.3 Stupid configuration of proxies . . . . . . . . . . . . . 30 9.3.3 Stupid configuration of proxies . . . . . . . . . . . . . 31
9.3.4 Copyrighted transient copies . . . . . . . . . . . . . . . 30 9.3.4 Copyrighted transient copies . . . . . . . . . . . . . . . 31
9.3.5 Application level access . . . . . . . . . . . . . . . . . 30 9.3.5 Application level access . . . . . . . . . . . . . . . . . 31
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . 31 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . 32
References . . . . . . . . . . . . . . . . . . . . . . . . 32 References . . . . . . . . . . . . . . . . . . . . . . . . 33
Authors' Addresses . . . . . . . . . . . . . . . . . . . . 34 Authors' Addresses . . . . . . . . . . . . . . . . . . . . 35
Full Copyright Statement . . . . . . . . . . . . . . . . . 36 Full Copyright Statement . . . . . . . . . . . . . . . . . 37
1. Introduction 1. Introduction
Since its introduction in 1990, the World-Wide Web has evolved from Since its introduction in 1990, the World-Wide Web has evolved from
a simple client server model into a sophisticated distributed a simple client server model into a sophisticated distributed
architecture. This evolution has been driven largely due to the architecture. This evolution has been driven largely due to the
scaling problems associated with exponential growth. Distinct scaling problems associated with exponential growth. Distinct
paradigms and solutions have emerged to satisfy specific paradigms and solutions have emerged to satisfy specific
requirements. Two core infrastructure components being employed to requirements. Two core infrastructure components being employed to
meet the demands of this growth are replication and caching. In many meet the demands of this growth are replication and caching. In many
skipping to change at page 5, line 19 skipping to change at page 5, line 19
taken, where possible, from the HTTP/1.1 specification[1] and are taken, where possible, from the HTTP/1.1 specification[1] and are
included here for reference. First- and second-order derivatives are included here for reference. First- and second-order derivatives are
constructed from these base terms to help define the relationships constructed from these base terms to help define the relationships
that exist within this area. that exist within this area.
Terms that are in common usage and which are contrary to definitions Terms that are in common usage and which are contrary to definitions
in RFC2616 and this document are highlighted. in RFC2616 and this document are highlighted.
2.1 Base Terms 2.1 Base Terms
The majority of these terms are taken as-is from RFC 2616[1], and The majority of these terms are taken as-is from RFC2616[1], and are
are included here for reference. included here for reference.
client (taken from [1]) client (taken from [1])
A program that establishes connections for the purpose of sending A program that establishes connections for the purpose of sending
requests. requests.
server (taken from [1]) server (taken from [1])
An application program that accepts connections in order to An application program that accepts connections in order to
service requests by sending back responses. Any given program may service requests by sending back responses. Any given program may
be capable of being both a client and a server; our use of these be capable of being both a client and a server; our use of these
terms refers only to the role being performed by the program for terms refers only to the role being performed by the program for
skipping to change at page 7, line 31 skipping to change at page 7, line 31
editors, spiders (web-traversing robots), or other end user tools. editors, spiders (web-traversing robots), or other end user tools.
caching proxy caching proxy
A proxy with a cache, acting as a server to clients, and a client A proxy with a cache, acting as a server to clients, and a client
to servers. to servers.
Caching proxies are often referred to as "proxy caches" or simply Caching proxies are often referred to as "proxy caches" or simply
"caches". The term "proxy" is also frequently misused when "caches". The term "proxy" is also frequently misused when
referring to caching proxies. referring to caching proxies.
surrogate (a.k.a. "reverse proxies", "web server accelerators") surrogate
An intermediary program which acts on behalf of one or more A gateway co-located with an origin server, or at a different
origin servers by serving the original resource from a different point in the network, delegated the authority to operate on
part of the network. Requests are typically serviced from an behalf of, and typically working in close co-operation with, one
internal cache or by acting as a gateway or tunnel to the origin or more origin servers. Responses are typically delivered from an
server. The implementation requirements of surrogates with internal cache.
respect to handling cache directives from [1] have not been
standardized. Surrogates are also known as "reverse proxies" and Surrogates may derive cache entries from the origin server or
"(origin) server accelerators". from another of the origin server's delegates. In some cases a
surrogate may tunnel such requests.
