rfc9217.original.xml | rfc9217.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<!DOCTYPE rfc [ | <!DOCTYPE rfc [ | |||
<!ENTITY nbsp " "> | <!ENTITY nbsp " "> | |||
<!ENTITY zwsp "​"> | <!ENTITY zwsp "​"> | |||
<!ENTITY nbhy "‑"> | <!ENTITY nbhy "‑"> | |||
<!ENTITY wj "⁠"> | <!ENTITY wj "⁠"> | |||
]> | ]> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 --> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | -irtf-panrg-questions-12" number="9217" tocInclude="true" sortRefs="true" symRef | |||
-irtf-panrg-questions-12" category="info" tocInclude="true" sortRefs="true" symR | s="true" obsoletes="" updates="" submissionType="IRTF" category="info" consensus | |||
efs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version=" | ="true" xml:lang="en" version="3"> | |||
3"> | ||||
<!-- xml2rfc v2v3 conversion 3.12.0 --> | <!-- [rfced] FYI: We've updated the term "path aware" when used in attributive p | |||
osition, including in the title of this document. Please let us know if this is | ||||
not preferred. | ||||
Original: | ||||
Current Open Questions in Path Aware Networking | ||||
Updated: | ||||
Current Open Questions in Path-Aware Networking | ||||
Note: We did not hyphenate as part of "Path Aware Networking proposed Research G | ||||
roup" since it does not appear as part of the RG name. | ||||
--> | ||||
<front> | <front> | |||
<title abbrev="PAN questions">Current Open Questions in Path Aware Networkin | <title abbrev="PAN questions">Current Open Questions in Path-Aware Networkin | |||
g</title> | g</title> | |||
<seriesInfo name="Internet-Draft" value="draft-irtf-panrg-questions-12"/> | <seriesInfo name="RFC" value="9217"/> | |||
<author initials="B." surname="Trammell" fullname="Brian Trammell"> | <author initials="B." surname="Trammell" fullname="Brian Trammell"> | |||
<organization>Google Switzerland GmbH</organization> | <organization>Google Switzerland GmbH</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street>Gustav-Gull-Platz 1</street> | <street>Gustav-Gull-Platz 1</street> | |||
<city>8004 Zurich</city> | <city>Zurich</city> | |||
<code>8004</code> | ||||
<country>Switzerland</country> | <country>Switzerland</country> | |||
</postal> | </postal> | |||
<email>ietf@trammell.ch</email> | <email>ietf@trammell.ch</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2022" month="January" day="25"/> | <date year="2022" month="March"/> | |||
<workgroup>Path Aware Networking RG</workgroup> | <workgroup>Path Aware Networking</workgroup> | |||
<keyword>Internet-Draft</keyword> | ||||
<!-- [rfced] Please insert any keywords (beyond those that appear in the title) | ||||
for use on https://www.rfc-editor.org/search. --> | ||||
<keyword>example</keyword> | ||||
<abstract> | <abstract> | |||
<t>In contrast to the present Internet architecture, a path-aware internet | <t>In contrast to the present Internet architecture, a path-aware | |||
working | internetworking architecture has two important properties: it exposes | |||
architecture has two important properties: it exposes the properties of | the properties of available Internet paths to endpoints, and it provides | |||
available Internet paths to endpoints, and provides for endpoints and | for endpoints and applications to use these properties to select paths | |||
applications to use these properties to select paths through the Internet for | through the Internet for their traffic. While this property of "path | |||
their traffic. While this property of "path awareness" already exists in many | awareness" already exists in many Internet-connected networks within | |||
Internet-connected networks within single domains and via administrative | single domains and via administrative interfaces to the network layer, a | |||
interfaces to the network layer, a fully path-aware internetwork expands these | fully path-aware internetwork expands these concepts across layers and | |||
concepts across layers and across the Internet.</t> | across the Internet.</t> | |||
<t>This document poses questions in path-aware networking open as of 2021, | ||||
that | <t>This document poses questions in path-aware networking, open as of | |||
must be answered in the design, development, and deployment of path-aware | 2021, that must be answered in the design, development, and deployment | |||
internetworks. It was originally written to frame discussions in the Path Aware | of path-aware internetworks. It was originally written to frame | |||
Networking proposed Research Group (PANRG), and has been published to snapshot | discussions in the Path Aware Networking Research Group (PANRG), and has | |||
current thinking in this space.</t> | been published to snapshot current thinking in this space.</t> | |||
</abstract> | </abstract> | |||
<note removeInRFC="true"> | ||||
<name>Discussion Venues</name> | ||||
<t>Source for this draft and an issue tracker can be found at | ||||
<eref target="https://github.com/panrg/questions"/>.</t> | ||||
</note> | ||||
</front> | </front> | |||
<middle> | <middle> | |||
<!-- [rfced] For ease of the reader, should a definition or reference for SD-WAN | ||||
be added? If yes, please provide the reference information. Perhaps an inform | ||||
