8 .ds RF FORMFEED[Page %]
11 .ds RH 25 November 2002
17 Network Working Group P. Riikonen
19 draft-riikonen-flags-payloads-01.txt 25 November 2002
20 Expires: 25 April 2003
25 SILC Message Flag Payloads
26 <draft-riikonen-flags-payloads-01.txt>
31 This document is an Internet-Draft and is in full conformance with
32 all provisions of Section 10 of RFC 2026. Internet-Drafts are
33 working documents of the Internet Engineering Task Force (IETF), its
34 areas, and its working groups. Note that other groups may also
35 distribute working documents as Internet-Drafts.
37 Internet-Drafts are draft documents valid for a maximum of six months
38 and may be updated, replaced, or obsoleted by other documents at any
39 time. It is inappropriate to use Internet-Drafts as reference
40 material or to cite them other than as "work in progress."
42 The list of current Internet-Drafts can be accessed at
43 http://www.ietf.org/ietf/1id-abstracts.txt
45 The list of Internet-Draft Shadow Directories can be accessed at
46 http://www.ietf.org/shadow.html
48 The distribution of this memo is unlimited.
54 This memo describes the data payloads associated with the SILC Message
55 Flags, as defined in the SILC Packet Protocol Internet Draft [SILC2]. The
56 purpose of the Message Flags is to augment the function of the Message
57 Payload used to send both private and channel messages, by allowing the
58 sender to tell the receiver what type of data the payload includes, and
59 how the data should be processed. Some of the Message Flags may define
60 additional payloads to be associated with the flag, and this memo
61 describes these payloads.
74 1 Introduction .................................................. 2
75 1.1 Requirements Terminology .................................. 2
76 2 SILC Message Flags ............................................ 2
77 3 SILC Message Flag Payloads .................................... 3
78 3.1 SILC_MESSAGE_FLAG_REQUEST ................................. 3
79 3.2 SILC_MESSAGE_FLAG_REPLY ................................... 3
80 3.3 SILC_MESSAGE_FLAG_SIGNED .................................. 4
81 3.4 SILC_MESSAGE_FLAG_DATA .................................... 6
82 4 Security Considerations ....................................... 7
83 5 References .................................................... 7
84 6 Author's Address .............................................. 8
90 The Secure Internet Live Conferencing [SILC1] supports sending binary
91 messages between users in the network. To make the data sending, and
92 processing at the receiver's end as simple as possible the SILC defines
93 Message Flags to the Message Payload [SILC2] that is used to send private
94 and channel messages, which can help the receiver to decide how the data
95 is encoded, and how it should be interpreted. Some of the Message Flags
96 may define additional payloads to be associated with the flag, but the
97 [SILC2] does not define them. This memo defines the payloads for those
98 Message Flags that was marked to include additional payloads in [SILC2].
100 By defining the payloads for the Message Flags the Message Payload
101 can be augmented to support any kind of data, which can be easily
102 interpreted at the receiver end. For example, it would be possible to
103 send audio stream, video stream, image files and HTML pages as messages,
104 and the receiver can either choose to ignore the message or to process
105 it, or to perhaps pass the message to some application for processing.
106 Without specific payloads for Message Flags it is almost impossible for
107 the receiver to interpret binary data from the payload.
111 1.1 Requirements Terminology
113 The keywords MUST, MUST NOT, REQUIRED, SHOULD, SHOULD NOT, RECOMMENDED,
114 MAY, and OPTIONAL, when they appear in this document, are to be
115 interpreted as described in [RFC2119].
121 The Message Flags was added to the SILC protocol for the reason that SILC
122 provides sending binary data as messages between users, and entities in
123 the network, and interpreting pure binary data is almost impossible.
124 With the flags the purpose, the reason, and the way the message is
125 supposed to be interpreted can be told to the recipient. Other
126 conferencing protocols which are usually ASCII based protocols do not have
127 such problems since they do not generally support sending of binary data
128 at all, or require encoding of the data before it can be sent over the
131 The Message Payload in SILC can have flags that can augment the function
132 of the payload. The flags can tell for example that the message is a
133 request, or a reply to an earlier received request. They can tell that
134 the message is some action that the sender is performing, or they can tell
135 that the message is an auto reply, or that it is explicitly digitally
136 signed by the sender.
138 The problem of Message Flags is that the space for flags mask is only 16
139 bits, so there is a limited number of flags available. For this reason a
140 flag that defines some generic way of sending any kind of data as a
141 message, and that it can be easily interpreted at the receiver's end is
142 important. For this reason the flag SILC_MESSAGE_FLAG_DATA was added to
143 the protocol which can represent any data. This memo describe how this
144 flag is used and how the associated payload is constructed and processed.
