Sept 29/30, 2005 IETF 63.5 - Lemonade 1 Towards Lemonade Profile Phase 2 Lemonade Mobile and New Drafts Towards Phase 2 of Lemonade Stéphane H. Maes,

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Draft-lemonade-imap-submit-01.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
1 Web Proxies Dr. Rocky K. C. Chang 6 November 2005.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Standards Based Mobile Messaging March, 2003.
Architecture of SMTP, POP, IMAP, MIME.
1 Enabling Secure Internet Access with ISA Server.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
2-3 August 2005IETF 63 - Paris, France1 Lemonade IETF 63 Eric Burger Glenn Parsons
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Enabling Embedded Systems to access Internet Resources.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lemonade IETF 66 Eric Burger Glenn Parsons
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
P-IMAP Draft Overview (
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Lemonade Requirements for Server to Client Notifications
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
China Mobile Mobile Service Jan 24th,2006. Outline ▪Market in China ▪Service Requirements ▪Business Model ▪Expectation.
December 6, 2007IETF 70 - Vancouver, Canada1 Lemonade Interop event in Munich.
OMA Mobile liaison Considers the OMA Mobile Requirements as input from the mobile community in terms of requirements for mobile features.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
29-30 September 2005IETF London, UK1 Lemonade IETF 63.5 Eric Burger Glenn Parsons
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
What's new in the World IMAP/LEMONADE/SIEVE (no DKIM or EAI) Alexey Melnikov.
P-IMAP Draft Overview (
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Lemonade IETF 64.5 Eric Burger Glenn Parsons
Slide 1 IETF LEMONADE Greg Vaudreuil (630)
IETF 69 SIPPING WG Meeting Mohammad Vakil Microsoft An Extension to Session Initiation Protocol (SIP) Events for Pausing and Resuming.
9-10 March 2005IETF 62 - Minneapolis, MN, USA1 Lemonade IETF 62 Eric Burger Glenn Parsons
1 Lemonade Status Updates of assigned drafts (*) for IETF’65.5 in Ottawa May 31, 2006 / June 1, 2006 WG sessions (*) Other updates are to be presented.
© 2007 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
IETF 65 – Lemonade – March 20, Lemonade Status Updates for IETF’65: Our Assigned drafts for Mar 20, 2006 WG session (*)
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Draft-lemonade-imap-submit-00.txt “Forward without Download” Allow IMAP client to include previously- received message (or parts) in or as new message.
Towards Lemonade Profile Version 2 August 3, 2005 IETF 63 - Lemonade 1 Lemonade New Drafts Towards Version 2 of Lemonade Profile Stéphane H. Maes,
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
9 November 2006IETF 671 SEARCH-WITHIN No major changes Fix nits, references, formatting, non- ASCII characters, boilerplate WGLC Underway.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Jonathan Rosenberg dynamicsoft
Chapter 9: Transport Layer
draft-lemonade-imap-submit-01.txt “Forward without Download”
IMAP CONVERT Alexey Melnikov Stéphane Maes Ray Cromwell
IETF-59 P-IMAP Draft Overview ( Stéphane H. Maes – Jean.
Cryptography and Network Security Chapter 16
Web Caching? Web Caching:.
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Topic 5: Communication and the Internet
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Working at a Small-to-Medium Business or ISP – Chapter 7
Lemonade Requirements for Server to Client Notifications
Protocol Application TCP/IP Layer Model
Presentation transcript:

Sept 29/30, 2005 IETF Lemonade 1 Towards Lemonade Profile Phase 2 Lemonade Mobile and New Drafts Towards Phase 2 of Lemonade Stéphane H. Maes, Ray Cromwell

Sept 29/30, 2005 IETF Lemonade 2 Towards Lemonade Profile Phase 2 Tasks in plan Profile items (possibly) not in profile version 1: –Media conversion –Quick Reconnect Per plan agreed during Lemonade 61.5 interim meeting in Redwood Shores (+ Lemonade 62 discussions): –Firewall Traversal –Filtering –Server to client notifications –Transport optimizations (mobile issues)

Sept 29/30, 2005 IETF Lemonade 3 Towards Lemonade Profile Phase 2 Starting to address these issues: Proposed new drafts draft-maes-lemonade-notifications- server-to-client-01 draft-maes-lemonade-lconvert-02 draft-maes-lemonade-lzip-02 draft-maes-lemonade-ldeliver-02 draft-maes-lemonade-http-binding-02 draft-maes-lemonade-monoincuid-01