ative reference to the definition in RFC 9061? | ||||
Original: | ||||
(e.g., Path Computation Element (PCE) [RFC4655] and Software-Defined | ||||
Wide Area Network (SD-WAN) approaches) | ||||
--> | ||||
<section anchor="intro" numbered="true" toc="default"> | <section anchor="intro" numbered="true" toc="default"> | |||
<name>Introduction to Path-Aware Networking</name> | <name>Introduction to Path-Aware Networking</name> | |||
<t>In the current Internet architecture, the network layer provides a | <t>In the current Internet architecture, the network layer provides a | |||
best-effort service to the endpoints using it, without verifiability of the | best-effort service to the endpoints using it, without verifiability of | |||
properties of the path between tne endpoints. While there are network layer | the properties of the path between the endpoints. While there are | |||
technologies that attempt better-than-best-effort delivery, the interfaces to | network-layer technologies that attempt better-than-best-effort | |||
these are generally administrative as opposed to endpoint-exposed (e.g. Path | delivery, the interfaces to these are generally administrative as | |||
Computation Element (PCE) <xref target="RFC4655" format="default"/> and Software | opposed to endpoint exposed (e.g., Path Computation Element (PCE) <xref | |||
-Defined Wide Area Network | target="RFC4655" format="default"/> and Software-Defined Wide Area | |||
(SD-WAN) approaches), and they are often restricted to single | Network (SD-WAN) approaches), and they are often restricted to single | |||
administrative domains. In this architecture, an application can assume that a | administrative domains. In this architecture, an application can assume | |||
packet with a given destination address will eventually be forwarded toward that | that a packet with a given destination address will eventually be | |||
destination, but little else.</t> | forwarded toward that destination, but little else.</t> | |||
<t>A transport layer protocol such as TCP can provide reliability over thi | <t>A transport-layer protocol such as TCP can provide reliability over | |||
s | this best-effort service, and a protocol above the network layer, such | |||
best-effort service, and a protocol above the network layer, such as | as Transport Layer Security (TLS) <xref target="RFC8446" | |||
Transport Layer Security (TLS) <xref target="RFC8446" format="default"/> can aut | format="default"/>, can authenticate the remote endpoint. However, | |||
henticate the remote | little, if any, explicit information about the path is available to the | |||
endpoint. However, little, if any, explicit information about the path | endpoints, and any assumptions made about that path often do not hold. | |||
is available to the endpoints, and any assumptions made about that path | These sometimes have serious impacts on the application, as in the case | |||
often do not hold. These sometimes have serious impacts on the application, | with BGP hijacking attacks.</t> | |||
as in the case with BGP hijacking attacks.</t> | <t>By contrast, in a path-aware internetworking architecture, endpoints | |||
<t>By contrast, in a path-aware internetworking architecture, endpoints ca | can select or influence the path(s) through the network used by any | |||
n | given packet or flow. The network and transport layers explicitly expose | |||
select or influence the path(s) through the network used by any given | information about the path or paths available to the endpoints and to | |||
packet or flow. The network and transport layers explicitly expose information | the applications running on them, so that they can make this | |||
about the path or paths available to the endpoints and to the applications | selection. The Application-Layer Traffic Optimization (ALTO) protocol | |||
running on them, so that they can make this selection. The Application Layer | <xref target="RFC7285" format="default"/> can be seen as an example of a | |||
Traffic Optimization (ALTO) protocol <xref target="RFC7285" format="default"/> c | path-awareness approach implemented in transport-layer terms on the | |||
an be seen as an example | present Internet protocol stack.</t> | |||
of a path-awareness approach implemented in transport-layer terms on the | ||||
present Internet protocol stack.</t> | ||||
<t>Path selection provides explicit visibility and control of network trea tment to | <t>Path selection provides explicit visibility and control of network trea tment to | |||
applications and users of the network. This selection is available to the | applications and users of the network. This selection is available to the | |||
application, transport, and/or network layer entities at each endpoint. Path | application-, transport-, and/or network-layer entities at each endpoint. Path | |||
control at the flow and subflow level enables the design of new transport | control at the flow and subflow level enables the design of new transport | |||
protocols that can leverage multipath connectivity across disjoint paths through | protocols that can leverage multipath connectivity across disjoint paths through | |||