145 This memo also describes payloads for all the other flags that can have
150 3 SILC Message Flag Payloads
152 The [SILC2] defines the flags which may have associated payloads. This
153 section will list these flags and define the payloads.
157 3.1 SILC_MESSAGE_FLAG_REQUEST
159 Currently this flag can be used in the context of application specific,
160 service specific or vendor specific requests, and the data payload type is
161 dependent of this context. Therefore, payload is not defined for this
162 flag in this memo. This flag may also be masked with some other flag in
163 the message payload, including with some other flag that defines
168 3.2 SILC_MESSAGE_FLAG_REPLY
170 Currently this flag can be used in the context of application specific,
171 service specific or vendor specific replies, and the data payload type is
172 dependent of this context. Therefore, payload is not defined for this
173 flag in this memo. This flag may also be masked with some other flag in
174 the message payload, including with some other flag that defines
179 3.3 SILC_MESSAGE_FLAG_SIGNED
181 This flag is used to tell the recipient that the sent message is
182 digitally signed by the sender, and that the recipient should verify
183 the signature to verify the true authenticity of the received message.
184 All message payloads in SILC provides message authentication code (MAC)
185 which can be used to verify that the sender produced and sent the message.
186 Even so, signing messages digitally can be used to verify the authenticity
187 of the message when recipient trusts the sender.
189 This flag defines a payload which is used to deliver the actual message,
190 sender's public key and the digital signature. The payload for
191 SILC_MESSAGE_FLAG_SIGNED is as follows:
196 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
197 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
201 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
203 ~ Public Key Payload ~
205 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
206 | Signature Data Length | |
207 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +
211 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
215 Figure 1: SILC_MESSAGE_FLAG_SIGNED Payload
219 o Message Payload (variable length) - This is the Message Payload
220 [SILC2] consisting of the encrypted message.
222 o Public Key Payload (variable length) - This includes the
223 Public Key Payload [SILC2] which can be used to deliver the
224 sender's public key (or certificate). It also indicates the
225 type of the public key (or certificate) which the recipient
226 use to identify how the signature must be verified. This
227 payload must always be present but it is not required to
228 include the public key data. The Public Key Type field in
229 the Public Key Payload MUST be set to the correct type of
230 the key, even if the actual public key data is not included.
232 o Signature Data Length (2 bytes) - Indicates the length of
233 the Signature Data field not including any other field.
235 o Signature Data (variable length) - Includes the actual
236 signature data. The signature computation and encoding
237 is key type specific. See [SILC3] for all key types, and
238 their respective references of how to compute and encode
242 How the data is processed before it is signed is key type specific.
243 The actual data that to be signed MUST be the plaintext message
244 payload before encryption. The data to be signed is concatenation
245 of Message Flags, Message Length, Message Data, Padding Length,
246 Padding and Initial Vector fields, and the Public Key Payload, in
247 that order. Any other fields is not included for signature data.
248 Before signing, the data is always processed, usually hashed. The
249 hash function to be used is defined in the key type specific
250 definitions. See the key type specific references in [SILC3].
252 If the public key of the sender is included in the payload the
253 recipient SHOULD verify before accepting the public key. Recipient
254 SHOULD verify the signature before accepting a public key. With
255 certificates the certificate verification may be done before
256 verifying the signature. If the signature verification fails the
257 message should still be displayed. The end user should also be
258 notified about the result of the signature verification.
260 To make the packet size smaller implementations may not want to
261 include the actual public key in all signed messages. Sending the
262 public key in the first message is usually sufficient. Subsequent
263 messages may include empty Public Key Payload with an indication of
266 Implementations that do not support this flag can still process the
267 message payload in normal manner. These implementations merely ignore
268 rest of the data after the message payload.
270 This flag MAY be masked with any other Message Flag including those that
271 define additional payloads. As long as the defined payload resides in
272 the data area of the message payload this flag may be masked with the
278 3.4 SILC_MESSAGE_FLAG_DATA
280 This flag is used to represent any data as a message in the way that it
281 can be easily interpreted by the recipient. This flag is used to send
282 MIME objects as messages from the sender to the receiver. The MIME as
283 defined in [RFC2045], [RFC2046], [RFC2047], [RFC2048] and [RFC2049] is
284 well established protocol for sending different kind of data with many
285 applications and protocols. It support dozens of different media types
286 and encodings, and for this reason is ideal for sending data in SILC
287 message payloads as well.
