<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-iab-path-signals-collaboration-00" category="info">

  <front>
    <title abbrev="Path Signals Collab">Considerations on Application - Network Collaboration Using Path Signals</title>

    <author initials="J." surname="Arkko" fullname="Jari Arkko">
      <organization>Ericsson</organization>
      <address>
        <email>jari.arkko@ericsson.com</email>
      </address>
    </author>
    <author initials="T." surname="Hardie" fullname="Ted Hardie">
      <organization>Cisco</organization>
      <address>
        <email>ted.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Kühlewind" fullname="Mirja Kühlewind">
      <organization>Ericsson</organization>
      <address>
        <email>mirja.kuehlewind@ericsson.com</email>
      </address>
    </author>

    <date year="2022" month="March" day="07"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document discusses principles for designing mechanisms that use or provide
path signals, and calls for standards action in specific valuable cases.
RFC 8558 describes path signals as messages to or from on-path elements,
and points out that visible information will be used whether it is
intended as a signal or not. The principles in this document are intended as
guidance for the design of explicit path signals, which are encouraged to be 
authenticated and include
a minimal set of parties and minimize information sharing. These principles can
be achieved through mechanisms like encryption of information and
establishing trust relationships between entities on a path.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>RFC 8558 defines the term “path signals” as signals to or from on-path
elements. Today path signals are often implicit, e.g. derived from
cleartext end-to-end information by e.g. examining transport
protocols. For instance, on-path elements use various fields of the
TCP header <xref target="RFC0793"/> to derive information about end-to-end latency
as well as congestion.  These techniques have evolved because the
information was available and its use required no coordination with
anyone. This made such techniques more easily deployed than
alternative, potentially more explicit or cooperative approaches. Such
techniques had some drawbacks as well, such as having to interpret
information designed to be carried for another purpose.</t>

<t>Today, applications and networks have often evolved their interaction
without comprehensive design for how this interaction should
happen or which information would be desired for a certain function.
This has lead to a situation where sometimes information is used that
maybe incomplete, incorrect, or only indirectly representative of the 
information that was actually desired. In addition, dependencies on
information and mechanisms that were designed for a different function
limits the evolvability of the protocols in question.</t>

<t>The unplanned interaction ends up having several negative effects:</t>

<t><list style="symbols">
  <t>Ossifying protocols by introducing unintended parties that may not be updating</t>
  <t>Creating systemic incentives against deploying more secure or otherwise updated versions of protocols</t>
  <t>Basing network behaviour on information that may be incomplete or incorrect</t>
  <t>Creating a model where network entities expect to be able to use
rich information about sessions passing through</t>
</list></t>

<t>For instance, features such as DNS resolution or TLS setup have been
used beyond their original intent, such as in name-based
filtering. MAC addresses have been used for access control, captive
portal implementations that employ taking over cleartext HTTP
sessions, and so on.</t>

<t>A large number of protocol mechanisms today fall into one of two
categories: authenticated and private communication that is only visible
to the a very limited set nodes, often one on each “end”; and unauthenticated
public communication that is visible to all nodes on a path.</t>

<t>Exposed information encourages pervasive monitoring, which is
described in RFC 7258 <xref target="RFC7258"/>, and may also be
used for commercial purposes, or form a basis for filtering that the
applications or users do not desire.
But a lack of all path signaling, on the other hand, may be harmful to
network management, debugging, or the ability for networks to provide
the most efficient services. There are many cases where elements on
the network path can provide beneficial services, but only if they can
coordinate with the endpoints. It also affects the ability of service providers
and others to observe why problems occur <xref target="RFC9075"/>.</t>

<t>As such, this situation is sometimes cast as an adversarial tradeoff
between privacy and the ability for the network path to provide
intended functions. However, this is perhaps an unnecessarily
polarized characterization as a zero-sum situation. Not all
information passing implies loss of privacy. For instance, performance
information or preferences do not require disclosing the content being accessed,
the user identity, or the application in use. Similarly, network
congestion status information does not have reveal network topology or
the status of other users, and so on.</t>

<t>Increased deployment of encryption is changing this situation.
Encryption provides tools for controling information access 
and protects again ossification by avoiding
unintended dependencies and requiring active maintenance.</t>

<t>The increased
deployment of encryption provides an opportunity to reconsider parts of
Internet architecture that have used implicit derivation of input
signals for on-path functions rather than explicit signaling, as recommended
by RFC 8558 <xref target="RFC8558"/>.</t>

