| rfc9419xml2.original.xml | rfc9419.xml | |||
|---|---|---|---|---|
| <?xml version="1.0" encoding="UTF-8"?> | <?xml version="1.0" encoding="UTF-8"?> | |||
| <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
| <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.11 --> | ||||
| <!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | <!DOCTYPE rfc [ | |||
| <!ENTITY nbsp " "> | ||||
| <!ENTITY zwsp "​"> | ||||
| <!ENTITY nbhy "‑"> | ||||
| <!ENTITY wj "⁠"> | ||||
| ]> | ]> | |||
| <?rfc toc="yes"?> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
| <?rfc sortrefs="yes"?> | -iab-path-signals-collaboration-03" number="9419" submissionType="IAB" category= | |||
| <?rfc symrefs="yes"?> | "info" consensus="true" obsoletes="" updates="" xml:lang="en" tocInclude="true" | |||
| sortRefs="true" symRefs="true" version="3"> | ||||
| <rfc ipr="trust200902" docName="draft-iab-path-signals-collaboration-03" categor | ||||
| y="info"> | ||||
| <front> | <front> | |||
| <title abbrev="Path Signals Collab">Considerations on Application - Network | <title abbrev="Path Signals Collaboration">Considerations on Application - N | |||
| Collaboration Using Path Signals</title> | etwork Collaboration Using Path Signals</title> | |||
| <seriesInfo name="RFC" value="9419"/> | ||||
| <author initials="J." surname="Arkko" fullname="Jari Arkko"> | <author initials="J." surname="Arkko" fullname="Jari Arkko"> | |||
| <organization>Ericsson</organization> | <organization showOnFrontPage="true">Ericsson</organization> | |||
| <address> | <address> | |||
| <email>jari.arkko@ericsson.com</email> | <email>jari.arkko@ericsson.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="T." surname="Hardie" fullname="Ted Hardie"> | <author initials="T." surname="Hardie" fullname="Ted Hardie"> | |||
| <organization>Cisco</organization> | <organization showOnFrontPage="true">Cisco</organization> | |||
| <address> | <address> | |||
| <email>ted.ietf@gmail.com</email> | <email>ted.ietf@gmail.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="T." surname="Pauly" fullname="Tommy Pauly"> | <author initials="T." surname="Pauly" fullname="Tommy Pauly"> | |||
| <organization>Apple</organization> | <organization showOnFrontPage="true">Apple</organization> | |||
| <address> | <address> | |||
| <email>tpauly@apple.com</email> | <email>tpauly@apple.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <author initials="M." surname="Kühlewind" fullname="Mirja Kühlewind"> | <author initials="M." surname="Kuehlewind" fullname="Mirja Kuehlewind"> | |||
| <organization>Ericsson</organization> | <organization showOnFrontPage="true">Ericsson</organization> | |||
| <address> | <address> | |||
| <email>mirja.kuehlewind@ericsson.com</email> | <email>mirja.kuehlewind@ericsson.com</email> | |||
| </address> | </address> | |||
| </author> | </author> | |||
| <date year="2023" month="June"/> | ||||
| <date year="2023" month="February" day="23"/> | ||||
| <keyword>Internet-Draft</keyword> | ||||
| <abstract> | <abstract> | |||
| <t>This document discusses principles for designing mechanisms that use | ||||
| <t>This document discusses principles for designing mechanisms that use or provi | or provide path signals and calls for standards action in specific | |||
| de | valuable cases. RFC 8558 describes path signals as messages to or from | |||
| path signals, and calls for standards action in specific valuable cases. | on-path elements and points out that visible information will be used | |||
| RFC 8558 describes path signals as messages to or from on-path elements, | whether or not it is intended as a signal. The principles in this | |||
| and points out that visible information will be used whether it is | document are intended as guidance for the design of explicit path | |||
| intended as a signal or not. The principles in this document are intended as | signals, which are encouraged to be authenticated and include a minimal | |||
| guidance for the design of explicit path signals, which are encouraged to be | set of parties to minimize information sharing. These principles can be | |||
| authenticated and include | achieved through mechanisms like encryption of information and | |||
| a minimal set of parties to minimize information sharing. These principles can | establishing trust relationships between entities on a path.</t> | |||
| be achieved through mechanisms like encryption of information and | ||||
| establishing trust relationships between entities on a path.</t> | ||||
| </abstract> | </abstract> | |||
| </front> | </front> | |||
| <middle> | <middle> | |||
| <section anchor="intro" numbered="true" toc="default"> | ||||
| <name>Introduction</name> | ||||
| <t><xref target="RFC8558" format="default"/> defines the term "path | ||||
| signals" as signals to or from on-path elements. Today, path signals are | ||||
| often implicit; for example, they are derived from cleartext end-to-end in | ||||
| formation by, | ||||
| e.g., examining transport protocols. For instance, on-path elements use | ||||
| various fields of the TCP header <xref target="RFC9293" | ||||
| format="default"/> to derive information about end-to-end latency as | ||||
| well as congestion. These techniques have evolved because the | ||||
| information was available and its use required no coordination with | ||||
| anyone. This made such techniques more easily deployable than | ||||
| alternative, potentially more explicit or cooperative, approaches.</t> | ||||
| <t>However, this also means that applications and networks have often | ||||
| evolved their interaction without comprehensive design for how this | ||||
| interaction should happen or which (minimal) information would be needed | ||||
| for a certain function. This has led to a situation where | ||||
| information that happens to be easily available is used instead of the | ||||
| information that is actually needed. As such, that information may | ||||
| be incomplete, incorrect, or only indirectly representative of the | ||||
| information that is actually needed. In addition, dependencies on | ||||
| information and mechanisms that were designed for a different function | ||||
| limit the evolvability of the protocols in question.</t> | ||||
| <t>In summary, such unplanned interactions end up having several | ||||
| negative effects:</t> | ||||
| <ul spacing="normal"> | ||||
| <li>Ossifying protocols by introducing dependencies to unintended | ||||
| parties that may not be updating, such as how middleboxes have limited | ||||
| the use of TCP options</li> | ||||
| <li>Creating systemic incentives against deploying more secure or | ||||
| otherwise updated versions of protocols</li> | ||||
| <li>Basing network behavior on information that may be incomplete or | ||||
| incorrect</li> | ||||
| <li>Creating a model where network entities expect to be able to use | ||||
| rich information about sessions passing through</li> | ||||
| </ul> | ||||
| <t>For instance, features such as DNS resolution or TLS setup have been | ||||
| used beyond their original intent, such as in name-based | ||||
| filtering. Media Access Control (MAC) addresses have been used for | ||||
| access control, captive portals have been used to take over cleartext | ||||
| HTTP sessions, and so on. (This document is not about whether those | ||||
| practices are good or bad; it is simply stating a fact that the features | ||||
| were used beyond their original intent.)</t> | ||||
| <section anchor="intro" title="Introduction"> | <t>Many protocol mechanisms throughout the stack fall into one of two | |||
| categories: authenticated private communication that is only visible to a | ||||
| <t><xref target="RFC8558"/> defines the term “path signals” as signals to or fro | very limited set of parties, often one on each "end", and | |||
| m on-path | unauthenticated public communication that is visible to all | |||
| elements. Today path signals are often implicit, e.g. derived from | network elements on a path.</t> | |||
| cleartext end-to-end information by e.g. examining transport | <t>Exposed information encourages pervasive monitoring, which is | |||
| protocols. For instance, on-path elements use various fields of the | described in <xref target="RFC7258" format="default"/>. It may also be | |||
| TCP header <xref target="RFC0793"/> to derive information about end-to-end laten | used for commercial purposes or to form a basis for filtering that the | |||
| cy | applications or users do not desire. However, a lack of all path signalin | |||
| as well as congestion. These techniques have evolved because the | g, | |||
| information was available and its use required no coordination with | on the other hand, may limit network management, debugging, or the | |||
| anyone. This made such techniques more easily deployable than | ability for networks to optimize their services. There are many cases | |||
| alternative, potentially more explicit or cooperative, approaches.</t> | where elements on the network path can provide beneficial services, but | |||
| only if they can coordinate with the endpoints. It also affects the | ||||
| <t>However, this also means that applications and networks have often evolved th | ability of service providers and others to observe why problems occur | |||
| eir interaction | <xref target="RFC9075" format="default"/>.</t> | |||
| without comprehensive design for how this interaction should | <t>As such, this situation is sometimes cast as an adversarial trade-off | |||
| happen or which (minimal) information would be needed for a certain function. | between privacy and the ability for the network path to provide intended | |||
| This has led to a situation where simply information that happens | functions. However, this is perhaps an unnecessarily polarized | |||
| to be easily available is used instead the information that would be actually ne | characterization as a zero-sum situation. Not all information passing | |||
| eded. | implies loss of privacy. For instance, performance information or | |||
| As such that information | preferences do not require disclosing the content being accessed, the | |||
| may be incomplete, incorrect, or only indirectly representative of the | user identity, or the application in use. Similarly, network congestion | |||
| information that is actually needed. In addition, dependencies on | status information does not have to reveal network topology, the | |||
| information and mechanisms that were designed for a different function | status of other users, and so on.</t> | |||
| limits the evolvability of the protocols in question.</t> | <t>Increased deployment of encryption is changing this situation. | |||
| Encryption provides tools for controlling information access and | ||||
| <t>In summary, such unplanned interactions end up having several negative effect | protects against ossification by avoiding unintended dependencies and | |||
| s:</t> | requiring active maintenance. The increased deployment of encryption | |||
| provides an opportunity to reconsider parts of Internet architecture | ||||
| <t><list style="symbols"> | that have used implicit derivation of input signals for on-path | |||
| <t>Ossifying protocols by introducing dependencies to unintended parties | functions rather than explicit signaling, as recommended by <xref | |||
| that may not be updating, such as how middleboxes have limited the use of TCP op | target="RFC8558" format="default"/>.</t> | |||
| tions</t> | ||||
| <t>Creating systemic incentives against deploying more secure or otherwise upd | ||||
| ated versions of protocols</t> | ||||
| <t>Basing network behaviour on information that may be incomplete or incorrect | ||||
| </t> | ||||
| <t>Creating a model where network entities expect to be able to use | ||||
| rich information about sessions passing through</t> | ||||
| </list></t> | ||||
| <t>For instance, features such as DNS resolution or TLS setup have been | ||||
| used beyond their original intent, such as in name-based | ||||
| filtering. MAC addresses have been used for access control, captive | ||||
| portals have been used to take over cleartext HTTP | ||||
| sessions, and so on. (This document is not about whether those | ||||
| practices are good or bad, it is simply stating a fact that the | ||||
| features were used beyond their original intent.)</t> | ||||
| <t>Many protocol mechanisms throughout the stack fall into one of two | ||||
| categories: authenticated and private communication that is only visible | ||||
| to a very limited set of parties, often one on each “end”; and unauthenticated | ||||
| public communication that is also visible to all network elements on a path.</t> | ||||
| <t>Exposed information encourages pervasive monitoring, which is | ||||
| described in RFC 7258 <xref target="RFC7258"/>, and may also be | ||||
| used for commercial purposes, or form a basis for filtering that the | ||||
| applications or users do not desire. | ||||
| But a lack of all path signalling, on the other hand, may limit network | ||||
| management, debugging, or the ability for networks to optimize their services. | ||||
| There are many cases where elements on | ||||
| the network path can provide beneficial services, but only if they can | ||||
| coordinate with the endpoints. It also affects the ability of service providers | ||||
| and others to observe why problems occur <xref target="RFC9075"/>.</t> | ||||
| <t>As such, this situation is sometimes cast as an adversarial tradeoff | ||||
| between privacy and the ability for the network path to provide | ||||
| intended functions. However, this is perhaps an unnecessarily | ||||
| polarized characterization as a zero-sum situation. Not all | ||||
| information passing implies loss of privacy. For instance, performance | ||||
| information or preferences do not require disclosing the content being accessed, | ||||
| the user identity, or the application in use. Similarly, network | ||||
| congestion status information does not have to reveal network topology or | ||||
| the status of other users, and so on.</t> | ||||
| <t>Increased deployment of encryption is changing this situation. | ||||
| Encryption provides tools for controlling information access | ||||
| and protects against ossification by avoiding | ||||
| unintended dependencies and requiring active maintenance. | ||||
| The increased | ||||
| deployment of encryption provides an opportunity to reconsider parts of | ||||
| Internet architecture that have used implicit derivation of input | ||||
| signals for on-path functions rather than explicit signalling, as recommended | ||||
| by RFC 8558 <xref target="RFC8558"/>.</t> | ||||
| <t>For instance, QUIC replaces TCP for various applications and ensures end-to-e | ||||
| nd | ||||
| signals are only accessible by the endpoints, ensuring evolvability <xref target | ||||
| ="RFC9000"/>. | ||||
| QUIC does expose information dedicated for on-path elements to consume | ||||
| by using explicit signals for specific use cases, such as the Spin bit | ||||
| for latency measurements or connection ID that can be used by | ||||
| load balancers <xref target="I-D.ietf-quic-manageability"/>. This information | ||||
| is accessible by all on-path devices but information is limited | ||||
| to only those use cases. Each new use case requires additional action. | ||||
| This points to one way to resolve the adversity: the careful design | ||||
| of what information is passed.</t> | ||||
| <t>Another extreme is to employ explicit trust and coordination between | ||||
| specific entities, endpoints as well as network path elements. | ||||
| VPNs are a good example of a case where | ||||
| there is an explicit authentication and negotiation with a network | ||||
| path element that is used to gain access to | ||||
| specific resources. Authentication and trust must be considered in | ||||
| both directions: how endpoints trust and authenticate signals | ||||
| from network path elements, and how network path elements trust and authenticate | ||||
| signals from endpoints.</t> | ||||
| <t>The goal of improving privacy and trust on the Internet does not necessarily | ||||
| need to remove the ability for network elements to perform beneficial | ||||
| functions. We should instead improve the way that these functions are | ||||
