summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc9049.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc9049.txt')
-rw-r--r--doc/rfc/rfc9049.txt2084
1 files changed, 2084 insertions, 0 deletions
diff --git a/doc/rfc/rfc9049.txt b/doc/rfc/rfc9049.txt
new file mode 100644
index 0000000..588d8c2
--- /dev/null
+++ b/doc/rfc/rfc9049.txt
@@ -0,0 +1,2084 @@
+
+
+
+
+Internet Research Task Force (IRTF) S. Dawkins, Ed.
+Request for Comments: 9049 Tencent America
+Category: Informational June 2021
+ISSN: 2070-1721
+
+
+ Path Aware Networking: Obstacles to Deployment
+ (A Bestiary of Roads Not Taken)
+
+Abstract
+
+ This document is a product of the Path Aware Networking Research
+ Group (PANRG). At the first meeting of the PANRG, the Research Group
+ agreed to catalog and analyze past efforts to develop and deploy Path
+ Aware techniques, most of which were unsuccessful or at most
+ partially successful, in order to extract insights and lessons for
+ Path Aware networking researchers.
+
+ This document contains that catalog and analysis.
+
+Status of This Memo
+
+ This document is not an Internet Standards Track specification; it is
+ published for informational purposes.
+
+ This document is a product of the Internet Research Task Force
+ (IRTF). The IRTF publishes the results of Internet-related research
+ and development activities. These results might not be suitable for
+ deployment. This RFC represents the consensus of the Path Aware
+ Networking Research Group of the Internet Research Task Force (IRTF).
+ Documents approved for publication by the IRSG are not candidates for
+ any level of Internet Standard; see Section 2 of RFC 7841.
+
+ Information about the current status of this document, any errata,
+ and how to provide feedback on it may be obtained at
+ https://www.rfc-editor.org/info/rfc9049.
+
+Copyright Notice
+
+ Copyright (c) 2021 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info) in effect on the date of
+ publication of this document. Please review these documents
+ carefully, as they describe your rights and restrictions with respect
+ to this document.
+
+Table of Contents
+
+ 1. Introduction
+ 1.1. What Do "Path" and "Path Awareness" Mean in This Document?
+ 2. A Perspective on This Document
+ 2.1. Notes for the Reader
+ 2.2. A Note about Path Aware Techniques Included in This
+ Document
+ 2.3. Architectural Guidance
+ 2.4. Terminology Used in This Document
+ 2.5. Methodology for Contributions
+ 3. Applying the Lessons We've Learned
+ 4. Summary of Lessons Learned
+ 4.1. Justifying Deployment
+ 4.2. Providing Benefits for Early Adopters
+ 4.3. Providing Benefits during Partial Deployment
+ 4.4. Outperforming End-to-End Protocol Mechanisms
+ 4.5. Paying for Path Aware Techniques
+ 4.6. Impact on Operational Practices
+ 4.7. Per-Connection State
+ 4.8. Keeping Traffic on Fast Paths
+ 4.9. Endpoints Trusting Intermediate Nodes
+ 4.10. Intermediate Nodes Trusting Endpoints
+ 4.11. Reacting to Distant Signals
+ 4.12. Support in Endpoint Protocol Stacks
+ 4.13. Planning for Failure
+ 5. Future Work
+ 6. Contributions
+ 6.1. Stream Transport (ST, ST2, ST2+)
+ 6.1.1. Reasons for Non-deployment
+ 6.1.2. Lessons Learned
+ 6.2. Integrated Services (IntServ)
+ 6.2.1. Reasons for Non-deployment
+ 6.2.2. Lessons Learned
+ 6.3. Quick-Start TCP
+ 6.3.1. Reasons for Non-deployment
+ 6.3.2. Lessons Learned
+ 6.4. ICMP Source Quench
+ 6.4.1. Reasons for Non-deployment
+ 6.4.2. Lessons Learned
+ 6.5. Triggers for Transport (TRIGTRAN)
+ 6.5.1. Reasons for Non-deployment
+ 6.5.2. Lessons Learned
+ 6.6. Shim6
+ 6.6.1. Reasons for Non-deployment
+ 6.6.2. Lessons Learned
+ 6.6.3. Addendum on Multipath TCP
+ 6.7. Next Steps in Signaling (NSIS)
+ 6.7.1. Reasons for Non-deployment
+ 6.7.2. Lessons Learned
+ 6.8. IPv6 Flow Labels
+ 6.8.1. Reasons for Non-deployment
+ 6.8.2. Lessons Learned
+ 6.9. Explicit Congestion Notification (ECN)
+ 6.9.1. Reasons for Non-deployment
+ 6.9.2. Lessons Learned
+ 7. Security Considerations
+ 8. IANA Considerations
+ 9. Informative References
+ Acknowledgments
+ Author's Address
+
+1. Introduction
+
+ This document describes the lessons that IETF participants have
+ learned (and learned the hard way) about Path Aware networking over a
+ period of several decades. It also provides an analysis of reasons
+ why various Path Aware techniques have seen limited or no deployment.
+
+ This document represents the consensus of the Path Aware Networking
+ Research Group (PANRG).
+
+1.1. What Do "Path" and "Path Awareness" Mean in This Document?
+
+ One of the first questions reviewers of this document have asked is
+ "What's the definition of a Path, and what's the definition of Path
+ Awareness?" That is not an easy question to answer for this
+ document.
+
+ These terms have definitions in other PANRG documents [PANRG] and are
+ still the subject of some discussion in the Research Group, as of the
+ date of this document. But because this document reflects work
+ performed over several decades, the technologies described in
+ Section 6 significantly predate the current definitions of "Path" and
+ "Path Aware" in use in the Path Aware Networking Research Group, and
+ it is unlikely that all the contributors to Section 6 would have had
+ the same understanding of these terms. Those technologies were
+ considered "Path Aware" in early PANRG discussions and so are
+ included in this retrospective document.
+
+ It is worth noting that the definitions of "Path" and "Path Aware" in
+ [PANRG-PATH-PROPERTIES] would apply to Path Aware techniques at a
+ number of levels of the Internet protocol architecture ([RFC1122],
+ plus several decades of refinements), but the contributions received
+ for this document tended to target the transport layer and to treat a
+ "Path" constructed by routers as opaque. It would be useful to
+ consider how applicable the Lessons Learned cataloged in this
+ document are, at other layers, and that would be a fine topic for
+ follow-on research.
+
+ The current definition of "Path" in the Path Aware Networking
+ Research Group appears in Section 2 ("Terminology") in
+ [PANRG-PATH-PROPERTIES]. That definition is included here as a
+ convenience to the reader.
+
+ | Path: A sequence of adjacent path elements over which a packet can
+ | be transmitted, starting and ending with a node. A path is
+ | unidirectional. Paths are time-dependent, i.e., the sequence of
+ | path elements over which packets are sent from one node to another
+ | may change. A path is defined between two nodes. For multicast
+ | or broadcast, a packet may be sent by one node and received by
+ | multiple nodes. In this case, the packet is sent over multiple
+ | paths at once, one path for each combination of sending and
+ | receiving node; these paths do not have to be disjoint. Note that
+ | an entity may have only partial visibility of the path elements
+ | that comprise a path and visibility may change over time.
+ | Different entities may have different visibility of a path and/or
+ | treat path elements at different levels of abstraction.
+
+ The current definition of Path Awareness, used by the Path Aware
+ Networking Research Group, appears in Section 1.1 ("Definition") in
+ [PANRG-QUESTIONS]. That definition is included here as a convenience
+ to the reader.
+
+ | For purposes of this document, "path aware networking" describes
+ | endpoint discovery of the properties of paths they use for
+ | communication across an internetwork, and endpoint reaction to
+ | these properties that affects routing and/or data transfer. Note
+ | that this can and already does happen to some extent in the
+ | current Internet architecture; this definition expands current
+ | techniques of path discovery and manipulation to cross
+ | administrative domain boundaries and up to the transport and
+ | application layers at the endpoints.
+ |
+ | Expanding on this definition, a "path aware internetwork" is one
+ | in which endpoint discovery of path properties and endpoint
+ | selection of paths used by traffic exchanged by the endpoint are
+ | explicitly supported, regardless of the specific design of the
+ | protocol features which enable this discovery and selection.
+
+2. A Perspective on This Document
+
+ At the first meeting of the Path Aware Networking Research Group
+ [PANRG], at IETF 99 [PANRG-99], Olivier Bonaventure led a discussion
+ of "A Decade of Path Awareness" [PATH-Decade], on attempts, which
+ were mostly unsuccessful for a variety of reasons, to exploit Path
+ Aware techniques and achieve a variety of goals over the past decade.
+ At the end of that discussion, two things were abundantly clear.
+
+ * The Internet community has accumulated considerable experience
+ with many Path Aware techniques over a long period of time, and
+
+ * Although some Path Aware techniques have been deployed (for
+ example, Differentiated Services, or Diffserv [RFC2475]), most of
+ these techniques haven't seen widespread adoption and deployment.
+ Even "successful" techniques like Diffserv can face obstacles that
+ prevent wider usage. The reasons for non-adoption and limited
+ adoption and deployment are many and are worthy of study.
+
+ The meta-lessons from that experience were as follows:
+
+ * Path Aware networking has been more Research than Engineering, so
+ establishing an IRTF Research Group for Path Aware networking was
+ the right thing to do [RFC7418].
+
+ * Analyzing a catalog of past experience to learn the reasons for
+ non-adoption would be a great first step for the Research Group.
+
+ Allison Mankin, as IRTF Chair, officially chartered the Path Aware
+ Networking Research Group in July 2018.
+
+ This document contains the analysis performed by that Research Group
+ (Section 4), based on that catalog (Section 6).
+
+2.1. Notes for the Reader
+
+ This Informational document discusses Path Aware protocol mechanisms
+ considered, and in some cases standardized, by the Internet
+ Engineering Task Force (IETF), and it considers Lessons Learned from
+ those mechanisms. The intention is to inform the work of protocol
+ designers, whether in the IRTF, the IETF, or elsewhere in the
+ Internet ecosystem.
+
+ As an Informational document published in the IRTF Stream, this
+ document has no authority beyond the quality of the analysis it
+ contains.
+
+2.2. A Note about Path Aware Techniques Included in This Document
+
+ This document does not catalog every proposed Path Aware technique
+ that was not adopted and deployed. Instead, we limited our focus to
+ technologies that passed through the IETF community and still
+ identified enough techniques to provide background for the lessons
+ included in Section 4 to inform researchers and protocol engineers in
+ their work.
+
+ No shame is intended for the techniques included in this document.
+ As shown in Section 4, the quality of specific techniques had little
+ to do with whether they were deployed or not. Based on the
+ techniques cataloged in this document, it is likely that when these
+ techniques were put forward, the proponents were trying to engineer
+ something that could not be engineered without first carrying out
+ research. Actual shame would be failing to learn from experience and
+ failing to share that experience with other networking researchers
+ and engineers.
+
+2.3. Architectural Guidance
+
+ As background for understanding the Lessons Learned contained in this
+ document, the reader is encouraged to become familiar with the
+ Internet Architecture Board's documents on "What Makes for a
+ Successful Protocol?" [RFC5218] and "Planning for Protocol Adoption
+ and Subsequent Transitions" [RFC8170].
+
+ Although these two documents do not specifically target Path Aware
+ networking protocols, they are helpful resources for readers seeking
+ to improve their understanding of considerations for successful
+ adoption and deployment of any protocol. For example, the basic
+ success factors described in Section 2.1 of [RFC5218] are helpful for
+ readers of this document.
+
+ Because there is an economic aspect to decisions about deployment,
+ the IAB Workshop on Internet Technology Adoption and Transition
+ [ITAT] report [RFC7305] also provides food for thought.