<t>For instance, QUIC replaces TCP for various applications and ensures end-to-end
signals are only be accessible by the endpoints, ensuring evolvability <xref target="RFC9000"/>. 
QUIC does expose information dedicated for on-path elements to consume
by using explicit signals for specific use cases, such as the Spin bit
for latency measurements or connection ID that can be used by 
load balancers <xref target="I-D.ietf-quic-manageability"/>. This information
is accessible by all on-path devices but information is limited
to only those use cases. Each new use case requires additional action.
This points to one way to resolve the adversity: the careful design
of what information is passed.</t>

<t>Another extreme is to employ explicit trust and coordination between
all involved entities, endpoints as well as network devices.
VPNs are a good example of a case where
there is an explicit authentication and negotiation with a network
path element that is used to optimize behavior or gain access to
specific resources. Authentication and trust must be considered in
multiple directions: how endpoints trust and authenticate signals
from network devices, and how network devices trust and authenticate
signals from endpoints.</t>

<t>The goal of improving privacy and trust on the Internet does not necessarily
need to remove the ability for network elements to perform beneficial
functions. We should instead improve the way that these functions are
achieved and design new protocols to support explicit collaboration where it
is seen as beneficial. As such our goals should be:</t>

<t><list style="symbols">
  <t>To ensure that information is distributed intentionally, not accidentally;</t>
  <t>to understand the privacy and other implications of any distributed information;</t>
  <t>to ensure that the information distribution is limited the intended parties; and</t>
  <t>to gate the distribution of information on the participation of the relevant parties</t>
</list></t>

<t>These goals for exposure and distribution apply equally to senders, receivers,
and path elements.</t>

<t>Going forward, new standards work in the IETF needs to focus on
addressing this gap by providing better alternatives and mechanisms
for building functions that require some collaboration between
endpoints and path elements.</t>

<t>We can establish some basic questions that any new network functions
should consider:</t>

<t><list style="symbols">
  <t>What is the minimum set of entities that need to be involved?</t>
  <t>What is the minimum information each entity in this set needs?</t>
  <t>Which entities must consent to the information exchange?</t>
  <t>What is the effect that new signals should have?</t>
</list></t>

<t>If we look at many of the ways network functions are achieved today, we
find that many if not most of them fall short the standard set up by the
questions above. Too often, they send unnecessary information or fail to
limit the scope of distribution or providing any negotiation or consent.</t>

<t>Designing explicit signals between applications and network elements,
and ensuring that all other information is appropriately protected,
enables information exchange in both directions that is important
for improving the quality of experience and network management.
This kind of cleanly separated architecture is also more conducive
to protocol evolvability.</t>

<t>This draft discusses different approaches for explicit collaboration
and provides guidance on architectural principles to design new
mechanisms. <xref target="principles"/> discusses
principles that good design can follow. This section also provides
some examples and explanation of situations that not following the
principles can lead to. <xref target="research"/> points to topics that need more
to be looked at more carefully before any guidance can be given.</t>

<t>Beyond the recommandation in <xref target="RFC8558"/>, the IAB has provided further
guidance on protocol design.  Among other documents, <xref target="RFC5218"/> provides general advice
on incremental deployability based on an analysis of successes and failures
and <xref target="RFC6709"/> discusses protocol extensibility. The Internet Technology
Adoption and Transition (ITAT) workshop report <xref target="RFC7305"/> is also recommended
reading on this same general topic. <xref target="RFC9049"/>, an IRTF document, provides
a catalogue of past issues to avoid and discusses incentives for adoption of
path signals such as the need for outperforming end-to-end mechanisms or
considering per-connection state.</t>

</section>
<section anchor="principles" title="Principles">

<t>This section provides architecture-level principles for protocol designers
and recommends models to apply for network collaboration and signaling.</t>

<t>While RFC 8558 <xref target="RFC8558"/> focused specifically on “on-path elements”,
the principles described in this document can be applied both to
on-path signalling and signalling with other elements in the network
that are not directly on-path, but still influence end-to-end connections.
An example of on-path signalling is communication between an endpoint
and a router on a network path. An example of signalling with another
network element is communication between an endpoint and a network-assigned
DNS server, firewall controller, or captive portal API server.</t>

<t>Taken together, these principles focus on the inherent privacy and security
concerns of sharing information between endpoints and network elements,
emphasizing that careful scrutiny and a high bar of consent and trust
need to be applied.</t>

<section anchor="intentional-distribution" title="Intentional Distribution">

<t>This guideline is best expressed in RFC 8558:</t>

<t>“Fundamentally, this document recommends that implicit signals
   should be avoided and that an implicit signal should be replaced
   with an explicit signal only when the signal’s originator intends
   that it be used by the network elements on the path.  For many
   flows, this may result in the signal being absent but allows it to
   be present when needed.”</t>