| achieved and design new ways to support explicit collaboration where it | ||||
| is seen as beneficial. As such our goals should be:</t> | ||||
| <t><list style="symbols"> | ||||
| <t>To ensure that information is distributed intentionally, not accidentally;< | ||||
| /t> | ||||
| <t>to understand the privacy and other implications of any distributed informa | ||||
| tion;</t> | ||||
| <t>to ensure that the information distribution is limited to the intended part | ||||
| ies; and</t> | ||||
| <t>to gate the distribution of information on the participation of the relevan | ||||
| t parties.</t> | ||||
| </list></t> | ||||
| <t>These goals for exposure and distribution apply equally to senders, receivers | <t>For instance, QUIC replaces TCP for various applications and protects | |||
| , | end-to-end signals so that they are only accessible by the endpoints, ensu | |||
| ring | ||||
| evolvability <xref target="RFC9000" format="default"/>. QUIC | ||||
| does expose information dedicated for on-path elements to consume by | ||||
| using explicit signals for specific use cases, such as the Spin Bit for | ||||
| latency measurements or connection ID that can be used by load balancers | ||||
| <xref target="RFC9312" format="default"/>. This information is | ||||
| accessible by all on-path devices, but information is limited to only | ||||
| those use cases. Each new use case requires additional action. This | ||||
| points to one way to resolve the adversity: the careful design of what | ||||
| information is passed.</t> | ||||
| <t>Another extreme is to employ explicit trust and coordination between | ||||
| specific entities, endpoints, and network path elements. VPNs are | ||||
| a good example of a case where there is an explicit authentication and | ||||
| negotiation with a network path element that is used to gain access to | ||||
| specific resources. Authentication and trust must be considered in both | ||||
| directions: how endpoints trust and authenticate signals from network path | ||||
| elements and how network path elements trust and authenticate signals fro | ||||
| m | ||||
| endpoints.</t> | ||||
| <t>The goal of improving privacy and trust on the Internet does not | ||||
| necessarily need to remove the ability for network elements to perform | ||||
| beneficial functions. We should instead improve the way that these | ||||
| functions are achieved and design new ways to support explicit | ||||
| collaboration where it is seen as beneficial. As such, our goals should | ||||
| be to:</t> | ||||
| <ul spacing="normal"> | ||||
| <li>ensure that information is distributed intentionally, not | ||||
| accidentally;</li> | ||||
| <li>understand the privacy and other implications of any | ||||
| distributed information;</li> | ||||
| <li>ensure that the information distribution is limited to the | ||||
| intended parties; and</li> | ||||
| <li>gate the distribution of information on the participation of | ||||
| the relevant parties.</li> | ||||
| </ul> | ||||
| <t>These goals for exposure and distribution apply equally to senders, rec | ||||
| eivers, | ||||
| and path elements.</t> | and path elements.</t> | |||
| <t>Going forward, new standards work in the IETF needs to focus on | ||||
| <t>Going forward, new standards work in the IETF needs to focus on | ||||
| addressing this gap by providing better alternatives and mechanisms | addressing this gap by providing better alternatives and mechanisms | |||
| for building functions that require some collaboration between | for building functions that require some collaboration between | |||
| endpoints and path elements.</t> | endpoints and path elements.</t> | |||
| <t>We can establish some basic questions that any new network function | ||||
| <t>We can establish some basic questions that any new network functions | ||||
| should consider:</t> | should consider:</t> | |||
| <ul spacing="normal"> | ||||
| <t><list style="symbols"> | <li>Which entities must consent to the information exchange?</li> | |||
| <t>Which entities must consent to the information exchange?</t> | <li>What is the minimum information each entity in this set needs?</li> | |||
| <t>What is the minimum information each entity in this set needs?</t> | <li>What is the effect that new signals should have?</li> | |||
| <t>What is the effect that new signals should have?</t> | <li>What is the minimum set of entities that need to be involved?</li> | |||
| <t>What is the minimum set of entities that need to be involved?</t> | <li>What are the right mechanism and needed level of trust to convey | |||
| <t>What is the right mechanism and needed level of trust to convey this kind o | this kind of information?</li> | |||
| f information?</t> | </ul> | |||
| </list></t> | <t>If we look at ways network functions are achieved today, we find that | |||
| many, if not most of them, fall short of the standard set up by the questi | ||||
| <t>If we look ways network functions are achieved today, we | ons | |||
| find that many if not most of them fall short the standard set up by the | above. Too often, they send unnecessary information, fail to limit the | |||
| questions above. Too often, they send unnecessary information or fail to | scope of distribution, or fail to provide any negotiation or consent.</t> | |||
| limit the scope of distribution or providing any negotiation or consent.</t> | <t>Designing explicit signals between applications and network elements, | |||
| and ensuring that all information is appropriately protected, enables | ||||
| <t>Designing explicit signals between applications and network elements, | information exchange in both directions that is important for improving | |||
| and ensuring that all information is appropriately protected, | the quality of experience and network management. The clean separation | |||
| enables information exchange in both directions that is important | provided by explicit signals is also more conducive to protocol evolvabili | |||
| for improving the quality of experience and network management. | ty.</t> | |||
| The clean separation provided by explicit signals is also more conducive | <t>Beyond the recommendation in <xref target="RFC8558" | |||
| to protocol evolvability.</t> | format="default"/>, the IAB has provided further guidance on protocol | |||
| design. Among other documents, <xref target="RFC5218" | ||||
| <t>Beyond the recommendation in <xref target="RFC8558"/>, the IAB has provided f | format="default"/> provides general advice on incremental deployability | |||
| urther | based on an analysis of successes and failures, and <xref | |||
| guidance on protocol design. Among other documents, <xref target="RFC5218"/> pr | target="RFC6709" format="default"/> discusses protocol | |||
| ovides general advice | extensibility. The Internet Technology Adoption and Transition (ITAT) | |||
| on incremental deployability based on an analysis of successes and failures | workshop report <xref target="RFC7305" format="default"/> is also a | |||
| and <xref target="RFC6709"/> discusses protocol extensibility. The Internet Tech | recommended reading on this same general topic. <xref target="RFC9049" | |||
| nology | format="default"/>, an IRTF document, provides a catalog of past | |||
| Adoption and Transition (ITAT) workshop report <xref target="RFC7305"/> is also | issues to avoid and discusses incentives for adoption of path signals | |||
| recommended | such as the need for outperforming end-to-end mechanisms or considering | |||
| reading on this same general topic. <xref target="RFC9049"/>, an IRTF document, | per-connection state.</t> | |||
| provides | <t>This document discusses different approaches for explicit collaboration | |||
| a catalogue of past issues to avoid and discusses incentives for adoption of | and provides guidance on architectural principles to design new | |||
| path signals such as the need for outperforming end-to-end mechanisms or | mechanisms. <xref target="principles" format="default"/> discusses | |||
| considering per-connection state.</t> | principles that good design can follow. This section also provides example | |||
| s and explores the consequences of not following these | ||||
| <t>This draft discusses different approaches for explicit collaboration | principles in those examples. <xref target="research" format="default"/> | |||
| and provides guidance on architectural principles to design new | points to topics | |||
| mechanisms. <xref target="principles"/> discusses | that need to be looked at more carefully before any guidance can be | |||
| principles that good design can follow. This section also provides | given.</t> | |||
| some examples and explanation of situations that not following the | </section> | |||
| principles can lead to. <xref target="research"/> points to topics that need mor | <section anchor="principles" numbered="true" toc="default"> | |||
| e | <name>Principles</name> | |||
| to be looked at more carefully before any guidance can be given.</t> | <t>This section provides architecture-level principles for protocol | |||
| designers and recommends models to apply for network collaboration and | ||||
| </section> | signaling.</t> | |||
| <section anchor="principles" title="Principles"> | <t>While <xref target="RFC8558" format="default"/> focuses specifically | |||
| on communication to "on-path elements", the principles described in this | ||||
| <t>This section provides architecture-level principles for protocol designers | document apply potentially to:</t> | |||
| and recommends models to apply for network collaboration and signalling.</t> | <ul spacing="normal"> | |||
| <li>on-path signaling (in either direction) and</li> | ||||
| <t>While RFC 8558 <xref target="RFC8558"/> focused specifically on communication | <li>signaling with other elements in the network that are not | |||
| to “on-path elements”, | directly on-path but still influence end-to-end connections.</li> | |||
| the principles described in this document apply potentially to</t> | </ul> | |||
| <t>An example of on-path signaling is communication between an endpoint | ||||
| <t><list style="symbols"> | and a router on a network path. An example of signaling with another | |||
| <t>on-path signalling, in either direction</t> | ||||
| <t>signalling with other elements in the network | ||||
| that are not directly on-path, but still influence end-to-end connections.</t> | ||||
| </list></t> | ||||
| <t>An example of on-path signalling is communication between an endpoint | ||||
| and a router on a network path. An example of signalling with another | ||||
| network element is communication between an endpoint and a network-assigned | network element is communication between an endpoint and a network-assigned | |||
| DNS server, firewall controller, or captive portal API server. Note that | DNS server, firewall controller, or captive portal API server. Note that | |||
| these communications are conceptually independent of the base flow, even if | these communications are conceptually independent of the base flow, even if | |||
| they share a packet; they are from and to other parties, rather than | they share a packet; they are coming from and going to other parties, rather tha n | |||
| creating a multiparty communication.</t> | creating a multiparty communication.</t> | |||
| <t>Taken together, these principles focus on the inherent privacy and secu | ||||
| <t>Taken together, these principles focus on the inherent privacy and security | rity | |||
| concerns of sharing information between endpoints and network elements, | concerns of sharing information between endpoints and network elements, | |||
| emphasizing that careful scrutiny and a high bar of consent and trust | emphasizing that careful scrutiny and a high bar of consent and trust | |||
| need to be applied. Given the known threat of pervasive monitoring, the | need to be applied. Given the known threat of pervasive monitoring, the | |||
| application of these principles is critical to ensuring that the use | application of these principles is critical to ensuring that the use | |||
| of path signals does not create a disproportionate opportunity for observers | of path signals does not create a disproportionate opportunity for observers | |||
| to extract new data from flows.</t> | to extract new data from flows.</t> | |||
| <section anchor="intent" numbered="true" toc="default"> | ||||
| <name>Intentional Distribution</name> | ||||
| <t>The following guideline is best expressed in <xref target="RFC8558" f | ||||
| ormat="default"/>:</t> | ||||
| <blockquote>Fundamentally, this document recommends that implicit | ||||
| signals should be avoided and that an implicit signal should be | ||||
| replaced with an explicit signal only when the signal's originator | ||||
| intends that it be used by the network elements on the path. For many | ||||
| flows, this may result in the signal being absent but allows it to be | ||||
| present when needed.</blockquote> | ||||
| <section anchor="intent" title="Intentional Distribution"> | <!-- [rfced] We would like to rephrase this information as follows for | |||
| clarity and to reduce redundancy. Please let us know if the | ||||
| <t>This guideline is best expressed in <xref target="RFC8558"/>:</t> | preferred text is agreeable or if you prefer otherwise. | |||
| <t>“Fundamentally, this document recommends that implicit signals | ||||
| should be avoided and that an implicit signal should be replaced | ||||
| with an explicit signal only when the signal’s originator intends | ||||
| that it be used by the network elements on the path. For many | ||||
| flows, this may result in the signal being absent but allows it to | ||||
| be present when needed.”</t> | ||||
| <t>The goal is that any information should be provided knowingly, for a | ||||
| specific purpose, sent in signals designed for that purpose, and that | ||||
| any use of information should be done within that purpose. And that | ||||
| an analysis of the security and privacy implications of the specific | ||||
| purpose and associated information is needed.</t> | ||||
| <t>This guideline applies in the network element to application direction as wel | ||||
| l: a | ||||
| network element should not unintentionally leak information. While this document | ||||
| makes recommendations that are applicable to many different situations, | ||||
| it is important to note that the above call | ||||
| for careful analysis is key. Different types of information, | ||||
| different applications, and different directions of communication influence the | ||||
| the analysis, and can lead to very different conclusions about what information | ||||
| can be | ||||
| shared or with whom. For instance, it is easy to find examples of information | ||||
| that applications should not share with network elements (e.g., content of commu | ||||
| nications) | ||||
| or network elements should not share with applications (e.g., detailed user loca | ||||
| tion in | ||||
| a wireless network). But, equally, information about other things such as the on | ||||
| set | ||||
| of congestion should be possible to share, and can be beneficial information to | ||||
| all parties.</t> | ||||
| <t>Intentional distribution is a precondition for explicit collaboration enablin | ||||
| g | ||||
| each entity to have the highest posssible level of control about what informatio | ||||
| n | ||||
| to share.</t> | ||||
| </section> | ||||
| <section anchor="control-distr" title="Control of the Distribution of Informatio | ||||
| n"> | ||||
| <t>Explicit signals are not enough. The entities | ||||
| also need to agree to exchange the information. | ||||
| Trust and mutual agreement between the involved entities must determine | ||||
| the distribution of information, in order to give adequate control to | ||||
| each entity over the collaboration or information sharing. This can | ||||
| be achieved as discussed below.</t> | ||||
| <t>The sender needs to decide that it is willing to send information to a specif | ||||
| ic entity or | ||||
| set of entities. | ||||
| Any passing of information or request for an action needs to be explicit, | ||||
| and use signalling mechanisms that are designed for the purpose. | ||||