Sept 29/30, 2005 IETF Lemonade 4 Towards Lemonade Profile Phase 2 Mobile Concerns and Motivations Network overhead –Bandwidth consumed and latency Client resource consumption –CPU, Memory, Radio, Battery Life Ease of Deployment –For both Operators and Enterprises Speed of deployment, Ease of Implementation –Handset manufacturing timelines require large lead times –Standards track should keep in mind manufacturer product cycles

Sept 29/30, 2005 IETF Lemonade 5 Towards Lemonade Profile Phase 2 Server-Side Compose Overview Desires: –Compose messages on server with attachments –Reduce bandwidth usage (message download) –Reduce round-trips –Reduce client complexity –Reduce deployment complexity –Support OMA requirements

Sept 29/30, 2005 IETF Lemonade 6 Towards Lemonade Profile Phase 2 LCOMPOSE Overview LCOMPOSE extends APPEND/CATENATE Requires LITERAL+ support Adds new literal type: delta encoded literal IMAPURL extensions Supports OMA Requirement for delta encoding New literal support reused by LDELIVER Look at optimizing for most common use case

Sept 29/30, 2005 IETF Lemonade 7 Towards Lemonade Profile Phase 2 Server-side Composing : Network Overhead Reduction LCOMPOSE vs CATENATE CATENATE –Extends APPEND to accept multiple TEXT and URL segments –Each literal part requires another adds another round trip without LITERAL+ LCOMPOSE –Extends APPEND to accept LITERAL+ and DTEXT literals –All inclusions can happen in a single roundtrip –Per-inclusion syntax overhead is less (no synchronization) –Delta encoded edits may be applied to includes to further reduce network overhead

Sept 29/30, 2005 IETF Lemonade 8 Towards Lemonade Profile Phase 2 Server-Side Compose Example CATENATE C: A003 APPEND Drafts (\Seen \Draft $MDNSent) CATENATE ( URL "/Drafts;UIDVALIDITY= /;UID=20;section=HEADER" TEXT {42} S: + Ready for literal data C: C: C: URL "/Drafts;UIDVALIDITY= /;UID=20;section=1.MIME" URL "/Drafts;UIDVALIDITY= /;UID=20;section=1" TEXT {42} S: + Ready for literal data C: C: C: URL "/Drafts;UIDVALIDITY= /;UID=30" TEXT {44} S: + Ready for literal data C: – C: ) S: A003 OK catenate append completed

Sept 29/30, 2005 IETF Lemonade 9 Towards Lemonade Profile Phase 2 Server-Side Compose Example LCOMPOSE C: A003 APPEND Drafts (\Seen \Draft $MDNSent) CATENATE ( URL "/Drafts;UIDVALIDITY= /;UID=20;section=HEADER" TEXT {42+} C: C: C: URL "/Drafts;UIDVALIDITY= /;UID=20;section=1.MIME" URL "/Drafts;UIDVALIDITY= /;UID=20;section=1" TEXT {42+} C: C: C: URL "/Drafts;UIDVALIDITY= /;UID=30" TEXT {44+} C: – C: ) S: A003 OK APPEND LCOMPOSE completed

Sept 29/30, 2005 IETF Lemonade 10 Towards Lemonade Profile Phase 2 Server-Side Compose Editing Example C: A003 APPEND Drafts (\Seen \Draft $MDNSent) LCOMPOSE (TEXT {123+} C: Date: Mon, 7 Feb :52: (PST) C: From: Fred Foobar C: Subject:some minor changes C: C: Content-Type: text/plain; charset=us-ascii C: C: DTEXT “/Inbox;UIDVALIDITY=9999/;UID=1234;Section=1” {456+} C: 3a4,6 C: > The trouble with tribbles is that C: > they insert themselves in your C: > files where you least expect it. C: ) S: A003 OK [APPENDUID ] APPEND Completed

Sept 29/30, 2005 IETF Lemonade 11 Towards Lemonade Profile Phase 2 Summary: Composing On the Server + editing / recomposition via delta encoding Features 1 minimummin 1 per URL included Roundtrips continuation responseOverhead About the same, except for delta encoded literal support About the sameComplexity LCOMPOSECATENATE