+
+ Several of the Lessons Learned in Section 4 reflect considerations
+ described in [RFC5218], [RFC7305], and [RFC8170].
+
+2.4. Terminology Used in This Document
+
+ The terms "node" and "element" in this document have the meaning
+ defined in [PANRG-PATH-PROPERTIES].
+
+2.5. Methodology for Contributions
+
+ This document grew out of contributions by various IETF participants
+ with experience with one or more Path Aware techniques.
+
+ There are many things that could be said about the Path Aware
+ techniques that have been developed. For the purposes of this
+ document, contributors were requested to provide
+
+ * the name of a technique, including an abbreviation if one was
+ used.
+
+ * if available, a long-term pointer to the best reference describing
+ the technique.
+
+ * a short description of the problem the technique was intended to
+ solve.
+
+ * a short description of the reasons why the technique wasn't
+ adopted.
+
+ * a short statement of the lessons that researchers can learn from
+ our experience with this technique.
+
+3. Applying the Lessons We've Learned
+
+ The initial scope for this document was roughly "What mistakes have
+ we made in the decade prior to [PANRG-99], that we shouldn't make
+ again?" Some of the contributions in Section 6 predate the initial
+ scope. The earliest Path Aware technique referred to in Section 6 is
+ [IEN-119], which was published in the late 1970s; see Section 6.1.
+ Given that the networking ecosystem has evolved continuously, it
+ seems reasonable to consider how to apply these lessons.
+
+ The PANRG reviewed the Lessons Learned (Section 4) contained in the
+ May 23, 2019 draft version of this document at IETF 105
+ [PANRG-105-Min] and carried out additional discussion at IETF 106
+ [PANRG-106-Min]. Table 1 provides the "sense of the room" about each
+ lesson after those discussions. The intention was to capture whether
+ a specific lesson seems to be
+
+ * "Invariant" - well-understood and is likely to be applicable for
+ any proposed Path Aware networking solution.
+
+ * "Variable" - has impeded deployment in the past but might not be
+ applicable in a specific technique. Engineering analysis to
+ understand whether the lesson is applicable is prudent.
+
+ * "Not Now" - a characteristic that tends to turn up a minefield
+ full of dragons. Prudent network engineers will wish to avoid
+ gambling on a technique that relies on this, until something
+ significant changes.
+
+ Section 6.9 on Explicit Congestion Notification (ECN) was added
+ during the review and approval process, based on a question from
+ Martin Duke. Section 6.9, as contained in the March 8, 2021 draft
+ version of this document, was discussed at [PANRG-110] and is
+ summarized in Section 4.13, describing a new Lesson Learned.
+
+ +=====================================================+===========+
+ | Lesson | Category |
+ +=====================================================+===========+
+ | Justifying Deployment (Section 4.1) | Invariant |
+ +-----------------------------------------------------+-----------+
+ | Providing Benefits for Early Adopters (Section 4.2) | Invariant |
+ +-----------------------------------------------------+-----------+
+ | Providing Benefits during Partial Deployment | Invariant |
+ | (Section 4.3) | |
+ +-----------------------------------------------------+-----------+
+ | Outperforming End-to-End Protocol Mechanisms | Variable |
+ | (Section 4.4) | |
+ +-----------------------------------------------------+-----------+
+ | Paying for Path Aware Techniques (Section 4.5) | Invariant |
+ +-----------------------------------------------------+-----------+
+ | Impact on Operational Practices (Section 4.6) | Invariant |
+ +-----------------------------------------------------+-----------+
+ | Per-Connection State (Section 4.7) | Variable |
+ +-----------------------------------------------------+-----------+
+ | Keeping Traffic on Fast Paths (Section 4.8) | Variable |
+ +-----------------------------------------------------+-----------+
+ | Endpoints Trusting Intermediate Nodes (Section 4.9) | Not Now |
+ +-----------------------------------------------------+-----------+
+ | Intermediate Nodes Trusting Endpoints | Not Now |
+ | (Section 4.10) | |
+ +-----------------------------------------------------+-----------+
+ | Reacting to Distant Signals (Section 4.11) | Variable |
+ +-----------------------------------------------------+-----------+
+ | Support in Endpoint Protocol Stacks (Section 4.12) | Variable |
+ +-----------------------------------------------------+-----------+
+ | Planning for Failure (Section 4.13) | Invariant |
+ +-----------------------------------------------------+-----------+
+
+ Table 1
+
+ "Justifying Deployment", "Providing Benefits for Early Adopters",
+ "Paying for Path Aware Techniques", "Impact on Operational
+ Practices", and "Planning for Failure" were considered to be
+ Invariant -- the sense of the room was that these would always be
+ considerations for any proposed Path Aware technique.
+
+ "Providing Benefits during Partial Deployment" was added after IETF
+ 105, during Research Group Last Call, and is also considered to be
+ Invariant.
+
+ For "Outperforming End-to-End Protocol Mechanisms", there is a trade-
+ off between improved performance from Path Aware techniques and
+ additional complexity required by some Path Aware techniques.
+
+ * For example, if you can obtain the same understanding of path
+ characteristics from measurements obtained over a few more round
+ trips, endpoint implementers are unlikely to be eager to add
+ complexity, and many attributes can be measured from an endpoint,
+ without assistance from intermediate nodes.
+
+ For "Per-Connection State", the key questions discussed in the
+ Research Group were "how much state" and "where state is maintained".
+
+ * Integrated Services (IntServ) (Section 6.2) required state at
+ every participating intermediate node for every connection between
+ two endpoints. As the Internet ecosystem has evolved, carrying
+ many connections in a tunnel that appears to intermediate nodes as
+ a single connection has become more common, so that additional
+ end-to-end connections don't add additional state to intermediate
+ nodes between tunnel endpoints. If these tunnels are encrypted,
+ intermediate nodes between tunnel endpoints can't distinguish
+ between connections, even if that were desirable.
+
+ For "Keeping Traffic on Fast Paths", we noted that this was true for
+ many platforms, but not for all.
+
+ * For backbone routers, this is likely an Invariant, but for
+ platforms that rely more on general-purpose computers to make
+ forwarding decisions, this may not be a fatal flaw for Path Aware
+ techniques.
+
+ For "Endpoints Trusting Intermediate Nodes" and "Intermediate Nodes
+ Trusting Endpoints", these lessons point to the broader need to
+ revisit the Internet Threat Model.
+
+ * We noted with relief that discussions about this were already
+ underway in the IETF community at IETF 105 (see the Security Area
+ Open Meeting minutes [SAAG-105-Min] for discussion of
+ [INTERNET-THREAT-MODEL] and [FARRELL-ETM]), and the Internet
+ Architecture Board has created a mailing list for continued
+ discussions [model-t], but we recognize that there are Path Aware
+ networking aspects of this effort, requiring research.
+
+ For "Reacting to Distant Signals", we noted that not all attributes
+ are equal.
+
+ * If an attribute is stable over an extended period of time, is
+ difficult to observe via end-to-end mechanisms, and is valuable,
+ Path Aware techniques that rely on that attribute to provide a
+ significant benefit become more attractive.
+
+ * Analysis to help identify attributes that are useful enough to
+ justify deployment of Path Aware techniques that make use of those
+ attributes would be helpful.
+
+ For "Support in Endpoint Protocol Stacks", we noted that Path Aware
+ applications must be able to identify and communicate requirements
+ about path characteristics.
+
+ * The de facto sockets API has no way of signaling application
+ expectations for the network path to the protocol stack.
+
+4. Summary of Lessons Learned
+
+ This section summarizes the Lessons Learned from the contributed
+ subsections in Section 6.
+
+ Each Lesson Learned is tagged with one or more contributions that
+ encountered this obstacle as a significant impediment to deployment.
+ Other contributed techniques may have also encountered this obstacle,
+ but this obstacle may not have been the biggest impediment to
+ deployment for those techniques.
+
+ It is useful to notice that sometimes an obstacle might impede
+ deployment, while at other times, the same obstacle might prevent
+ adoption and deployment entirely. The Research Group discussed
+ distinguishing between obstacles that impede and obstacles that
+ prevent, but it appears that the boundary between "impede" and
+ "prevent" can shift over time -- some of the Lessons Learned are
+ based on both a) Path Aware techniques that were not deployed and b)
+ Path Aware techniques that were deployed but were not deployed widely
+ or quickly. See Sections 6.6 and 6.6.3 for examples of this shifting
+ boundary.
+
+4.1. Justifying Deployment
+
+ The benefit of Path Awareness must be great enough to justify making
+ changes in an operational network. The colloquial U.S. American
+ English expression, "If it ain't broke, don't fix it" is a "best
+ current practice" on today's Internet. (See Sections 6.3, 6.4, 6.5,
+ and 6.9, in addition to [RFC5218].)
+
+4.2. Providing Benefits for Early Adopters
+
+ Providing benefits for early adopters can be key -- if everyone must
+ deploy a technique in order for the technique to provide benefits, or
+ even to work at all, the technique is unlikely to be adopted widely
+ or quickly. (See Sections 6.2 and 6.3, in addition to [RFC5218].)
+
+4.3. Providing Benefits during Partial Deployment
+
+ Some proposals require that all path elements along the full length
+ of the path must be upgraded to support a new technique, before any
+ benefits can be seen. This is likely to require coordination between
+ operators who control a subset of path elements, and between
+ operators and end users if endpoint upgrades are required. If a
+ technique provides benefits when only a part of the path has been
+ upgraded, this is likely to encourage adoption and deployment. (See
+ Sections 6.2, 6.3, and 6.9, in addition to [RFC5218].)
+
+4.4. Outperforming End-to-End Protocol Mechanisms
+
+ Adaptive end-to-end protocol mechanisms may respond to feedback
+ quickly enough that the additional realizable benefit from a new Path
+ Aware mechanism that tries to manipulate nodes along a path, or
+ observe the attributes of nodes along a path, may be much smaller
+ than anticipated. (See Sections 6.3 and 6.5.)
+
+4.5. Paying for Path Aware Techniques
+
+ "Follow the money." If operators can't charge for a Path Aware
+ technique to recover the costs of deploying it, the benefits to the
+ operator must be really significant. Corollary: if operators charge
+ for a Path Aware technique, the benefits to users of that Path Aware
+ technique must be significant enough to justify the cost. (See
+ Sections 6.1, 6.2, 6.5, and 6.9.)
+
+4.6. Impact on Operational Practices
+
+ The impact of a Path Aware technique requiring changes to operational
+ practices can affect how quickly or widely a promising technique is
+ deployed. The impacts of these changes may make deployment more
+ likely, but they often discourage deployment. (See Section 6.6,
+ including Section 6.6.3.)
+
+4.7. Per-Connection State
+
+ Per-connection state in intermediate nodes has been an impediment to
+ adoption and deployment in the past, because of added cost and
+ complexity. Often, similar benefits can be achieved with much less
+ finely grained state. This is especially true as we move from the
+ edge of the network, further into the routing core. (See
+ Sections 6.1 and 6.2.)
+
+4.8. Keeping Traffic on Fast Paths
+
+ Many modern platforms, especially high-end routers, have been
+ designed with hardware that can make simple per-packet forwarding
+ decisions ("fast paths") but have not been designed to make heavy use
+ of in-band mechanisms such as IPv4 and IPv6 Router Alert Options
+ (RAOs) that require more processing to make forwarding decisions.
+ Packets carrying in-band mechanisms are diverted to other processors
+ in the router with much lower packet-processing rates. Operators can
+ be reluctant to deploy techniques that rely heavily on in-band
+ mechanisms because they may significantly reduce packet throughput.
+ (See Section 6.7.)