| Merely sending a particular kind of packet to a destination should not | ||||
| be interpreted as an implicit agreement.</t> | ||||
| <t>At the same time, the recipient of information or the target of a | ||||
| request should have the option to agree or deny to receiving the information. It | ||||
| should not be burdened with extra processing if it does not have | ||||
| willingness or a need to do so. This happens naturally in most | ||||
| protocol designs, but has been a problem for some cases where | ||||
| “slow path” packet processing is required or implied, and the | ||||
| recipient or router is not willing to handle this. Performance | ||||
| impacts like this are best avoided, however.</t> | ||||
| <t>In any case, all involved entities must be identified and | ||||
| potentially authenticated if trust is required as a prerequisite | ||||
| to share certain information.</t> | ||||
| <t>Many Internet communications are not performed on behalf of the applications, | ||||
| but are | ||||
| ultimately made on behalf of users. However, not all information | ||||
| that may be shared directly relates to user actions or other | ||||
| sensitive data. All information shared must be evaluated carefully | ||||
| to identify potential privacy implications for users. Information that | ||||
| directly relates to the user should not be shared without the user’s | ||||
| consent. It should be noted that the interests of the user and | ||||
| other parties, such as the application developer, may not always coincide; | ||||
| some applications may wish to collect more information about | ||||
| the user than the user would like. | ||||
| As discussed in <xref target="RFC8890"/>, from an IETF point view, the interests | ||||
| of the user should be | ||||
| prioritized over those of the application developer. The general issue | ||||
| of how to achieve a balance of control between the actual user and an applicatio | ||||
| n | ||||
| representing an user’s interest is out of scope for this document.</t> | ||||
| </section> | ||||
| <section anchor="auth" title="Protecting Information and Authentication"> | ||||
| <t>Some simple forms of information often exist in cleartext | ||||
| form, e.g, ECN bits from routers are generally not authenticated | ||||
| or integrity protected. This is possible when the information | ||||
| exchanges do not carry any significantly sensitive information | ||||
| from the parties. Often these kind of interactions are also advisory | ||||
| in their nature (see also section <xref target="impact"/>).</t> | ||||
| <t>In other cases it may be necessary to establish a secure | ||||
| signalling channel for communication with a specific other party, e.g., | ||||
| between a network element and an application. This channel | ||||
| may need to be authenticated, integrity protected and confidential. | ||||
| This is necessary, for instance, if the particular information or | ||||
| request needs to be shared in confidence only with a particular, | ||||
| trusted network element or endpoint, or there’s a danger of an attack where some | ||||
| one else | ||||
| may forge messages that could endanger the communication.</t> | ||||
| <t>Authenticated integrity protections on signalled data can help | ||||
| ensure that data received in a signal has not been modified by | ||||
| other parties. Still, both network elements and endpoints need to | ||||
| be careful in processing or responding to any signal. Whether | ||||
| through bugs or attacks, the content of path signals can lead | ||||
| to unexpected behaviors or security vulnerabilities if not | ||||
| properly handled. As a result, the advice in <xref target="impact"/> still | ||||
| applies even in situations where there’s a secure channel for | ||||
| sending information.</t> | ||||
| <t>However, it is important to note that authentication does not equal | ||||
| trust. Whether a communication is with an application server or | ||||
| network element that can be shown to be associated with a particular | ||||
| domain name, it does not follow that information about the user can be | ||||
| safely sent to it.</t> | ||||
| <t>In some cases, the ability of a party to show that it is on the path | ||||
| can be beneficial. For instance, an ICMP error that refers to a valid | ||||
| flow may be more trustworthy than any ICMP error claiming to come from | ||||
| an address.</t> | ||||
| <t>Other cases may require more substantial assurances. For instance, | ||||
| a specific trust arrangement may be established between a particular | ||||
| network and application. Or technologies such as confidential | ||||
| computing can be applied to provide an assurance that information | ||||
| processed by a party is handled in an appropriate manner.</t> | ||||
| </section> | ||||
| <section anchor="minimize-info" title="Minimize Information"> | ||||
| <t>Each party should provide only the information that is needed for the | ||||
| other parties to perform the task for which collaboration is desired, | ||||
| and no more. This applies to information sent by an | ||||
| application about itself, information sent about users, or information | ||||
| sent by the network. This also applies to any information | ||||
| related to flow identification.</t> | ||||
| <t>An architecture can follow the guideline from <xref target="RFC8558"/> in usi | ||||
| ng | ||||
| explicit signals, but still fail to differentiate properly between | ||||
| information that should be kept private and information that should be | ||||
| shared. <xref target="RFC6973"/> also outlines this principle of data minimizati | ||||
| on | ||||
| as mitigation technique to protect privacy and provides further guidance.</t> | ||||
| <t>In looking at what information can or cannot easily be passed, we | ||||
| need to consider both, information from the network to the application | ||||
| and from the application to the network.</t> | ||||
| <t>For the application to the network direction, user-identifying | ||||
| information can be problematic for privacy and tracking reasons. | ||||
| Similarly, application identity can be problematic, if it might form | ||||
| the basis for prioritization or discrimination that the | ||||
| application provider may not wish to happen.</t> | ||||
| <t>On the other hand, as noted above, information about general classes | ||||
| of applications may be desirable to be given by application providers, | ||||
| if it enables prioritization that would improve service, e.g., | ||||
| differentiation between interactive and non-interactive services.</t> | ||||
| <t>For the network to application direction there is similarly sensitive | ||||
| information, such as the precise location of the user. On the other | ||||
| hand, various generic network conditions, predictive bandwidth and | ||||
| latency capabilities, and so on might be attractive information that | ||||
| applications can use to determine, for instance, optimal strategies | ||||
| for changing codecs. However, information given by the network about | ||||
| load conditions and so on should not form a mechanism to provide a | ||||
| side-channel into what other users are doing.</t> | ||||
| <t>While information needs to be specific and provided on a per-need | ||||
| basis, it is often beneficial to provide declarative information that, | ||||
| for instance, expresses application needs than makes specific requests | ||||
| for action.</t> | ||||
| </section> | ||||
| <section anchor="impact" title="Limiting Impact of Information"> | ||||
| <t>Information shared between a network element and an endpoint of a | ||||
| connection needs to have a limited impact on the behavior of both | ||||
| endpoints and network elements. Any action that an endpoint or | ||||
| network element takes based on a path signal needs to be considered | ||||
| appropriately based on the level of authentication and trust that | ||||
| has been established, and be scoped to a specific network path.</t> | ||||
| <t>For example, an ICMP signal from a network element to an endpoint can | ||||
| be used to influence future behavior on that particular network path (such as | ||||
| changing the effective packet size or closing a path-specific connection), | ||||
| but should not be able to cause a multipath or migration-capable transport | ||||
| connection to close.</t> | ||||
| <t>In many cases, path signals can be considered to be advisory information, | ||||
| with the effect of optimizing or adjusting the behavior of connections | ||||
| on a specific path. In the case of a firewall blocking connectivity | ||||
| to a given host, endpoints should only interpret that as the host being | ||||
| unavailable on that particular path; this is in contrast to an end-to-end | ||||
| authenticated signal, such as a DNSSEC-authenticated denial of existence | ||||
| <xref target="RFC7129"/>.</t> | ||||
| </section> | ||||
| <section anchor="min-ents" title="Minimum Set of Entities"> | ||||
| <t>It is recommended that a design identifies the minimum number of | ||||
| entities needed to share a specific signal required for an identified | ||||
| function.</t> | ||||
| <t>Often this will be a very limited set, such as when an application | Original: | |||
| only needs to provide a signal to its peer at the other end of the | The goal is that any information should be provided knowingly, for a | |||
| connection or a host needs to contact a specific VPN gateway. In | specific purpose, sent in signals designed for that purpose, and that | |||
| other cases a broader set is needed, such as when explicit or | any use of information should be done within that purpose. And that | |||
| implicit signals from a potentially unknown set of multiple routers | an analysis of the security and privacy implications of the specific | |||
| along the path inform the endpoints about congestion.</t> | purpose and associated information is needed. | |||
| <t>While it is tempting to consider removing these limitations in the | Perhaps: | |||
| context of closed, private networks, each interaction is still best | The goal is that any information should be provided knowingly for a | |||
| considered separately, rather than simply allowing all information | specific purpose, sent in signals designed for that purpose, and used | |||
| exchanges within the closed network. Even in a closed network with | within that purpose. In addition, an analysis of the security and privacy | |||
| carefully managed elements there may be compromised components, as | implications of the specific purpose and associated information is needed. | |||
| evidenced in the most extreme way by the Stuxnet worm that operated in | --> | |||
| an airgapped network. Most “closed” networks have at least some needs | ||||
| and means to access the rest of the Internet, and should not be | ||||
| modeled as if they had an impenetrable security barrier.</t> | ||||
| </section> | <t>The goal is that any information should be provided knowingly, for | |||
| <section anchor="info-carry" title="Carrying Information"> | a specific purpose, sent in signals designed for that purpose, and that | |||
| any use of information should be done within that purpose. In | ||||
| addition, an analysis of the security and privacy implications of the | ||||
| specific purpose and associated information is needed.</t> | ||||
| <t>This guideline applies in the network element to application | ||||
| direction as well: a network element should not unintentionally leak | ||||
| information. While this document makes recommendations that are | ||||
| applicable to many different situations, it is important to note that | ||||
| the above call for careful analysis is key. Different types of | ||||
| information, applications, and directions of | ||||
| communication influence the analysis and can lead to very | ||||
| different conclusions about what information can be shared and with | ||||
| whom. For instance, it is easy to find examples of information that | ||||
| applications should not share with network elements (e.g., content of | ||||
| communications) or that network elements should not share with | ||||
| applications (e.g., detailed user location in a wireless | ||||
| network). But, equally, information about other things, such as the | ||||
| onset of congestion, should be possible to share and can be beneficial | ||||
| information to all parties.</t> | ||||
| <t>Intentional distribution is a precondition for explicit | ||||
| collaboration that enables each entity to have the highest possible leve | ||||
| l | ||||
| of control about what information to share.</t> | ||||
| </section> | ||||
| <section anchor="control-distr" numbered="true" toc="default"> | ||||
| <name>Control of the Distribution of Information</name> | ||||
| <t>Explicit signals are not enough. The entities also need to agree to | ||||
| exchange the information. Trust and mutual agreement between the | ||||
| involved entities must determine the distribution of information in | ||||
| order to give each entity adequate control over the collaboration | ||||
| or information sharing. This can be achieved as discussed | ||||
| below.</t> | ||||
| <t>The sender needs to decide that it is willing to send information | ||||
| to a specific entity or set of entities. Any passing of information | ||||
| or request for an action needs to be explicit and use signaling | ||||
| mechanisms that are designed for the purpose. Merely sending a | ||||
| particular kind of packet to a destination should not be interpreted | ||||
| as an implicit agreement.</t> | ||||
| <t>At the same time, the recipient of information or the target of a | ||||
| request should have the option to agree or deny to receiving the | ||||
| information. It should not be burdened with extra processing if it | ||||
| does not have willingness or a need to do so. This happens naturally | ||||
| in most protocol designs, but it has been a problem for some cases where | ||||
| "slow path" packet processing is required or implied, and the | ||||
| recipient or router is not willing to handle it. Performance impacts | ||||
| like this are best avoided, however.</t> | ||||
| <t>In any case, all involved entities must be identified and | ||||
| potentially authenticated if trust is required as a prerequisite to | ||||
| share certain information.</t> | ||||
| <t>Many Internet communications are not performed on behalf of the | ||||
| applications but are ultimately made on behalf of users. However, not | ||||
| all information that may be shared directly relates to user actions or | ||||
| other sensitive data. All shared information must be evaluated | ||||
| carefully to identify potential privacy implications for | ||||
| users. Information that directly relates to the user should not be | ||||
| shared without the user's consent. It should be noted that the | ||||
| interests of the user and other parties, such as the application | ||||
| developer, may not always coincide; some applications may wish to | ||||
| collect more information about the user than the user would like. As | ||||
| discussed in <xref target="RFC8890" format="default"/>, from an IETF | ||||
| point of view, the interests of the user should be prioritized over thos | ||||
| e | ||||
| of the application developer. The general issue of how to achieve a | ||||
| balance of control between the actual user and an application | ||||
| representing a user's interest is out of scope for this document.</t> | ||||
| </section> | ||||
| <section anchor="auth" numbered="true" toc="default"> | ||||
| <name>Protecting Information and Authentication</name> | ||||
| <t>Some simple forms of information often exist in cleartext form, | ||||
| e.g., Explicit Congestion Notification (ECN) bits from routers are | ||||
| generally not authenticated or integrity protected. This is possible | ||||
| when the information exchanges do not carry any significantly | ||||
| sensitive information from the parties. Often, these kinds of | ||||
| interactions are also advisory in their nature (see <xref | ||||
| target="impact" format="default"/>).</t> | ||||
| <t>In other cases, it may be necessary to establish a secure | ||||
| signaling channel for communication with a specific other party, | ||||
| e.g., between a network element and an application. This channel may | ||||