Where close co-operation between origin servers and surrogates
exists, this enables modifications of some protocol requirements,
including the Cache-Control directives in [1]. Such modifications
have yet to be fully specified.
Devices commonly known as "reverse proxies" and "(origin) server
accelerators" are both more properly defined as surrogates.
reverse proxy
See "surrogate".
server accelerator
See "surrogate".
2.3 Second order derivatives 2.3 Second order derivatives
The following terms further build on first order derivatives: The following terms further build on first order derivatives:
master origin server master origin server
An origin server on which the definitive version of a resource An origin server on which the definitive version of a resource
resides. resides.
replica origin server replica origin server
skipping to change at page 22, line 15 skipping to change at page 23, line 15
7. Inter-Proxy Communication 7. Inter-Proxy Communication
7.1 Loosely coupled Inter-Proxy Communication 7.1 Loosely coupled Inter-Proxy Communication
This section describes the cooperation and communication between This section describes the cooperation and communication between
caching proxies. caching proxies.
7.1.1 Internet Cache Protocol (ICP) 7.1.1 Internet Cache Protocol (ICP)
Authoritative reference: Authoritative reference:
RFC 2186 Internet Cache Protocol (ICP), version 2[5] RFC2186 Internet Cache Protocol (ICP), version 2[5]
Description: Description:
ICP is used by proxies to query other (caching) proxies about web ICP is used by proxies to query other (caching) proxies about web
resources, to see if the requested resource is present on the resources, to see if the requested resource is present on the
other system. other system.
ICP uses UDP. Since UDP is an uncorrected network transport ICP uses UDP. Since UDP is an uncorrected network transport
protocol, an estimate of network congestion and availability may protocol, an estimate of network congestion and availability may
be calculated by ICP loss. This rudimentary loss measurement be calculated by ICP loss. This rudimentary loss measurement
provides, together with round trip times, a load balancing method provides, together with round trip times, a load balancing method
for caches. for caches.
Security: Security:
See RFC 2187[6] See RFC2187[6]
ICP does not convey information about HTTP headers associated ICP does not convey information about HTTP headers associated
with resources. HTTP headers may include access control and cache with resources. HTTP headers may include access control and cache
directives. Since proxies ask for the availability of resources, directives. Since proxies ask for the availability of resources,
and subsequently retrieve them using HTTP, false cache hits may and subsequently retrieve them using HTTP, false cache hits may
occur (object present in cache, but not accessible to a sibling occur (object present in cache, but not accessible to a sibling
is one example). is one example).
ICP suffers from all the security problems of UDP. ICP suffers from all the security problems of UDP.
skipping to change at page 22, line 53 skipping to change at page 23, line 53
Submitter: Submitter:
Document editors. Document editors.
See also Internet-Draft draft-lovric-icp-ext-02.txt[7], ICP See also Internet-Draft draft-lovric-icp-ext-02.txt[7], ICP
development Web page[8], ICP1.4 specification[9]. development Web page[8], ICP1.4 specification[9].
7.1.2 Hyper Text Caching Protocol 7.1.2 Hyper Text Caching Protocol
Authoritative reference: Authoritative reference:
RFC 2756 Hyper Text Caching Protocol (HTCP/0.0)[18] RFC2756 Hyper Text Caching Protocol (HTCP/0.0)[18]
Description: Description:
HTCP is a protocol for discovering HTTP caching proxies and HTCP is a protocol for discovering HTTP caching proxies and
cached data, managing sets of HTTP caching proxies, and cached data, managing sets of HTTP caching proxies, and
monitoring cache activity. monitoring cache activity.
HTCP requests include HTTP header material, while ICPv2 does not, HTCP requests include HTTP header material, while ICPv2 does not,
enabling HTCP replies to more accurately describe the behaviour enabling HTCP replies to more accurately describe the behaviour
that would occur as a result of a subsequent HTTP request for the that would occur as a result of a subsequent HTTP request for the
same resource. same resource.
skipping to change at page 31, line 11 skipping to change at page 32, line 11
world. Some network level equipment may have required physical world. Some network level equipment may have required physical
access to get sensitive information. Introduction of application access to get sensitive information. Introduction of application
level components may require additional system security. level components may require additional system security.