+
+4.9. Endpoints Trusting Intermediate Nodes
+
+ If intermediate nodes along the path can't be trusted, it's unlikely
+ that endpoints will rely on signals from intermediate nodes to drive
+ changes to endpoint behaviors. We note that "trust" is not binary --
+ one low level of trust applies when a node receiving a message can
+ confirm that the sender of the message has visibility of the packets
+ on the path it is seeking to control [RFC8085] (e.g., an ICMP
+ Destination Unreachable message [RFC0792] that includes the Internet
+ Header + 64 bits of Original Data Datagram payload from the source).
+ A higher level of trust can arise when an endpoint has established a
+ short-term, or even long-term, trust relationship with network nodes.
+ (See Sections 6.4 and 6.5.)
+
+4.10. Intermediate Nodes Trusting Endpoints
+
+ If the endpoints do not have any trust relationship with the
+ intermediate nodes along a path, operators have been reluctant to
+ deploy techniques that rely on endpoints sending unauthenticated
+ control signals to routers. (See Sections 6.2 and 6.7.) (We also
+ note that this still remains a factor hindering deployment of
+ Diffserv.)
+
+4.11. Reacting to Distant Signals
+
+ Because the Internet is a distributed system, if the distance that
+ information from distant path elements travels to a Path Aware host
+ is sufficiently large, the information may no longer accurately
+ represent the state and situation at the distant host or elements
+ along the path when it is received locally. In this case, the
+ benefit that a Path Aware technique provides will be inconsistent and
+ may not always be beneficial. (See Section 6.3.)
+
+4.12. Support in Endpoint Protocol Stacks
+
+ Just because a protocol stack provides a new feature/signal does not
+ mean that applications will use the feature/signal. Protocol stacks
+ may not know how to effectively utilize Path Aware techniques,
+ because the protocol stack may require information from applications
+ to permit the technique to work effectively, but applications may not
+ a priori know that information. Even if the application does know
+ that information, the de facto sockets API has no way of signaling
+ application expectations for the network path to the protocol stack.
+ In order for applications to provide these expectations to protocol
+ stacks, we need an API that signals more than the packets to be sent.
+ (See Sections 6.1 and 6.2.)
+
+4.13. Planning for Failure
+
+ If early implementers discover severe problems with a new feature,
+ that feature is likely to be disabled, and convincing implementers to
+ re-enable that feature can be very difficult and can require years or
+ decades. In addition to testing, partial deployment for a subset of
+ users, implementing instrumentation that will detect degraded user
+ experience, and even "failback" to a previous version or "failover"
+ to an entirely different implementation are likely to be helpful.
+ (See Section 6.9.)
+
+5. Future Work
+
+ By its nature, this document has been retrospective. In addition to
+ considering how the Lessons Learned to date apply to current and
+ future Path Aware networking proposals, it's also worth considering
+ whether there is deeper investigation left to do.
+
+ * We note that this work was based on contributions from experts on
+ various Path Aware techniques, and all of the contributed
+ techniques involved unicast protocols. We didn't consider how
+ these lessons might apply to multicast, and, given anecdotal
+ reports at the IETF 109 Media Operations (MOPS) Working Group
+ meeting of IP multicast offerings within data centers at one or
+ more cloud providers [MOPS-109-Min], it might be useful to think
+ about Path Awareness in multicast, before we have a history of
+ unsuccessful deployments to document.
+
+ * The question of whether a mechanism supports admission control,
+ based on either endpoints or applications, is associated with Path
+ Awareness. One of the motivations of IntServ and a number of
+ other architectures (e.g., Deterministic Networking [RFC8655]) is
+ the ability to "say no" to an application based on resource
+ availability on a path, before the application tries to inject
+ traffic onto that path and discovers the path does not have the
+ capacity to sustain enough utility to meet the application's
+ minimum needs. The question of whether admission control is
+ needed comes up repeatedly, but we have learned a few useful
+ lessons that, while covered implicitly in some of the Lessons
+ Learned provided in this document, might be explained explicitly:
+
+ - We have gained a lot of experience with application-based
+ adaptation since the days where applications just injected
+ traffic inelastically into the network. Such adaptations seem
+ to work well enough that admission control is of less value to
+ these applications.
+
+ - There are end-to-end measurement techniques that can steer
+ traffic at the application layer (Content Delivery Networks
+ (CDNs), multi-CDNs like Conviva [Conviva], etc.).
+
+ - We noted in Section 4.12 that applications often don't know how
+ to utilize Path Aware techniques. This includes not knowing
+ enough about their admission control threshold to be able to
+ ask accurately for the resources they need, whether this is
+ because the application itself doesn't know or because the
+ application has no way to signal its expectations to the
+ underlying protocol stack. To date, attempts to help them
+ haven't gotten anywhere (e.g., the multiple-TSPEC (Traffic
+ Specification) additions to RSVP to attempt to mirror codec
+ selection by applications [INTSERV-MULTIPLE-TSPEC] expired in
+ 2013).
+
+ * We note that this work took the then-current IP network
+ architecture as given, at least at the time each technique was
+ proposed. It might be useful to consider aspects of the now-
+ current IP network architecture that ease, or impede, Path Aware
+ techniques. For example, there is limited ability in IP to
+ constrain bidirectional paths to be symmetric, and information-
+ centric networking protocols such as Named Data Networking (NDN)
+ and Content-Centric Networking (CCNx) [RFC8793] must force
+ bidirectional path symmetry using protocol-specific mechanisms.
+
+6. Contributions
+
+ Contributions on these Path Aware techniques were analyzed to arrive
+ at the Lessons Learned captured in Section 4.
+
+ Our expectation is that most readers will not need to read through
+ this section carefully, but we wanted to record these hard-fought
+ lessons as a service to others who may revisit this document, so
+ they'll have the details close at hand.
+
+6.1. Stream Transport (ST, ST2, ST2+)
+
+ The suggested references for Stream Transport are:
+
+ * "ST - A Proposed Internet Stream Protocol" [IEN-119]
+
+ * "Experimental Internet Stream Protocol: Version 2 (ST-II)"
+ [RFC1190]
+
+ * "Internet Stream Protocol Version 2 (ST2) Protocol Specification -
+ Version ST2+" [RFC1819]
+
+ The first version of Stream Transport, ST [IEN-119], was published in
+ the late 1970s and was implemented and deployed on the ARPANET at
+ small scale. It was used throughout the 1980s for experimental
+ transmission of voice, video, and distributed simulation.
+
+ The second version of the ST specification (ST2) [RFC1190] [RFC1819]
+ was an experimental connection-oriented internetworking protocol that
+ operated at the same layer as connectionless IP. ST2 packets could
+ be distinguished by their IP header version numbers (IP, at that
+ time, used version number 4, while ST2 used version number 5).
+
+ ST2 used a control plane layered over IP to select routes and reserve
+ capacity for real-time streams across a network path, based on a flow
+ specification communicated by a separate protocol. The flow
+ specification could be associated with QoS state in routers,
+ producing an experimental resource reservation protocol. This
+ allowed ST2 routers along a path to offer end-to-end guarantees,
+ primarily to satisfy the QoS requirements for real-time services over
+ the Internet.
+
+6.1.1. Reasons for Non-deployment
+
+ Although implemented in a range of equipment, ST2 was not widely used
+ after completion of the experiments. It did not offer the
+ scalability and fate-sharing properties that have come to be desired
+ by the Internet community.
+
+ The ST2 protocol is no longer in use.
+
+6.1.2. Lessons Learned
+
+ As time passed, the trade-off between router processing and link
+ capacity changed. Links became faster, and the cost of router
+ processing became comparatively more expensive.
+
+ The ST2 control protocol used "hard state" -- once a route was
+ established, and resources were reserved, routes and resources
+ existed until they were explicitly released via signaling. A soft-
+ state approach was thought superior to this hard-state approach and
+ led to development of the IntServ model described in Section 6.2.
+
+6.2. Integrated Services (IntServ)
+
+ The suggested references for IntServ are:
+
+ * "Integrated Services in the Internet Architecture: an Overview"
+ [RFC1633]
+
+ * "Specification of the Controlled-Load Network Element Service"
+ [RFC2211]
+
+ * "Specification of Guaranteed Quality of Service" [RFC2212]
+
+ * "General Characterization Parameters for Integrated Service
+ Network Elements" [RFC2215]
+
+ * "Resource ReSerVation Protocol (RSVP) -- Version 1 Functional
+ Specification" [RFC2205]
+
+ In 1994, when the IntServ architecture document [RFC1633] was
+ published, real-time traffic was first appearing on the Internet. At
+ that time, bandwidth was still a scarce commodity. Internet Service
+ Providers built networks over DS3 (45 Mbps) infrastructure, and sub-
+ rate (< 1 Mbps) access was common. Therefore, the IETF anticipated a
+ need for a fine-grained QoS mechanism.
+
+ In the IntServ architecture, some applications can require service
+ guarantees. Therefore, those applications use RSVP [RFC2205] to
+ signal QoS reservations across network paths. Every router in the
+ network that participates in IntServ maintains per-flow soft state to
+ a) perform call admission control and b) deliver guaranteed service.
+
+ Applications use Flow Specifications (Flow Specs, or FLOWSPECs)
+ [RFC2210] to describe the traffic that they emit. RSVP reserves
+ capacity for traffic on a per-Flow-Spec basis.
+
+6.2.1. Reasons for Non-deployment
+
+ Although IntServ has been used in enterprise and government networks,
+ IntServ was never widely deployed on the Internet because of its
+ cost. The following factors contributed to operational cost:
+
+ * IntServ must be deployed on every router that is on a path where
+ IntServ is to be used. Although it is possible to include a
+ router that does not participate in IntServ along the path being
+ controlled, if that router is likely to become a bottleneck,
+ IntServ cannot be used to avoid that bottleneck along the path.
+
+ * IntServ maintained per-flow state.
+
+ As IntServ was being discussed, the following occurred:
+
+ * For many expected uses, it became more cost effective to solve the
+ QoS problem by adding bandwidth. Between 1994 and 2000, Internet
+ Service Providers upgraded their infrastructures from DS3 (45
+ Mbps) to OC-48 (2.4 Gbps). This meant that even if an endpoint
+ was using IntServ in an IntServ-enabled network, its requests
+ would rarely, if ever, be denied, so endpoints and Internet
+ Service Providers had little reason to enable IntServ.
+
+ * Diffserv [RFC2475] offered a more cost-effective, albeit less
+ fine-grained, solution to the QoS problem.
+
+6.2.2. Lessons Learned
+
+ The following lessons were learned:
+
+ * Any mechanism that requires every participating on-path router to
+ maintain per-flow state is not likely to succeed, unless the
+ additional cost for offering the feature can be recovered from the
+ user.
+
+ * Any mechanism that requires an operator to upgrade all of its
+ routers is not likely to succeed, unless the additional cost for
+ offering the feature can be recovered from the user.
+
+ In environments where IntServ has been deployed, trust relationships
+ with endpoints are very different from trust relationships on the
+ Internet itself. There are often clearly defined hierarchies in
+ Service Level Agreements (SLAs) governing well-defined transport
+ flows operating with predetermined capacity and latency requirements
+ over paths where capacity or other attributes are constrained.
+
+ IntServ was never widely deployed to manage capacity across the
+ Internet. However, the technique that it produced was deployed for
+ reasons other than bandwidth management. RSVP is widely deployed as
+ an MPLS signaling mechanism. BGP reuses the RSVP concept of Filter
+ Specs to distribute firewall filters, although they are called "Flow
+ Spec Component Types" in BGP [RFC5575].