| need to be authenticated, integrity protected, and confidential. This | ||||
| is necessary, for instance, if the particular information or request | ||||
| needs to be shared in confidence only with a particular, trusted | ||||
| network element or endpoint or if there is danger of an attack where | ||||
| someone else may forge messages that could endanger the | ||||
| communication.</t> | ||||
| <t>Authenticated integrity protections on signaled data can help | ||||
| ensure that data received in a signal has not been modified by other | ||||
| parties. Still, both network elements and endpoints need to be careful | ||||
| in processing or responding to any signal. Whether through bugs or | ||||
| attacks, the content of path signals can lead to unexpected behaviors | ||||
| or security vulnerabilities if not properly handled. As a result, the | ||||
| advice in <xref target="impact" format="default"/> still applies even | ||||
| in situations where there's a secure channel for sending | ||||
| information.</t> | ||||
| <t>However, it is important to note that authentication does not equal | ||||
| trust. | ||||
| <t>There is a distinction between what information is sent and how it | Whether a communication is with an application server or | |||
| is sent. The actually sent information may be limited, while the | network element that can be shown to be associated with a particular | |||
| domain name, it does not follow that information about the user can be | ||||
| safely sent to it.</t> | ||||
| <t>In some cases, the ability of a party to show that it is on the | ||||
| path can be beneficial. For instance, an ICMP error that refers to a | ||||
| valid flow may be more trustworthy than any ICMP error claiming to | ||||
| come from an address.</t> | ||||
| <t>Other cases may require more substantial assurances. For instance, | ||||
| a specific trust arrangement may be established between a particular | ||||
| network and application. Or technologies, such as confidential | ||||
| computing, can be applied to provide an assurance that information | ||||
| processed by a party is handled in an appropriate manner.</t> | ||||
| </section> | ||||
| <section anchor="minimize-info" numbered="true" toc="default"> | ||||
| <name>Minimize Information</name> | ||||
| <t>Each party should provide only the information that is needed for | ||||
| the other parties to perform the task for which collaboration is | ||||
| desired and no more. This applies to information sent by an | ||||
| application about itself, sent about users, or | ||||
| sent by the network. This also applies to any information related to | ||||
| flow identification.</t> | ||||
| <t>An architecture can follow the guideline from <xref | ||||
| target="RFC8558" format="default"/> in using explicit signals but | ||||
| still fail to differentiate properly between information that should | ||||
| be kept private and information that should be shared. <xref | ||||
| target="RFC6973" format="default"/> also outlines this principle of | ||||
| data minimization as a mitigation technique to protect privacy and | ||||
| provides further guidance.</t> | ||||
| <t>In looking at what information can or cannot be easily passed, we | ||||
| need to consider both information from the network to the application | ||||
| and from the application to the network.</t> | ||||
| <t>For the application-to-network direction, user-identifying | ||||
| information can be problematic for privacy and tracking reasons. | ||||
| Similarly, application identity can be problematic if it might form | ||||
| the basis for prioritization or discrimination that the application | ||||
| provider may not wish to happen.</t> | ||||
| <t>On the other hand, as noted above, information about general | ||||
| classes of applications may be desirable to be given by application | ||||
| providers if it enables prioritization that would improve service, | ||||
| e.g., differentiation between interactive and non-interactive | ||||
| services.</t> | ||||
| <t>For the network-to-application direction, there is similarly | ||||
| sensitive information, such as the precise location of the user. On | ||||
| the other hand, various generic network conditions, predictive | ||||
| bandwidth and latency capabilities, and so on might be attractive | ||||
| information that applications can use to determine, for instance, | ||||
| optimal strategies for changing codecs. However, information given by | ||||
| the network about load conditions and so on should not form a | ||||
| mechanism to provide a side channel into what other users are | ||||
| doing.</t> | ||||
| <t>While information needs to be specific and provided on a per-need | ||||
| basis, it is often beneficial to provide declarative information that, | ||||
| for instance, expresses application needs and then makes specific reques | ||||
| ts | ||||
| for action.</t> | ||||
| </section> | ||||
| <section anchor="impact" numbered="true" toc="default"> | ||||
| <name>Limiting Impact of Information</name> | ||||
| <t>Information shared between a network element and an endpoint of a | ||||
| connection needs to have a limited impact on the behavior of both | ||||
| endpoints and network elements. Any action that an endpoint or network | ||||
| element takes based on a path signal needs to be considered | ||||
| appropriately based on the level of authentication and trust that has | ||||
| been established, and it needs to be scoped to a specific network path.< | ||||
| /t> | ||||
| <t>For example, an ICMP signal from a network element to an endpoint | ||||
| can be used to influence future behavior on that particular network | ||||
| path (such as changing the effective packet size or closing a | ||||
| path-specific connection) but should not be able to cause a multipath | ||||
| or migration-capable transport connection to close.</t> | ||||
| <t>In many cases, path signals can be considered advisory | ||||
| information, with the effect of optimizing or adjusting the behavior | ||||
| of connections on a specific path. In the case of a firewall blocking | ||||
| connectivity to a given host, endpoints should only interpret that as | ||||
| the host being unavailable on that particular path; this is in | ||||
| contrast to an end-to-end authenticated signal, such as a | ||||
| DNSSEC-authenticated denial of existence <xref target="RFC7129" | ||||
| format="default"/>.</t> | ||||
| </section> | ||||
| <section anchor="min-ents" numbered="true" toc="default"> | ||||
| <name>Minimum Set of Entities</name> | ||||
| <t>It is recommended that a design identifies the minimum number of | ||||
| entities needed to share a specific signal required for an identified | ||||
| function.</t> | ||||
| <t>Often, this will be a very limited set, such as when an application | ||||
| only needs to provide a signal to its peer at the other end of the | ||||
| connection or a host needs to contact a specific VPN gateway. In other | ||||
| cases, a broader set is needed, such as when explicit or implicit | ||||
| signals from a potentially unknown set of multiple routers along the | ||||
| path inform the endpoints about congestion.</t> | ||||
| <t>While it is tempting to consider removing these limitations in the | ||||
| context of closed, private networks, each interaction is still best | ||||
| considered separately, rather than simply allowing all information | ||||
| exchanges within the closed network. Even in a closed network with | ||||
| carefully managed elements, there may be compromised components, as | ||||
| evidenced in the most extreme way by the Stuxnet worm that operated in | ||||
| an air-gapped network. Most "closed" networks have at least some needs | ||||
| and means to access the rest of the Internet and should not be | ||||
| modeled as if they had an impenetrable security barrier.</t> | ||||
| </section> | ||||
| <section anchor="info-carry" numbered="true" toc="default"> | ||||
| <name>Carrying Information</name> | ||||
| <t>There is a distinction between what information is sent and how it | ||||
| is sent. The information that is actually sent may be limited, while the | ||||
| mechanisms for sending or requesting information can be capable of | mechanisms for sending or requesting information can be capable of | |||
| sharing much more.</t> | sharing much more.</t> | |||
| <t>There is a trade-off here between flexibility and ensuring that | ||||
| <t>There is a tradeoff here between flexibility and ensuring the | the information is minimal in the future. The concern is that a fully | |||
| minimality of information in the future. The concern is that a fully | generic data-sharing approach between different layers and parties | |||
| generic data sharing approach between different layers and parties | ||||
| could potentially be misused, e.g., by making the availability of some | could potentially be misused, e.g., by making the availability of some | |||
| information a requirement for passing through a network, such as | information a requirement for passing through a network, such as | |||
| making it mandatory to identify specific applications or users. This is | making it mandatory to identify specific applications or users. This is | |||
| undesirable.</t> | undesirable.</t> | |||
| <t>This document recommends that signaling mechanisms that send | ||||
| <t>This document recommends that signalling mechanisms that send information | information be built to specifically support sending the necessary, | |||
| are built to specifically support sending the necessary, minimal set of informat | minimal set of information (see <xref target="minimize-info" | |||
| ion (see <xref target="minimize-info"/>) | format="default"/>) and no more. As previously noted, flow-identifying | |||
| and no more. As previously noted, flow-identifying information is a path signal | information is a path signal in itself, and as such, provisioning of | |||
| in itself, | flow identifiers also requires protocol-specific analysis.</t> | |||
| and as such provisioning of flow identifiers also requires protocol specific ana | <t>Further, such mechanisms also need to have the ability to | |||
| lysis.</t> | establish an agreement (see <xref target="control-distr" | |||
| format="default"/>) and sufficient trust to pass the | ||||
| <t>Further, such mechanisms also need have an ability for establishing an agreem | information (see <xref target="auth" format="default"/>).</t> | |||
| ent (see <xref target="control-distr"/>) and to establish | </section> | |||
| sufficient trust to pass the information (see <xref target="auth"/>).</t> | </section> | |||
| <section anchor="research" numbered="true" toc="default"> | ||||
| </section> | <name>Further Work</name> | |||
| </section> | <t>This is a developing field, and it is expected that our understanding | |||
| <section anchor="research" title="Further Work"> | of it will continue to grow. One recent change is much higher use of | |||
| encryption at different protocol layers. This obviously impacts the | ||||
| <t>This is a developing field, and it is expected that our understanding | field greatly, by removing the ability to use most implicit signals. | |||
| will continue to grow. One recent change is much higher use | However, it may also provide new tools for secure collaboration and | |||
| of encryption at different protocol layers. This obviously impacts | force a rethinking of how collaboration should be performed.</t> | |||
| the field greatly, by removing the ability to use most implicit signals. | <t>While there are some examples of modern, well-designed collaboration | |||
| But it may also provide new tools for secure collaboration, and force | mechanisms, the list of examples is not long. Clearly, more work is | |||
| a rethinking of how collaboration should be performed.</t> | needed if we wish to realize the potential benefits of collaboration in | |||
| further cases. This requires a mindset change, a migration away from | ||||
| <t>While there are some examples of modern, well-designed collaboration | using implicit signals. And of course we need to choose such cases where | |||
| mechanisms, the list of examples is not long. Clearly more work is needed, if | the collaboration | |||
| we wish to realize the potential benefits of collaboration in further cases. | can be performed safely, where it is not a privacy concern, and where the | |||
| This requires a mindset change, a migration away from using implicit signals. | incentives of the relevant parties are aligned. It | |||
| And of course, we need to choose such cases where the collaboration can | should also be noted that many complex cases would require significant | |||
| be performed safely, is not a privacy concern, and the incentives of | developments in order to become feasible.</t> | |||
| the relevant parties are aligned. It should also be noted that many complex case | <t>Some of the most difficult areas are listed below. Research on | |||
| s would | ||||
| require significant developments in order to become feasible.</t> | ||||
| <t>Some of the most difficult areas are listed below. Research on<vspace /> | ||||
| these topics would be welcome. Note that the topics include | these topics would be welcome. Note that the topics include | |||
| both those dealing directly with on-path network element collaboration, | both those dealing directly with on-path network element collaboration | |||
| as well as some adjacent issues that would influence such collaboration.</t> | and some adjacent issues that would influence such collaboration.</t> | |||
| <t><list style="symbols"> | ||||
| <t>Some forms of collaboration may depend on business arrangements, which may | ||||
| or | ||||
| may not be easy to put in place. For instance, some | ||||
| quality-of-service mechanisms involve an expectation of paying for a | ||||
| service. This is possible and has been successful within individual | ||||
| domains, e.g., users can pay for higher data rates or data caps in | ||||
| their ISP networks. However, it is a business-wise much harder | ||||
| proposition for end-to-end connections across multiple | ||||
| administrative domains <xref target="Claffy2015"/> | ||||
| <xref target="RFC9049"/>.</t> | ||||
| <t>Secure communications with path elements is needed as discussed in <xref ta | ||||
| rget="auth"/>. Finding practical | ||||
| ways for this has been difficult, both from the mechanics and scalability point | ||||
| view. And also | ||||
| because there is no easy way to find out which parties to trust or | ||||
| what trust roots would be appropriate. Some application-network | ||||
| element interaction designs have focused on information (such as ECN | ||||
| bits) that is distributed openly within a path, but there are limited | ||||
| examples of designs with secure information exchange with specific network eleme | ||||
| nts or endpoints.</t> | ||||
| <t>The use of path signals for reducing the effects of | ||||
| denial-of-service attacks, e.g., perhaps modern forms of “source | ||||
| quench” designs could be developed. The difficulty is finding a solution | ||||
| that would be both effective against attacks and would not enable third | ||||
| parties from slowing down or censoring someone else’s commmunication.</t> | ||||
| <t>Ways of protecting information when held by network elements or | ||||
| servers, beyond communications security. For instance, host | ||||
| applications commonly share sensitive information about the user’s | ||||
| actions with other parties, starting from basic data such as domain | ||||
| names learned by DNS infrastructure or source and destination | ||||
| addresses and protocol header information learned by all routers on | ||||
| the path, to detailed end user identity and other information | ||||
| learned by the servers. Some solutions are starting to exist for this | ||||
| but are not widely deployed, | ||||
| at least not today <xref target="Oblivious"/> <xref target="PDoT"/> | ||||
| <xref target="I-D.arkko-dns-confidential"/> <xref target="I-D.thomson-http-obliv | ||||
| ious"/>. | ||||
| These solutions address also very specific parts of the issue, | ||||
| and more work remains.</t> | ||||