10. Acknowledgements 10. Acknowledgements
The editors would like to thank the following for their assistance: The editors would like to thank the following for their assistance:
David Forster, Alex Rousskov, Josh Cohen, John Martin, John Dilley, David Forster, Alex Rousskov, Josh Cohen, John Martin, John Dilley,
Ivan Lovric, Joe Touch, Henrik Nordstrom, Patrick McManus, Duane Ivan Lovric, Joe Touch, Henrik Nordstrom, Patrick McManus, Duane
Wessels, Wojtek Sylwestrzak, Ted Hardie, Misha Rabinovich, Larry Wessels, Wojtek Sylwestrzak, Ted Hardie, Misha Rabinovich, Larry
Masinter, Keith Moore, Roy Fielding, and Patrick Faltstrom. Masinter, Keith Moore, Roy Fielding, Patrick Faltstrom, Hilarie
Orman, Mark Nottingham and Oskar Batuner.
References References
[1] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, [1] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter,
L., Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol L., Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol
-- HTTP/1.1", RFC 2616, June 1999, -- HTTP/1.1", RFC 2616, June 1999,
<http://www.rfc-editor.org/rfc/rfc2616.txt>. <URL:http://www.ietf.org/rfc/rfc2616.txt>.
[2] Netscape, Inc., "Navigator Proxy Auto-Config File Format", [2] Netscape, Inc., "Navigator Proxy Auto-Config File Format",
External reference http://www.netscape.com/eng/mozilla/2.0/ March 1996,
relnotes/demo/proxy-live.html, March 1996, <URL:http://www.netscape.com/eng/mozilla/2.0/relnotes/demo/prox
<http://www.netscape.com/eng/mozilla/2.0/relnotes/demo/proxy-live.html> y-live.html>.
.
[3] Gauthier, P., Cohen, J., Dunsmuir, M. and C. Perkins, "The Web [3] Gauthier, P., Cohen, J., Dunsmuir, M. and C. Perkins, "The Web
Proxy Auto-Discovery Protocol", Expired Internet Draft Proxy Auto-Discovery Protocol", draft-ietf-wrec-wpad-01.txt
draft-ietf-wrec-wpad-01.txt, July 1999, (work in progress), July 1999,
<http://www.ietf.org/internet-drafts/draft-ietf-wrec-wpad-01.txt> <URL:http://www.wrec.org/Drafts/draft-ietf-wrec-wpad-01.txt>.
.
[4] Valloppillil, V. and K.W. Ross, "Cache Array Routing [4] Valloppillil, V. and K.W. Ross, "Cache Array Routing
Protocol", Expired Internet Draft draft-vinod-carp-v1-03.txt Protocol", draft-vinod-carp-v1-03.txt (work in progress),
available at http://ircache.nlanr.net/Cache/ICP/carp.txt, February 1998,
February 1998, <http://ircache.nlanr.net/Cache/ICP/carp.txt>. <URL:http://www.wrec.org/Drafts/draft-vinod-carp-v1-03.txt>.
[5] Wessels, D. and K. Claffy, "Internet Cache Protocol (ICP), [5] Wessels, D. and K. Claffy, "Internet Cache Protocol (ICP),
Version 2", RFC 2186, September 1997, Version 2", RFC 2186, September 1997,
<http://www.rfc-editor.org/rfc/rfc2186.txt>. <URL:http://www.ietf.org/rfc/rfc2186.txt>.
[6] Wessels, D. and K. Claffy, "Application of Internet Cache [6] Wessels, D. and K. Claffy, "Application of Internet Cache
Protocol (ICP), Version 2", RFC 2187, September 1997, Protocol (ICP), Version 2", RFC 2187, September 1997,
<http://www.rfc-editor.org/rfc/rfc2187.txt>. <URL:http://www.ietf.org/rfc/rfc2187.txt>.
[7] Lovric, I., "Internet Cache Protocol Extension", Expired [7] Lovric, I., "Internet Cache Protocol Extension",
Internet Draft draft-lovric-icp-ext-02.txt, October 1999, draft-lovric-icp-ext-02.txt (work in progress), October 1999,
<http://www.ietf.org/internet-drafts/draft-lovric-icp-ext-02.txt> <URL:http://www.wrec.org/Drafts/draft-lovric-icp-ext-02.txt>.