+
+6.3. Quick-Start TCP
+
+ The suggested references for Quick-Start TCP are:
+
+ * "Quick-Start for TCP and IP" [RFC4782]
+
+ * "Determining an appropriate sending rate over an underutilized
+ network path" [SAF07]
+
+ * "Fast Startup Internet Congestion Control for Broadband
+ Interactive Applications" [Sch11]
+
+ * "Using Quick-Start to enhance TCP-friendly rate control
+ performance in bidirectional satellite networks" [QS-SAT]
+
+ Quick-Start is defined in an Experimental RFC [RFC4782] and is a TCP
+ extension that leverages support from the routers on the path to
+ determine an allowed initial sending rate for a path through the
+ Internet, either at the start of data transfers or after idle
+ periods. Without information about the path, a sender cannot easily
+ determine an appropriate initial sending rate. The default TCP
+ congestion control therefore uses the safe but time-consuming slow-
+ start algorithm [RFC5681]. With Quick-Start, connections are allowed
+ to use higher initial sending rates if there is significant unused
+ bandwidth along the path and if the sender and all of the routers
+ along the path approve the request.
+
+ By examining the Time To Live (TTL) field in Quick-Start packets, a
+ sender can determine if routers on the path have approved the Quick-
+ Start request. However, this method is unable to take into account
+ the routers hidden by tunnels or other network nodes invisible at the
+ IP layer.
+
+ The protocol also includes a nonce that provides protection against
+ cheating routers and receivers. If the Quick-Start request is
+ explicitly approved by all routers along the path, the TCP host can
+ send at up to the approved rate; otherwise, TCP would use the default
+ congestion control. Quick-Start requires modifications in the
+ involved end systems as well as in routers. Due to the resulting
+ deployment challenges, Quick-Start was only proposed in [RFC4782] for
+ controlled environments.
+
+ The Quick-Start mechanism is a lightweight, coarse-grained, in-band,
+ network-assisted fast startup mechanism. The benefits are studied by
+ simulation in a research paper [SAF07] that complements the protocol
+ specification. The study confirms that Quick-Start can significantly
+ speed up mid-sized data transfers. That paper also presents router
+ algorithms that do not require keeping per-flow state. Later studies
+ [Sch11] comprehensively analyze Quick-Start with a full Linux
+ implementation and with a router fast-path prototype using a network
+ processor. In both cases, Quick-Start could be implemented with
+ limited additional complexity.
+
+6.3.1. Reasons for Non-deployment
+
+ However, experiments with Quick-Start in [Sch11] revealed several
+ challenges:
+
+ * Having information from the routers along the path can reduce the
+ risk of congestion but cannot avoid it entirely. Determining
+ whether there is unused capacity is not trivial in actual router
+ and host implementations. Data about available capacity visible
+ at the IP layer may be imprecise, and due to the propagation
+ delay, information can already be outdated when it reaches a
+ sender. There is a trade-off between the speedup of data
+ transfers and the risk of congestion even with Quick-Start. This
+ could be mitigated by only allowing Quick-Start to access a
+ proportion of the unused capacity along a path.
+
+ * For scalable router fast-path implementations, it is important to
+ enable parallel processing of packets, as this is a widely used
+ method, e.g., in network processors. One challenge is
+ synchronization of information between packets that are processed
+ in parallel, which should be avoided as much as possible.
+
+ * Only some types of application traffic can benefit from Quick-
+ Start. Capacity needs to be requested and discovered. The
+ discovered capacity needs to be utilized by the flow, or it
+ implicitly becomes available for other flows. Failing to use the
+ requested capacity may have already reduced the pool of Quick-
+ Start capacity that was made available to other competing Quick-
+ Start requests. The benefit is greatest when senders use this
+ only for bulk flows and avoid sending unnecessary Quick-Start
+ requests, e.g., for flows that only send a small amount of data.
+ Choosing an appropriate request size requires application-internal
+ knowledge that is not commonly expressed by the transport API.
+ How a sender can determine the rate for an initial Quick-Start
+ request is still a largely unsolved problem.
+
+ There is no known deployment of Quick-Start for TCP or other IETF
+ transports.
+
+6.3.2. Lessons Learned
+
+ Some lessons can be learned from Quick-Start. Despite being a very
+ lightweight protocol, Quick-Start suffers from poor incremental
+ deployment properties regarding both a) the required modifications in
+ network infrastructure and b) its interactions with applications.
+ Except for corner cases, congestion control can be quite efficiently
+ performed end to end in the Internet, and in modern stacks there is
+ not much room for significant improvement by additional network
+ support.
+
+ After publication of the Quick-Start specification, there have been
+ large-scale experiments with an initial window of up to 10 segments
+ [RFC6928]. This alternative "IW10" approach can also ramp up data
+ transfers faster than the standard congestion control, but it only
+ requires sender-side modifications. As a result, this approach can
+ be easier and incrementally deployed in the Internet. While
+ theoretically Quick-Start can outperform "IW10", the improvement in
+ completion time for data transfer times can, in many cases, be small.
+ After publication of [RFC6928], most modern TCP stacks have increased
+ their default initial window.
+
+6.4. ICMP Source Quench
+
+ The suggested reference for ICMP Source Quench is:
+
+ * "Internet Control Message Protocol" [RFC0792]
+
+ The ICMP Source Quench message [RFC0792] allowed an on-path router to
+ request the source of a flow to reduce its sending rate. This method
+ allowed a router to provide an early indication of impending
+ congestion on a path to the sources that contribute to that
+ congestion.
+
+6.4.1. Reasons for Non-deployment
+
+ This method was deployed in Internet routers over a period of time;
+ the reaction of endpoints to receiving this signal has varied. For
+ low-speed links, with low multiplexing of flows the method could be
+ used to regulate (momentarily reduce) the transmission rate.
+ However, the simple signal does not scale with link speed or with the
+ number of flows sharing a link.
+
+ The approach was overtaken by the evolution of congestion control
+ methods in TCP [RFC2001], and later also by other IETF transports.
+ Because these methods were based upon measurement of the end-to-end
+ path and an algorithm in the endpoint, they were able to evolve and
+ mature more rapidly than methods relying on interactions between
+ operational routers and endpoint stacks.
+
+ After ICMP Source Quench was specified, the IETF began to recommend
+ that transports provide end-to-end congestion control [RFC2001]. The
+ Source Quench method has been obsoleted by the IETF [RFC6633], and
+ both hosts and routers must now silently discard this message.
+
+6.4.2. Lessons Learned
+
+ This method had several problems.
+
+ First, [RFC0792] did not sufficiently specify how the sender would
+ react to the ICMP Source Quench signal from the path (e.g.,
+ [RFC1016]). There was ambiguity in how the sender should utilize
+ this additional information. This could lead to unfairness in the
+ way that receivers (or routers) responded to this message.
+
+ Second, while the message did provide additional information, the
+ Explicit Congestion Notification (ECN) mechanism [RFC3168] provided a
+ more robust and informative signal for network nodes to provide early
+ indication that a path has become congested.
+
+ The mechanism originated at a time when the Internet trust model was
+ very different. Most endpoint implementations did not attempt to
+ verify that the message originated from an on-path node before they
+ utilized the message. This made it vulnerable to Denial-of-Service
+ (DoS) attacks. In theory, routers might have chosen to use the
+ quoted packet contained in the ICMP payload to validate that the
+ message originated from an on-path node, but this would have
+ increased per-packet processing overhead for each router along the
+ path and would have required transport functionality in the router to
+ verify whether the quoted packet header corresponded to a packet the
+ router had sent. In addition, Section 5.2 of [RFC4443] noted
+ ICMPv6-based attacks on hosts that would also have threatened routers
+ processing ICMPv6 Source Quench payloads. As time passed, it became
+ increasingly obvious that the lack of validation of the messages
+ exposed receivers to a security vulnerability where the messages
+ could be forged to create a tangible DoS opportunity.
+
+6.5. Triggers for Transport (TRIGTRAN)
+
+ The suggested references for TRIGTRAN are:
+
+ * TRIGTRAN BOF at IETF 55 [TRIGTRAN-55]
+
+ * TRIGTRAN BOF at IETF 56 [TRIGTRAN-56]
+
+ TCP [RFC0793] has a well-known weakness -- the end-to-end flow
+ control mechanism has only a single signal, the loss of a segment,
+ detected when no acknowledgment for the lost segment is received at
+ the sender. There are multiple reasons why the sender might not have
+ received an acknowledgment for the segment. To name several, the
+ segment could have been trapped in a routing loop, damaged in
+ transmission and failed checksum verification at the receiver, or
+ lost because some intermediate device discarded the packet, or any of
+ a variety of other things could have happened to the acknowledgment
+ on the way back from the receiver to the sender. TCP implementations
+ since the late 1980s have made the "safe" decision and have
+ interpreted the loss of a segment as evidence that the path between
+ two endpoints may have become congested enough to exhaust buffers on
+ intermediate hops, so that the TCP sender should "back off" -- reduce
+ its sending rate until it knows that its segments are now being
+ delivered without loss [RFC5681].
+
+ The thinking behind TRIGTRAN was that if a path completely stopped
+ working because a link along the path was "down", somehow something
+ along the path could signal TCP when that link returned to service,
+ and the sending TCP could retry immediately, without waiting for a
+ full retransmission timeout (RTO) period.
+
+6.5.1. Reasons for Non-deployment
+
+ The early dreams for TRIGTRAN were dashed because of an assumption
+ that TRIGTRAN triggers would be unauthenticated. This meant that any
+ "safe" TRIGTRAN mechanism would have relied on a mechanism such as
+ setting the IPv4 TTL or IPv6 Hop Count to 255 at a sender and testing
+ that it was 254 upon receipt, so that a receiver could verify that a
+ signal was generated by an adjacent sender known to be on the path
+ being used and not some unknown sender that might not even be on the
+ path (e.g., "The Generalized TTL Security Mechanism (GTSM)"
+ [RFC5082]). This situation is very similar to the case for ICMP
+ Source Quench messages as described in Section 6.4, which were also
+ unauthenticated and could be sent by an off-path attacker, resulting
+ in deprecation of ICMP Source Quench message processing [RFC6633].
+
+ TRIGTRAN's scope shrunk from "the path is down" to "the first-hop
+ link is down."
+
+ But things got worse.
+
+ Because TRIGTRAN triggers would only be provided when the first-hop
+ link was "down", TRIGTRAN triggers couldn't replace normal TCP
+ retransmission behavior if the path failed because some link further
+ along the network path was "down". So TRIGTRAN triggers added
+ complexity to an already-complex TCP state machine and did not allow
+ any existing complexity to be removed.
+
+ There was also an issue that the TRIGTRAN signal was not sent in
+ response to a specific host that had been sending packets and was
+ instead a signal that stimulated a response by any sender on the
+ link. This needs to scale when there are multiple flows trying to
+ use the same resource, yet the sender of a trigger has no
+ understanding of how many of the potential traffic sources will
+ respond by sending packets -- if recipients of the signal "back off"
+ their responses to a trigger to improve scaling, then that
+ immediately mitigates the benefit of the signal.
+
+ Finally, intermediate forwarding nodes required modification to
+ provide TRIGTRAN triggers, but operators couldn't charge for TRIGTRAN
+ triggers, so there was no way to recover the cost of modifying,
+ testing, and deploying updated intermediate nodes.
+
+ Two TRIGTRAN BOFs were held, at IETF 55 [TRIGTRAN-55] and IETF 56
+ [TRIGTRAN-56], but this work was not chartered, and there was no
+ interest in deploying TRIGTRAN unless it was chartered and
+ standardized in the IETF.
+
+6.5.2. Lessons Learned
+
+ The reasons why this work was not chartered, much less deployed,
+ provide several useful lessons for researchers.
+
+ * TRIGTRAN started with a plausible value proposition, but
+ networking realities in the early 2000s forced reductions in scope
+ that led directly to reductions in potential benefits but no
+ corresponding reductions in costs and complexity.