| <t>Sharing information from networks to applications. There are some | ||||
| working examples of this, e.g., ECN. A few other proposals have been | ||||
| made (see, e.g., <xref target="I-D.flinck-mobile-throughput-guidance"/>), but | ||||
| very few of those have seen deployment.</t> | ||||
| <t>Sharing information from applications to networks. There are a few more | ||||
| working examples of this (see <xref target="intro"/>). However, numerous | ||||
| proposals have been made in this space, but most of them have not | ||||
| progressed through standards or been deployed, for a variety of | ||||
| reasons <xref target="RFC9049"/>. Several current or recent proposals exist, | ||||
| however, such as <xref target="I-D.yiakoumis-network-tokens"/>.</t> | ||||
| <t>Data privacy regimes generally deal with more issues than merely | ||||
| whether some information is shared with another party or not. For | ||||
| instance, there may be rules regarding how long information can be | ||||
| stored or what purpose information may be used for. Similar issues | ||||
| may also be applicable to the kind of information sharing discussed | ||||
| in this document.</t> | ||||
| <t>The present work has | ||||
| focused on the technical aspects of making collabration safe and | ||||
| mutually beneficial, but of course, deployments need to take into account variou | ||||
| s | ||||
| regulatory and other policy matters. These include privacy regulation, | ||||
| competitive issues & network neutrality aspects, and so on.</t> | ||||
| </list></t> | ||||
| </section> | ||||
| <section anchor="acknowledgments" title="Acknowledgments"> | ||||
| <t>The authors would like to thank everyone at the IETF, the IAB, and our | <!--[rfced] Some of the bullet points in this list begin with a | |||
| day jobs for interesting thoughts and proposals in this space. | complete sentence and some begin with a fragmented sentence (see | |||
| Fragments of this document were also in | #4, #5, and #6). Please let us know if/how we may make the list | |||
| <xref target="I-D.per-app-networking-considerations"/> and | parallel. | |||
| <xref target="I-D.arkko-path-signals-information"/> that were published earlier. | ||||
| We | ||||
| would also like to acknowledge <xref target="I-D.trammell-stackevo-explicit-coop | ||||
| "/> | ||||
| for presenting similar thoughts. Finally, the authors would like to | ||||
| thank Adrian Farrell, Toerless Eckert, Martin Thomson, Mark | ||||
| Nottingham, Luis M. Contreras, Watson Ladd, Vittorio Bertola, Andrew | ||||
| Campling, Eliot Lear, Spencer Dawkins, Christian Huitema, David | ||||
| Schinazi, Cullen Jennings, Mallory | ||||
| Knodel, Zhenbin Li, Chris Box, and Jeffrey Haas for useful feedback on this topi | ||||
| c | ||||
| and this draft.</t> | ||||
| </section> | Original: | |||
| * Some forms of collaboration may depend on business arrangements, | ||||
| which may or may not be easy to put in place. | ||||
| </middle> | * Secure communications with path elements is needed as discussed in | |||
| Section 2.3. | ||||
| <back> | * The use of path signals for reducing the effects of denial-of- | |||
| service attacks, e.g., perhaps modern forms of "source quench" | ||||
| designs could be developed. | ||||
| <references title='Informative References'> | * Ways of protecting information when held by network elements or | |||
| servers, beyond communications security. | ||||
| <reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc793"> | * Sharing information from networks to applications. | |||
| <front> | ||||
| <title>Transmission Control Protocol</title> | ||||
| <author fullname="J. Postel" initials="J." surname="Postel"/> | ||||
| <date month="September" year="1981"/> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="793"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC0793"/> | ||||
| </reference> | ||||
| <reference anchor="RFC5218" target="https://www.rfc-editor.org/info/rfc5218"> | * Sharing information from applications to networks. | |||
| <front> | ||||
| <title>What Makes for a Successful Protocol?</title> | ||||
| <author fullname="D. Thaler" initials="D." surname="Thaler"/> | ||||
| <author fullname="B. Aboba" initials="B." surname="Aboba"/> | ||||
| <date month="July" year="2008"/> | ||||
| <abstract> | ||||
| <t>The Internet community has specified a large number of protocols to dat | ||||
| e, and these protocols have achieved varying degrees of success. Based on case | ||||
| studies, this document attempts to ascertain factors that contribute to or hinde | ||||
| r a protocol's success. It is hoped that these observations can serve as guidan | ||||
| ce for future protocol work. This memo provides information for the Internet co | ||||
| mmunity.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="5218"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC5218"/> | ||||
| </reference> | ||||
| <reference anchor="RFC6709" target="https://www.rfc-editor.org/info/rfc6709"> | * Data privacy regimes generally deal with more issues than merely | |||
| <front> | whether some information is shared with another party or not. | |||
| <title>Design Considerations for Protocol Extensions</title> | ||||
| <author fullname="B. Carpenter" initials="B." surname="Carpenter"/> | ||||
| <author fullname="B. Aboba" initials="B." role="editor" surname="Aboba"/> | ||||
| <author fullname="S. Cheshire" initials="S." surname="Cheshire"/> | ||||
| <date month="September" year="2012"/> | ||||
| <abstract> | ||||
| <t>This document discusses architectural issues related to the extensibili | ||||
| ty of Internet protocols, with a focus on design considerations. It is intended | ||||
| to assist designers of both base protocols and extensions. Case studies are in | ||||
| cluded. A companion document, RFC 4775 (BCP 125), discusses procedures relating | ||||
| to the extensibility of IETF protocols. This document is not an Internet Stand | ||||
| ards Track specification; it is published for informational purposes.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="6709"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC6709"/> | ||||
| </reference> | ||||
| <reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973"> | * The present work has focused on the technical aspects of making | |||
| <front> | collaboration safe and mutually beneficial, but of course, | |||
| <title>Privacy Considerations for Internet Protocols</title> | deployments need to take into account various regulatory and other | |||
| <author fullname="A. Cooper" initials="A." surname="Cooper"/> | policy matters. | |||
| <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/> | --> | |||
| <author fullname="B. Aboba" initials="B." surname="Aboba"/> | ||||
| <author fullname="J. Peterson" initials="J." surname="Peterson"/> | ||||
| <author fullname="J. Morris" initials="J." surname="Morris"/> | ||||
| <author fullname="M. Hansen" initials="M." surname="Hansen"/> | ||||
| <author fullname="R. Smith" initials="R." surname="Smith"/> | ||||
| <date month="July" year="2013"/> | ||||
| <abstract> | ||||
| <t>This document offers guidance for developing privacy considerations for | ||||
| inclusion in protocol specifications. It aims to make designers, implementers, | ||||
| and users of Internet protocols aware of privacy-related design choices. It su | ||||
| ggests that whether any individual RFC warrants a specific privacy consideration | ||||
| s section will depend on the document's content.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="6973"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC6973"/> | ||||
| </reference> | ||||
| <reference anchor="RFC7258" target="https://www.rfc-editor.org/info/rfc7258"> | <ul spacing="normal"> | |||
| <front> | <li>Some forms of collaboration may depend on business arrangements, | |||
| <title>Pervasive Monitoring Is an Attack</title> | which may or may not be easy to put in place. For instance, some | |||
| <author fullname="S. Farrell" initials="S." surname="Farrell"/> | quality-of-service mechanisms involve an expectation of paying for a | |||
| <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/> | service. This is possible and has been successful within individual | |||
| <date month="May" year="2014"/> | domains, e.g., users can pay for higher data rates or data caps in | |||
| <abstract> | their ISP networks. However, it is a business-wise | |||
| <t>Pervasive monitoring is a technical attack that should be mitigated in | proposition that is much harder for end-to-end connections across multip | |||
| the design of IETF protocols, where possible.</t> | le administrative | |||
| </abstract> | domains <xref target="Claffy2015" format="default"/> <xref | |||
| </front> | target="RFC9049" format="default"/>.</li> | |||
| <seriesInfo name="BCP" value="188"/> | <li>Secure communication with path elements is needed as discussed | |||
| <seriesInfo name="RFC" value="7258"/> | in <xref target="auth" format="default"/>. | |||
| <seriesInfo name="DOI" value="10.17487/RFC7258"/> | Finding practical ways for | |||
| </reference> | this has been difficult, both from the mechanics and scalability point | |||
| of view, partially because there is no easy way to find out which partie | ||||
| s | ||||
| to trust or what trust roots would be appropriate. Some | ||||
| application-network element interaction designs have focused on | ||||
| information (such as ECN bits) that is distributed openly within a | ||||
| path, but there are limited examples of designs with secure | ||||
| information exchange with specific network elements or endpoints.</li> | ||||
| <li>The use of path signals to reduce the effects of | ||||
| denial-of-service attacks, e.g., perhaps modern forms of "source | ||||
| quench" designs, could be developed. The difficulty is finding a | ||||
| solution that would be both effective against attacks and would not | ||||
| enable third parties from slowing down or censoring someone else's | ||||
| communication.</li> | ||||
| <reference anchor="RFC7305" target="https://www.rfc-editor.org/info/rfc7305"> | <li>Work has begun on mechanisms that dissociate the information held by servers | |||
| <front> | from knowledge of the user's network location and behavior. Among the solutions | |||
| <title>Report from the IAB Workshop on Internet Technology Adoption and Tran | that exist for this but are not widely deployed are <xref target="Oblivious" fo | |||
| sition (ITAT)</title> | rmat="default"/> <xref target="PDoT" format="default"/> <xref target="I-D.arkko- | |||
| <author fullname="E. Lear" initials="E." role="editor" surname="Lear"/> | dns-confidential" format="default"/> <xref target="I-D.thomson-http-oblivious" f | |||
| <date month="July" year="2014"/> | ormat="default"/>. These solutions address specific parts of the issue, and more | |||
| <abstract> | work remains to find ways to limit the spread of information about the user's a | |||
| <t>This document provides an overview of a workshop held by the Internet A | ctions. Host applications currently share sensitive information about the user' | |||
| rchitecture Board (IAB) on Internet Technology Adoption and Transition (ITAT). T | s action with a variety of infrastructure and path elements, starting from basic | |||
| he workshop was hosted by the University of Cambridge on December 4th and 5th of | data, such as domain names, source and destination addresses, and protocol head | |||
| 2013 in Cambridge, UK. The goal of the workshop was to facilitate adoption of I | er information. This can expand to detailed end-user identity and other informa | |||
| nternet protocols, through examination of a variety of economic models, with par | tion learned by the servers. Work to protect all of this information is needed. | |||
| ticular emphasis at the waist of the hourglass (e.g., the middle of the protocol | </li> | |||
| stack). This report summarizes contributions and discussions. As the topics wer | ||||
| e wide ranging, there is no single set of recommendations for IETF participants | ||||
| to pursue at this time. Instead, in the classic sense of early research, the wor | ||||
| kshop noted areas that deserve further exploration.</t> | ||||
| <t>Note that this document is a report on the proceedings of the workshop. | ||||
| The views and positions documented in this report are those of the workshop par | ||||
| ticipants and do not necessarily reflect IAB views and positions.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="7305"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC7305"/> | ||||
| </reference> | ||||
| <reference anchor="RFC8558" target="https://www.rfc-editor.org/info/rfc8558"> | <li>Work is needed to explore how to increase the deployment of mechanisms for s | |||
| <front> | haring information from networks to applications. There are some working example | |||
| <title>Transport Protocol Path Signals</title> | s of this, e.g., ECN. A few other proposals have been made (see, e.g., <xref ta | |||
| <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/> | rget="I-D.flinck-mobile-throughput-guidance" format="default"/>), but very few o | |||
| <date month="April" year="2019"/> | f those have seen deployment.</li> | |||
| <abstract> | ||||
| <t>This document discusses the nature of signals seen by on-path elements | ||||
| examining transport protocols, contrasting implicit and explicit signals. For e | ||||
| xample, TCP's state machine uses a series of well-known messages that are exchan | ||||
| ged in the clear. Because these are visible to network elements on the path bet | ||||
| ween the two nodes setting up the transport connection, they are often used as s | ||||
| ignals by those network elements. In transports that do not exchange these mess | ||||
| ages in the clear, on-path network elements lack those signals. Often, the remo | ||||
| val of those signals is intended by those moving the messages to confidential ch | ||||
| annels. Where the endpoints desire that network elements along the path receive | ||||
| these signals, this document recommends explicit signals be used.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="8558"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8558"/> | ||||
| </reference> | ||||
| <reference anchor="RFC8890" target="https://www.rfc-editor.org/info/rfc8890"> | <li>Additional work on sharing information from applications to networks would a | |||
| <front> | lso be valuable. There are a few working examples of this (see Section 1). Numer | |||
| <title>The Internet is for End Users</title> | ous proposals have been made in this space, but most of them have not progressed | |||
| <author fullname="M. Nottingham" initials="M." surname="Nottingham"/> | through standards or been deployed for a variety of reasons <xref target="RFC90 | |||
| <date month="August" year="2020"/> | 49" format="default"/>. However, several current or recent proposals exist, such | |||
| <abstract> | as <xref target="I-D.yiakoumis-network-tokens" format="default"/>.</li> | |||
| <t>This document explains why the IAB believes that, when there is a confl | ||||
| ict between the interests of end users of the Internet and other parties, IETF d | ||||
| ecisions should favor end users. It also explores how the IETF can more effecti | ||||
| vely achieve this.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="8890"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC8890"/> | ||||
| </reference> | ||||
| <reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000"> | <!-- | |||
| <front> | <li>Ways of protecting information when held by network elements or | |||
| <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title> | servers, beyond communications security. For instance, host | |||
| <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/ | applications commonly share sensitive information about the user's | |||
| > | actions with other parties, starting from basic data, such as domain | |||
| <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/ | names learned by DNS infrastructure or source and destination | |||
| > | addresses and protocol header information learned by all routers on | |||
| <date month="May" year="2021"/> | the path, to detailed end-user identity and other information learned | |||