.
[8] Wessels, D., "ICP Home Page", External reference [8] Wessels, D., "ICP Home Page", July 1999,
http://ircache.nlanr.net/Cache/ICP/, July 1999, <URL:http://ircache.nlanr.net/Cache/ICP/>.
<http://ircache.nlanr.net/Cache/ICP/>.
[9] University of Southern California and University of [9] University of Southern California and University of
Colorado-Boulder, "Internet Cache Protocol Specification 1.4", Colorado-Boulder, "Internet Cache Protocol Specification 1.4",
External reference http://excalibur.usc.edu/icpdoc/icp.html, September 1994,
September 1994, <http://excalibur.usc.edu/icpdoc/icp.html>. <URL:http://excalibur.usc.edu/icpdoc/icp.html>.
[10] Postel, J. and J.K. Reynolds, "File Transfer Protocol (FTP)", [10] Postel, J. and J.K. Reynolds, "File Transfer Protocol (FTP)",
RFC 959, Oct 1985, <http://www.rfc-editor.org/rfc/rfc959.txt>. RFC 959, Oct 1985,
<URL:http://www.ietf.org/rfc/rfc0959.txt>.
[11] Anklesaria, F., McCahill, M., Lindner, P., Johnson, D., [11] Anklesaria, F., McCahill, M., Lindner, P., Johnson, D.,
Torrey, D. and B. Alberti, "The Internet Gopher Protocol", RFC Torrey, D. and B. Alberti, "The Internet Gopher Protocol", RFC
1436, Mar 1993, <http://www.rfc-editor.org/rfc/rfc1436.txt>. 1436, Mar 1993,
<URL:http://www.ietf.org/rfc/rfc1436.txt>.
[12] Berners-Lee, T., Fielding, R. and H. Frystyk, "Hypertext [12] Berners-Lee, T., Fielding, R. and H. Frystyk, "Hypertext
Transfer Protocol -- HTTP/1.0", RFC 1945, May 1996, Transfer Protocol -- HTTP/1.0", RFC 1945, May 1996,
<http://www.rfc-editor.org/rfc/rfc1945.txt>. <URL:http://www.ietf.org/rfc/rfc1945.txt>.
[13] Cisco Systems, "Cisco Web Cache Control Protocol V1.0", [13] Cieslak, M. and D. Forster, "Cisco Web Cache Control Protocol
Expired Internet Draft draft-ietf-wrec-web-pro-00.txt, June V1.0", draft-ietf-wrec-web-pro-00.txt (work in progress), June
1999, 1999,
<http://www.ietf.org/internet-drafts/draft-ietf-wrec-web-pro-00.txt> <URL:http://www.wrec.org/Drafts/draft-ietf-wrec-web-pro-00.txt>.
.
[14] Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D. and L. [14] Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D. and L.
Jones, "SOCKS Protocol Version 5", RFC 1928, March 1996, Jones, "SOCKS Protocol Version 5", RFC 1928, March 1996,
<http://www.rfc-editor.org/rfc/rfc1928.txt>. <URL:http://www.ietf.org/rfc/rfc1928.txt>.
[15] Brisco, T., "DNS Support for Load Balancing", RFC 1794, April [15] Brisco, T., "DNS Support for Load Balancing", RFC 1794, April
1995, <http://www.rfc-editor.org/rfc/rfc1794.txt>. 1995,
<URL:http://www.ietf.org/rfc/rfc1794.txt>.
[16] Goutard, C., Lovric, I. and E. Maschio-Esposito, "Pre-filling [16] Goutard, C., Lovric, I. and E. Maschio-Esposito, "Pre-filling
a cache - A satellite overview", Internet Draft a cache - A satellite overview",
draft-lovric-francetelecom-satellites-01.txt, February 2000, draft-lovric-francetelecom-satellites-01.txt (work in
<http://www.ietf.org/internet-drafts/draft-lovric-francetelecom-satellites-01.txt> progress), February 2000,
. <URL:http://www.ietf.org/internet-drafts/draft-lovric-francetel
ecom-satellites-01.txt>.