289 When the receiver has checked that the message payload includes the
290 SILC_MESSAGE_FLAG_DATA flag, it may then start parsing the MIME header.
291 It would also be possible to pass the message to some application which
292 can already interpret MIME objects. If the receiver does not support the
293 media type received in the MIME header, it SHOULD be treated as
294 "application/octet-stream". The receiver MAY also ignore and discard
295 messages that it does not support.
297 The MIME header MUST be at the start of the data area of the Message
298 Payload. The MIME header received in the data area of the payload SHOULD
299 have the MIME-Version field at first and then Content-Type field. The
300 MIME-Version field is not required to be present in each body part of
301 multipart entity. Additionally the header MAY also include any other
302 MIME compliant headers. The character encoding for the MIME Header
303 strings inside the message payload is US-ASCII, as defined in [RFC2045].
304 The actual MIME object may define additional character sets or encodings
305 for the data it delivers.
307 Hence, the MIME Header in the message payload may be as follows:
311 MIME-Version: 1.0\\r\\n
312 Content-Type: discrete/composite\\r\\n
313 Content-Transfer-Encoding: binary\\r\\n
317 The Content-Transfer-Encoding field behaves as defined in [RFC2045] and
318 defines the encoding of the data in the MIME object. The preferred data
319 encoding with SILC is "binary". However, many MIME media types defines
320 their preferred encoding and they may be used if binary encoding is not
323 When sending large amounts of traffic or large files as MIME objects the
324 limits of the SILC Packet needs to be taken into consideration. The
325 maximum length of SILC Packet is 2^16 bytes, and larger messages would
326 need to be fragmented. MIME provides way of fragmenting and reassembling
327 messages, and it is to be done with SILC as defined in [RFC2046]. The
328 MIME fragmentation is defined for gateway usage, but in case of SILC the
329 sender may also start sending fragmented MIME objects.
331 This flag SHOULD NOT be masked with some other Message Flag that defines
332 payloads for message data. Generally this sort of setting would be
333 impossible for the receiver to interpret. However, flags that does not
334 define any specific payloads MAY be masked with this flag as well. For
335 example, this flag could be masked also with SILC_MESSAGE_FLAG_REQUEST flag.
336 It also can be masked with SILC_MESSAGE_FLAG_SIGNED flag since it does not
337 define data specific payload.
341 4 Security Considerations
343 In case of SILC_MESSAGE_FLAG_DATA the implementors should pay special
344 attention to the security implications of any media type that can cause
345 the remote execution of any actions in the receiver's environment. The
346 [RFC2046] and [RFC2048] discusses more MIME specific security
347 considerations. Even though SILC provides secured messages, in case of
348 MIME which can be used to transfer files and documents which are stored in
349 the receiver's local environment, securing separately the MIME object may
350 be desired. For example, augmenting the MIME support in SILC messages to
351 support S/MIME may be desired in some implementations.
358 [SILC1] Riikonen, P., "Secure Internet Live Conferencing (SILC),
359 Protocol Specification", Internet Draft, May 2002.
361 [SILC2] Riikonen, P., "SILC Packet Protocol", Internet Draft,
364 [SILC3] Riikonen, P., "SILC Key Exchange and Authentication
365 Protocols", Internet Draft, May 2002.
367 [RFC2045] Freed, N., et al., "Multipurpose Internet Mail Extensions
368 (MIME) Part One: Format of Internet Message Bodies",
369 Standards Track, RFC 2045, November 1996.
371 [RFC2046] Freed, N., et al., "Multipurpose Internet Mail Extensions
372 (MIME) Part Two: Media Types", Standards Track, RFC 2045,
375 [RFC2047] Moore K., "MIME (Multipurpose Internet Mail Extensions)
376 Part Three: Message Header Extensions for Non-ASCII Text"
377 Standards Track, RFC 2047, November 1996.
379 [RFC2048] Freed, N., et al., "Multipurpose Internet Mail Extensions
380 (MIME) Part Four: Registration Procedures", Standards
381 Track, RFC 2048, November 1996.
383 [RFC2049] Freed, N., et al., "Multipurpose Internet Mail Extensions
384 (MIME) Part Five: Conformance Criteria and Examples",
385 Standards Track, RFC 2049, November 1996.
387 [RFC2119] Bradner, S., "Key Words for use in RFCs to Indicate
388 Requirement Levels", BCP 14, RFC 2119, March 1997.
396 Snellmaninkatu 34 A 15
400 EMail: priikone@iki.fi
402 This Internet-Draft expires 25 April 2003