the Internet, even over a single physical interface. When exposed to | the Internet, even over a single physical interface. When exposed to | |||
applications, or to end-users through a system configuration interface, path | applications, or to end users through a system configuration interface, path | |||
control allows the specification of constraints on the paths that traffic should | control allows the specification of constraints on the paths that traffic should | |||
traverse, for instance to confound passive surveillance in the network core | traverse, for instance to confound passive surveillance in the network core | |||
<xref target="RFC7624" format="default"/>.</t> | <xref target="RFC7624" format="default"/>.</t> | |||
<t>We note that this property of "path awareness" already exists in many | <t>We note that this property of "path awareness" already exists in many | |||
Internet-connected networks within single domains. Indeed, much of the practice | Internet-connected networks within single domains. Indeed, much of the | |||
of network engineering using encapsulation at layer 3 can be said to be "path | practice of network engineering using encapsulation at layer 3 can be | |||
aware", in that it explicitly assigns traffic at tunnel endpoints to a given | said to be "path aware" in that it explicitly assigns traffic at tunnel | |||
path within the network. Path-aware internetworking seeks to extend this | endpoints to a given path within the network. Path-aware internetworking | |||
awareness across domain boundaries without resorting to overlays, except as a | seeks to extend this awareness across domain boundaries without | |||
transition technology.</t> | resorting to overlays, except as a transition technology.</t> | |||
<t>This document presents a snapshot of open questions in this space that will need | <t>This document presents a snapshot of open questions in this space that will need | |||
to be answered in order to realize a path-aware internetworking architecture; it | to be answered in order to realize a path-aware internetworking architecture; it | |||
is published to further frame discussions within and outside the Path Aware | is published to further frame discussions within and outside the Path Aware | |||
Networking Research Group, and is published with the rough consensus of that | Networking Research Group, and is published with the rough consensus of that | |||
group.</t> | group.</t> | |||
<section anchor="definitions" numbered="true" toc="default"> | <section anchor="definitions" numbered="true" toc="default"> | |||
<name>Definitions</name> | <name>Definitions</name> | |||
<t>For purposes of this document, "path aware networking" describes endp oint | <t>For purposes of this document, "path-aware networking" describes endp oint | |||
discovery of the properties of paths they use for communication across an | discovery of the properties of paths they use for communication across an | |||
internetwork, and endpoint reaction to these properties that affects routing | internetwork, and endpoint reaction to these properties that affects routing | |||
and/or data transfer. Note that this can and already does happen to some extent | and/or data transfer. Note that this can and already does happen to some extent | |||
in the current Internet architecture; this definition expands current techniques | in the current Internet architecture; this definition expands current techniques | |||
of path discovery and manipulation to cross administrative domain boundaries and | of path discovery and manipulation to cross administrative domain boundaries and | |||
up to the transport and application layers at the endpoints.</t> | up to the transport and application layers at the endpoints.</t> | |||
<t>Expanding on this definition, a "path aware internetwork" is one in w | <t>Expanding on this definition, a "path-aware internetwork" is one in | |||
hich | which endpoint discovery of path properties and endpoint selection of | |||
endpoint discovery of path properties and endpoint selection of paths used by | paths used by traffic exchanged by the endpoint are explicitly | |||
traffic exchanged by the endpoint are explicitly supported, regardless of the | supported regardless of the specific design of the protocol features | |||
specific design of the protocol features which enable this discovery and | that enable this discovery and selection.</t> | |||
selection.</t> | <t>A "path", for the purposes of these definitions, is abstractly | |||
<t>A "path", for the purposes of these definitions, is abstractly define | defined as a sequence of adjacent path elements over which a packet | |||
d as a | can be transmitted, where the definition of "path element" is | |||
sequence of adjacent path elements over which a packet can be transmitted, | technology dependent. As this document is intended to pose questions | |||
where the definition of "path element" is technology-dependent. As this document | rather than answer them, it assumes that this definition will be | |||
is intended to pose questions rather than answer them, it assumes that this | refined as part of the answer to the first two questions it poses | |||
definition will be refined as part of the answer the first two questions it | about the vocabulary of path properties and how they are | |||