<t>This guideline applies in the other direction as well.
For instance, a network element should not unintentionally leak
information that is not visible to endpoints. An explicit decision is
needed for a specific information to be provided, along with analysis
of the security and privacy implications of that information.</t>

</section>
<section anchor="minimum-set-of-entities" title="Minimum Set of Entities">

<t>It is recommended that a design identifies the minimum number of
entities needed to share a specific signal required for an identified
function.</t>

<t>Often this will be a very limited set, such as when an application
only needs to provide a signal to its peer at the other end of the
connection or a host needs to contact a specific VPN gateway. In
other cases a broader set is neeeded, such as when explicit or
implicit signals from a potentially unknown set of multiple routers
along the path inform the endpoints about congestion.</t>

<t>While it is tempting to consider removing these limitations in the
context of closed, private networks, each interaction is still best
considered separately, rather than simply allowing all information
exchanges within the closed network.  Even in a closed network with
carefully managed elements there may be compromised components, as
evidenced in the most extreme way by the Stuxnet worm that operated in
an airgapped network.  Most “closed” networks have at least some needs
and means to access the rest of the Internet, and should not be
modeled as if they had an impenetrable security barrier.</t>

</section>
<section anchor="control-of-the-distribution-of-information" title="Control of the Distribution of Information">

<t>Trust and mutual agreement between the involved entities must determine
the distribution of information, in order to give adequate control to 
each entity over the collaboration or information sharing.</t>

<t>The sender needs to agree to sending the information.
Any passing of information or request for an action needs to be explicit,
and use protocol mechanisms that are designed for the purpose.
Merely sending a particular kind of packet to a destination should not
be interpreted as an implicit agreement.</t>

<t>At the same time, the recipient of information or the target of a
request should agree to receiving the information. It
should not be burdened with extra processing if it does not have
willigness or a need to do so. This happens naturally in most
protocol designs, but has been a problem for some cases where
“slow path” packet processing is required or implied, and the
recipient or router is not willing to handle this.</t>

<t>In both cases, all involved entities must be identified and
potentially authenticated if trust is required as a prerequisite
to share certain information.</t>

<t>Many Internet communications are not performed on behalf of the applications, but are
ultimately made on behalf of users. However, not all information
that may be shared directly relates to user actions or other
senstive data. All information shared must be evaluated carefully
to identify potential privacy implications for users. Information that
directly relates to the user should not be shared without the user’s
consent. It should be noted that the interests of the user and
other parties, such as the application developer, may not always coincide;
some applications may wish to collect more information about
the user than the user would like. How to achieve a
balance of control between the actual user and an application
representing an user’s interest is out of scope for this document.</t>

</section>
<section anchor="minimize-info" title="Minimize Information">

<t>Each party should provide only the information that is needed for the
other parties to perform the task for which collaboration is desired,
and no more. This applies to information sent by an
application about itself, information sent about users, or information
sent by the network.</t>

<t>An architecture can follow the guideline from RFC 8558 in using
explicit signals, but still fail to differentiate properly between
information that should be kept private and information that should be
shared.</t>

<t>In looking at what information can or cannot easily be passed, we
need to consider both, information from the network to the application
and from the application to the network.</t>

<t>For the application to the network direction, user-identifying
information can be problematic for privacy and tracking reasons.
Similarly, application identity can be problematic, if it might form
the basis for prioritization or discrimination that the
application provider may not wish to happen.</t>

<t>On the other hand, as noted above, information about general classes
of applications may be desirable to be given by application providers,
if it enables prioritization that would improve service, e.g.,
differentiation between interactive and non-interactive services.</t>

<t>For the network to application direction there is similarly sensitive
information, such as the precise location of the user.  On the other
hand, various generic network conditions, predictive bandwidth and
latency capabilities, and so on might be attractive information that
applications can use to determine, for instance, optimal strategies
for changing codecs. However, information given by the network about
load conditions and so on should not form a mechanism to provide a
side-channel into what other users are doing.</t>

<t>While information needs to be specific and provided on a per-need
basis, it is often beneficial to provide declarative information that,
for instance, expresses application needs than makes specific requests
for action.</t>

</section>
<section anchor="carrying-information" title="Carrying Information">

<t>There is a distinction between what information is passed and how it
is carried. The actually sent information may be limited, while the
mechanisms for sending or requesting information can be capable of
sending much more.</t>

<t>There is a tradeoff here between flexibility and ensuring the
minimality of information in the future. The concern is that a fully
generic data sharing approach between different layers and parties
could potentially be misused, e.g., by making the availability of some
information a requirement for passing through a network. This is
undesirable.</t>

