ZERO CONFIGURATION AND THE FUTURE HOME NETWORK William Garrison Motorola, Inc., Broadband Communications Sector Abstract of Windows PCs. However, these protocols were completely separate from any WAN This paper will review the state-of-the-art (Wide Area Network) Protocol and served a in Zero Configuration initiatives as it applies limited range of devices. They did not allow to an in-home network. The IETF Zeroconf, a wide variety of appliances, PCs and Macs to UPnP (Universal Plug-and-Play), Apple interoperate. Rendezvous and IPv6 Stateless Address Autoconfiguration initiatives will be covered. An additional Zero Configuration In addition, from a MSO’s perspective, does networking benefit will be the creation of new Zero Configuration represent a lost revenue kinds of networked products. These products opportunity or a lost headache opportunity? will become commercially viable only when How will the Zero Configuration home the inconvenience and support costs of network connect to the internet? traditional networking technologies are removed. INTRODUCTION This paper will cover the Zero Consumers do not want to own a home Configuration of IP (Internet Protocol) based network. Instead, they want applications and networks. IP was selected because it is the services to simply work, as if by magic. If native protocol for the ubiquitous Internet. this magic requires a network, then it should be easily invoked with, at most, a simple COVERAGE incantation. This is how the consumer sees it. This is how we need to see it to get consumers A whole home network should be to deploy applications that rely on home comprised of all of the data paths available networks. between devices. These data paths include wired and wireless technologies. Wired The purpose of a home network is to technologies include power line, phone line, enable new services by combining the coax and dedicated CAT5 wiring. Wireless capabilities of both new and existing includes 802.11a/b/g, Zigbee and UWB (Ultra elements. Why can’t I view a program that Wide Band). These technologies have happens to be stored on my PVR downstairs significantly different data rate, delay and on my TV upstairs? Why can’t I listen to the jitter characteristics. However, we need them music stored on my iPod on my home theater to interoperate seamlessly and with zero user without hooking anything up? Well, with a intervention. Zero Configuration home network, you will be able to do all these things and more! REQUIREMENTS Zero Configuration is not a new idea. In As described in the internet draft entitled the past, AppleTalk handled Zero “Requirements for Automatic Configuration Configuration for Macs and NETBIOS of IP Hosts” by Aidan Williams [1], Zero provided similar features for small networks Configuration requires that we: • Distribute IP addresses without a to interact with a corresponding entity at the DHCP (Dynamic Host Configuration same layer in a remote host. Zero Protocol) server Configuration applies to the Application and • Provide name resolution without a Network layers, as outlined in Figure 1. DNS (Domain Name System) server • Find and list services SECURITY • Distribute multicast addresses Security is also a Zero Configuration In addition, while the system must operate requirement. In the wired world, there is in the absence of DHCP and DNS, it also some physical security in a local network. In must operate properly in their presence. Zero the wireless world, it is a challenge to tell the Configuration must not thwart their normal difference between your wireless device and function. your neighbor’s. Zero Configuration may bring tighter security requirements. You cannot depend on the user noticing an Application intrusion because the user is further removed Name Resolution / Find Services from what is actually going on. At the very least, the protocols used on a Zero Configuration network must be as secure as a Presentation non-Zero Configuration network. Does Zero Configuration degrade security? Not really, a cracker can find out the same Session network information as offered by Zero Configuration using standard tools. There are plenty of tools floating around that let the unsophisticated “script kiddies” get into Transport lightly protected networks. Zero Configuration’s most likely security effect is to increase the number of networks that Network someone might try to intercept and increase IP unicast/multicast addresses the number of devices connected to those networks. Data Link ZERO CONFIGURATION APPROACHES Many people are currently trying to solve the Zero Configuration problem. Current Physical initiatives include: • Apple Rendezvous • IETF Zeroconf Figure 1 – The OSI Reference Model • UPnP™ (Universal Plug-and-Play) The OSI Basic Reference Model divides a • IPv6 Stateless Address networking system into seven layers. This Autoconfiguration layering system enables an entity in one host Each of these will be covered in its own Vulnerability to denial of service attacks is section. probably