+
+ * These reductions in scope were the direct result of an inability
+ for hosts to trust or authenticate TRIGTRAN signals they received
+ from the network.
+
+ * Operators did not believe they could charge for TRIGTRAN
+ signaling, because first-hop links didn't fail frequently and
+ TRIGTRAN provided no reduction in operating expenses, so there was
+ little incentive to purchase and deploy TRIGTRAN-capable network
+ equipment.
+
+ It is also worth noting that the targeted environment for TRIGTRAN in
+ the late 1990s contained links with a relatively small number of
+ directly connected hosts -- for instance, cellular or satellite
+ links. The transport community was well aware of the dangers of
+ sender synchronization based on multiple senders receiving the same
+ stimulus at the same time, but the working assumption for TRIGTRAN
+ was that there wouldn't be enough senders for this to be a meaningful
+ problem. In the 2010s, it was common for a single "link" to support
+ many senders and receivers, likely requiring TRIGTRAN senders to wait
+ some random amount of time before sending after receiving a TRIGTRAN
+ signal, which would have reduced the benefits of TRIGTRAN even more.
+
+6.6. Shim6
+
+ The suggested reference for Shim6 is:
+
+ * "Shim6: Level 3 Multihoming Shim Protocol for IPv6" [RFC5533]
+
+ The IPv6 routing architecture [RFC1887] assumed that most sites on
+ the Internet would be identified by Provider Assigned IPv6 prefixes,
+ so that Default-Free Zone routers only contained routes to other
+ providers, resulting in a very small IPv6 global routing table.
+
+ For a single-homed site, this could work well. A multihomed site
+ with only one upstream provider could also work well, although BGP
+ multihoming from a single upstream provider was often a premium
+ service (costing more than twice as much as two single-homed sites),
+ and if the single upstream provider went out of service, all of the
+ multihomed paths could fail simultaneously.
+
+ IPv4 sites often multihomed by obtaining Provider Independent
+ prefixes and advertising these prefixes through multiple upstream
+ providers. With the assumption that any multihomed IPv4 site would
+ also multihome in IPv6, it seemed likely that IPv6 routing would be
+ subject to the same pressures to announce Provider Independent
+ prefixes, resulting in an IPv6 global routing table that exhibited
+ the same explosive growth as the IPv4 global routing table. During
+ the early 2000s, work began on a protocol that would provide
+ multihoming for IPv6 sites without requiring sites to advertise
+ Provider Independent prefixes into the IPv6 global routing table.
+
+ This protocol, called "Shim6", allowed two endpoints to exchange
+ multiple addresses ("Locators") that all mapped to the same endpoint
+ ("Identity"). After an endpoint learned multiple Locators for the
+ other endpoint, it could send to any of those Locators with the
+ expectation that those packets would all be delivered to the endpoint
+ with the same Identity. Shim6 was an example of an "Identity/Locator
+ Split" protocol.
+
+ Shim6, as defined in [RFC5533] and related RFCs, provided a workable
+ solution for IPv6 multihoming using Provider Assigned prefixes,
+ including capability discovery and negotiation, and allowing end-to-
+ end application communication to continue even in the face of path
+ failure, because applications don't see Locator failures and continue
+ to communicate with the same Identity using a different Locator.
+
+6.6.1. Reasons for Non-deployment
+
+ Note that the problem being addressed was "site multihoming", but
+ Shim6 was providing "host multihoming". That meant that the decision
+ about what path would be used was under host control, not under edge
+ router control.
+
+ Although more work could have been done to provide a better technical
+ solution, the biggest impediments to Shim6 deployment were
+ operational and business considerations. These impediments were
+ discussed at multiple network operator group meetings, including
+ [Shim6-35] at [NANOG-35].
+
+ The technical issues centered around concerns that Shim6 relied on
+ the host to track all the connections, while also tracking Identity/
+ Locator mappings in the kernel and tracking failures to recognize
+ that an available path has failed.
+
+ The operational issues centered around concerns that operators were
+ performing traffic engineering on traffic aggregates. With Shim6,
+ these operator traffic engineering policies must be pushed down to
+ individual hosts.
+
+ In addition, operators would have no visibility or control over the
+ decision of hosts choosing to switch to another path. They expressed
+ concerns that relying on hosts to steer traffic exposed operator
+ networks to oscillation based on feedback loops, if hosts moved from
+ path to path frequently. Given that Shim6 was intended to support
+ multihoming across operators, operators providing only one of the
+ paths would have even less visibility as traffic suddenly appeared
+ and disappeared on their networks.
+
+ In addition, firewalls that expected to find a TCP or UDP transport-
+ level protocol header in the IP payload would see a Shim6 Identity
+ header instead, and they would not perform transport-protocol-based
+ firewalling functions because the firewall's normal processing logic
+ would not look past the Identity header. The firewall would perform
+ its default action, which would most likely be to drop packets that
+ don't match any processing rule.
+
+ The business issues centered on reducing or removing the ability to
+ sell BGP multihoming service to their own customers, which is often
+ more expensive than two single-homed connectivity services.
+
+6.6.2. Lessons Learned
+
+ It is extremely important to take operational concerns into account
+ when a Path Aware protocol is making decisions about path selection
+ that may conflict with existing operational practices and business
+ considerations.
+
+6.6.3. Addendum on Multipath TCP
+
+ During discussions in the PANRG session at IETF 103 [PANRG-103-Min],
+ Lars Eggert, past Transport Area Director, pointed out that during
+ charter discussions for the Multipath TCP Working Group [MP-TCP],
+ operators expressed concerns that customers could use Multipath TCP
+ to load-share TCP connections across operators simultaneously and
+ compare passive performance measurements across network paths in real
+ time, changing the balance of power in those business relationships.
+ Although the Multipath TCP Working Group was chartered, this concern
+ could have acted as an obstacle to deployment.
+
+ Operator objections to Shim6 were focused on technical concerns, but
+ this concern could have also been an obstacle to Shim6 deployment if
+ the technical concerns had been overcome.
+
+6.7. Next Steps in Signaling (NSIS)
+
+ The suggested references for Next Steps in Signaling (NSIS) are:
+
+ * the concluded working group charter [NSIS-CHARTER-2001]
+
+ * "GIST: General Internet Signalling Transport" [RFC5971]
+
+ * "NAT/Firewall NSIS Signaling Layer Protocol (NSLP)" [RFC5973]
+
+ * "NSIS Signaling Layer Protocol (NSLP) for Quality-of-Service
+ Signaling" [RFC5974]
+
+ * "Authorization for NSIS Signaling Layer Protocols" [RFC5981]
+
+ The NSIS Working Group worked on signaling techniques for network-
+ layer resources (e.g., QoS resource reservations, Firewall and NAT
+ traversal).
+
+ When RSVP [RFC2205] was used in deployments, a number of questions
+ came up about its perceived limitations and potential missing
+ features. The issues noted in the NSIS Working Group charter
+ [NSIS-CHARTER-2001] include interworking between domains with
+ different QoS architectures, mobility and roaming for IP interfaces,
+ and complexity. Later, the lack of security in RSVP was also
+ recognized [RFC4094].
+
+ The NSIS Working Group was chartered to tackle those issues and
+ initially focused on QoS signaling as its primary use case. However,
+ over time a new approach evolved that introduced a modular
+ architecture using two application-specific signaling protocols: a)
+ the NSIS Signaling Layer Protocol (NSLP) on top of b) a generic
+ signaling transport protocol (the NSIS Transport Layer Protocol
+ (NTLP)).
+
+ NTLP is defined in [RFC5971]. Two types of NSLPs are defined: an
+ NSLP for QoS signaling [RFC5974] and an NSLP for NATs/firewalls
+ [RFC5973].
+
+6.7.1. Reasons for Non-deployment
+
+ The obstacles for deployment can be grouped into implementation-
+ related aspects and operational aspects.
+
+ * Implementation-related aspects:
+
+ Although NSIS provides benefits with respect to flexibility,
+ mobility, and security compared to other network signaling
+ techniques, hardware vendors were reluctant to deploy this
+ solution, because it would require additional implementation
+ effort and would result in additional complexity for router
+ implementations.
+
+ NTLP mainly operates as a path-coupled signaling protocol, i.e.,
+ its messages are processed at the control plane of each
+ intermediate node that is also forwarding the data flows. This
+ requires a mechanism to intercept signaling packets while they are
+ forwarded in the same manner (especially along the same path) as
+ data packets. NSIS uses the IPv4 and IPv6 Router Alert Option
+ (RAO) to allow for interception of those path-coupled signaling
+ messages, and this technique requires router implementations to
+ correctly understand and implement the handling of RAOs, e.g., to
+ only process packets with RAOs of interest and to leave packets
+ with irrelevant RAOs in the fast forwarding processing path (a
+ comprehensive discussion of these issues can be found in
+ [RFC6398]). The latter was an issue with some router
+ implementations at the time of standardization.
+
+ Another reason is that path-coupled signaling protocols that
+ interact with routers and request manipulation of state at these
+ routers (or any other network element in general) are under
+ scrutiny: a packet (or sequence of packets) out of the mainly
+ untrusted data path is requesting creation and manipulation of
+ network state. This is seen as potentially dangerous (e.g., opens
+ up a DoS threat to a router's control plane) and difficult for an
+ operator to control. Path-coupled signaling approaches were
+ considered problematic (see also Section 3 of [RFC6398]). There
+ are recommendations on how to secure NSIS nodes and deployments
+ (e.g., [RFC5981]).
+
+ * Operational Aspects:
+
+ NSIS not only required trust between customers and their provider,
+ but also among different providers. In particular, QoS signaling
+ techniques would require some kind of dynamic SLA support that
+ would imply (potentially quite complex) bilateral negotiations
+ between different Internet Service Providers. This complexity was
+ not considered to be justified, and increasing the bandwidth (and
+ thus avoiding bottlenecks) was cheaper than actively managing
+ network resource bottlenecks by using path-coupled QoS signaling
+ techniques. Furthermore, an end-to-end path typically involves
+ several provider domains, and these providers need to closely
+ cooperate in cases of failures.
+
+6.7.2. Lessons Learned
+
+ One goal of NSIS was to decrease the complexity of the signaling
+ protocol, but a path-coupled signaling protocol comes with the
+ intrinsic complexity of IP-based networks, beyond the complexity of
+ the signaling protocol itself. Sources of intrinsic complexity
+ include:
+
+ * the presence of asymmetric routes between endpoints and routers.
+
+ * the lack of security and trust at large in the Internet
+ infrastructure.
+
+ * the presence of different trust boundaries.
+
+ * the effects of best-effort networks (e.g., robustness to packet
+ loss).
+
+ * divergence from the fate-sharing principle (e.g., state within the
+ network).
+
+ Any path-coupled signaling protocol has to deal with these realities.
+
+ Operators view the use of IPv4 and IPv6 Router Alert Options (RAOs)
+ to signal routers along the path from end systems with suspicion,
+ because these end systems are usually not authenticated and heavy use
+ of RAOs can easily increase the CPU load on routers that are designed
+ to process most packets using a hardware "fast path" and diverting
+ packets containing RAOs to a slower, more capable processor.
+
+6.8. IPv6 Flow Labels
+
+ The suggested reference for IPv6 Flow Labels is:
+
+ * "IPv6 Flow Label Specification" [RFC6437]
+
+ IPv6 specifies a 20-bit Flow Label field [RFC6437], included in the
+ fixed part of the IPv6 header and hence present in every IPv6 packet.