<t>This document recommends that the protocols that carry information
are specific to the type of information that is needed to carry the
minimal set of information (see <xref target="minimize-info"/>) and can
establish sufficient trust to pass that information (see <xref target="auth"/>).</t>

</section>
<section anchor="auth" title="Protecting Information and Authentication">

<t>Some simple forms of information often exist in cleartext
form, e.g, ECN bits from routers are generally not authenticated
or integrity protected. This is possible when the information
exchanges do not carry any significantly sensitive information
from the parties. Often these kind of interations are also advisory
in their nature (see also section {#impact}).</t>

<t>In other cases it may be necessary to establish a secure
channel for communication with a specific other party, e.g.,
between a network element and an application. This channel
may need to be authenticated, integrity protected and confidential.
This is necessary, for instance, if the particular information or
request needs to be share in confidence only with a particular,
trusted node, or there’s a danger of an attack where someone else
may forge messages that could endanger the communication.</t>

<t>Authenticated integrity protections on signalled data can help
ensure that data received in a signal has not been modified by
other parties, but both network elements and endpoints need to
be careful in processing or responding to any signal. Whether
through bugs or attacks, the content of path signals can lead
to unexpected behaviors or security vulernabilities if not
properly handled.</t>

<t>However, it is important to note that authentication does not equal
trust. Whether a communication is with an application server or
network element that can be shown to be associated with a particular
domain name, it does not follow that information about the user can be
safely sent to it.</t>

<t>In some cases, the ability of a party to show that it is on the path
can be beneficial. For instance, an ICMP error that refers to a valid
flow may be more trustworthy than any ICMP error claiming to come from
an address.</t>

<t>Other cases may require more substantial assurances. For instance,
a specific trust arrangement may be established between a particular
network and application. Or technologies such as confidential
computing can be applied to provide an assurance that information
processed by a party is handled in an appropriate manner.</t>

</section>
<section anchor="limiting-impact-of-information" title="Limiting Impact of Information">

<t>Information shared between a network element and an endpoint of a
connection needs to have a limited impact on the behavior of both
endpoints and network elements. Any action that an endpoint or
network element takes based on a path signal needs to be considered
appropriately based on the level of authentication and trust that
has been established, and be scoped to a specific network path.</t>

<t>For example, an ICMP signal from a network element to an endpoint can
be used to influence future behavior on that particular network path (such as
changing the effective packet size or closing a path-specific connection),
but should not be able to cause a multipath or migration-capable transport
connection to close.</t>

<t>In many cases, path signals can be considered to be advisory information,
with the effect of optimizing or adjusting the behavior of connections
on a specific path. In the case of a firewall blocking connectivity
to a given host, endpoints should only interpret that as the host being
unavailable on that particular path; this is in contrast to an end-to-end
authenticated signal, such as a DNSSEC-authenticated denial of existence
<xref target="RFC7129"/>.</t>

</section>
</section>
<section anchor="research" title="Further Work">

<t>This is a developing field, and it is expected that our understanding
will continue to grow. Among the recent changes are much higher use
of encryption at different protocol layers and the consolidation of more
and more traffic to the same destinations; these have greatly
impacted the field.</t>

<t>While there are some examples of modern, well-designed collaboration
mechanisms, clearly more work is needed. Many complex cases would
require significant developments in order to become feasible.</t>

<t>Some of the most difficult areas are listed below. Research on these
topics would be welcome.</t>

