<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 2.7.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-meynell-panrg-scion-research-questions-00" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="scion-research_I-D">SCION Research Questions</title>
    <seriesInfo name="Internet-Draft" value="draft-meynell-panrg-scion-research-questions-00"/>
    <author initials="K." surname="Meynell" fullname="Kevin Meynell">
      <organization>SCION Association</organization>
      <address>
        <email>kme@scion.org</email>
      </address>
    </author>
    <author initials="J." surname="García Pardo" fullname="Juan A. García Pardo Giménez de los Galanes">
      <organization>ETH Zürich</organization>
      <address>
        <email>juan.garcia@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="T." surname="Zäschke" fullname="Tilmann Zäschke">
      <organization>ETH Zürich</organization>
      <address>
        <email>tilmann.zaeschke@inf.ethz.ch</email>
      </address>
    </author>
    <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
      <organization>SCION Association</organization>
      <address>
        <email>nic@scion.org</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>IRTF</area>
    <workgroup>PANRG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 172?>

<t>TODO Abstract here</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://scionassociation.github.io/scion-research_I-D/draft-meynell-panrg-scion-research-questions.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-meynell-panrg-scion-research-questions/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        WG Working Group mailing list (<eref target="mailto:panrg@irtf.org"/>),
        which is archived at <eref target="https://datatracker.ietf.org/rg/panrg"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/panrg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/scionassociation/scion-research_I-D"/>.</t>
    </note>
  </front>
  <middle>
    <?line 177?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>SCION is an inter-domain network architecture. Its core components specification, as deployed by some of its early adopters, is outlined in <xref target="I-D.scion-dataplane"/>, <xref target="I-D.scion-cppki"/>, <xref target="I-D.scion-cp"/>, currently under ISE review.</t>
      <t>The goal of this draft is to explore how SCION and its early deployments try to address open research questions in <xref target="RFC9217"/>. Specifically, there are still many open areas of research around path-aware networking, where SCION with its early deployment experiences and research efforts can provide a contribution. This can also be a starting point for discussions around long-term protocol evolution.</t>
      <t>This draft assumes the reader is familiar with some of the fundamental concepts defined in the components specification.</t>
      <t><strong>Note:</strong> This is the very first version of the SCION research questions draft, and it merely contains a skeleton of potential topics to be further discussed in this draft. Any feedback is welcome and much appreciated. Thanks!</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="discovery-distribution-and-trustworthiness-of-path-properties">
      <name>Discovery, Distribution, and Trustworthiness of Path Properties</name>
      <section anchor="isd-as-identity">
        <name>ISD, AS identity</name>
        <ul spacing="normal">
          <li>
            <t>How many ASes do we expect in the SCION network model?</t>
          </li>
          <li>
            <t>How many ISDs? What is the ontology of an ISD? Per geographic area only?</t>
          </li>
          <li>
            <t>One AS belongs to many ISDs?</t>
          </li>
        </ul>
      </section>
      <section anchor="segment-dissemination">
        <name>Segment Dissemination</name>
        <t>Control servers return a large number of path segments. This can cost considerable bandwidth / network egress while at the same time overloading clients with an unnecessarily large numbers of segments, mostly consisting of redundant information in terms of duplicate link and hops.</t>
        <ul spacing="normal">
          <li>
            <t>This problem may be more problematic in ASes with many end hosts (e.g. IoT), or end hosts with little computing power or little spare bandwidth.</t>
          </li>
          <li>
            <t>Getting a full path to a remote endhost may require three round-trips with the control server.</t>
          </li>
        </ul>
        <t>There are multiple possible and independent solution steps here:</t>
        <ul spacing="normal">
          <li>
            <t>Compression (idea suggested by Francois Wirz): Segments could be stored in a way that duplicate information (hops &amp; links) is only stored once and the segments contain only references to the hops and links.</t>
          </li>
          <li>
            <t>Allow queries from start AS to end AS across multiple segments. This should be very easy to implement and would be compatible with the current wire protocol (protobuf).