+ An endpoint sets the value in this field to one of a set of
+ pseudorandomly assigned values. If a packet is not part of any flow,
+ the flow label value is set to zero [RFC3697]. A number of Standards
+ Track and Best Current Practice RFCs (e.g., [RFC8085], [RFC6437],
+ [RFC6438]) encourage IPv6 endpoints to set a non-zero value in this
+ field. A multiplexing transport could choose to use multiple flow
+ labels to allow the network to either independently forward its
+ subflows or use one common value for the traffic aggregate. The flow
+ label is present in all fragments. IPsec was originally put forward
+ as one important use case for this mechanism and does encrypt the
+ field [RFC6438].
+
+ Once set, the flow label can provide information that can help inform
+ network nodes about subflows present at the transport layer, without
+ needing to interpret the setting of upper-layer protocol fields
+ [RFC6294]. This information can also be used to coordinate how
+ aggregates of transport subflows are grouped when queued in the
+ network and to select appropriate per-flow forwarding when choosing
+ between alternate paths [RFC6438] (e.g., for Equal-Cost Multipath
+ (ECMP) routing and Link Aggregation Groups (LAGs)).
+
+6.8.1. Reasons for Non-deployment
+
+ Despite the field being present in every IPv6 packet, the mechanism
+ did not receive as much use as originally envisioned. One reason is
+ that to be useful it requires engagement by two different
+ stakeholders:
+
+ * Endpoint Implementation:
+
+ For network nodes along a path to utilize the flow label, there
+ needs to be a non-zero value inserted in the field [RFC6437] at
+ the sending endpoint. There needs to be an incentive for an
+ endpoint to set an appropriate non-zero value. The value should
+ appropriately reflect the level of aggregation the traffic expects
+ to be provided by the network. However, this requires the stack
+ to know granularity at which flows should be identified (or,
+ conversely, which flows should receive aggregated treatment),
+ i.e., which packets carry the same flow label. Therefore, setting
+ a non-zero value may result in additional choices that need to be
+ made by an application developer.
+
+ Although the original flow label standard [RFC3697] forbids any
+ encoding of meaning into the flow label value, the opportunity to
+ use the flow label as a covert channel or to signal other meta-
+ information may have raised concerns about setting a non-zero
+ value [RFC6437].
+
+ Before methods are widely deployed to use this method, there could
+ be no incentive for an endpoint to set the field.
+
+ * Operational support in network nodes:
+
+ A benefit can only be realized when a network node along the path
+ also uses this information to inform its decisions. Network
+ equipment (routers and/or middleboxes) need to include appropriate
+ support in order to utilize the field when making decisions about
+ how to classify flows or forward packets. The use of any optional
+ feature in a network node also requires corresponding updates to
+ operational procedures and therefore is normally only introduced
+ when the cost can be justified.
+
+ A benefit from utilizing the flow label is expected to be
+ increased quality of experience for applications -- but this comes
+ at some operational cost to an operator and requires endpoints to
+ set the field.
+
+6.8.2. Lessons Learned
+
+ The flow label is a general-purpose header field for use by the path.
+ Multiple uses have been proposed. One candidate use was to reduce
+ the complexity of forwarding decisions. However, modern routers can
+ use a "fast path", often taking advantage of hardware to accelerate
+ processing. The method can assist in more complex forwarding, such
+ as ECMP routing and load balancing.
+
+ Although [RFC6437] recommended that endpoints should by default
+ choose uniformly distributed labels for their traffic, the
+ specification permitted an endpoint to choose to set a zero value.
+ This ability of endpoints to choose to set a flow label of zero has
+ had consequences on deployability:
+
+ * Before wide-scale support by endpoints, it would be impossible to
+ rely on a non-zero flow label being set. Network nodes therefore
+ would need to also employ other techniques to realize equivalent
+ functions. An example of a method is one assuming semantics of
+ the source port field to provide entropy input to a network-layer
+ hash. This use of a 5-tuple to classify a packet represents a
+ layering violation [RFC6294]. When other methods have been
+ deployed, they increase the cost of deploying standards-based
+ methods, even though they may offer less control to endpoints and
+ result in potential interaction with other uses/interpretation of
+ the field.
+
+ * Even though the flow label is specified as an end-to-end field,
+ some network paths have been observed to not transparently forward
+ the flow label. This could result from non-conformant equipment
+ or could indicate that some operational networks have chosen to
+ reuse the protocol field for other (e.g., internal) purposes.
+ This results in lack of transparency, and a deployment hurdle to
+ endpoints expecting that they can set a flow label that is
+ utilized by the network. The more recent practice of "greasing"
+ [GREASE] would suggest that a different outcome could have been
+ achieved if endpoints were always required to set a non-zero
+ value.
+
+ * [RFC1809] noted that setting the choice of the flow label value
+ can depend on the expectations of the traffic generated by an
+ application, which suggests that an API should be presented to
+ control the setting or policy that is used. However, many
+ currently available APIs do not have this support.
+
+ A growth in the use of encrypted transports (e.g., QUIC [RFC9000])
+ seems likely to raise issues similar to those discussed above and
+ could motivate renewed interest in utilizing the flow label.
+
+6.9. Explicit Congestion Notification (ECN)
+
+ The suggested references for Explicit Congestion Notification (ECN)
+ are:
+
+ * "Recommendations on Queue Management and Congestion Avoidance in
+ the Internet" [RFC2309]
+
+ * "A Proposal to add Explicit Congestion Notification (ECN) to IP"
+ [RFC2481]
+
+ * "The Addition of Explicit Congestion Notification (ECN) to IP"
+ [RFC3168]
+
+ * "Implementation Report on Experiences with Various TCP RFCs"
+ [vista-impl], slides 6 and 7
+
+ * "Implementation and Deployment of ECN" (at [SallyFloyd])
+
+ In the early 1990s, the large majority of Internet traffic used TCP
+ as its transport protocol, but TCP had no way to detect path
+ congestion before the path was so congested that packets were being
+ dropped. These congestion events could affect all senders using a
+ path, either by "lockout", where long-lived flows monopolized the
+ queues along a path, or by "full queues", where queues remain full,
+ or almost full, for a long period of time.
+
+ In response to this situation, "Active Queue Management" (AQM) was
+ deployed in the network. A number of AQM disciplines have been
+ deployed, but one common approach was that routers dropped packets
+ when a threshold buffer length was reached, so that transport
+ protocols like TCP that were responsive to loss would detect this
+ loss and reduce their sending rates. Random Early Detection (RED)
+ was one such proposal in the IETF. As the name suggests, a router
+ using RED as its AQM discipline that detected time-averaged queue
+ lengths passing a threshold would choose incoming packets
+ probabilistically to be dropped [RFC2309].
+
+ Researchers suggested providing "explicit congestion notifications"
+ to senders when routers along the path detected that their queues
+ were building, giving senders an opportunity to "slow down" as if a
+ loss had occurred, giving path queues time to drain, while the path
+ still had sufficient buffer capacity to accommodate bursty arrivals
+ of packets from other senders. This was proposed as an experiment in
+ [RFC2481] and standardized in [RFC3168].
+
+ A key aspect of ECN was the use of IP header fields rather than IP
+ options to carry explicit congestion notifications, since the
+ proponents recognized that
+
+ Many routers process the "regular" headers in IP packets more
+ efficiently than they process the header information in IP
+ options.
+
+ Unlike most of the Path Aware technologies included in this document,
+ the story of ECN continues to the present day and encountered a large
+ number of Lessons Learned during that time. The early history of ECN
+ (non-)deployment provides Lessons Learned that were not captured by
+ other contributions in Section 6, so that is the emphasis in this
+ section of the document.
+
+6.9.1. Reasons for Non-deployment
+
+ ECN deployment relied on three factors -- support in client
+ implementations, support in router implementations, and deployment
+ decisions in operational networks.
+
+ The proponents of ECN did so much right, anticipating many of the
+ Lessons Learned now recognized in Section 4. They recognized the
+ need to support incremental deployment (Section 4.2). They
+ considered the impact on router throughput (Section 4.8). They even
+ considered trust issues between end nodes and the network, for both
+ non-compliant end nodes (Section 4.10) and non-compliant routers
+ (Section 4.9).
+
+ They were rewarded with ECN being implemented in major operating
+ systems, for both end nodes and routers. A number of implementations
+ are listed under "Implementation and Deployment of ECN" at
+ [SallyFloyd].
+
+ What they did not anticipate was routers that would crash when they
+ saw bits 6 and 7 in the IPv4 Type of Service (TOS) octet [RFC0791] /
+ IPv6 Traffic Class field [RFC2460], which [RFC2481] redefined to be
+ "Currently Unused", being set to a non-zero value.
+
+ As described in [vista-impl] ("IGD" stands for "Intermediate Gateway
+ Device"),
+
+ | IGD problem #1: one of the most popular versions from one of the
+ | most popular vendors. When a data packet arrives with either
+ | ECT(0) or ECT(1) (indicating successful ECN capability
+ | negotiation) indicated, router crashed. Cannot be recovered at
+ | TCP layer [sic]
+
+ This implementation, which would be run on a significant percentage
+ of Internet end nodes, was shipped with ECN disabled, as was true for
+ several of the other implementations listed under "Implementation and
+ Deployment of ECN" at [SallyFloyd]. Even if subsequent router
+ vendors fixed these implementations, ECN was still disabled on end
+ nodes, and given the trade-off between the benefits of enabling ECN
+ (somewhat better behavior during congestion) and the risks of
+ enabling ECN (possibly crashing a router somewhere along the path),
+ ECN tended to stay disabled on implementations that supported ECN for
+ decades afterwards.
+
+6.9.2. Lessons Learned
+
+ Of the contributions included in Section 6, ECN may be unique in
+ providing these lessons:
+
+ * Even if you do everything right, you may trip over implementation
+ bugs in devices you know nothing about, that will cause severe
+ problems that prevent successful deployment of your Path Aware
+ technology.
+
+ * After implementations disable your Path Aware technology, it may
+ take years, or even decades, to convince implementers to re-enable
+ it by default.
+
+ These two lessons, taken together, could be summarized as "you get
+ one chance to get it right."
+
+ During discussion of ECN at [PANRG-110], we noted that "you get one
+ chance to get it right" isn't quite correct today, because operating
+ systems on so many host systems are frequently updated, and transport
+ protocols like QUIC [RFC9000] are being implemented in user space and
+ can be updated without touching installed operating systems. Neither
+ of these factors were true in the early 2000s.
+
+ We think that these restatements of the ECN Lessons Learned are more
+ useful for current implementers:
+
+ * Even if you do everything right, you may trip over implementation
+ bugs in devices you know nothing about, that will cause severe
+ problems that prevent successful deployment of your Path Aware
+ technology. Testing before deployment isn't enough to ensure
+ successful deployment. It is also necessary to "deploy gently",
+ which often means deploying for a small subset of users to gain
+ experience and implementing feedback mechanisms to detect that
+ user experience is being degraded.
+
+ * After implementations disable your Path Aware technology, it may
+ take years, or even decades, to convince implementers to re-enable
+ it by default. This might be based on the difficulty of
+ distributing implementations that enable it by default, but it is
+ just as likely to be based on the "bad taste in the mouth" that
+ implementers have after an unsuccessful deployment attempt that
+ degraded user experience.
+
+ With these expansions, the two lessons, taken together, could be more
+ helpfully summarized as "plan for failure" -- anticipate what your
+ next step will be, if initial deployment is unsuccessful.
+
+ ECN deployment was also hindered by non-deployment of AQM in many
+ devices, because of operator interest in QoS features provided in the
+ network, rather than using the network to assist end systems in
+ providing for themselves. But that's another story, and the AQM
+ Lessons Learned are already covered in other contributions in
+ Section 6.
+
+7. Security Considerations
+
+ This document describes Path Aware techniques that were not adopted
+ and widely deployed on the Internet, so it doesn't affect the
+ security of the Internet.
+
+ If this document meets its goals, we may develop new techniques for
+ Path Aware networking that would affect the security of the Internet,
+ but security considerations for those techniques will be described in
+ the corresponding RFCs that specify them.