<t><list style="symbols">
  <t>Business arrangements. Many designs – for instance those related to
quality-of-service – involve an expectation of paying for a
service.  This is possible and has been successful within individual
domains, e.g., users can pay for higher data rates or data caps in
their ISP networks. However, it is a business-wise much harder
proposition for end-to-end connections across multiple
administrative domains <xref target="Claffy2015"/>
<xref target="RFC9049"/>.</t>
  <t>Secure communications with path elements. This has been a difficult
topic, both from the mechanics and scalability point view, but also
because there is no easy way to find out which parties to trust or
what trust roots would be appropriate. Some application-network
element interaction designs have focused on information (such as ECN
bits) that is distributed openly within a path, but there are limited
examples of designs with secure information exchange with specific nodes.</t>
  <t>The use of path signals for reducing the effects of
denial-of-service attacks, e.g., in the form of modern “source
quench” designs.</t>
  <t>Ways of protecting information when held by network elements or
servers, beyond communications security. For instance, host
applications commonly share sensitive information about the user’s
actions with other nodes, starting from basic data such as domain
names learned by DNS infrastructure or source and destination
addresses and protocol header information learned by all routers on
the path, to detailed end user identity and other information
learned by the servers. Some solutions are starting to exist for this
but are not widely deployed,
at least not today <xref target="Oblivious"/> <xref target="PDoT"/>
<xref target="I-D.arkko-dns-confidential"/> <xref target="I-D.thomson-http-oblivious"/>.
These solutions address also very specific parts of the issue,
and more work remains.</t>
  <t>Sharing information from networks to applications. There are some
working examples of this, e.g., ECN. A few other proposals have been
made (see, e.g., <xref target="I-D.flinck-mobile-throughput-guidance"/>), but
very few of those have seen deployment.</t>
  <t>Sharing information from applications to networks. There are a few more
 working examples of this (see <xref target="intro"/>). However, numerous 
 proposals have been made in this space, but most of them have not
 progressed through standards or been deployed, for a variety of
 reasons <xref target="RFC9049"/>. Several current or recent proposals exist,
 however, such as <xref target="I-D.yiakoumis-network-tokens"/>.</t>
  <t>Data privacy regimes generally deal with more issues than merely
whether some information is shared with another party or not. For
instance, there may be rules regarding how long information can be
stored or what purpose information may be used for.  Similar issues
may also be applicable to the kind of information sharing discussed
in this document.</t>
</list></t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>The authors would like to thank everyone at the IETF, the IAB, and our
day jobs for interesting thoughts and proposals in this space.
Fragments of this document were also in
<xref target="I-D.per-app-networking-considerations"/> and
<xref target="I-D.arkko-path-signals-information"/> that were published earlier. We
would also like to acknowledge <xref target="I-D.trammell-stackevo-explicit-coop"/>
for presenting similar thoughts. Finally, the authors would like to
thank Adrian Farrell, Toerless Eckert, Martin Thomson, Mark
Nottingham, Luis M. Contreras, Watson Ladd, Vittorio Bertola, Andrew
Campling, Eliot Lear, Spencer Dawkins, Christian Huitema, and Jeffrey
Haas for useful feedback in the IABOPEN sessions and on the list.</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor="RFC0793" target='https://www.rfc-editor.org/info/rfc793'>
<front>
<title>Transmission Control Protocol</title>
<author initials='J.' surname='Postel' fullname='J. Postel'><organization /></author>
<date year='1981' month='September' />
</front>
<seriesInfo name='STD' value='7'/>
<seriesInfo name='RFC' value='793'/>
<seriesInfo name='DOI' value='10.17487/RFC0793'/>
</reference>



<reference  anchor="RFC5218" target='https://www.rfc-editor.org/info/rfc5218'>
<front>
<title>What Makes for a Successful Protocol?</title>
<author initials='D.' surname='Thaler' fullname='D. Thaler'><organization /></author>
<author initials='B.' surname='Aboba' fullname='B. Aboba'><organization /></author>
<date year='2008' month='July' />
<abstract><t>The Internet community has specified a large number of protocols to date, and these protocols have achieved varying degrees of success. Based on case studies, this document attempts to ascertain factors that contribute to or hinder a protocol's success.  It is hoped that these observations can serve as guidance for future protocol work.  This memo  provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='RFC' value='5218'/>
<seriesInfo name='DOI' value='10.17487/RFC5218'/>
</reference>



<reference  anchor="RFC6709" target='https://www.rfc-editor.org/info/rfc6709'>
<front>
<title>Design Considerations for Protocol Extensions</title>
<author initials='B.' surname='Carpenter' fullname='B. Carpenter'><organization /></author>
<author initials='B.' surname='Aboba' fullname='B. Aboba' role='editor'><organization /></author>
<author initials='S.' surname='Cheshire' fullname='S. Cheshire'><organization /></author>
<date year='2012' month='September' />
<abstract><t>This document discusses architectural issues related to the extensibility of Internet protocols, with a focus on design considerations.  It is intended to assist designers of both base protocols and extensions.  Case studies are included.  A companion document, RFC 4775 (BCP 125), discusses procedures relating to the extensibility of IETF protocols.  This document is not an  Internet Standards Track specification; it is published for informational  purposes.</t></abstract>
</front>
<seriesInfo name='RFC' value='6709'/>
<seriesInfo name='DOI' value='10.17487/RFC6709'/>
</reference>



