Internet-Draft EOH December 2023
ARAM Expires 29 June 2024 [Page]
Workgroup:
INTAREA (Internet Area Working Group)
Internet-Draft:
draft-bouaram-ethernet-over-https-00
Published:
Intended Status:
Informational
Expires:
Author:
S. B. ARAM
SKELDUS

Ethernet over HTTPS Protocol

Abstract

This document defines a protocol for encapsulating Ethernet frames over HTTPS, allowing secure communication between a client and internal web servers. The protocol includes authentication using strong API keys encrypted with the server's public key. The communication is secured using TLS for privacy and integrity.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 29 June 2024.

Table of Contents

1. Introduction

Ethernet over HTTPS (EOH) extends traditional networking by allowing communication between a web client and internal resources over the HTTPS protocol. This document outlines the procedures for authentication, encapsulation of Ethernet frames, and communication between the client and internal web servers. TLS is employed to secure the communication channel and ensure privacy and integrity.

1.1. TLS Considerations

To ensure the security of the Ethernet-over-HTTPS communication, TLS must be used to encrypt and authenticate the data exchanged between the client and server. Implementations MUST follow best practices for TLS configuration, including the use of strong cipher suites, secure protocols, and proper certificate validation.

1.2. Flow and Scenarios

1.2.1. Client Authentication

If the client specifies an internal URL (e.g., internal.url), the browser recognizes that Ethernet over HTTPS should be used for the communication. The client browser, pre-configured with the IP address and port of the HTTP Server acting as the gateway to the LAN, automatically recognizes the internal URL (e.g., internal.url). It then initiates the Ethernet-over-HTTPS protocol and sends an authentication request.

  • The client initiates the connection by sending an authentication request to the server.

plaintext
POST /authenticate HTTP/1.1
Host: server.example.com
Content-Type: application/json

{
"api_key": "encrypted_api_key"
}

### Server Authentication and LAN Information The server decrypts the API key, authenticates the client, and responds with the MAC address or IP address (or both) based on the LAN layer specified by the client

HTTP/1.1 200 OK
Content-Type: application/json

{
  "mac_address": "xx:xx:xx:xx:xx:xx",
  "ip_address": "192.168.1.2"
}

1.2.2. Internal Webpage Request

The client, now authenticated, sends an Ethernet frame encapsulated within an HTTPS request for an internal webpage

1.2.3. Server-Side Processing

The server decapsulates the Ethernet frame, extracts the original HTTP request, and routes it to the internal web server.

1.2.4. Response to the Client

The server encapsulates the response from the internal web server

POST /ethernet-over-https HTTP/1.1
Host: server.example.com
Content-Type: application/octet-stream
Content-Length: length_of_payload_in_bytes

{
  "http_response": "HTTP/1.1 200 OK\r\nContent-Type: text/html\r\n\r\n<html>Internal Webpage</html>"
}

2. FLow summary

  +----------------------+       +----------------------+
  |                      |       |                      |
  |      Web Client      |       |        EOH Server     |
  |                      |       |                      |
  +----------------------+       +----------------------+
           |                             |
           | 1. Browser Recognizes       |
           |    Internal URL             |
           | --------------------------> |
           |                             |
           | 2. Authentication Request   |
           | --------------------------> |
           |                             |
           |                             |
           | 3. Browser Initiates        |
           |    Ethernet over HTTPS      |
           |                             |
           |                             |
           | 4. Server Authenticates     |
           |    and Responds             |
           | <-------------------------- |
           |                             |
           | 5. Internal Webpage Request |
           |    as Encapsulated Frame    |
           | --------------------------> |
           |                             |
           | 6. Server Decapsulation     |
           |    and Routing              |
           | <-------------------------- |
           |                             |
           | 7. Response to Client       |
           |    as Encapsulated Frame    |
           | --------------------------> |
           |                             |

# Security Considerations The security of the Ethernet-over-HTTPS protocol relies on the implementation of TLS. It ensures the confidentiality, integrity, and authenticity of the communication between the client and server. Implementers should adhere to best practices for TLS configuration, including the use of strong cipher suites, secure protocols, and proper certificate validation.

3. IANA Considerations

This document has no IANA actions.

Author's Address

Salim-Amine BOU ARAM
SKELDUS