draft-ietf-cdi-model-01.txt   draft-ietf-cdi-model-02.txt 
Network Working Group M. Day Network Working Group M. Day
Internet-Draft Cisco Internet-Draft Cisco
Expires: August 23, 2002 B. Cain Expires: November 1, 2002 B. Cain
Storigen Storigen
G. Tomlinson G. Tomlinson
CacheFlow CacheFlow
P. Rzewski P. Rzewski
Inktomi Inktomi
February 22, 2002 May 3, 2002
A Model for Content Internetworking (CDI) A Model for Content Internetworking (CDI)
draft-ietf-cdi-model-01.txt draft-ietf-cdi-model-02.txt
Status of this Memo Status of this Memo
This document is an Internet-Draft and is in full conformance with This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026. all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
skipping to change at page 1, line 37 skipping to change at page 1, line 37
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at http:// The list of current Internet-Drafts can be accessed at http://
www.ietf.org/ietf/1id-abstracts.txt. www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 23, 2002. This Internet-Draft will expire on November 1, 2002.
Copyright Notice Copyright Notice
Copyright (C) The Internet Society (2002). All Rights Reserved. Copyright (C) The Internet Society (2002). All Rights Reserved.
Abstract Abstract
Content [distribution] internetworking (CDI) is the technology for Content [distribution] internetworking (CDI) is the technology for
interconnecting content networks, sometimes previously called interconnecting content networks, sometimes previously called
"content peering" or "CDN peering." A common vocabulary helps the "content peering" or "CDN peering." A common vocabulary helps the
skipping to change at page 18, line 14 skipping to change at page 18, line 14
6. Security Considerations 6. Security Considerations
This document defines terminology and concepts for content This document defines terminology and concepts for content
internetworking. The terminology itself does not introduce any internetworking. The terminology itself does not introduce any
security-related issues. The implementation of content security-related issues. The implementation of content
internetworking concepts does raise some security-related issues, internetworking concepts does raise some security-related issues,
which we identify in broad categories below. Other CDI documents which we identify in broad categories below. Other CDI documents
will address their specific security-related issues in more detail. will address their specific security-related issues in more detail.
Secure relationship establishment: content internetworking must Secure relationship establishment: CONTENT INTERNETWORKING GATEWAYS
provide means to ensure that content networks are internetworking must ensure that CONTENT NETWORKS are internetworking only with other
only with other content networks as intended. It must be possible to CONTENT NETWORKS as intended. It must be possible to prevent
prevent unauthorized internetworking or spoofing of another network's unauthorized internetworking or spoofing of another CONTENT NETWORK's
identity. identity.
Secure content transfer: content internetworking must support Secure content transfer: CONTENT INTERNETWORKING GATEWAYS must
content-network mechanisms that ensure both the integrity of content support CONTENT NETWORK mechanisms that ensure both the integrity of
and the integrity of the delivery process, even when the delivering CONTENT and the integrity of both DISTRIBUTION and DELIVERY, even
network is not the originating network. Content internetworking must when both ORIGINATING and ENLISTED networks are involved. CONTENT
allow for mechanisms to prevent theft or corruption of content. INTERNETWORKING GATEWAYS must allow for mechanisms to prevent theft
or corruption of CONTENT.
Secure meta-content transfer: content internetworking must support Secure meta-content transfer: CONTENT INTERNETWORKING GATEWAYS must
the movement of accurate, reliable, auditable information about costs support the movement of accurate, reliable, auditable ACCOUNTING
and performance between content networks. Content internetworking information between CONTENT NETWORKS. CONTENT INTERNETWORKING
must allow for mechanisms to prevent the diversion or corruption of GATEWAYS must allow for mechanisms to prevent the diversion or
accounting data and similar meta-content. corruption of ACCOUNTING data and similar meta-content.
7. Acknowledgements 7. Acknowledgements
The authors acknowledge the contributions and comments of Fred The authors acknowledge the contributions and comments of Fred
Douglis (AT&T), Don Gilletti (CacheFlow), Markus Hoffmann (Lucent), Douglis (AT&T), Don Gilletti (CacheFlow), Markus Hoffmann (Lucent),
Barron Housel (Cisco), Barbara Liskov (Cisco), John Martin (Network Barron Housel (Cisco), Barbara Liskov (Cisco), John Martin (Network
Appliance), Nalin Mistry (Nortel Networks) Raj Nair (Cisco), Hilarie Appliance), Nalin Mistry (Nortel Networks) Raj Nair (Cisco), Hilarie
Orman (Volera), Doug Potter (Cisco), and Oliver Spatscheck (AT&T). Orman (Volera), Doug Potter (Cisco), and Oliver Spatscheck (AT&T).
[Note to RFC Editor: The last normative reference is [3], all [Note to RFC Editor: The last normative reference is [3], all
 End of changes. 7 change blocks. 
18 lines changed or deleted 19 lines changed or added

This html diff was produced by rfcdiff 1.34. The latest version is available from http://tools.ietf.org/tools/rfcdiff/