| <abstract> | by the servers. Some solutions are starting to exist for this but are | |||
| <t>This document defines the core of the QUIC transport protocol. QUIC pr | not widely deployed, at least not today <xref target="Oblivious" | |||
| ovides applications with flow-controlled streams for structured communication, l | format="default"/> <xref target="PDoT" format="default"/> <xref | |||
| ow-latency connection establishment, and network path migration. QUIC includes | target="I-D.arkko-dns-confidential" format="default"/> <xref | |||
| security measures that ensure confidentiality, integrity, and availability in a | target="I-D.thomson-http-oblivious" format="default"/>. These | |||
| range of deployment circumstances. Accompanying documents describe the integrat | solutions address also very specific parts of the issue, and more work | |||
| ion of TLS for key negotiation, loss detection, and an exemplary congestion cont | remains.</li> | |||
| rol algorithm.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="9000"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC9000"/> | ||||
| </reference> | ||||
| <reference anchor="RFC9049" target="https://www.rfc-editor.org/info/rfc9049"> | <li>Sharing information from networks to applications. There are some | |||
| <front> | working examples of this, e.g., ECN. A few other proposals have been | |||
| <title>Path Aware Networking: Obstacles to Deployment (A Bestiary of Roads N | made (see, e.g., <xref target="I-D.flinck-mobile-throughput-guidance" | |||
| ot Taken)</title> | format="default"/>), but very few of those have seen deployment.</li> | |||
| <author fullname="S. Dawkins" initials="S." role="editor" surname="Dawkins"/ | ||||
| > | ||||
| <date month="June" year="2021"/> | ||||
| <abstract> | ||||
| <t>This document is a product of the Path Aware Networking Research Group | ||||
| (PANRG). At the first meeting of the PANRG, the Research Group agreed to catalog | ||||
| and analyze past efforts to develop and deploy Path Aware techniques, most of w | ||||
| hich were unsuccessful or at most partially successful, in order to extract insi | ||||
| ghts and lessons for Path Aware networking researchers.</t> | ||||
| <t>This document contains that catalog and analysis.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="RFC" value="9049"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC9049"/> | ||||
| </reference> | ||||
| <reference anchor="RFC9075" target="https://www.rfc-editor.org/info/rfc9075"> | <li>Sharing information from applications to networks. There are a few | |||
| <front> | working examples of this (see <xref target="intro" | |||
| <title>Report from the IAB COVID-19 Network Impacts Workshop 2020</title> | format="default"/>). Numerous proposals have been made in | |||
| <author fullname="J. Arkko" initials="J." surname="Arkko"/> | this space, but most of them have not progressed through standards or | |||
| <author fullname="S. Farrell" initials="S." surname="Farrell"/> | been deployed for a variety of reasons <xref target="RFC9049" | |||
| <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/> | format="default"/>. However, several current or recent proposals exist, | |||
| <author fullname="C. Perkins" initials="C." surname="Perkins"/> | such as <xref target="I-D.yiakoumis-network-tokens" | |||
| <date month="July" year="2021"/> | format="default"/>.</li> | |||
| <abstract> | --> | |||
| <t>The Coronavirus disease (COVID-19) pandemic caused changes in Internet | <li>Data privacy regimes generally deal with multiple issues, not just | |||
| user behavior, particularly during the introduction of initial quarantine and wo | whether or not some information is shared with another party. For | |||
| rk-from-home arrangements. These behavior changes drove changes in Internet traf | instance, there may be rules regarding how long information can be | |||
| fic.</t> | stored or what purpose that information may be used for. Similar | |||
| <t>The Internet Architecture Board (IAB) held a workshop to discuss networ | issues may also be applicable to the kind of information sharing | |||
| k impacts of the pandemic on November 9-13, 2020. The workshop was held to conve | discussed in this document.</li> | |||
| ne interested researchers, network operators, network management experts, and In | <li>The present work has focused on the technical aspects of making | |||
| ternet technologists to share their experiences. The meeting was held online giv | collaboration safe and mutually beneficial, but of course, deployments | |||
| en the ongoing travel and contact restrictions at that time.</t> | need to take into account various regulatory and other policy | |||
| <t>Note that this document is a report on the proceedings of the workshop. | matters. These include privacy regulation, competitive issues, network | |||
| The views and positions documented in this report are those of the workshop par | neutrality aspects, and so on.</li> | |||
| ticipants and do not necessarily reflect IAB views and positions.</t> | </ul> | |||
| </abstract> | </section> | |||
| </front> | <section anchor="iana-considerations" numbered="true" toc="include"> | |||
| <seriesInfo name="RFC" value="9075"/> | <name>IANA Considerations</name> | |||
| <seriesInfo name="DOI" value="10.17487/RFC9075"/> | <t>This document has no IANA actions.</t> | |||
| </reference> | </section> | |||
| <section anchor="security-considerations" numbered="true" toc="include"> | ||||
| <name>Security Considerations</name> | ||||
| <t>This document has no security considerations.</t> | ||||
| </section> | ||||
| </middle> | ||||
| <back> | ||||
| <displayreference target="I-D.per-app-networking-considerations" to="PER-APP-NET | ||||
| WORKING"/> | ||||
| <displayreference target="I-D.arkko-path-signals-information" to="PATH-SIGNALS-I | ||||
| NFO"/> | ||||
| <displayreference target="I-D.trammell-stackevo-explicit-coop" to="EXPLICIT-COOP | ||||
| "/> | ||||
| <displayreference target="I-D.flinck-mobile-throughput-guidance" to="MOBILE-THRO | ||||
| UGHPUT-GUIDANCE"/> | ||||
| <displayreference target="I-D.arkko-dns-confidential" to="DNS-CONFIDENTIAL"/> | ||||
| <displayreference target="I-D.thomson-http-oblivious" to="HTTP-OBLIVIOUS"/> | ||||
| <displayreference target="I-D.yiakoumis-network-tokens" to="NETWORK-TOKENS"/> | ||||
| <reference anchor="I-D.ietf-quic-manageability" target="https://datatracker.ietf | <references> | |||
| .org/doc/html/draft-ietf-quic-manageability-18"> | <name>Informative References</name> | |||
| <front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.521 | |||
| <title>Manageability of the QUIC Transport Protocol</title> | 8.xml"/> | |||
| <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind"> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.670 | |||
| <organization>Ericsson</organization> | 9.xml"/> | |||
| </author> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.697 | |||
| <author fullname="Brian Trammell" initials="B." surname="Trammell"> | 3.xml"/> | |||
| <organization>Google Switzerland GmbH</organization> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.725 | |||
| </author> | 8.xml"/> | |||
| <date day="15" month="July" year="2022"/> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.730 | |||
| <abstract> | 5.xml"/> | |||
| <t>This document discusses manageability of the QUIC transport protocol an | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.855 | |||
| d focuses on the implications of QUIC's design and wire image on network operati | 8.xml"/> | |||
| ons involving QUIC traffic. It is intended as a "user's manual" for the wire ima | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.889 | |||
| ge to provide guidance for network operators and equipment vendors who rely on t | 0.xml"/> | |||
| he use of transport-aware network functions.</t> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.900 | |||
| </abstract> | 0.xml"/> | |||
| </front> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.929 | |||
| <seriesInfo name="Internet-Draft" value="draft-ietf-quic-manageability-18"/> | 3.xml"/> | |||
| </reference> | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.904 | |||
| 9.xml"/> | ||||
| <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.907 | ||||
| 5.xml"/> | ||||
| <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.931 | ||||
| 2.xml"/> | ||||
| <reference anchor="I-D.per-app-networking-considerations" target="https://datatr | <!-- [I-D.per-app-networking-considerations] IESG state Expired --> | |||
| acker.ietf.org/doc/html/draft-per-app-networking-considerations-00"> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.p | |||
| <front> | er-app-networking-considerations.xml"/> | |||
| <title>Per-Application Networking Considerations</title> | ||||
| <author fullname="Lorenzo Colitti" initials="L." surname="Colitti"> | ||||
| <organization>Google</organization> | ||||
| </author> | ||||
| <author fullname="Tommy Pauly" initials="T." surname="Pauly"> | ||||
| <organization>Apple Inc.</organization> | ||||
| </author> | ||||
| <date day="15" month="November" year="2020"/> | ||||
| <abstract> | ||||
| <t>This document describes considerations for and implications of using ap | ||||
| plication identifiers as a method of differentiating traffic on networks. Specif | ||||
| ically, it discusses privacy considerations, possible mitigations, and considera | ||||
| tions for user experience and API design. Discussion Venues This note is to be r | ||||
| emoved before publishing as an RFC. Source for this draft and an issue tracker c | ||||
| an be found at https://github.com/tfpauly/per-app-networking-considerations.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-per-app-networking-consideratio | ||||
| ns-00"/> | ||||
| </reference> | ||||
| <reference anchor="I-D.arkko-path-signals-information" target="https://datatrack | <!-- [I-D.arkko-path-signals-information] IESG state Expired --> | |||
| er.ietf.org/doc/html/draft-arkko-path-signals-information-00"> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.a | |||
| <front> | rkko-path-signals-information.xml"/> | |||
| <title>Considerations on Information Passed between Networks and Application | ||||
| s</title> | ||||
| <author fullname="Jari Arkko" initials="J." surname="Arkko"> | ||||
| <organization>Ericsson</organization> | ||||
| </author> | ||||
| <date day="22" month="February" year="2021"/> | ||||
| <abstract> | ||||
| <t>Path signals are messages seen by on-path elements examining transport | ||||
| protocols. Current preference for good protocol design indicates desire for cons | ||||
| tructing explict rather than implicit signals to carry information. For instance | ||||
| , the ability of various middleboxes to read TCP messaging was an implicit signa | ||||
| l that lead to difficulties in evolving the TCP protocol without breaking connec | ||||
| tivity through some of those middleboxes. This document discusses the types of i | ||||
| nformation that could be passed in these path signals, and provides some advice | ||||
| on what types of information might be provided in a beneficial manner, and which | ||||
| information might be less likely to be revealed or used by applications or netw | ||||
| orks.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-arkko-path-signals-information- | ||||
| 00"/> | ||||
| </reference> | ||||
| <!-- [I-D.trammell-stackevo-explicit-coop] IESG state Expired. Updated to long v ersion because output is not showing editor role--> | ||||
| <reference anchor="I-D.trammell-stackevo-explicit-coop" target="https://datatrac ker.ietf.org/doc/html/draft-trammell-stackevo-explicit-coop-00"> | <reference anchor="I-D.trammell-stackevo-explicit-coop" target="https://datatrac ker.ietf.org/doc/html/draft-trammell-stackevo-explicit-coop-00"> | |||
| <front> | <front> | |||
| <title>Architectural Considerations for Transport Evolution with Explicit Pa | <title> | |||
| th Cooperation</title> | Architectural Considerations for Transport Evolution with Explicit Path Cooperat | |||
| <author fullname="Brian Trammell" initials="B." surname="Trammell"> | ion | |||
| <organization>ETH Zurich</organization> | </title> | |||
| </author> | <author initials="B." surname="Trammell" fullname="Brian Trammell" role="editor" | |||
| <date day="23" month="September" year="2015"/> | > | |||
| <abstract> | <organization>ETH Zurich</organization> | |||
| <t>The IAB Stack Evolution in a Middlebox Internet (SEMI) workshop in Zuri | </author> | |||
| ch in January 2015 and the follow-up Substrate Protocol for User Datagrams (SPUD | <date month="September" day="23" year="2015"/> | |||
| ) BoF session at the IETF 92 meeting in Dallas in March 2015 identified the pote | </front> | |||
| ntial need for a UDP-based encapsulation to allow explicit cooperation with midd | <seriesInfo name="Internet-Draft" value="draft-trammell-stackevo-explicit-coop-0 | |||
| leboxes while using encryption at the transport layer and above to protect user | 0"/> | |||
| payload and metadata from inspection and interference. This document proposes a | ||||
| set of architectural considerations for such approaches.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-trammell-stackevo-explicit-coop | ||||
| -00"/> | ||||
| </reference> | </reference> | |||
| <!-- [I-D.flinck-mobile-throughput-guidance] IESG state Expired. Updated to | ||||
| long version because Yanai's name is showing as "R.B Yanai" instead of | ||||
| "R. Bar Yanai". | ||||
| --> | ||||
| <reference anchor="I-D.flinck-mobile-throughput-guidance" target="https://datatr acker.ietf.org/doc/html/draft-flinck-mobile-throughput-guidance-04"> | <reference anchor="I-D.flinck-mobile-throughput-guidance" target="https://datatr acker.ietf.org/doc/html/draft-flinck-mobile-throughput-guidance-04"> | |||
| <front> | <front> | |||
| <title>Mobile Throughput Guidance Inband Signaling Protocol</title> | <title> | |||
| <author fullname="Ankur Jain" initials="A." surname="Jain"> | Mobile Throughput Guidance Inband Signaling Protocol | |||
| <organization>Google</organization> | </title> | |||
| </author> | <author initials="A." surname="Jain" fullname="Ankur Jain"> | |||
| <author fullname="Andreas Terzis" initials="A." surname="Terzis"> | <organization>Google</organization> | |||
| <organization>Google</organization> | </author> | |||
| </author> | <author initials="A." surname="Terzis" fullname="Andreas Terzis"> | |||
| <author fullname="Hannu Flinck" initials="H." surname="Flinck"> | <organization>Google</organization> | |||
| <organization>Nokia Networks</organization> | </author> | |||
| </author> | <author initials="H." surname="Flinck" fullname="Hannu Flinck"> | |||
| <author fullname="Nurit Sprecher" initials="N." surname="Sprecher"> | <organization>Nokia Networks</organization> | |||
| <organization>Nokia Networks</organization> | </author> | |||
| </author> | <author initials="N." surname="Sprecher" fullname="Nurit Sprecher"> | |||
| <author fullname="Swaminathan Arunachalam" initials="S." surname="Arunachala | <organization>Nokia Networks</organization> | |||
| m"> | </author> | |||
| <organization>Nokia Networks</organization> | <author initials="S." surname="Arunachalam" fullname="Swaminathan Arunachalam"> | |||
| </author> | <organization>Nokia Networks</organization> | |||
| <author fullname="Kevin Smith" initials="K." surname="Smith"> | </author> | |||
| <organization>Vodafone</organization> | <author initials="K." surname="Smith" fullname="Kevin Smith"> | |||
| </author> | <organization>Vodafone</organization> | |||
| <author fullname="Vijay Devarapalli" initials="V." surname="Devarapalli"> | </author> | |||
| <organization>Vasona Networks</organization> | <author initials="V." surname="Devarapalli" fullname="Vijay Devarapalli"> | |||
| </author> | <organization>Vasona Networks</organization> | |||
| <author fullname="Roni Bar Yanai" initials="R. B." surname="Yanai"> | </author> | |||
| <organization>Vasona Networks</organization> | <author initials="R." surname="Bar Yanai" fullname="Roni Bar Yanai"> | |||
| </author> | <organization>Vasona Networks</organization> | |||
| <date day="13" month="March" year="2017"/> | </author> | |||
| <abstract> | <date month="March" day="13" year="2017"/> | |||
| <t>The bandwidth available for end user devices in cellular networks can v | </front> | |||