unavoidable. Even a simple ploy, such as a rogue device responding to every IETF ZEROCONF ARP (Address Resolution Protocol) so as to claim all available IP addresses, could shut The Zeroconf Working Group of the IETF down a Zeroconf network. However, is this (Internet Engineering Task Force) was any worse than being unable to speak to the chartered in September, 1999. Its goal is to person next to you on the train due to an “enable networking in the absence of unruly child? Given local nature of a configuration and administration.” Their goal Zeroconf network, the universe of people who is so inclusive that it goes as far as to include could interfere with your network is small. allowing “impromptu networks as between Given the local nature of the network, in the the devices of strangers on a train.” [2] case of a network interruption you could simply search for the scoundrel. Zeroconf is a link-local technology. This means that the link-local addressing and Industry Support naming are only meaningful to devices directly connected to the local network. A standard needs industry support to have Because these addresses and names are not real-world relevance. Support for Zeroconf unique globally, Zeroconf only applies to has been announced by: small wired or wireless networks. Zeroconf is • Apple appropriate for: • Canon • Home and small office networks • Epson • Ad hoc networks at meetings and • HP conferences • Lexmark • Two devices needed to share • Philips information • Sybase Inappropriate applications of Zeroconf would • Xerox potentially result in serious networking • World-Book problems. Working Group Status Security The Zeroconf Working Group could not Zeroconf security is primarily based on the reach a consensus on security and service requirement that all included devices must be discovery issues. Therefore, it is not going to connected to a single link. Therefore, a produce a specification on those issues. The Zeroconf connection can only be hacked by a Working Group is producing a protocol device that is close by and easier to detect. specification, describing automatic generation However, if you are indeed going to and assignment of link-local IPv4 addresses in wirelessly network with the stranger on the environments lacking host configuration train, you will want some way to prevent (static or using DHCP). This document is in networking with the stranger in the next train draft form and will be submitted in the spring compartment. of 2004 for consideration as a Standards Track RFC. A Zeroconf network is relatively vulnerable to some fairly standard attacks. Further information on the IETF Zeroconf Working group can be found at http://www.zeroconf.org/. APPLE RENDEZVOUS Rendezvous is Apple’s name for IETF’s Zeroconf. You might want to think of it like Rendezvous is to Zeroconf as Firewire is to 1394. Rendezvous is an open protocol, which Apple has submitted back to the IETF as a part Figure 2 – A Rendezvous Assigned IP Address of the ongoing standards creation process. Apple is using Rendezvous to transition from In the above figure, you can tell the IP AppleTalk to an all-IP network. address came from Rendezvous both by the 164.256/16 address and the annotation “Self- Rendezvous matches the Apple customer’s assigned”. expectations of a friendly, easy to use system. Apple added Rendezvous services in the Apple then uses mDNS (multicast DNS) to Jaguar release of the Mac OS X Operating handle DNS requests. In mDNS, each device System and is using those services in its own runs their own mDNS responder. The mDNS applications. responder provides traditional domain name services by having every device respond to Rendezvous uses three technologies the name queries that they know how to • Automatic IP addresses (IPv4) answer. Traditionally, devices contact a single • Name to Address Translation (DNS known DNS server for name lookups. In queries via IP Multicast) mDNS, when a host needs to look up a name, • Service Discovery it sends the query out to a local multicast group that includes all of devices that have A Rendezvous device first tries to obtain locally registered Rendezvous services. an IP address by a standard DHCP request. If there is no DHCP response, it: Rendezvous also uses a DNS-based • picks an address at random in the Service Discovery called mDNS-SD. 169.254/16 range Essentially, services are resolved to devices • Checks to see if this IP address is used similar to the way host names are resolved via an ARP (tries another IP if it is) using mDNS. • Periodically checks for DHCP server Rendezvous Applications The device periodically checks for a DHCP server because it wants to participate in the Apple uses Rendezvous in its iChat instant network with the widest possible reach. messaging application. Besides working with AOL Instant Messenger, it also works with Rendezvous-enabled Macs. So, if the stranger on the train has a Mac, you can easily chat.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages8 Page
-
File Size-