+
+8. IANA Considerations
+
+ This document has no IANA actions.
+
+9. Informative References
+
+ [Colossal-Cave]
+ Wikipedia, "Colossal Cave Adventure", June 2021,
+ <https://en.wikipedia.org/w/
+ index.php?title=Colossal_Cave_Adventure&oldid=1027119625>.
+
+ [Conviva] "Conviva Precision : Data Sheet", January 2021,
+ <https://www.conviva.com/datasheets/precision-delivery-
+ intelligence/>.
+
+ [FARRELL-ETM]
+ Farrell, S., "We're gonna need a bigger threat model",
+ Work in Progress, Internet-Draft, draft-farrell-etm-03, 6
+ July 2019, <https://datatracker.ietf.org/doc/html/draft-
+ farrell-etm-03>.
+
+ [GREASE] Thomson, M., "Long-term Viability of Protocol Extension
+ Mechanisms", Work in Progress, Internet-Draft, draft-iab-
+ use-it-or-lose-it-00, 7 August 2019,
+ <https://datatracker.ietf.org/doc/html/draft-iab-use-it-
+ or-lose-it-00>.
+
+ [IEN-119] Forgie, J., "ST - A Proposed Internet Stream Protocol",
+ September 1979,
+ <https://www.rfc-editor.org/ien/ien119.txt>.
+
+ [INTERNET-THREAT-MODEL]
+ Arkko, J., "Changes in the Internet Threat Model", Work in
+ Progress, Internet-Draft, draft-arkko-arch-internet-
+ threat-model-01, 8 July 2019,
+ <https://datatracker.ietf.org/doc/html/draft-arkko-arch-
+ internet-threat-model-01>.
+
+ [INTSERV-MULTIPLE-TSPEC]
+ Polk, J. and S. Dhesikan, "Integrated Services (IntServ)
+ Extension to Allow Signaling of Multiple Traffic
+ Specifications and Multiple Flow Specifications in
+ RSVPv1", Work in Progress, Internet-Draft, draft-ietf-
+ tsvwg-intserv-multiple-tspec-02, 25 February 2013,
+ <https://datatracker.ietf.org/doc/html/draft-ietf-tsvwg-
+ intserv-multiple-tspec-02>.
+
+ [ITAT] "IAB Workshop on Internet Technology Adoption and
+ Transition (ITAT) 2013", December 2013,
+ <https://www.iab.org/activities/workshops/itat/>.
+
+ [model-t] "Model-t -- Discussions of changes in Internet deployment
+ patterns and their impact on the Internet threat model",
+ model-t mailing list,
+ <https://www.iab.org/mailman/listinfo/model-t>.
+
+ [MOPS-109-Min]
+ "Media Operations Working Group - IETF 109 Minutes",
+ November 2020,
+ <https://datatracker.ietf.org/meeting/109/materials/
+ minutes-109-mops-00>.
+
+ [MP-TCP] "Multipath TCP Working Group Home Page",
+ <https://datatracker.ietf.org/wg/mptcp/>.
+
+ [NANOG-35] "NANOG 35 Agenda", North American Network Operators' Group
+ (NANOG), October 2005,
+ <https://archive.nanog.org/meetings/nanog35/agenda>.
+
+ [NSIS-CHARTER-2001]
+ "Next Steps In Signaling Working Group Charter", March
+ 2011,
+ <https://datatracker.ietf.org/doc/charter-ietf-nsis/>.
+
+ [PANRG] "Path Aware Networking Research Group Home Page",
+ <https://irtf.org/panrg>.
+
+ [PANRG-103-Min]
+ "Path Aware Networking Research Group - IETF 103 Minutes",
+ November 2018,
+ <https://datatracker.ietf.org/doc/minutes-103-panrg/>.
+
+ [PANRG-105-Min]
+ "Path Aware Networking Research Group - IETF 105 Minutes",
+ July 2019,
+ <https://datatracker.ietf.org/doc/minutes-105-panrg/>.
+
+ [PANRG-106-Min]
+ "Path Aware Networking Research Group - IETF 106 Minutes",
+ November 2019,
+ <https://datatracker.ietf.org/doc/minutes-106-panrg/>.
+
+ [PANRG-110]
+ "Path Aware Networking Research Group - IETF 110", March
+ 2021,
+ <https://datatracker.ietf.org/meeting/110/session/panrg>.
+
+ [PANRG-99] "Path Aware Networking Research Group - IETF 99", July
+ 2017,
+ <https://datatracker.ietf.org/meeting/99/session/panrg>.
+
+ [PANRG-PATH-PROPERTIES]
+ Enghardt, T. and C. Krähenbühl, "A Vocabulary of Path
+ Properties", Work in Progress, Internet-Draft, draft-irtf-
+ panrg-path-properties-02, 22 February 2021,
+ <https://datatracker.ietf.org/doc/html/draft-irtf-panrg-
+ path-properties-02>.
+
+ [PANRG-QUESTIONS]
+ Trammell, B., "Current Open Questions in Path Aware
+ Networking", Work in Progress, Internet-Draft, draft-irtf-
+ panrg-questions-09, 16 April 2021,
+ <https://datatracker.ietf.org/doc/html/draft-irtf-panrg-
+ questions-09>.
+
+ [PATH-Decade]
+ Bonaventure, O., "A Decade of Path Awareness", July 2017,
+ <https://datatracker.ietf.org/doc/slides-99-panrg-a-
+ decade-of-path-awareness/>.
+
+ [QS-SAT] Secchi, R., Sathiaseelan, A., Potortì, F., Gotta, A., and
+ G. Fairhurst, "Using Quick-Start to enhance TCP-friendly
+ rate control performance in bidirectional satellite
+ networks", DOI 10.1002/sat.929, May 2009,
+ <https://dl.acm.org/citation.cfm?id=3160304.3160305>.
+
+ [RFC0791] Postel, J., "Internet Protocol", STD 5, RFC 791,
+ DOI 10.17487/RFC0791, September 1981,
+ <https://www.rfc-editor.org/info/rfc791>.
+
+ [RFC0792] Postel, J., "Internet Control Message Protocol", STD 5,
+ RFC 792, DOI 10.17487/RFC0792, September 1981,
+ <https://www.rfc-editor.org/info/rfc792>.
+
+ [RFC0793] Postel, J., "Transmission Control Protocol", STD 7,
+ RFC 793, DOI 10.17487/RFC0793, September 1981,
+ <https://www.rfc-editor.org/info/rfc793>.
+
+ [RFC1016] Prue, W. and J. Postel, "Something a Host Could Do with
+ Source Quench: The Source Quench Introduced Delay
+ (SQuID)", RFC 1016, DOI 10.17487/RFC1016, July 1987,
+ <https://www.rfc-editor.org/info/rfc1016>.
+
+ [RFC1122] Braden, R., Ed., "Requirements for Internet Hosts -
+ Communication Layers", STD 3, RFC 1122,
+ DOI 10.17487/RFC1122, October 1989,
+ <https://www.rfc-editor.org/info/rfc1122>.
+
+ [RFC1190] Topolcic, C., "Experimental Internet Stream Protocol:
+ Version 2 (ST-II)", RFC 1190, DOI 10.17487/RFC1190,
+ October 1990, <https://www.rfc-editor.org/info/rfc1190>.
+
+ [RFC1633] Braden, R., Clark, D., and S. Shenker, "Integrated
+ Services in the Internet Architecture: an Overview",
+ RFC 1633, DOI 10.17487/RFC1633, June 1994,
+ <https://www.rfc-editor.org/info/rfc1633>.
+
+ [RFC1809] Partridge, C., "Using the Flow Label Field in IPv6",
+ RFC 1809, DOI 10.17487/RFC1809, June 1995,
+ <https://www.rfc-editor.org/info/rfc1809>.
+
+ [RFC1819] Delgrossi, L., Ed. and L. Berger, Ed., "Internet Stream
+ Protocol Version 2 (ST2) Protocol Specification - Version
+ ST2+", RFC 1819, DOI 10.17487/RFC1819, August 1995,
+ <https://www.rfc-editor.org/info/rfc1819>.
+
+ [RFC1887] Rekhter, Y., Ed. and T. Li, Ed., "An Architecture for IPv6
+ Unicast Address Allocation", RFC 1887,
+ DOI 10.17487/RFC1887, December 1995,
+ <https://www.rfc-editor.org/info/rfc1887>.
+
+ [RFC2001] Stevens, W., "TCP Slow Start, Congestion Avoidance, Fast
+ Retransmit, and Fast Recovery Algorithms", RFC 2001,
+ DOI 10.17487/RFC2001, January 1997,
+ <https://www.rfc-editor.org/info/rfc2001>.
+
+ [RFC2205] Braden, R., Ed., Zhang, L., Berson, S., Herzog, S., and S.
+ Jamin, "Resource ReSerVation Protocol (RSVP) -- Version 1
+ Functional Specification", RFC 2205, DOI 10.17487/RFC2205,
+ September 1997, <https://www.rfc-editor.org/info/rfc2205>.
+
+ [RFC2210] Wroclawski, J., "The Use of RSVP with IETF Integrated
+ Services", RFC 2210, DOI 10.17487/RFC2210, September 1997,
+ <https://www.rfc-editor.org/info/rfc2210>.
+
+ [RFC2211] Wroclawski, J., "Specification of the Controlled-Load
+ Network Element Service", RFC 2211, DOI 10.17487/RFC2211,
+ September 1997, <https://www.rfc-editor.org/info/rfc2211>.
+
+ [RFC2212] Shenker, S., Partridge, C., and R. Guerin, "Specification
+ of Guaranteed Quality of Service", RFC 2212,
+ DOI 10.17487/RFC2212, September 1997,
+ <https://www.rfc-editor.org/info/rfc2212>.
+
+ [RFC2215] Shenker, S. and J. Wroclawski, "General Characterization
+ Parameters for Integrated Service Network Elements",
+ RFC 2215, DOI 10.17487/RFC2215, September 1997,
+ <https://www.rfc-editor.org/info/rfc2215>.
+
+ [RFC2309] Braden, B., Clark, D., Crowcroft, J., Davie, B., Deering,
+ S., Estrin, D., Floyd, S., Jacobson, V., Minshall, G.,
+ Partridge, C., Peterson, L., Ramakrishnan, K., Shenker,
+ S., Wroclawski, J., and L. Zhang, "Recommendations on
+ Queue Management and Congestion Avoidance in the
+ Internet", RFC 2309, DOI 10.17487/RFC2309, April 1998,
+ <https://www.rfc-editor.org/info/rfc2309>.
+
+ [RFC2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6
+ (IPv6) Specification", RFC 2460, DOI 10.17487/RFC2460,
+ December 1998, <https://www.rfc-editor.org/info/rfc2460>.
+
+ [RFC2475] Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z.,
+ and W. Weiss, "An Architecture for Differentiated
+ Services", RFC 2475, DOI 10.17487/RFC2475, December 1998,
+ <https://www.rfc-editor.org/info/rfc2475>.
+
+ [RFC2481] Ramakrishnan, K. and S. Floyd, "A Proposal to add Explicit
+ Congestion Notification (ECN) to IP", RFC 2481,
+ DOI 10.17487/RFC2481, January 1999,
+ <https://www.rfc-editor.org/info/rfc2481>.
+
+ [RFC3168] Ramakrishnan, K., Floyd, S., and D. Black, "The Addition
+ of Explicit Congestion Notification (ECN) to IP",
+ RFC 3168, DOI 10.17487/RFC3168, September 2001,
+ <https://www.rfc-editor.org/info/rfc3168>.