[17] Hamilton, M., Rousskov, A. and D. Wessels, "Cache Digest [17] Hamilton, M., Rousskov, A. and D. Wessels, "Cache Digest
specification - version 5", External reference specification - version 5", December 1998,
http://squid.nlanr.net/CacheDigest/cache-digest-v5.txt, <URL:http://www.squid-cache.org/CacheDigest/cache-digest-v5.txt
December 1998, >.
<http://squid.nlanr.net/CacheDigest/cache-digest-v5.txt>.
[18] Vixie, P. and D. Wessels, "Hyper Text Caching Protocol [18] Vixie, P. and D. Wessels, "Hyper Text Caching Protocol
(HTCP/0.0)", RFC 2756, January 2000, (HTCP/0.0)", RFC 2756, January 2000,
<http://www.rfc-editor.org/rfc/rfc2756.txt>. <URL:http://www.ietf.org/rfc/rfc2756.txt>.
[19] Fan, L., Cao, P., Almeida, J. and A. Broder, "Summary Cache: A [19] Fan, L., Cao, P., Almeida, J. and A. Broder, "Summary Cache: A
Scalable Wide-Area Web Cache Sharing Protocol", Proceedings of Scalable Wide-Area Web Cache Sharing Protocol", Proceedings of
ACM SIGCOMM'98 pp. 254-265, September 1998, ACM SIGCOMM'98 pp. 254-265, September 1998,
<http://www.cs.wisc.edu/~cao/papers/summarycache.html>. <URL:http://www.cs.wisc.edu/~cao/papers/summarycache.html>.
[20] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC: Keyed-Hashing [20] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC: Keyed-Hashing
for Message Authentication", RFC 2104, February 1997, for Message Authentication", RFC 2104, February 1997,
<http://www.rfc-editor.org/rfc/rfc2104.txt>. <URL:http://www.ietf.org/rfc/rfc2104.txt>.
[21] Cerpa, A., Elson, J., Beheshti, H., Chankhunthod, A., Danzig, [21] Cerpa, A., Elson, J., Beheshti, H., Chankhunthod, A., Danzig,
P., Jalan, R., Neerdaels, C., Shroeder, T. and G. Tomlinson, P., Jalan, R., Neerdaels, C., Shroeder, T. and G. Tomlinson,
"NECP: The Network Element Control Protocol", Internet Draft "NECP: The Network Element Control Protocol",
draft-cerpa-necp-02.txt, February 2000, draft-cerpa-necp-02.txt (work in progress), February 2000,
<http://www.ietf.org/internet-drafts/draft-cerpa-necp-02.txt>. <URL:http://www.ietf.org/internet-drafts/draft-cerpa-necp-02.tx
t>.
[22] FOLDOC, "Free Online Dictionary of Computing: Replication", [22] FOLDOC, "Free Online Dictionary of Computing: Replication",
Online reference
http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?replication,
December 1997, December 1997,
<http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?replication>. <URL:http://foldoc.doc.ic.ac.uk/foldoc/foldoc.cgi?replication>.
[23] Dilley, J. and I. Cooper, "Known HTTP Proxy/Caching Problems", [23] Cooper, I. and J. Dilley, "Known HTTP Proxy/Caching Problems",
Internet Draft draft-ietf-wrec-known-prob-01.txt, February draft-ietf-wrec-known-prob-02.txt (work in progress), July
2000, 2000,
<http://www.ietf.org/internet-drafts/draft-ietf-wrec-known-prob-01.txt> <URL:http://www.ietf.org/internet-drafts/draft-ietf-wrec-known-
. prob-02.txt>.
[24] http://www.squid-cache.org/ [24] <URL:http://www.squid-cache.org/>
[25] http://www.vix.com/vix/wgi.html [25] <URL:http://www.vix.com/vix/wgi.html>
[26] http://ircache.nlanr.net/Cache/ [26] <URL:http://ircache.nlanr.net/Cache/>
[27] http://www.terena.nl/task-force/tf-cache/ [27] <URL:http://www.terena.nl/task-force/tf-cache/>
Authors' Addresses Authors' Addresses
Ian Cooper Ian Cooper
Mirror Image Internet, Inc. Mirror Image Internet, Inc.
49 Dragon Court 49 Dragon Court
Woburn, MA 01801 Woburn, MA 01801
USA USA
Phone: +1 781 376 1109 Phone: +1 781 376 1109
 End of changes. 42 change blocks. 
132 lines changed or deleted 145 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/