            </t>
            <ul spacing="normal">
              <li>
                <t>This would reduce the number of round trips to one.</t>
              </li>
              <li>
                <t>It would reduce the number of returned segments because only segments that actually connect to other segments would need to be returned.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Predefine some policies that can be resolved by the control server, e.g. ANY, BEST_LATENCY, BEST_BANDWIDTH, BEST_PRICE, BEST_CO2. For these, a control server could simply calculate 5-10 good paths and return these. Moreover these could be cached for commonly requested remote ASs. If a user requires a custom policy they can still resort to requesting actual segments.</t>
          </li>
        </ul>
        <t>Doing path computation on the control server will initially increase computational cost. However, it would substantially decrease network egress. Caching of paths should reduce CPU cost, maybe even below the current cost for retrieving a large amount of segments from the local database and sending them over the network interface.</t>
      </section>
      <section anchor="routing-policies-and-traffic-engineering">
        <name>Routing Policies and Traffic Engineering</name>
        <t>Reduced adoption due to limited routing policy possibilities, such as a (core-)AS does not want to accept transit traffic unless it starts/ends in ASs with special properties. For example a GEANT AS does not want to allow transit traffic unless it originates or ends in another research AS.</t>
        <t>One solution could be to add a “confirm full path”-flag to certain segments. If this flag is set, the full path (all segments) needs to authorized by all ASes that insist on authorizing it. This is obviously less scalable but may be viable for ASes that insist on such policies. This also allows for “secret” policies.</t>
        <t>Collateral: this probably needs a data plane change. Conceptually, we have only a single resulting segment, and that segment needs to be used in full, e.g. no on-path trickery.</t>
      </section>
      <section anchor="drkey">
        <name>DRKey</name>
        <ul spacing="normal">
          <li>
            <t>Is forward-secrecy DRKey useful and should we develop it?</t>
          </li>
          <li>
            <t>What are the properties of the control-plane?
            </t>
            <ul spacing="normal">
              <li>
                <t>Do we want to have any authorization of the data-plane transit undertaken at this stage?</t>
              </li>
              <li>
                <t>Would this obsolete firewalls?</t>
              </li>
              <li>
                <t>What do we mean when we say "authorize transit"?</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>For more info: <xref target="I-D.garciapardo-drkey"/>.</t>
      </section>
      <section anchor="scmp-authentication">
        <name>SCMP Authentication</name>
      </section>
      <section anchor="proof-of-transit">
        <name>Proof of transit</name>
        <t>FABRID <xref target="KRAHENBUHL2023"/> and EPIC <xref target="LEGNER2020"/>.</t>
      </section>
      <section anchor="nat">
        <name>NAT</name>
        <t>At this moment, the SCION implementation is not compatible out-of-the-box with NAT'ed devices, whether these devices are end-hosts, or even running SCION services. This is due to the (UDP-IP) underlay being modified by the NAT mechanism, but not the internal destination SCION address. Although this does not concern the SCION protocols themselves, we want to check that this will not be a problem.</t>
        <ul spacing="normal">
          <li>
            <t>With IPv6 underlay, this problem disappears.</t>
          </li>
          <li>
            <t>Modify the SCION border router to also act as a STUN server.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="dataplane-stability">
      <name>Dataplane stability</name>
      <section anchor="link-load-balancing">
        <name>Link load balancing</name>
        <t>Links may get overloaded because the SCION routing system fails to distribute load properly over different links. New/different links might be underutilized.</t>
        <t>If links become overloaded, there are several ways to handle that. Non comprehensively:</t>
        <ul spacing="normal">
          <li>
            <t>Squeeze: send an SCMP message to trigger end-hosts to use an alternative path</t>
          </li>
          <li>
            <t>Steer: send and SCMP to trigger users to ask CS for a better path</t>
          </li>
          <li>
            <t>Reduce: hand over very short lived paths, let the end-hosts wait for the path to expire so that they request new paths and (hopefully) decide on a different path.</t>
          </li>
          <li>
            <t>Recommend: let the end-hosts know which paths are recommended by the AS at this time.</t>
          </li>
        </ul>
        <t>If a link has good properties, many AS will disseminate segments, therefore paths that go through this link and the link may become overloaded. See Simon Scherrer's work on Braess Paradox.</t>
        <t>Either there needs to be some constant control by all clients to not choose the best theoretical path, but the one that works best. Or we need to find a way that control servers do not disseminate “good” links to all end-hosts.</t>
        <t>The current consensus is that end-hosts can use multi-pathing and “automatically” converge on the best path, i.e. creating an equilibrium. Again, see Simon Scherrer's work on Braess Paradox.</t>
      </section>
      <section anchor="reverse-path-refreshment">
        <name>Reverse Path Refreshment</name>
        <t>When a client contacts a server, it is usually understood that it wants the server to use the reverse path to answer back. It the server uses that path for a long period of time, the path will eventually expire. How to standardize the process of refreshment?</t>
        <ul spacing="normal">
          <li>
            <t>The server must ask the CS for a path, regardless of the client's policy.</t>
          </li>