+
+ [RFC3697] Rajahalme, J., Conta, A., Carpenter, B., and S. Deering,
+ "IPv6 Flow Label Specification", RFC 3697,
+ DOI 10.17487/RFC3697, March 2004,
+ <https://www.rfc-editor.org/info/rfc3697>.
+
+ [RFC4094] Manner, J. and X. Fu, "Analysis of Existing Quality-of-
+ Service Signaling Protocols", RFC 4094,
+ DOI 10.17487/RFC4094, May 2005,
+ <https://www.rfc-editor.org/info/rfc4094>.
+
+ [RFC4443] Conta, A., Deering, S., and M. Gupta, Ed., "Internet
+ Control Message Protocol (ICMPv6) for the Internet
+ Protocol Version 6 (IPv6) Specification", STD 89,
+ RFC 4443, DOI 10.17487/RFC4443, March 2006,
+ <https://www.rfc-editor.org/info/rfc4443>.
+
+ [RFC4782] Floyd, S., Allman, M., Jain, A., and P. Sarolahti, "Quick-
+ Start for TCP and IP", RFC 4782, DOI 10.17487/RFC4782,
+ January 2007, <https://www.rfc-editor.org/info/rfc4782>.
+
+ [RFC5082] Gill, V., Heasley, J., Meyer, D., Savola, P., Ed., and C.
+ Pignataro, "The Generalized TTL Security Mechanism
+ (GTSM)", RFC 5082, DOI 10.17487/RFC5082, October 2007,
+ <https://www.rfc-editor.org/info/rfc5082>.
+
+ [RFC5218] Thaler, D. and B. Aboba, "What Makes for a Successful
+ Protocol?", RFC 5218, DOI 10.17487/RFC5218, July 2008,
+ <https://www.rfc-editor.org/info/rfc5218>.
+
+ [RFC5533] Nordmark, E. and M. Bagnulo, "Shim6: Level 3 Multihoming
+ Shim Protocol for IPv6", RFC 5533, DOI 10.17487/RFC5533,
+ June 2009, <https://www.rfc-editor.org/info/rfc5533>.
+
+ [RFC5575] Marques, P., Sheth, N., Raszuk, R., Greene, B., Mauch, J.,
+ and D. McPherson, "Dissemination of Flow Specification
+ Rules", RFC 5575, DOI 10.17487/RFC5575, August 2009,
+ <https://www.rfc-editor.org/info/rfc5575>.
+
+ [RFC5681] Allman, M., Paxson, V., and E. Blanton, "TCP Congestion
+ Control", RFC 5681, DOI 10.17487/RFC5681, September 2009,
+ <https://www.rfc-editor.org/info/rfc5681>.
+
+ [RFC5971] Schulzrinne, H. and R. Hancock, "GIST: General Internet
+ Signalling Transport", RFC 5971, DOI 10.17487/RFC5971,
+ October 2010, <https://www.rfc-editor.org/info/rfc5971>.
+
+ [RFC5973] Stiemerling, M., Tschofenig, H., Aoun, C., and E. Davies,
+ "NAT/Firewall NSIS Signaling Layer Protocol (NSLP)",
+ RFC 5973, DOI 10.17487/RFC5973, October 2010,
+ <https://www.rfc-editor.org/info/rfc5973>.
+
+ [RFC5974] Manner, J., Karagiannis, G., and A. McDonald, "NSIS
+ Signaling Layer Protocol (NSLP) for Quality-of-Service
+ Signaling", RFC 5974, DOI 10.17487/RFC5974, October 2010,
+ <https://www.rfc-editor.org/info/rfc5974>.
+
+ [RFC5981] Manner, J., Stiemerling, M., Tschofenig, H., and R. Bless,
+ Ed., "Authorization for NSIS Signaling Layer Protocols",
+ RFC 5981, DOI 10.17487/RFC5981, February 2011,
+ <https://www.rfc-editor.org/info/rfc5981>.
+
+ [RFC6294] Hu, Q. and B. Carpenter, "Survey of Proposed Use Cases for
+ the IPv6 Flow Label", RFC 6294, DOI 10.17487/RFC6294, June
+ 2011, <https://www.rfc-editor.org/info/rfc6294>.
+
+ [RFC6398] Le Faucheur, F., Ed., "IP Router Alert Considerations and
+ Usage", BCP 168, RFC 6398, DOI 10.17487/RFC6398, October
+ 2011, <https://www.rfc-editor.org/info/rfc6398>.
+
+ [RFC6437] Amante, S., Carpenter, B., Jiang, S., and J. Rajahalme,
+ "IPv6 Flow Label Specification", RFC 6437,
+ DOI 10.17487/RFC6437, November 2011,
+ <https://www.rfc-editor.org/info/rfc6437>.
+
+ [RFC6438] Carpenter, B. and S. Amante, "Using the IPv6 Flow Label
+ for Equal Cost Multipath Routing and Link Aggregation in
+ Tunnels", RFC 6438, DOI 10.17487/RFC6438, November 2011,
+ <https://www.rfc-editor.org/info/rfc6438>.
+
+ [RFC6633] Gont, F., "Deprecation of ICMP Source Quench Messages",
+ RFC 6633, DOI 10.17487/RFC6633, May 2012,
+ <https://www.rfc-editor.org/info/rfc6633>.
+
+ [RFC6928] Chu, J., Dukkipati, N., Cheng, Y., and M. Mathis,
+ "Increasing TCP's Initial Window", RFC 6928,
+ DOI 10.17487/RFC6928, April 2013,
+ <https://www.rfc-editor.org/info/rfc6928>.
+
+ [RFC7305] Lear, E., Ed., "Report from the IAB Workshop on Internet
+ Technology Adoption and Transition (ITAT)", RFC 7305,
+ DOI 10.17487/RFC7305, July 2014,
+ <https://www.rfc-editor.org/info/rfc7305>.
+
+ [RFC7418] Dawkins, S., Ed., "An IRTF Primer for IETF Participants",
+ RFC 7418, DOI 10.17487/RFC7418, December 2014,
+ <https://www.rfc-editor.org/info/rfc7418>.
+
+ [RFC8085] Eggert, L., Fairhurst, G., and G. Shepherd, "UDP Usage
+ Guidelines", BCP 145, RFC 8085, DOI 10.17487/RFC8085,
+ March 2017, <https://www.rfc-editor.org/info/rfc8085>.
+
+ [RFC8170] Thaler, D., Ed., "Planning for Protocol Adoption and
+ Subsequent Transitions", RFC 8170, DOI 10.17487/RFC8170,
+ May 2017, <https://www.rfc-editor.org/info/rfc8170>.
+
+ [RFC8655] Finn, N., Thubert, P., Varga, B., and J. Farkas,
+ "Deterministic Networking Architecture", RFC 8655,
+ DOI 10.17487/RFC8655, October 2019,
+ <https://www.rfc-editor.org/info/rfc8655>.
+
+ [RFC8793] Wissingh, B., Wood, C., Afanasyev, A., Zhang, L., Oran,
+ D., and C. Tschudin, "Information-Centric Networking
+ (ICN): Content-Centric Networking (CCNx) and Named Data
+ Networking (NDN) Terminology", RFC 8793,
+ DOI 10.17487/RFC8793, June 2020,
+ <https://www.rfc-editor.org/info/rfc8793>.
+
+ [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
+ Multiplexed and Secure Transport", RFC 9000,
+ DOI 10.17487/RFC9000, May 2021,
+ <https://www.rfc-editor.org/info/rfc9000>.
+
+ [SAAG-105-Min]
+ "Security Area Open Meeting - IETF 105 Minutes", July
+ 2019, <https://datatracker.ietf.org/meeting/105/materials/
+ minutes-105-saag-00>.
+
+ [SAF07] Sarolahti, P., Allman, M., and S. Floyd, "Determining an
+ appropriate sending rate over an underutilized network
+ path", Computer Networks: The International Journal of
+ Computer and Telecommunications Networking, Volume 51,
+ Number 7, DOI 10.1016/j.comnet.2006.11.006, May 2007,
+ <https://dl.acm.org/doi/10.1016/j.comnet.2006.11.006>.
+
+ [SallyFloyd]
+ Floyd, S., "ECN (Explicit Congestion Notification) in TCP/
+ IP", June 2009, <https://www.icir.org/floyd/ecn.html>.
+
+ [Sch11] Scharf, M., "Fast Startup Internet Congestion Control for
+ Broadband Interactive Applications", Ph.D. Thesis,
+ University of Stuttgart, April 2011.
+
+ [Shim6-35] Meyer, D., Huston, G., Schiller, J., and V. Gill, "IAB
+ IPv6 Multihoming Panel at NANOG 35", North American
+ Network Operators' Group (NANOG), October 2005,
+ <https://www.youtube.com/watch?v=ji6Y_rYHAQs>.
+
+ [TRIGTRAN-55]
+ "Triggers for Transport BOF at IETF 55", November 2002,
+ <https://www.ietf.org/proceedings/55/239.htm>.
+
+ [TRIGTRAN-56]
+ "Triggers for Transport BOF at IETF 56", March 2003,
+ <https://www.ietf.org/proceedings/56/251.htm>.
+
+ [vista-impl]
+ Sridharan, M., Bansal, D., and D. Thaler, "Implementation
+ Report on Experiences with Various TCP RFCs", March 2007,
+ <https://www.ietf.org/proceedings/68/slides/tsvarea-3/
+ sld1.htm>.
+
+Acknowledgments
+
+ Initial material for Section 6.1 on ST2 was provided by Gorry
+ Fairhurst.
+
+ Initial material for Section 6.2 on IntServ was provided by Ron
+ Bonica.
+
+ Initial material for Section 6.3 on Quick-Start TCP was provided by
+ Michael Scharf, who also provided suggestions to improve this section
+ after it was edited.
+
+ Initial material for Section 6.4 on ICMP Source Quench was provided
+ by Gorry Fairhurst.
+
+ Initial material for Section 6.5 on Triggers for Transport (TRIGTRAN)
+ was provided by Spencer Dawkins.
+
+ Section 6.6 on Shim6 builds on initial material describing obstacles,
+ which was provided by Erik Nordmark, with background added by Spencer
+ Dawkins.
+
+ Initial material for Section 6.7 on Next Steps in Signaling (NSIS)
+ was provided by Roland Bless and Martin Stiemerling.
+
+ Initial material for Section 6.8 on IPv6 Flow Labels was provided by
+ Gorry Fairhurst.
+
+ Initial material for Section 6.9 on Explicit Congestion Notification
+ was provided by Spencer Dawkins.
+
+ Our thanks to Adrian Farrel, Bob Briscoe, C.M. Heard, David Black,
+ Eric Kinnear, Erik Auerswald, Gorry Fairhurst, Jake Holland, Joe
+ Touch, Joeri de Ruiter, Kireeti Kompella, Mohamed Boucadair, Randy
+ Presuhn, Roland Bless, Ruediger Geib, Theresa Enghardt, and Wes Eddy,
+ who provided review comments on this document as a "work in process".
+
+ Mallory Knodel reviewed this document for the Internet Research
+ Steering Group and provided many helpful suggestions.
+
+ David Oran also provided helpful comments and text suggestions on
+ this document during Internet Research Steering Group balloting. In
+ particular, Section 5 reflects his review.
+
+ Benjamin Kaduk, Martin Duke, and Rob Wilton provided helpful comments
+ during Internet Engineering Steering Group conflict review.
+
+ Special thanks to Adrian Farrel for helping Spencer navigate the
+ twisty little passages of Flow Specs and Filter Specs in IntServ,
+ RSVP, MPLS, and BGP. They are all alike, except when they are
+ different [Colossal-Cave].
+
+Author's Address
+
+ Spencer Dawkins (editor)
+ Tencent America
+ United States of America
+
+ Email: spencerdawkins.ietf@gmail.com