<reference  anchor="RFC7258" target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='May' />
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference  anchor="RFC7305" target='https://www.rfc-editor.org/info/rfc7305'>
<front>
<title>Report from the IAB Workshop on Internet Technology Adoption and Transition (ITAT)</title>
<author initials='E.' surname='Lear' fullname='E. Lear' role='editor'><organization /></author>
<date year='2014' month='July' />
<abstract><t>This document provides an overview of a workshop held by the Internet Architecture Board (IAB) on Internet Technology Adoption and Transition (ITAT).  The workshop was hosted by the University of Cambridge on December 4th and 5th of 2013 in Cambridge, UK.  The goal of the workshop was to facilitate adoption of Internet protocols, through examination of a variety of economic models, with particular emphasis at the waist of the hourglass (e.g., the middle of the protocol stack).  This report summarizes contributions and discussions.  As the topics were wide ranging, there is no single set of recommendations for IETF participants to pursue at this time. Instead, in the classic sense of early research, the workshop noted areas that deserve further exploration.</t><t>Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t></abstract>
</front>
<seriesInfo name='RFC' value='7305'/>
<seriesInfo name='DOI' value='10.17487/RFC7305'/>
</reference>



<reference  anchor="RFC8558" target='https://www.rfc-editor.org/info/rfc8558'>
<front>
<title>Transport Protocol Path Signals</title>
<author initials='T.' surname='Hardie' fullname='T. Hardie' role='editor'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals.  For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear.  Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements.  In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels.  Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t></abstract>
</front>
<seriesInfo name='RFC' value='8558'/>
<seriesInfo name='DOI' value='10.17487/RFC8558'/>
</reference>



<reference  anchor="RFC9000" target='https://www.rfc-editor.org/info/rfc9000'>
<front>
<title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
<author initials='J.' surname='Iyengar' fullname='J. Iyengar' role='editor'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2021' month='May' />
<abstract><t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t></abstract>
</front>
<seriesInfo name='RFC' value='9000'/>
<seriesInfo name='DOI' value='10.17487/RFC9000'/>
</reference>



<reference  anchor="RFC9049" target='https://www.rfc-editor.org/info/rfc9049'>
<front>
<title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads Not Taken)</title>
<author initials='S.' surname='Dawkins' fullname='S. Dawkins' role='editor'><organization /></author>
<date year='2021' month='June' />
<abstract><t>This document is a product of the Path Aware Networking Research Group (PANRG).  At the first meeting of the PANRG, the Research Group agreed to catalog and analyze past efforts to develop and deploy Path Aware techniques, most of which were unsuccessful or at most partially successful, in order to extract insights and lessons for Path Aware networking researchers.</t><t>This document contains that catalog and analysis.</t></abstract>
</front>
<seriesInfo name='RFC' value='9049'/>
<seriesInfo name='DOI' value='10.17487/RFC9049'/>
</reference>



<reference  anchor="RFC9075" target='https://www.rfc-editor.org/info/rfc9075'>
<front>
<title>Report from the IAB COVID-19 Network Impacts Workshop 2020</title>
<author initials='J.' surname='Arkko' fullname='J. Arkko'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='M.' surname='Kühlewind' fullname='M. Kühlewind'><organization /></author>
<author initials='C.' surname='Perkins' fullname='C. Perkins'><organization /></author>
<date year='2021' month='July' />
<abstract><t>The Coronavirus disease (COVID-19) pandemic caused changes in Internet user behavior, particularly during the introduction of initial quarantine and work-from-home arrangements. These behavior changes drove changes in Internet traffic.</t><t>The Internet Architecture Board (IAB) held a workshop to discuss network impacts of the pandemic on November 9-13, 2020. The workshop was held to convene interested researchers, network operators, network management experts, and Internet technologists to share their experiences. The meeting was held online given the ongoing travel and contact restrictions at that time.</t><t>Note that this document is a report on the proceedings of the workshop.  The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t></abstract>
</front>
<seriesInfo name='RFC' value='9075'/>
<seriesInfo name='DOI' value='10.17487/RFC9075'/>
</reference>


<reference anchor="I-D.ietf-quic-manageability">
   <front>
      <title>Manageability of the QUIC Transport Protocol</title>
      <author fullname="Mirja Kuehlewind">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Brian Trammell">
	 <organization>Google Switzerland GmbH</organization>
      </author>
      <date month="January" day="21" year="2022" />
      <abstract>
	 <t>   This document discusses manageability of the QUIC transport protocol,
   focusing on the implications of QUIC&#39;s design and wire image on
   network operations involving QUIC traffic.  It is intended as a
   &quot;user&#39;s manual&quot; for the wire image, providing guidance for network
   operators and equipment vendors who rely on the use of transport-
   aware network functions.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-quic-manageability-14" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-quic-manageability-14.txt" />
</reference>