Sept 29/30, 2005 IETF Lemonade 12 Towards Lemonade Profile Phase 2 Submit of Composed Messages Overview Desires: –Reduce bandwidth usage –Reduce round-trips –Reduce client complexity –Reduce deployment complexity –Support almost full SMTP functionality –Design for common cases

Sept 29/30, 2005 IETF Lemonade 13 Towards Lemonade Profile Phase 2 LDELIVER Allows client to submit Batch SMTP sequences to SMTP server through IMAP Using LCOMPOSE extension, pre- composed messages may be included in batch via text literal or delta encoded literal Or message may be composed “on the fly” inline, no intermediate draft storage needed

Sept 29/30, 2005 IETF Lemonade 14 Towards Lemonade Profile Phase 2 Network Overhead: Submit of Composed Messages BURL + SMTP –Adds SMTP extension to fetch URLAUTH IMAPURLs as DATA portion –Adds 2+ round-trips. One to generate URL, more for SMTP transaction. More verbosity. –Requires SMTP server be upgraded to support two standards: URLAUTH and BURL –Requires client to utilize URLAUTH –Potentially complicates deployment due to simultaneous extensions needed on IMAP and SMTP servers.

Sept 29/30, 2005 IETF Lemonade 15 Towards Lemonade Profile Phase 2 Network Overhead: Submit of Composed Messages LDELIVER –Only one roundtrip needed –No special support in SMTP server needed

Sept 29/30, 2005 IETF Lemonade 16 Towards Lemonade Profile Phase 2 BURL Example IMAP SERVER C: a777 GENURLAUTH ;section=1.2;urlauth=submit+fred" INTERNAL S: * GENURLAUTH ;urlauth=submit+fred:internal:91354a de f92038" S: a777 OK GENURLAUTH completed SMTP SERVER C: EHLO potter.example.com S: 250-owlry.example.com S: 250-8BITMIME S: 250-PIPELINING S: 250-BURL imap S: 250-AUTH PLAIN C: AUTH PLAIN aGFycnkAaGFycnkAYWNjaW8= C: MAIL FROM: C: RCPT TO: C: BURL ;urlauth=submit+fred:internal:91354a de f92038” LAST S: PLAIN authentication successful. S: Address Ok. S: OK. S: Ok.

Sept 29/30, 2005 IETF Lemonade 17 Towards Lemonade Profile Phase 2 LDELIVER Example IMAP SERVER C: a123 LDELIVER TEXT {123+} C: EHLO potter.example.com C: AUTH PLAIN aGFycnkAaGFycnkAYWNjaW8= C: MAIL FROM: C: RCPT TO: C: DATA C: URL “/INBOX/;uid=20/;section=1.2” TEXT{3+} C:. S: * LDELIVER SMTP-RESPONSE {536} S: PLAIN authentication successful. S: Address Ok. S: S: Ok. S: a123 LDELIVER completed successfully

Sept 29/30, 2005 IETF Lemonade 18 Towards Lemonade Profile Phase 2 Sending On the Server No need to touch SMTP server Comments 1 minimum2 minimum setup, (more if PIPELINING not used,+xtra TCP conn ) Roundtrips LDELIVER cmd + URL + TEXT GENURLAUTH + response, BURL cmd Overhead Client impl LDELIVER, IMAPURL IMAP Server impl LDELIVER, LCOMPOSE LITERAL+, +batch SMTP proxy Client impl URLAUTH, SMTP+send BURL IMAP Server impl URLAUTH SMTP Server impl BURL/URLFETCH Complexity LDELIVERSMTP/BURL

Sept 29/30, 2005 IETF Lemonade 19 Towards Lemonade Profile Phase 2 Compression Mobile clients (GPRS, 1xRTT) are bandwidth constrained Mobile bandwidth is expensive IMAP is a verbose protocol Experiments have shown dramatic compression ratios of IMAP response sequences are achievable

Sept 29/30, 2005 IETF Lemonade 20 Towards Lemonade Profile Phase 2 Solutions Transport Layer Security (TLS) compression –But, not all TLS implementations support compression –Deployment of a codec specialized for IMAP may be infeasible New IMAP extension LZIP –Wraps an IMAP command and indicates to the server to compress all server generated responses using ZLIB Defining specialized compression dictionary may be desirable

Sept 29/30, 2005 IETF Lemonade 21 Towards Lemonade Profile Phase 2 LZIP Example C: A001 LZIP A002 FETCH 1:* ALL S: * LZIP ~{1234} S:...[zipped response to FETCH command]... S: A001 OK LZIP completed