          <li>
            <t>The client (somehow) sends a new packet with a new path, prompting the server to use this path from now on.</t>
          </li>
        </ul>
        <t>There are some nuances: Usually the server's API will store the initial address of the client to be used through all the session. We might need to take this into account.</t>
      </section>
    </section>
    <section anchor="hummingbird-qos">
      <name>Hummingbird / QoS</name>
      <ul spacing="normal">
        <li>
          <t>How many QoS flows to support at core routers?</t>
        </li>
        <li>
          <t>How does QoS interact with Net Neutrality?</t>
        </li>
        <li>
          <t>What proof of transit (or forwarding failure detection) is needed or wanted?</t>
        </li>
        <li>
          <t>What time synchronization precision should we expect at the border router level of every AS? How far can we go realistically?</t>
        </li>
      </ul>
    </section>
    <section anchor="interfaces-for-path-awareness">
      <name>Interfaces for Path Awareness</name>
      <ul spacing="normal">
        <li>
          <t>IPv6 in the Data Plane</t>
        </li>
        <li>
          <t>SCION-IP translation</t>
        </li>
      </ul>
    </section>
    <section anchor="implications-of-path-awareness-for-the-transport-and-application-layers">
      <name>Implications of Path Awareness for the Transport and Application Layers</name>
      <t>To be discussed</t>
    </section>
    <section anchor="naming">
      <name>Naming</name>
      <t>To be discussed</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9217">
          <front>
            <title>Current Open Questions in Path-Aware Networking</title>
            <author fullname="B. Trammell" initials="B." surname="Trammell"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>In contrast to the present Internet architecture, a path-aware internetworking architecture has two important properties: it exposes the properties of available Internet paths to endpoints, and it provides for endpoints and applications to use these properties to select paths through the Internet for their traffic. While this property of "path awareness" already exists in many Internet-connected networks within single domains and via administrative interfaces to the network layer, a fully path-aware internetwork expands these concepts across layers and across the Internet.</t>
              <t>This document poses questions in path-aware networking, open as of 2021, that must be answered in the design, development, and deployment of path-aware internetworks. It was originally written to frame discussions in the Path Aware Networking Research Group (PANRG), and has been published to snapshot current thinking in this space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9217"/>
          <seriesInfo name="DOI" value="10.17487/RFC9217"/>
        </reference>
        <reference anchor="I-D.scion-cp" target="https://datatracker.ietf.org/doc/draft-dekater-scion-controlplane/">
          <front>
            <title>SCION Control Plane</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.scion-cppki" target="https://datatracker.ietf.org/doc/draft-dekater-scion-pki/">
          <front>
            <title>SCION Control-Plane PKI</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="I-D.scion-dataplane" target="https://datatracker.ietf.org/doc/draft-dekater-scion-dataplane/">
          <front>
            <title>SCION Data Plane</title>
            <author initials="C." surname="de Kater" fullname="Corine de Kater">
              <organization>SCION Association</organization>
            </author>
            <author initials="N." surname="Rustignoli" fullname="Nicola Rustignoli">
              <organization>SCION Association</organization>
            </author>
            <author initials="S." surname="Hitz" fullname="Samuel Hitz">
              <organization>Anapaya Systems</organization>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.garciapardo-drkey" target="https://datatracker.ietf.org/doc/draft-garciapardo-panrg-drkey/">
          <front>
            <title>Dynamically Recreatable Keys</title>
            <author initials="J." surname="Pardo" fullname="Juan A. García Pardo Giménez de los Galanes">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="B." surname="Rothenberger" fullname="Benjamin Rothenberger">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zürich</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="LEGNER2020" target="https://netsec.ethz.ch/publications/papers/Legner_Usenix2020_EPIC.pdf">
          <front>
            <title>EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet</title>
            <author initials="M." surname="Legner" fullname="Markus Legner">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="T." surname="Klenze" fullname="Tobias Klenze">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="C." surname="Sprenger" fullname="Christoph Sprenger">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zürich</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
        <reference anchor="KRAHENBUHL2023" target="https://www.usenix.org/conference/usenixsecurity23/presentation/krahenbuhl">
          <front>
            <title>FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks</title>
            <author initials="C." surname="Krähenbühl" fullname="Cyrill Krähenbühl">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="M." surname="Wyss" fullname="Marc Wyss">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="V." surname="Lenders" fullname="Vincent Lenders">
              <organization>Armasuisse</organization>
            </author>
            <author initials="A." surname="Perrig" fullname="Adrian Perrig">
              <organization>ETH Zürich</organization>
            </author>
            <author initials="M." surname="Strohmeier" fullname="Martin Strohmeier">
              <organization>Armasuisse</organization>
            </author>
            <date year="2020"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 327?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