<reference anchor="I-D.per-app-networking-considerations">
   <front>
      <title>Per-Application Networking Considerations</title>
      <author fullname="Lorenzo Colitti">
	 <organization>Google</organization>
      </author>
      <author fullname="Tommy Pauly">
	 <organization>Apple Inc.</organization>
      </author>
      <date month="November" day="15" year="2020" />
      <abstract>
	 <t>   This document describes considerations for and implications of using
   application identifiers as a method of differentiating traffic on
   networks.  Specifically, it discusses privacy considerations,
   possible mitigations, and considerations for user experience and API
   design.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tfpauly/per-app-networking-considerations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-per-app-networking-considerations-00" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-per-app-networking-considerations-00.txt" />
</reference>


<reference anchor="I-D.arkko-path-signals-information">
   <front>
      <title>Considerations on Information Passed between Networks and Applications</title>
      <author fullname="Jari Arkko">
	 <organization>Ericsson</organization>
      </author>
      <date month="February" day="22" year="2021" />
      <abstract>
	 <t>   Path signals are messages seen by on-path elements examining
   transport protocols.  Current preference for good protocol design
   indicates desire for constructing explict rather than implicit
   signals to carry information.  For instance, the ability of various
   middleboxes to read TCP messaging was an implicit signal that lead to
   difficulties in evolving the TCP protocol without breaking
   connectivity through some of those middleboxes.

   This document discusses the types of information that could be passed
   in these path signals, and provides some advice on what types of
   information might be provided in a beneficial manner, and which
   information might be less likely to be revealed or used by
   applications or networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-arkko-path-signals-information-00" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-arkko-path-signals-information-00.txt" />
</reference>


<reference anchor="I-D.trammell-stackevo-explicit-coop">
   <front>
      <title>Architectural Considerations for Transport Evolution with Explicit Path Cooperation</title>
      <author fullname="Brian Trammell">
	 </author>
      <date month="September" day="23" year="2015" />
      <abstract>
	 <t>   The IAB Stack Evolution in a Middlebox Internet (SEMI) workshop in
   Zurich in January 2015 and the follow-up Substrate Protocol for User
   Datagrams (SPUD) BoF session at the IETF 92 meeting in Dallas in
   March 2015 identified the potential need for a UDP-based
   encapsulation to allow explicit cooperation with middleboxes while
   using encryption at the transport layer and above to protect user
   payload and metadata from inspection and interference.  This document
   proposes a set of architectural considerations for such approaches.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-trammell-stackevo-explicit-coop-00" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-trammell-stackevo-explicit-coop-00.txt" />
</reference>


<reference anchor="I-D.flinck-mobile-throughput-guidance">
   <front>
      <title>Mobile Throughput Guidance Inband Signaling Protocol</title>
      <author fullname="Ankur Jain">
	 </author>
      <author fullname="Andreas Terzis">
	 </author>
      <author fullname="Hannu Flinck">
	 </author>
      <author fullname="Nurit Sprecher">
	 </author>
      <author fullname="Swaminathan Arunachalam">
	 </author>
      <author fullname="Kevin Smith">
	 </author>
      <author fullname="Vijay Devarapalli">
	 </author>
      <author fullname="Roni Bar Yanai">
	 </author>
      <date month="March" day="13" year="2017" />
      <abstract>
	 <t>   The bandwidth available for end user devices in cellular networks can
   vary by an order of magnitude over a few seconds due to changes in
   the underlying radio channel conditions, as device mobility and
   changes in system load as other devices enter and leave the network.
   Furthermore, packets losses are not always signs of congestion.  The
   Transmission Control Protocol (TCP) can have difficulties adapting to
   these rapidly varying conditions leading to inefficient use of a
   cellular network&#39;s resources and degraded application performance.
   Problem statement, requirements and the architecture for a solution
   is documented in [Req_Arch_MTG_Exposure].

   This document proposes a mechanism and protocol elements that allow
   the cellular network to provide near real-time information on
   capacity available to the TCP server.  This &quot;Throughput Guidance&quot;
   (TG) information would indicate the throughput estimated to be
   available at the radio downlink interface (between the Radio Access
   Network (RAN) and the mobile device (UE)).  TCP server can use this
   TG information to ensure high network utilization and high service
   delivery performance.  The document describes the applicability of
   the proposed mechanism for video delivery over cellular networks; it
   also presents test results from live operator&#39;s environment.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-flinck-mobile-throughput-guidance-04" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-flinck-mobile-throughput-guidance-04.txt" />
</reference>


<reference anchor="I-D.arkko-dns-confidential">
   <front>
      <title>Privacy Improvements for DNS Resolution with Confidential Computing</title>
      <author fullname="Jari Arkko">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Jiri Novotny">
	 <organization>Ericsson</organization>
      </author>
      <date month="July" day="2" year="2021" />
      <abstract>
	 <t>   Data leaks are a serious privacy problem for Internet users.  Data in
   flight and at rest can be protected with traditional communications
   security and data encryption.  Protecting data in use is more
   difficult.  In addition, failure to protect data in use can lead to
   disclosing session or encryption keys needed for protecting data in
   flight or at rest.