Sept 29/30, 2005 IETF Lemonade 22 Towards Lemonade Profile Phase 2 LZIP Compression example ratios 600 messages in INBOX 1064/2003 (53.1%)UID FETCH n BODY[1] 249/465 (53.5%)SELECT INBOX 3144/20408(15.4%)UID FETCH 1:* FLAGS RatioIMAP Command

Sept 29/30, 2005 IETF Lemonade 23 Towards Lemonade Profile Phase 2 Compression LZIP (defining compression at the application layer) allows some clients to achieve compression without a full SSL/TLS implementation, or where the server does not support the right set of cipher suites, or where an application protocol sensitive codec may be desired Comments 1 minimumMinimum 2+Roundtrips ZLIB + cpu overheadTLS/SSL stack + CPU overhead Complexity LZIPTLS

Sept 29/30, 2005 IETF Lemonade 24 Towards Lemonade Profile Phase 2 Server to Client Notifications and Filtering Notion of Event-based synchronization Server-side filtering –Poll and push repository –View, notification and event filters Inband and outband notifications Events – Payload – SMS binding

Sept 29/30, 2005 IETF Lemonade 25 Towards Lemonade Profile Phase 2 Server to Client Notifications Support event based synchronization whereby the server can notify clients of new and other server events Integrated with IMAP to: –Allow IMAP events to be sent as notifications –Handle delayed or lost notification –Avoid data duplications

Sept 29/30, 2005 IETF Lemonade 26 Towards Lemonade Profile Phase 2 Server to Client Notifications and Filtering LPROVISION –The LPROVISION command is used to allow a device to obtain service specific parameters of the server. LSETPREFS and LGETPREFS –The LSETPREF command allows a user to define certain configuration parameters, while the LGETPREFS command allows a user to retrieve the configuration values. LFILTER: –The LFILTER command allows users to name a set of IMAP search terms to be used as a view filters or notification filters, or to get the description or search terms associated with a named filter.

Sept 29/30, 2005 IETF Lemonade 27 Towards Lemonade Profile Phase 2 HTTP Binding Optional use of HTTP as binding for IMAP –This binding is intended to facilitate the use of IMAP in deployments involving a variety of intermediaries offers a standardized alternative to de facto proprietary implementations of such a feature. –HTTP allows operators to reuse similar setup and model already used for many other similar and related services, e.g. certain proprietary push and synchronization offerings, OMA Data Synchronization, Web services and Web access. –Using HTTP/HTTPS can simplify deployment in a corporate network through the potential use of a reverse proxy. –Also has the advantage of not requiring changes to any firewall configurations and reduces deployment concerns that this often presents to corporation. In general the solution is compatible with any existing firewall. –A reverse proxy can also support deployment models that offer roles to other service providers in the value chains, as discussed in OMA Mobiel AD

Sept 29/30, 2005 IETF Lemonade 28 Towards Lemonade Profile Phase 2 HTTP Binding HTTP Security, encryption and compression capabilities used with HTTP already implemented in a wide range of existing mobile device can be reused. Studies have also shown that a persistent HTTP session has usually proven more resilient than an IMAP IDLE over TCP connection over an unreliable bearer such as a GPRS-based mobile network. –Reasons unknown, but speculated to be a shorter time to live given to non-port 80/443 TCP connections –Such policy not under control or sphere of IETF Use of HTTP as application protocol transport has received much attention[RFC3205]. Concern exists it circumvents firewall policies and misuses or neglects HTTP semantics. –draft-maes-lemonade-http-binding-02 does not intent to do so and respect HTTP semantics –If suppression of IMAP traffic on HTTP is desired, firewall administrators can still prevent such passage and this can provide incentives to re-configure firewalls to allow solutions on other transports (e.g. TLS) or offer the HTTP-based solution using another provisioned port (e.g. manually, out of band or inband) –The ubiquity of HTTP as a transport in most new application protocols both standard and proprietary indicates an underlying political intractability to requiring direct connectivity to non-HTTP ports. Aim to allow use of HTTP binding in the widest possible setting, by defining a standard, while enabling firewalls to detect and filter such traffic if they wish to deny such usage

Sept 29/30, 2005 IETF Lemonade 29 Towards Lemonade Profile Phase 2 Next Steps Collect comments and alternatives Moves to WG drafts Progress as appropriate