| ary by an order of magnitude over a few seconds due to changes in the underlying | <seriesInfo name="Internet-Draft" value="draft-flinck-mobile-throughput-guidance | |||
| radio channel conditions, as device mobility and changes in system load as othe | -04"/> | |||
| r devices enter and leave the network. Furthermore, packets losses are not alway | ||||
| s signs of congestion. The Transmission Control Protocol (TCP) can have difficul | ||||
| ties adapting to these rapidly varying conditions leading to inefficient use of | ||||
| a cellular network's resources and degraded application performance. Problem sta | ||||
| tement, requirements and the architecture for a solution is documented in [Req_A | ||||
| rch_MTG_Exposure]. This document proposes a mechanism and protocol elements that | ||||
| allow the cellular network to provide near real-time information on capacity av | ||||
| ailable to the TCP server. This "Throughput Guidance" (TG) information would ind | ||||
| icate the throughput estimated to be available at the radio downlink interface ( | ||||
| between the Radio Access Network (RAN) and the mobile device (UE)). TCP server c | ||||
| an use this TG information to ensure high network utilization and high service d | ||||
| elivery performance. The document describes the applicability of the proposed me | ||||
| chanism for video delivery over cellular networks; it also presents test results | ||||
| from live operator's environment.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-flinck-mobile-throughput-guidan | ||||
| ce-04"/> | ||||
| </reference> | </reference> | |||
| <reference anchor="I-D.arkko-dns-confidential" target="https://datatracker.ietf. | <!-- [I-D.arkko-dns-confidential] IESG state Expired --> | |||
| org/doc/html/draft-arkko-dns-confidential-02"> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.a | |||
| <front> | rkko-dns-confidential.xml"/> | |||
| <title>Privacy Improvements for DNS Resolution with Confidential Computing</ | ||||
| title> | ||||
| <author fullname="Jari Arkko" initials="J." surname="Arkko"> | ||||
| <organization>Ericsson</organization> | ||||
| </author> | ||||
| <author fullname="Jiri Novotny" initials="J." surname="Novotny"> | ||||
| <organization>Ericsson</organization> | ||||
| </author> | ||||
| <date day="2" month="July" year="2021"/> | ||||
| <abstract> | ||||
| <t>Data leaks are a serious privacy problem for Internet users. Data in fl | ||||
| ight and at rest can be protected with traditional communications security and d | ||||
| ata encryption. Protecting data in use is more difficult. In addition, failure t | ||||
| o protect data in use can lead to disclosing session or encryption keys needed f | ||||
| or protecting data in flight or at rest. This document discusses the use of Conf | ||||
| idential Computing, to reduce the risk of leaks from data in use. Our example us | ||||
| e case is in the context of DNS resolution services. The document looks at the o | ||||
| perational implications of running services in a way that even the owner of the | ||||
| service or compute platform cannot access user-specific information produced by | ||||
| the resolution process.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-arkko-dns-confidential-02"/> | ||||
| </reference> | ||||
| <reference anchor="I-D.thomson-http-oblivious" target="https://datatracker.ietf. | <!-- [I-D.thomson-http-oblivious] IESG state Expired --> | |||
| org/doc/html/draft-thomson-http-oblivious-02"> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.t | |||
| <front> | homson-http-oblivious.xml"/> | |||
| <title>Oblivious HTTP</title> | ||||
| <author fullname="Martin Thomson" initials="M." surname="Thomson"> | ||||
| <organization>Mozilla</organization> | ||||
| </author> | ||||
| <author fullname="Christopher A. Wood" initials="C. A." surname="Wood"> | ||||
| <organization>Cloudflare</organization> | ||||
| </author> | ||||
| <date day="24" month="August" year="2021"/> | ||||
| <abstract> | ||||
| <t>This document describes a system for the forwarding of encrypted HTTP m | ||||
| essages. This allows a client to make multiple requests of a server without the | ||||
| server being able to link those requests to the client or to identify the reques | ||||
| ts as having come from the same client.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-thomson-http-oblivious-02"/> | ||||
| </reference> | ||||
| <!-- [I-D.yiakoumis-network-tokens] IESG state Expired. Updated to long version because date is showing as "December 22" instead of "December 21" --> | ||||
| <reference anchor="I-D.yiakoumis-network-tokens" target="https://datatracker.iet f.org/doc/html/draft-yiakoumis-network-tokens-02"> | <reference anchor="I-D.yiakoumis-network-tokens" target="https://datatracker.iet f.org/doc/html/draft-yiakoumis-network-tokens-02"> | |||
| <front> | <front> | |||
| <title>Network Tokens</title> | <title>Network Tokens</title> | |||
| <author fullname="Yiannis Yiakoumis" initials="Y." surname="Yiakoumis"> | <author initials="Y." surname="Yiakoumis" fullname="Yiannis Yiakoumis"> | |||
| <organization>Selfie Networks</organization> | <organization>Selfie Networks</organization> | |||
| </author> | </author> | |||
| <author fullname="Nick McKeown" initials="N." surname="McKeown"> | <author initials="N." surname="McKeown" fullname="Nick McKeown"> | |||
| <organization>Stanford University</organization> | <organization>Stanford University</organization> | |||
| </author> | </author> | |||
| <author fullname="Frode Sorensen" initials="F." surname="Sorensen"> | <author initials="F." surname="Sorensen" fullname="Frode Sorensen"> | |||
| <organization>Norwegian Communications Authority</organization> | <organization>Norwegian Communications Authority</organization> | |||
| </author> | </author> | |||
| <date day="22" month="December" year="2020"/> | <date month="December" day="21" year="2020"/> | |||
| <abstract> | </front> | |||
| <t>Network tokens is a method for endpoints to explicitly and securely coo | <seriesInfo name="Internet-Draft" value="draft-yiakoumis-network-tokens-02"/> | |||
| rdinate with networks about how their traffic is treated. They are inserted by e | ||||
| ndpoints in existing protocols, interpreted by trusted networks, and may be sign | ||||
| ed or encrypted to meet security and privacy requirements. Network tokens provid | ||||
| e a means for network operators to expose datapath services (such as a zero-rati | ||||
| ng service, a user-driven QoS service, or a firewall whitelist), and for end use | ||||
| rs and application providers to access such services. Network tokens are inspire | ||||
| d and derived by existing security tokens (like JWT and CWT), and borrow several | ||||
| of their core ideas along with security and privacy properties.</t> | ||||
| </abstract> | ||||
| </front> | ||||
| <seriesInfo name="Internet-Draft" value="draft-yiakoumis-network-tokens-02"/> | ||||
| </reference> | ||||
| <reference anchor="Claffy2015" > | ||||
| <front> | ||||
| <title>Adding Enhanced Services to the Internet: Lessons from History</title | ||||
| > | ||||
| <author initials="." surname="kc Claffy"> | ||||
| <organization></organization> | ||||
| </author> | ||||
| <author initials="D." surname="Clark"> | ||||
| <organization></organization> | ||||
| </author> | ||||
| <date year="2015" month="April"/> | ||||
| </front> | ||||
| <seriesInfo name="TPRC 43: The 43rd Research Conference on Communication, Info | ||||
| rmation and Internet Policy Paper" value=""/> | ||||
| </reference> | ||||
| <reference anchor="Oblivious" > | ||||
| <front> | ||||
| <title>Oblivious DNS: Practical privacy for DNS queries</title> | ||||
| <author initials="P." surname="Schmitt"> | ||||
| <organization></organization> | ||||
| </author> | ||||
| <date year="2019"/> | ||||
| </front> | ||||
| <seriesInfo name="Proceedings on Privacy Enhancing Technologies 2019.2: 228-24 | ||||
| 4" value=""/> | ||||
| </reference> | ||||
| <reference anchor="PDoT" > | ||||
| <front> | ||||
| <title>PDoT: Private DNS-over-TLS with TEE Support</title> | ||||
| <author initials="Y." surname="Nakatsuka"> | ||||
| <organization></organization> | ||||
| </author> | ||||
| <author initials="A." surname="Paverd"> | ||||
| <organization></organization> | ||||
| </author> | ||||
| <author initials="G." surname="Tsudik"> | ||||
| <organization></organization> | ||||
| </author> | ||||
| <date year="2021" month="February"/> | ||||
| </front> | ||||
| <seriesInfo name="Digit. Threat.: Res. Pract., Vol. 2, No. 1, Article 3, https | ||||
| ://dl.acm.org/doi/fullHtml/10.1145/3431171" value=""/> | ||||
| </reference> | </reference> | |||
| <reference anchor="RFC7129" target="https://www.rfc-editor.org/info/rfc7129"> | <reference anchor="Claffy2015" target="https://papers.ssrn.com/sol3/papers | |||
| <front> | .cfm?abstract_id=2587262"> | |||
| <title>Authenticated Denial of Existence in the DNS</title> | <front> | |||
| <author fullname="R. Gieben" initials="R." surname="Gieben"/> | <title>Adding Enhanced Services to the Internet: Lessons from History< | |||
| <author fullname="W. Mekking" initials="W." surname="Mekking"/> | /title> | |||
| <date month="February" year="2014"/> | <author initials="kc" surname="claffy" fullname="kc claffy" > | |||
| <abstract> | <organization/> | |||
| <t>Authenticated denial of existence allows a resolver to validate that a | </author> | |||
| certain domain name does not exist. It is also used to signal that a domain name | <author initials="D." surname="Clark" fullname="David Clark"> | |||
| exists but does not have the specific resource record (RR) type you were asking | <organization/> | |||
| for. When returning a negative DNS Security Extensions (DNSSEC) response, a nam | </author> | |||
| e server usually includes up to two NSEC records. With NSEC version 3 (NSEC3), t | <date year="2015" month="November"/> | |||
| his amount is three.</t> | </front> | |||
| <t>This document provides additional background commentary and some contex | <refcontent>TPRC 43: The 43rd Research Conference on Communication, | |||
| t for the NSEC and NSEC3 mechanisms used by DNSSEC to provide authenticated deni | Information and Internet Policy Paper</refcontent> | |||
| al-of-existence responses.</t> | <seriesInfo name="DOI" value="10.2139/ssrn.2587262"/> | |||
| </abstract> | </reference> | |||
| </front> | ||||
| <seriesInfo name="RFC" value="7129"/> | ||||
| <seriesInfo name="DOI" value="10.17487/RFC7129"/> | ||||
| </reference> | ||||
| </references> | <reference anchor="Oblivious"> | |||
| <front> | ||||
| <title>Oblivious DNS: Practical Privacy for DNS Queries</title> | ||||
| <author initials="P." surname="Schmitt" fullname="Paul Schmitt"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author initials="A." surname="Edmundson" fullname="Anne Edmundson"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author initials="A." surname="Mankin" fullname="Allison Mankin"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author initials="N." surname="Feamster" fullname="Nick Feamster"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date year="2018" month="December"/> | ||||
| </front> | ||||
| <refcontent>Proceedings on Privacy Enhancing Technologies, Volume 2019, | ||||
| Issue 2, pp. 228-244</refcontent> | ||||
| <seriesInfo name="DOI" value="10.2478/popets-2019-0028"/> | ||||
| </reference> | ||||
| </back> | <reference anchor="PDoT"> | |||
| <front> | ||||
| <title>PDoT: Private DNS-over-TLS with TEE Support</title> | ||||
| <author initials="Y." surname="Nakatsuka" fullname="Yoshimichi Nakatsu | ||||
| ka"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author initials="A." surname="Paverd" fullname="Andrew Paverd"> | ||||
| <organization/> | ||||
| </author> | ||||
| <author initials="G." surname="Tsudik" fullname="Gene Tsudik"> | ||||
| <organization/> | ||||
| </author> | ||||
| <date year="2021" month="February"/> | ||||
| </front> | ||||
| <refcontent>Digital Threats: Research and Practice, Volume 2, Issue 1, | ||||
| Article No. 3, pp. 1-22</refcontent> | ||||
| <seriesInfo name="DOI" value="10.1145/3431171"/> | ||||
| </reference> | ||||
| <!-- ##markdown-source: | <xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.712 | |||
| H4sIAA1h92MAA419XZMbx7Hle/2KCjLiSnQAEElJV+LowaZIyqKvSPGac63Y | 9.xml"/> | |||
| 3djYaKALQGsa3XB/zBBizD+7b/vHNk9+VFU3QHodtmM406iuysrKPHkys7Bc | </references> | |||
| Lt1QDXW48i/apq/K0BVDRT/5tvHPj8e62vC//dK/DcNd293Qc3VdrFt5zv9X | ||||
| XzU7/64Y9v59tWuKunfFet2F26vJL/VTrmw3TXGgt5VdsR2WVbFeHumxZS+P | ||||
| LTf54MvHX7uyGMKVo0mEXdudrnzVbFvnqmN35Ydu7Ienjx8/e/zU3YQTTa68 | ||||
| 8q+bIXRNGJYv8QLn+qFoyv9T1G1DLz2F3h2rK/+/hnaz8H3bDV3Y9vTT6YAf | ||||
| /rdzxTjs2+7Keb+k/3l6XX/l/7byz7ubm5Z/I9P/W9FV2S/bbnflX3XVpu/b | ||||
| hn8TDkVVX/nf6blVgef+EvTPq017cNMXXK/8z0VXViF7w3Uo81/yG15U/abN | ||||
| hx9CuarCsP3LDv++PPK7YqxP+cDt4XDKfssjY6vDZOQjHvhLgd9fGPfNyv/H | ||||
| //3vfR3uqqbMBn9Tdb8X8z99UjoHPL26GYM+PZORa9ruQJpwSxpAe047H//p | ||||
| /d9/evH4u2df64/fPn3y/ZWXn//9u8fP9Nf//uw7e+K7p9/GJ777+vG39vP3 | ||||
| 39Lv9cfvnz3WH589fpx+/OZZ/PE7+dzr5UuW+/KfY7VZHoqm2IViXdXVcLrS | ||||
| Px9DtyTpLRs5NnRKSLnzE2YPsnZMT0FcatvYU0NXHA6hrpek0JubcNsuwwec | ||||
| zmqgYdujPbatq2Zzszy0NJmwHPZdO+72x3FY7saqLJpNmL61bHDkmi3Nqhmq | ||||
| oo5v27cH2oblfhiOy3ZdV7dVO8YZn6riph0PVW+LWw7tTZAVvaiL7fb09PGT | ||||
| b694p71alwfPyxKW4lWzxzRK/z50t9Um9H5o/bAP8eBe+V8CVKD32649+J+r | ||||
| fqCD/0AG60lBQg/x0IjX7/7+wn/zNWk0ffybr7vS/z30oeg2e9iybegCvQh2 | ||||
| 7AVp/NioJVvQm6J0PRmH+Gb/riWB4mjQ3ukL2fzQ6eiq2mNR8ttkJeg/SzkR | ||||
| Nxtd++S3L1f4bXdDv/w1F2MUS/ytf/n2PdnMrtgMNNPa0ytvC5oNzRV/8v8c | ||||
| ee0PoH46LZrQMzebjr733cq/3+wP1TC4udjede0mBGwGG/l3+h7ZGGzRddjs | ||||
| m7Zud/QZfsfqKb3r6ffLp998A7G8e9leT9bAv5CBhoDJLttb0v7rX977u4p8 | ||||
| wPWrV/79eDySvX3wifn+j5V/W9wUQz/eFPnvn8N+0WBl/su/rvx1P5bVTRLF | ||||
| T2HdjUV3ovk+fXK25JfVrhroQ/suFMPqCnqyElGvFv4fbb3yTxf+bbvyTxZk | ||||
| 1En+dfBfLzy0v7/66quyXhWbw4rM2FdlW321Hev65+FQf/Xk8erJk2++/err | ||||
| b75+8uS7J7w2t1wufbHuB4zu3PW+6j05vfFAB8yXZL/Hviex0u6SsMm29rzB | ||||
| ZcDRh/APJPyiqfoDHYx9MfixJxXu6Pn2lg6pg5nwaiYWrL2kK7UMwq6OPEbv | ||||
| oUO0tVXj+2PYVNtq42+LeizWtK5NQe9fObJmHqYPr9501Rpzysb2RU9T6Xuy | ||||
| a3xCaXg+jmQT+LFQB6yoXzjM4dhW9LNvx0EmfVv1Fd6V2THShLr264AFlf5u | ||||
| H+jMd74afNWTZR9CU9Kv6aWFzgBvbFretJBLi9Y0TGRadHhPHMCZoWORwLCI | ||||
| bH279WYx/VSKd/uKTAbGIYPRjh2tucSaabKMB2AaAUBKljfNpB5pJwryXk11 | ||||
| oJn2ZDpo9GNBmiPS4r9Uf0wF0O8JCzQ7XlE/WdOmaBy9rNjsq3CLd4vZznWh | ||||
| rm54et3pyIPR+6qpGXOB9p+MSb+HGjE28l2oxdfsq2NP6xnuQmg81sMzxQdZ | ||||
| FivHanuoypJQgHsIk9i15Shq9PFhhX/ekw/++FE95v09yXVbNVgvyZgM6ME/ | ||||
| yMX6AJtpynSuQM4UiMTRlsVppny0F+2W9tRXB9myhQ8rEh05zwoSwlCOTimJ | ||||
| PHwYaEUluaBl4O1JUlmf5FPhQ4EdYbEUTQ875OhAEQhsa5rATzQ3sisDtGZx | ||||
| puF8Am9p62Cjt1Wo6XyR9GnV7vrFO78PBU3Ks2CAR0gwtFqZ53SL1jge2Uxp | ||||
| a2hDT47kdEeOHfIiV0znDY+vvKrJAGNckfHv/Z4MoSfPX0MC67ApMDPMY3LM | ||||
| cIZuCV3xYWeF1TV0gcBKRx9tWnoRgeWqsZNJ+1E0J4LIUE46XAdak+9HOhXZ | ||||
| 6w8tTkjRV/WJ1nes2xO/gg5844oaLpSx2YKswSBogh6UD9m5I0EDrDACwpOE | ||||
| j7qW1B7m2Lmf2ztS/24hB5z0gA5SoP0Sm1KkYKTndSn2ULmIuph0SCpVx2ah | ||||
| E1vosEhsAAHLYxfoTPfYILUNMBX79k5enH2Kzmw71qXb08tpdHpKbMWXevQf | ||||
| TS0cnoXVaMi9Qknp+cJvQjcUZLW2Y8NjrsQn7GmfarEzMHnDqGOQVSTRQ+1P | ||||
| k8FZBjKP3juxTroZaburXswrtJn0ko/m2SBxmrTGkTdJ5rtyz3vddDyWfc4d | ||||
| 6ICuMRSkV4eBtg4/d13Y0MmkZbYNT7es8Bv6sQsk5J60gDdaz4t3Z3Op+rNZ | ||||
| kO3xBWFFwWqkaLDsZCnZXrmZ0Ttzl3cQn+xq3IGy2jIYHOIeuJrM8yCmi1VG | ||||
| sbtNNBoHuBsov2yco6n14+FAOGMhkhqbY100DYs8ak2PU+7HIxQTRqeHVpOf | ||||
| aMJOxBFoPpuBcKD7k/+176vtCY+ll64hSzHA+MNEBrTzBGXN36nPIeDBq8c+ | ||||
| kdNkN3skYESf1omStkHBxcKv2w9mTlgQcmAEamw9rFrLXqan+b0AZOJVnEin | ||||
| DoQkaOdxvG9piGJXQNXUHDB8wXnvw2bsGLa08PJ3Va/zoReRKHrhF7ZpxfSe | ||||
| HwsmEvRQ0wogPHLGnnHMTG3O9NGzCVeNzGdNXrotQ63nykaPHpAsE31Anb2Y | ||||
| sxZyIIF2OOjnBpzAk8z/WPQ8Y3XWzk3dyJYmQELoo/iB4enfbT2KA+888DFh | ||||
| B1GUQDMIjePjuw5ki82ItR2BVwAi3vQh7SepJmLu5ZoAXem2FUww44s3z1/g | ||||
| BNHLettmjC2mgY/EhuIu9jakZPWC8McR++ngGOF+Zx9BgFYQ/ACo98np/nx9 | ||||
| /c6ZOASLksWG6/pyinrpZyilyM+QH1ljEvNRwp0gLn/XtiUEsy7KhUBDs4T9 | ||||
| YNu5LTYKMuH5opT53P9L4a0eOfeGPF3UvKn94I0UEBs8x9n0upo/jIWJHbtr | ||||
| jY0iBbry5wDxqHHQJo86o7ljS6n42LHxJ6me4jmcYsmFujV+N3k3cpX+AZ38 | ||||
| Bz/wm8Zm8nZ3HAn/bT7xYvanBszx4rpO58GwTo4IX304tuJM0hmIAJn0n+L3 | ||||
| gp3ooW0qitHZ2Ih/JExvYQU+D+rEg38RmISf7u9FY3CSeWbr4KJ+YgGh21SI | ||||