   This document discusses the use of Confidential Computing, to reduce
   the risk of leaks from data in use.  Our example use case is in the
   context of DNS resolution services.  The document looks at the
   operational implications of running services in a way that even the
   owner of the service or compute platform cannot access user-specific
   information produced by the resolution process.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-arkko-dns-confidential-02" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-arkko-dns-confidential-02.txt" />
</reference>


<reference anchor="I-D.thomson-http-oblivious">
   <front>
      <title>Oblivious HTTP</title>
      <author fullname="Martin Thomson">
	 <organization>Mozilla</organization>
      </author>
      <author fullname="Christopher A. Wood">
	 <organization>Cloudflare</organization>
      </author>
      <date month="August" day="24" year="2021" />
      <abstract>
	 <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-thomson-http-oblivious-02" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-thomson-http-oblivious-02.txt" />
</reference>


<reference anchor="I-D.yiakoumis-network-tokens">
   <front>
      <title>Network Tokens</title>
      <author fullname="Yiannis Yiakoumis">
	 <organization>Selfie Networks</organization>
      </author>
      <author fullname="Nick McKeown">
	 <organization>Stanford University</organization>
      </author>
      <author fullname="Frode Sorensen">
	 <organization>Norwegian Communications Authority</organization>
      </author>
      <date month="December" day="22" year="2020" />
      <abstract>
	 <t>   Network tokens is a method for endpoints to explicitly and securely
   coordinate with networks about how their traffic is treated.  They
   are inserted by endpoints in existing protocols, interpreted by
   trusted networks, and may be signed or encrypted to meet security and
   privacy requirements.  Network tokens provide a means for network
   operators to expose datapath services (such as a zero-rating service,
   a user-driven QoS service, or a firewall whitelist), and for end
   users and application providers to access such services.  Network
   tokens are inspired and derived by existing security tokens (like JWT
   and CWT), and borrow several of their core ideas along with security
   and privacy properties.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-yiakoumis-network-tokens-02" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-yiakoumis-network-tokens-02.txt" />
</reference>


<reference anchor="Claffy2015" >
  <front>
    <title>Adding Enhanced Services to the Internet: Lessons from History</title>
    <author initials="." surname="kc Claffy">
      <organization></organization>
    </author>
    <author initials="D." surname="Clark">
      <organization></organization>
    </author>
    <date year="2015" month="April"/>
  </front>
  <seriesInfo name="TPRC 43: The 43rd Research Conference on Communication, Information and Internet Policy Paper" value=""/>
</reference>
<reference anchor="Oblivious" >
  <front>
    <title>Oblivious DNS: Practical privacy for DNS queries</title>
    <author initials="P." surname="Schmitt">
      <organization></organization>
    </author>
    <date year="2019"/>
  </front>
  <seriesInfo name="Proceedings on Privacy Enhancing Technologies 2019.2: 228-244" value=""/>
</reference>
<reference anchor="PDoT" >
  <front>
    <title>PDoT: Private DNS-over-TLS with TEE Support</title>
    <author initials="Y." surname="Nakatsuka">
      <organization></organization>
    </author>
    <author initials="A." surname="Paverd">
      <organization></organization>
    </author>
    <author initials="G." surname="Tsudik">
      <organization></organization>
    </author>
    <date year="2021" month="February"/>
  </front>
  <seriesInfo name="Digit. Threat.: Res. Pract., Vol. 2, No. 1, Article 3, https://dl.acm.org/doi/fullHtml/10.1145/3431171" value=""/>
</reference>




<reference  anchor="RFC7129" target='https://www.rfc-editor.org/info/rfc7129'>
<front>
<title>Authenticated Denial of Existence in the DNS</title>
<author initials='R.' surname='Gieben' fullname='R. Gieben'><organization /></author>
<author initials='W.' surname='Mekking' fullname='W. Mekking'><organization /></author>
<date year='2014' month='February' />
<abstract><t>Authenticated denial of existence allows a resolver to validate that a certain domain name does not exist.  It is also used to signal that a domain name exists but does not have the specific resource record (RR) type you were asking for.  When returning a negative DNS Security Extensions (DNSSEC) response, a name server usually includes up to two NSEC records.  With NSEC version 3 (NSEC3), this amount is three.</t><t>This document provides additional background commentary and some context for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticated denial-of-existence responses.</t></abstract>
</front>
<seriesInfo name='RFC' value='7129'/>
<seriesInfo name='DOI' value='10.17487/RFC7129'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