| gscOs+jZy2AeND9S+Eoinqj0SSMmMIEeoUE76CKrIBxDF1buR9rjggAYbTAJ | ||||
| G5LI4GfNC2HJBTFgdCAa0kjMlffJ5OaE+DnwsSzDetzt5LMSeJhTwUwjWIEm | ||||
| 0Wnj6EB0tFciBMAAWoyTcICScqSmlivbIYexbed43hQ/WIBIcmwIl7PsbOCF | ||||
| X9N6xUWzfztxxBExYJAonZ1hU0osR254kI0pxFlNVkRC08HtvV3PgSCLSxa5 | ||||
| xhM09J5PGykdHbF2Q45BlABU2v09qZmCDkV9CQnhH+0hkKg4QiIvA2QLbAAX | ||||
| QnicVkhwvgztdusstDHSpBALMNmCM7HRLC2sjg7VEAIJYApHK9Z4AmA8iZF8 | ||||
| PmwoTaM+kd2s6Yc/6ONkTGDRSCf/UKeBiPaP0LVLAg5pdSv/FhaxrieAxlwK | ||||
| Bz206rrt1U/yquaRCs2HP0v/mAzDdEFQ/ivqvsJ/5iBoYDk0gZ0AjPQ6sH1l | ||||
| zxDKhVNAQO9janA4JbXOsgIVu4iVf08KTTKo6Sk7GymWYes99hNDUrZBvAL7 | ||||
| GtqJjmRdJIs0tEcwUKRqnVNrjCFIGHIi+VjnTgfgbENeHzZE4Aj7HkT9KWqm | ||||
| TYS538nic3VbuVfpMdUK6HGr3Ir6ypq3JwcF4kqFBSGnwkfFYFELbGeiWgOo | ||||
| txV4N5chuAm4wyiyT7IZjBYPBT+MbaYo6Zohva7UfXKlcQmkrC0zb/ROOggs | ||||
| aeOh2c1AqC5SoGBPK6wCAE5jjlv1rBaLS3RbJB7iOA7OQvctRwMSQsfD5Cng | ||||
| E6dP04nRYG5u6ZxgXmT3IRVHwooEVcY5rOYo6z//6/ULBBtkymmtQK54v0Xr | ||||
| ZyEjxU6MFlIU7iaUA0yk7Ch7SZrFxCguZADszSRqUIP2+DHN0DueE+t3YA86 | ||||
| 1ftQKlTIBRWt+4DQnN5xCBDByKd0Ji/l+ozXA2hnR5GAIeb8/khHc10NDg8r | ||||
| 04BoGutXR8JKTWaM5/X6pew2XImRdDQDV7cURq6LGuImw/7x42cyH1j9tUTQ | ||||
| KXTkCC+XKLytrbsMkgKAf8qlVPUGiBwjr/okeDGtduVfAQw14S7+zixcH8NH | ||||
| sidFHnMrTalg7q7Q49CDMxDTxr4FSRyxjaQU27HWeNKRrt/NImN2CwUsJjxZ | ||||
| I7aJwDGEjL/R+OGAI5p2UZg5Zm5zEkY9mIsbazHKIumfz6iiiSeLZJr7x7u3 | ||||
| osuFoGlQXxQhMcwRKTGegE3teIb5gczQpMXXFLO2Q5V4IhrFDHz+5ogyLWCA | ||||
| BTTjOLRpVZD22AHt+OfnbxPZHPB/a3ZNbKYYQ7p1C4VhgoGzZxzPJtEkseaY | ||||
| 2M6MY+7xoszEiWCwi3/+xMDJ3mHgBJscG+hdCwJ7C4sJO8zBfQZMeEQFmNHy | ||||
| Ro+YIwtwIqKkh9Z09BxVTuyHooIMCLoM1PwWlNOKHJHMUcbmI6FImlQl2W/S | ||||
| KBfpaaxBiTOcP/oQv7iXDE9Sp0kuX3EsWSS4XWC1os/mSOqgoTJifsivt4mu | ||||
| AxMl162a7zN6CnpHqGagcGMclIpp5PwzIAHS2mwYx+A3P9BgzKIAtQ6GFPMN | ||||
| kmMs7s4iCTo/BMmnr4kz0CHz+c2pt/jJqX2z7Oec0eEAT0bdQY85kZEPMUsA | ||||
| qDbxpzfVMTpn/LIj9bgtmsHGFiXtg4oZisSeCnPnvc3fAx9K1uufwtFhmwML | ||||
| bgF/HSrYS80BTQ2R+2sLvafB74quXLCmpAQVa22lJ+DV9U9M/rEWbdvNyFGO | ||||
| MhgRqu2KI9yHABv8liwmHR2fUc/9jBJk57ceq5qfT9rMG2R4GEHGTFXNFmeG | ||||
| 98ICfwvsLWPaRUZCcLqJnKFx182JBWDnNU7FqY6bqWNN/41j6MhRsTnEA2xn | ||||
| 2zPNCh8Y04Y/e/6s2GE8xCQ1RR2Thwsb+hRTaeAcWP5/ng0gPKUsgfdPbZ5O | ||||
| Gshw/hF7p/IYcRE6RkysVY0w9WeT7qrdfkh7qE6I+XTS4sBmVQyoYKXbcJJV | ||||
| 3FQ4uZNTQYO71+S0A0VS7Y0YqrMtEG8ZU29IRi3oI25bsWVgtrHhyBmG5ND2 | ||||
| g56rg5BDJIwuMkas3rz48ajw0SVdIA27RYqlbYXXWUgw3jNdHCPKKe8PlqOo | ||||
| ajhR4R74TZv2yD59ahK67HSIyiXnLXAPOkSq+zKmm8/ApUXSn0q3zDK/ERCL | ||||
| njNZNjHMnOIh40pGrD5ZiIQAkyKatSR0z1UZqjnz9xFhkFkGTdkItE0eFnKB | ||||
| lVJ+AsxuV3EFSD77xNgw3cJ0JgWogUxjkQdOjH7PhBPTUmC5SZwg6G+ZxouE | ||||
| Yh4YkKR/jGxkim9i6JxFNgsxhc9/5MRQnMR27OCLUlJbZiivEh+88v75gWJt | ||||
| 9VrGupKB5uFRGHV/n+LBHblcJCMI6hL0djyRjcQERR3zegIxmFlmThD/LeoT | ||||
| eDdwP6PQBKIYUE9EVawP/E4UYCFBnFU7mHQ+DMi8qXg4tx8BUCw7ObnnpSQg | ||||
| ePxr5GwZz/svX18/v37E3oOO3RGRHw6fsIpfP/6WXmpblEeTFCzzmWjN4BVk | ||||
| qE0QQ3usNiuL4b55Jsykf/138komzEWUnwOKJkm1uzEIUdtDK/tRUjMc4ZsT | ||||
| 1cVn+RIm321tFHZPkt55+MaWkiPEcVBAx6c1ZY8z4rrtnPkPhpqhW2aRHZiT | ||||
| sLJKFBRFZnNLqbGUijVAcAHEGc2hqpQpZcYbSO2S1TZwMtywokuzhsTTY7m2 | ||||
| uPzTOPQcyOgg8LhbmlJ7p7Fmr8vkTY+7xK5YYx8N/T8gUxdxUSR+zDWRbZdx | ||||
| 1Za4aX0GOR/kU1tMu9MqMxyrGFGyGuV+DjZC87TwPsDNgxoOCStr5LC2LYOu | ||||
| UxKmRuA7UhiwWg9RV2UT+fgwE5luqQkgMT4ZhbMUnzmrNppZECNv45HpJWkm | ||||
| Gs34Lw82pliJGbhI5AAW7SuKNy+xN4LtkOTQaJAhJY0xS1i0/sGcGHkghGS2 | ||||
| jkl+YVYRxFPOqxDIeaI260+ReMipJ/p8qMR2mreRh9NDEvpqdG+xlsJXC4e9 | ||||
| VDuyG0SqEekGS4fra4WIJzAgbrIe2T1lhzod2575hDx8P58605kT0UXn3cSQ | ||||
| lHe28B0ZktBJfiePcynumrxlvuZCOA038/7/X6+WoNletwS5jay8QyaUkwPd | ||||
| wm9JRHeADUaw4pfAKpKS9JKS9M/fvdaPkLt72w4SZDkJUycTETxHo23CUQsL | ||||
| CMgpyWrQjT2b39JpX5DDRpnR1gkU2wt3ckSN7fCD4DP8isN8jhVb1YOYosu5 | ||||
| TbfJEs9jPVR46jSdIWxxcROg6DvOhS403J6cUomCFOzvxUbnMSrn2MmJOl5q | ||||
| JyGqlphNi6Bi1VcezJyjuXA4EvSo/ohgztgvOmeEL5uTbueeADrJr8P7LCqJ | ||||
| rIbLID4jSBR0+L/ClvFSbpr2Dj9BSuw+LyYRZ3k83bSphKCAtH4ulbXQO08E | ||||
| chafHXTmYiPHwtsUuDakBz4lLQNfgEKCjCxnByx5rE6KbkDtIQGNaIhwXCF6 | ||||
| AUXCgX3IhXPGPfiXOTjnIjr6k5lt2PtA54xJuDVFCPBQnLIvZ9Dwim3Xg59G | ||||
| Qo4H5TAWM5OXmW7ByYcpcuWK2H0s/AFKUSJH49P5J7KnlV7nCly1CXNkLBTt | ||||
| 3V53WX75RW/p96HtlODgicgMh5xnznNzeTJaOA2YKc59IRLDCCxwlQGysiQ3 | ||||
| OmxmkXVOmtFas4bC8BZw7z3ePHATxRoKxVVKMnUtQHqQcXhVFsBPazlNOhGq | ||||
| Q7XphdgbKTtKpKcmsRee34WqXNPHvFCJXxQfjXuDyjwrzbk8hZLZbNqZqpkM | ||||
| Atsug7gZgGcpqQFJNQtkWeacFz+oy3A6rNiBvm83VTHjwbjUQ4vJ5mou5mDu | ||||
| NhOB3E4Si9EVG+d9BYnOP6QywInWlJrRfsBrN/nUVl6AyeTcuAMZ4n4WmfXJ | ||||
| ieuMtGLiIAygIeYEIReumoameLoxL6WsLThWIB4OW822xk0BgREoInoZhx9O | ||||
| x9DPNn3hJoA9btVCQw77WxY2s5XOHXUCHjCzPDedhNWTR7ArpSlpWLiaeuyN | ||||
| y+BqnhkVq+jVsSPlYh42GXf79jBPX4vMQtEzrch0S0Ts02W78wLQbOfFZ/Nr | ||||
| zkzIl6j/XcQk91wY/SN3iUW/PPjk/TpwGQaKfmmhnCqv2yhjihPvKhCvfaSc | ||||
| Hq38jyMKmYVLXVwoLmsVSXBvRh4Pws+SKRCXG9PqyQi1fazr4RmnrVxPSkIm | ||||
| lXStVr4YKZz7rjldXcBUgvGQQPzTIaJnXgdJ7pxqpHdJop/WAgABf4dJy6wj | ||||
| sacg8BPK5Wx14mpf6MNqpl7O2PG8y+fjQx15yeu65+KmKbVjmD00KAITasLY | ||||
| S8fBpUGbYtcFlnRkq2aM7Mpdx5zRYQQIlc8cpM5C4Jh8RsuVp1wvKVVAvC+n | ||||
| 8zOsP8cubYdMPvIEgFFFCfUaQhQl/WGyE1zEJ4Uf+a7xybzYq1Cd9ycUfYzW | ||||
| oX4IxsVnSm4gkfllQNolOnwaCl0gDNMkkXCmkH6a/+T6jxmXvKLA6BRrZeZ5 | ||||
| kI6JfegXe+HGemHinNapHl0oTPjWLOyZVxQX84JixiTqYd0bsoy1ULiC+iUD | ||||
| M9YEkI2RlmBCllfi7DYTD05a59aSAerokA3aB5NBsqg9CAqVAQaFhdqohXGL | ||||
| 1bFSEzeTB/dnFN1OpFg4k0/G4ouNOcZdYA3ntqTGSkZCFVnWiVd9PbjMXMLa | ||||
| jKSQkBUbTQbMAEkbzeVUW2jCpPzHqVI0MJYMneyolaQlrSqh1b43BXNMHNcx | ||||
| He9mdIbWu+05vxi4oFHqz6RwgtM9qbLOPehJfxlkPrCdyqfbp76JVnOCoTR4 | ||||
| Flwm+M6CbK13zVQd9YOKPVb+XSrb8o4GLFAyxP090vfQBYkHFKUvkJtGIZrU | ||||
| n1th4ELJ9osWBOrEZVvbSmC+y9mQaclqZfmUfKmFWnz+BQGdEG1v7GeYGDyp | ||||
| qo1U7oWIHBJRJlM4ZVR411uz3lM0w2id9gYR9EEyB9ySMvkYl4BlZXpNe5aA | ||||
| cHm1uEKSrEcBdTG9Vnx33or3rWyd7A7zzmgToVCP0PQsu6EDmsQDt9hBpJHg | ||||
| g9R0IzJC6jLa3lqx6mriuhi+X5pzLNCbHj+dlLW72FNf9M7SP6jsTNABMLXM | ||||
| U9a0haR9Ef2LaEiDZqxHjk4mwB2+HC0+i9iNUNScedu0CN7L8IOwsxM4hUfv | ||||
| kEPlpF5dI+3IXOkZRkqFiUy4xH9JVwuO0cqjpjQ5qBhNf//sMch9pXIk7yxE | ||||
| 1W0V7hafWX8UF1jhFrQDij3VlbZ9uKDFSRCCJSzdwLkCADnuN2rNqXJZcy1s | ||||
| esJBOViQPpm4H+za0utc7LiR5J9uelwPl56P7AEkeSieLIuFBFS9kwQdBpm3 | ||||
| Sc/qdT4+hB0hKPUeu8l1+jzqYY7erTXrQ9Vz8Bs7CBAJHbixb+FfvXiLcjWt | ||||
| pxFDqk0BIrhadWlS8K68wo7j2JhbtCq0PuHiSE3kxsHwWyyRpXPbndjCcnoU | ||||
| DHUziHdXQ5B/nGcaiy5Q0fQrL1SoqpSOzvqCOKbkouryturb7uQkGq46cWvB | ||||
| f9kHfcR4/Y8fxUfc3z8SDyAHUVxYFa1byh4DmcaahEKbcVyGcLDqhgC3ldqn | ||||
| 2FArvCIGS2f+JA2Yi1hpXZxF8OdKafBR3sddZDk/mG/l4tJGapVcup5A6/iY | ||||
| ZdDlCtuSRZXbrBCGYdgUDkX4kwNCNZpQTn3bRqtBVSJpuIVjbxnOKFT4DeNY | ||||
| rVa6C1/AkZbQsk5qiHwxcGOJNvrR2QF7E+o+sHxoqhRQpM5rJmLZ+ICe4GEE | ||||
| vE8J5edTlz4XZaUXuqgSwAuCvER8uA/10eWFS/wXre1hkcSObCAq8TIByKsU | ||||
| dLE+TV3Dyr9HgmMhCfyz2FqKBoyKVnUA/jVKpGpy/MV4vj+2Aq9hL/V0omTs | ||||
| N+klctYvvR53AiBZxP3C5wXucy7YeA7HtWDSCMbhDDeedTxQ5MhuxxpWiPPW | ||||
| TGJxNQiQJxl4UhMBeCVXsRVKRy6spBRtElV+kDUF5IwSkxREkyclRT2SCmlL | ||||
| XX50nQUdUyQW8dBnOalZqWfE40xOiIpH+aJydEoh9ZEIzj2eEOU4Y2fkXlZa | ||||
| TL70rjETkFjEs4PmyhaV79zjtpjEDJKnPS8DFNYgOm15n+uLrUZoLIJq0D7O | ||||
| GAfoPqXWFpmFFLvt44u0eytS0u6MXZkTXMAYL96886HrjN7ltgzJq+JGhqp0 | ||||
| oLLNhjPiYdmT9Ib9SSAOI+s0zqYuqoMehg0Wwb3w3BjDBXO0vF8zDyH0uJS6 | ||||
| SXPmuMYEGYiS/CmWargcdzJ3lzkBLYDtOpgf3k6dbvQyfGzMLWQ7aGrAniF3 | ||||
| C7920lhul4wYmMxtvUNv58hIRCWtCaWsb4c10NZwphBO7YikGGxXOZTk08rG | ||||
| rckrlEDxNhxpERR6Y5c4TJkku9uBL+kBkwRyRYZWmGiT07r1Cy3YkSY3QmFq | ||||
| QvMyXone+xt+UrrrpsxN1WtbWyl0RiPlSep7zcRA8/PQhakoYJ1Jok1OEMGw | ||||
| UG8X5x+QP2vrzZQxcjZixu3bFBjwpHnMcilOYhreVj4MFrkm59ZM21JSDQi/ | ||||
| LaUYGJHlBQfcnsRc5IzuyzPxWl6XeG7WhGjarRj0bBNTDHUTjkNs+yzmrNbk | ||||
| WSXGtd4I11PRNFlCJNpa79OosvthuMoPLln1Tutw6GCTJ9rpK+ySBj0aENQk | ||||
| WRxrQ7SeLFabiC1EfQqHDZ8g9Dlh0bB7kBsHQDlz1wNXShqmi21F8PxT9YlY | ||||
| OfV3zQMmVt74XK6V+qxplfQAff6hlAFZsL4uLQqHMlzIVyhDRL/baIVMXq5P | ||||
| YALiQc8VV2Zk3W6TZjjtlLsw6EJ5rwNXt+L1TssQKivJ0bgy0nYIYDtY+kyN | ||||
| 5olxa76MobbF0EKWwRWct7EKigO6Rk7qUhrCYlVyNVyQBZ84j9bXwop2lhyz | ||||
| kiW2KhemiCQZi8DqPmcrzq6msI4EbTG1yCM/n3lhQ4ywbrXUs22W+e9Sf21U | ||||
| nEwLLycdB2uP6W2rUxDoJgx8zoMgRYK7DmIeKOMQVt7ne+FkL6xTjSVOupdq | ||||
| rDTT0qP0ED1jvJQ1feiuKhl6lc7aujbFMSLTrCVSlQ2OcxhMGHPLNO2X3ghx | ||||
| INS9JiHmARZ3L6NAgMakMAPpEQ4kra9y05Zhk/Ny+SujiuS7ILwOd5qldWfr | ||||
| yAgu7QBP5eE5FnCwPkuDyNy0z+Ys6xgVNr/NK9Xy6U1iQsM/mQEttUGeDAoe | ||||
| dXx+DWkLzZEl27K5kUjqQm69OduChZsK2OpAJv2LNjUAQklaZy1VHNDKNli/ | ||||
| GwDML6gXZyaH447zpJjGI/ABZ6zmv4zzY5UXJxWygtMoRM4sFLHTpdJZyCmw | ||||
| OAsfh79wn69PQi3DyXI5VrOSpnAh5GAhpQrmPPib7HPqMnPTWvX4WUw3pigv | ||||
| 9MhpOwJOU0w6ZNhYjuRaq/btxh/bvUkxnlgozYKnAEJnLcTlxcqJTBaarLNG | ||||
| vJTu346MnpLgrVokUSWTDrgv1bS5rGXaekK4NE+SJT0gMscl0lQukl7GBSbN | ||||
| eLRwjLomfLX5D7nNKlbNodyygwXTm2DZxuHJeIFXpnH4eM3pOKCZdHfC4jzi | ||||
| n7YVahSqZNy00iLdiSBdMCjBlIsblJcoyt/HfjC55PqclXE61r1UCcS1TK9F | ||||
| p7gdk+PNWAW5JtdxI1ZUhrhFiR9rjJjOfdsPeUeoClPvX9IMoh4QcUr4hNRC | ||||
| ubFJV0Vd2H1M7gdvtx0IGUby7jMVs67paQpJBJx8YYHLbt6/erGcPkbwqJK+ | ||||
| SOaCoZTu48c/o3b/ydNn3N1tYdd48O8lX/nKElsceS1hC2CwNF0Va/x1yVYm | ||||
| HrNf066kZjysmYhzMV+mcVhMb2WbpccuJsU0oZwyay7d6eWM+9UcN+vV2dUu | ||||
| SURMSM8ofN7EaJqiW7N5MHmBWyjAyAwZrAvCNAMcZoeCE6m8+XFI7CdMcLbG | ||||
| f7x7yw2Gd8UJeulycrnw667l2+2QgY8x62wR2eVubl52aCYrzz6OjRSBalZf | ||||
| zjsppHL+Dlc17yLLomdSDmLyEGu5yi3elhedufSRhcNxiBSJBiXcQquntdeL | ||||
| rxT2CAnvmCn8IFVCMCflIgZ1dn3LQhro8iviABIH2fF+cJlx0aaigDAhrxHW | ||||
| K40KazaY5yxTWiLW9AWdUIqs/SvlDIvZn+Q2v9RiIA1PZdYizNBWITzfhtce | ||||
| KgyAn9tGW6J7F26FBy+tYo9b36y3HZ3CCuPeD+MHJH3vZJ8AuPiGP2nbho5X | ||||
| 3Q7xSD79NxjsgUz9wewqPxqhDjA7zNGx9jpp7OTLANvYV86FD7EfL6afFQPn | ||||
| bsZxQ4Mktu0OnH1RapUFQbZBAplI+K6LrquMCXqBvNA8JYaC3m275JwRF/Va | ||||
| Qz1X7FRiGCKMunRxQCydBslojdGNXnkar8XTmtH0Sd06NSt85VItxXxZ6QqX | ||||
| Oig/nGpi5rXh5hHVuZJdtAryA44480iTpdmFO55/ZYvb1mTQlT+dNQXSpOSq | ||||
| ROVWJyIQvRJcIqvWYvZUd+slj27xETMhNkdrWYrzSJWKdXFitN+kK/Iki5Jb | ||||
| IjCuVT/yQZdyvjXOy425dHWW6cojUsfpBYTmGxiHcRg/vRQuobVkNJ2+gVN3 | ||||
| KDltJWcX6wRS4HHpKquY3HRoYNcAHLdnXn+2IPwzBU7zOizHFShjVbPfn/Tq | ||||
| WIu/aZZEcTETN7sQNxcV5zU/fpySp/ePpozlc7ACgW/DlnQvdgacYE7fnDWY | ||||
| TpA9ClOEvpTGF+WW2ZmicFVLxiZEI2uK9AzqBSKxoigLAqVGFhBdODTd0Uya | ||||
| qUpQzFgzuathcj0v/hZLAlU20xLF+0fWbhI/6Ppxi9CSQb+1QEPjzkhmHZET | ||||
| 9Jw2fuh11v43+IiPD2MPm4sp1cJKFrhZHhfdLvT+WK7TtQSZWPixyy5QALZk | ||||
| 0IMlVI3wkLsOPXq/NlycxtXD2trbi3HhMtDO2jSyq4uQg4wHOe6EnGjV/nZt | ||||
| SqL1U8ym8ZzpvaEY4HPXp4nPj5sh9T7izuaARa6G06x63lLIHR/pOihLx+VM | ||||
| vEiL/rrB5dAEw2mnb1TfYOGntH1WvGtVURHFDPEeuGkfI+AS+bGuWXBJ/DKW | ||||
| JU6bNJNKSmqrrsRHxnG0QA1AC9fTB+a3ODkk9zIkpFdt3V2IrCJJttZ767Jq | ||||
| JmE8Bi01n6Qmmkg4663jvHvpnh5YjBLWQnRjwb/ZWWchMAYDyDHdijbZq+cC | ||||
| fHElIQri7kIsL9jsW5Tl8AnNr9E7L3zVcDmVpkm+cBFvrYxcsPqmWPuXN/bS | ||||
| LNxw4aoNrfjgXcoLr/TKw7z6SsJWvs/0g82ZLx+OF1WkmhQ7qbERMRYBr4Pk | ||||
| BEHUwzFoeY4iJNZ5HC5EfFxiV8gUoSKxljd9jQLJx2uTnfa3xsuDSQHxplXq | ||||
| xpNUlTxml6RzDYCUSJVQHtxma7Vs0lOpXY1zUmN6svI7sqV4rPy92EgforRe | ||||
| Z+xxJDxk9/OBVrhegwUSC5Wm2oBjL82CXGsIxQPSzJKf8b54PEohj88v3bVm | ||||
| hiPfZ+W5b2qeFWYU4e2qgmW7XdpVipkr0bpObbUieUU++Vic9F4Vjy9K0M/y | ||||
| deGzmidGlsZHacs+Ciw0qsBtzWTZkO73XnLtveEg4Ur5WkmpSTFrLcUhXILY | ||||
| dlZEcsR8+QpiFDK9fv8u4vmcBZZLSKNMl3wrsHiCAtpLA3AnXp91GFzsjCVo | ||||
| 3OFiRIsc6YNFCWDBjDSXa8pqyAOmbyO5v6fnsiZ/UQUz45NyVVbM6SVQKWFb | ||||
| nJUWipelba4EFB3tKzzohVz4GEvt4m7EI6hVMjHtpSqwUfqbBjGvlQoVpa0L | ||||
| FsT5/Bp4wegEplgL9XYzbquRZopK89SahtVbqCB3Dk70GwPadshOecaIruTg | ||||
| ZKDUvv2FRohtwVlgrNXYAoas9bttZkBFUfGrF2+xGnIjj2KKPL9siUJKK8eq | ||||
| jM2VJG5ylnZlnJ94TJsG76r67Yt3jsgDc142dSOm8q6eled6H6/MntCMW463 | ||||
| 9O7uRCDyPYteSbD82MdqJTl7dsuoePpkqB7IxWlsOsi87R/ElW1iI6CWnJYS | ||||
| TEUt46KHbWUtCnYHtd0aHnebdTERvHaNpU6QVfIuBtWSx4Ni85ezmGaxKvdK | ||||
| bZQgesANU0TIvb2TgrcvpId8Usj2J/8bjoxeDq6VqJNL9sE57QH01qdLm6Q2 | ||||
| kUsU9Cro2fG2GH9umMGVwZZMEmL0UablhBy8WAg6qzv6Aj2uVvCZ3RuQKqcH | ||||
| /AQbDlHJfVES1+pZEPPl5Cu18C0BRddIDQs65+nN4GS7UYohuKUBimHXsll7 | ||||
| CZtFuwTcridlKK1fWZEvIXsH6Cirv1UdCXrcJC0oDW+hKaf3w+Y3p2XBpM/H | ||||
| HvbBdkfNiemiwJAoGu6uqrSJB7YTxmFMNyvcoeTDvoYClS8+sUb4O1/jRLY5 | ||||
| frvS/T39C99TpH7g01+BxU9++juw4DnsuzmyyYuk9ZJtsL4Z5d+lanKGKzzb | ||||
| pswQdxfYYYlPutDDn99eGG/lMCXlw57FCzDo8oVjEzsIKZqNIWtLXoRQ4p0p | ||||
| J3veyd3vjGxKqUi2z4lg/uV3jFHMybaZhmBZ8Hu2igP5BXwBYLq89vMLn5xI | ||||
| VDFGdJEWXvBL+M4V/+n1W2As32dDkXHWPTIeQodUPD5/QRwijHhlGkWdQfzP | ||||
| 5EYwfhyVoTLIThv6jQ5KF+DhYrokA+Y5mLBHQUBguglDaMXJBLcQaJGvkyAr | ||||
| 1lnjkUTYadp8eKBn1jyU+CfZw099hZsCo5ewRxb4dGHHl3CnSnxgebFt0qQR | ||||
| QTiJiRviGFRI8Sjj9TnzmZpU7IYRLaGzb336iS15Ms4T1roba+7a3uHrEWmb | ||||
| EV1z1uCc24Q7GFprRc6a4y9RqnYBPaFpLfHRpSnKt6ht2haOc33h8rlIU0a4 | ||||
| yAuaN114r1AiXkUAg0BIkf6SgSaOrbjMa8N1m0dFFMZXShhj3AKFsFwh4rX/ | ||||
| lMlOq0vQ6+BT3JzOYSzIli984BKKYkPPAXpKqQq+GSPsxlp4y2Tzj/LdebT2 | ||||
| QXmawELmODBXpbHWmM5ztBsGdaiiQ/8WfXoTRsLzwinLcqfXfT/0zzfIJJEz | ||||
| 2vHcpQVVvluuz/qBZI+K5gZ11h2+5cjSZ+gAihevyegkEgfX8Xu77rXwRRpo | ||||
| BMzhFA/RnephmxiFlfupK3aKRrbT3ZZvqWAtIv8uB/Fffk0k6gNpK3OX9anv | ||||
| isR3T8UvweEvg+DaXPA7yGX434K7S/SDyaaIYgzm+T7/XZPkQqVkLfYbaZVU | ||||
| FBAHQ3ZPySf2xMmePC8pumj8TxRiB3QNXLeh4675V/TmjgKkNwwJSJ/YG/O/ | ||||
| b9zbdsCL98Vh4X8ZScRvVtIPTlIjPfmtGOhZ/wu55YX/RzXgYpnW/0jjtXWx | ||||
| QPzUhTv3As6BL5x5VVcEGn4hQS38+yPIg45M4N0Nh8Qv9h0SOjTJn0eKLw40 | ||||
| wMuCImf3fkOxSPFHRY+MdU3G/G+hAcHcY5J1jfae/2iQd1r4/0modU2r+KXS | ||||
| 8fyP7QfRuL8R4O7Cyf9cFLEJEGH6lk7imr+hQtWLqRUn5JNd5bZy/w/wHLO+ | ||||
| wXcAAA== | ||||
| <section anchor="iab-members-at-the-time-of-approval" numbered="false"> | ||||
| <name>IAB Members at the Time of Approval</name> | ||||
| <t>Internet Architecture Board members at the time this document was | ||||
| approved for publication were:</t> | ||||
| <ul empty="true" spacing="compact" bare="false" indent="3"> | ||||
| <li> | ||||
| <t><contact fullname="Jari Arkko"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Deborah Brungard"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Lars Eggert"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Wes Hardaker"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Cullen Jennings"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Mallory Knodel"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Mirja Kühlewind"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Zhenbin Li"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Tommy Pauly"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="David Schinazi"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Russ White"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Qin Wu"/></t> | ||||
| </li> | ||||
| <li> | ||||
| <t><contact fullname="Jiankang Yao"/></t> | ||||
| </li> | ||||
| </ul> | ||||
| </section> | ||||
| <section anchor="acknowledgments" numbered="false" toc="default"> | ||||
| <name>Acknowledgments</name> | ||||
| <t>The authors would like to thank everyone at the IETF, the IAB, and | ||||
| our day jobs for interesting thoughts and proposals in this space. | ||||
| Fragments of this document were also in <xref | ||||
| target="I-D.per-app-networking-considerations" format="default"/> and | ||||
| <xref target="I-D.arkko-path-signals-information" format="default"/>. | ||||
| We would also like to acknowledge that similar thoughts are presented in < | ||||
| xref | ||||
| target="I-D.trammell-stackevo-explicit-coop" format="default"/>. Finally, | ||||
| the authors would like to thank | ||||
| <contact fullname="Adrian Farrell"/>, <contact fullname="Toerless | ||||
| Eckert"/>, <contact fullname="Martin Thomson"/>, <contact fullname="Mark | ||||
| Nottingham"/>, <contact fullname="Luis M. Contreras"/>, <contact | ||||
| fullname="Watson Ladd"/>, <contact fullname="Vittorio Bertola"/>, | ||||
| <contact fullname="Andrew Campling"/>, <contact fullname="Eliot Lear"/>, | ||||
| <contact fullname="Spencer Dawkins"/>, <contact fullname="Christian | ||||
| Huitema"/>, <contact fullname="David Schinazi"/>, <contact | ||||
| fullname="Cullen Jennings"/>, <contact fullname="Mallory Knodel"/>, | ||||
| <contact fullname="Zhenbin Li"/>, <contact fullname="Chris Box"/>, and | ||||
| <contact fullname="Jeffrey Haas"/> for useful feedback on this topic and | ||||
| document.</t> | ||||
| </section> | ||||
| </back> | ||||
| </rfc> | </rfc> | |||
| End of changes. 62 change blocks. | ||||
| 1336 lines changed or deleted | 837 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. | ||||