poses, about the vocabulary of path properties and how they are disseminated.</t | disseminated.</t> | |||
> | <t>Research into path-aware internetworking covers any and all aspects o | |||
<t>Research into path aware internetworking covers any and all aspects o | f | |||
f | designing, building, and operating path-aware internetworks or the networks | |||
designing, building, and operating path aware internetworks or the networks | ||||
and endpoints attached to them. This document presents a collection of | and endpoints attached to them. This document presents a collection of | |||
research questions to address in order to make a path aware Internet a | research questions to address in order to make a path-aware Internet a | |||
reality.</t> | reality.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="questions" numbered="true" toc="default"> | <section anchor="questions" numbered="true" toc="default"> | |||
<name>Questions</name> | <name>Questions</name> | |||
<t>Realizing path-aware networking requires answers to a set of open resea | <t>Realizing path-aware networking requires answers to a set of open | |||
rch | research questions. This document poses these questions as a starting | |||
questions. This document poses these questions, as a starting point for | point for discussions about how to realize path awareness in the | |||
discussions about how to realize path awareness in the Internet, and to direct | Internet and to direct future research efforts within the Path Aware | |||
future research efforts within the Path Aware Networking Research Group.</t> | Networking Research Group.</t> | |||
<section anchor="a-vocabulary-of-path-properties" numbered="true" toc="def ault"> | <section anchor="a-vocabulary-of-path-properties" numbered="true" toc="def ault"> | |||
<name>A Vocabulary of Path Properties</name> | <name>A Vocabulary of Path Properties</name> | |||
<t>The first question: how are paths and path properties defined and rep resented?</t> | <t>The first question: how are paths and path properties defined and rep resented?</t> | |||
<t>In order for information about paths to be exposed to an endpoint, an | <t>In order for information about paths to be exposed to an endpoint, | |||
d for the | and for the endpoint to make use of that information, | |||
endpoint to make use of that information, it is necessary to define a common | <!-- [rfced] Is it necessary to a) define a common vocabulary for paths and b) t | |||
vocabulary for paths through an internetwork, and properties of those paths. The | he properties of those paths, or to define a) a common vocablary for paths and b | |||
elements of this vocabulary could include terminology for components of a path | ) properties of the paths? | |||
and properties defined for these components, for the entire path, or for | ||||
subpaths of a path. These properties may be relatively static, such as the | Original: | |||
presence of a given node or service function on the path; as well as relatively | In order for information about paths to be exposed to an endpoint, | |||
dynamic, such as the current values of metrics such as loss and latency.</t> | and for the endpoint to make use of that information, it is necessary | |||
<t>This vocabulary and its representation must be defined carefully, as | to define a common vocabulary for paths through an internetwork, and | |||
its design | properties of those paths. | |||
will have impacts on the properties (e.g., expressiveness, scalability, security | --> | |||
) | it is necessary | |||
of a given path-aware internetworking architecture. For example, a system that e | to define a common vocabulary for paths through an internetwork and | |||
xposes | properties of those paths. The elements of this vocabulary could | |||
node-level information for the topology through each network would maximize | include terminology for components of a path and properties defined | |||
information about the individual components of the path at the endpoints, at | for these components, for the entire path or for subpaths of a | |||
the expense of making internal network topology universally public, which may | path. These properties may be relatively static, such as the presence | |||
be in conflict with the business goals of each network's operator. Furthermore, | of a given node or service function on the path, as well as relatively | |||
properties related to individual components of the path may change frequently | dynamic, such as the current values of metrics such as loss and | |||
and may quickly become outdated. However, aggregating the properties of | latency.</t> | |||
individual components to distill end-to-end properties for the entire path is | <t>This vocabulary and its representation must be defined carefully, | |||
not trivial.</t> | as its design will have impacts on the properties (e.g., | |||
expressiveness, scalability, and security) of a given path-aware | ||||
internetworking architecture. For example, a system that exposes | ||||
node-level information for the topology through each network would | ||||
maximize information about the individual components of the path at | ||||
the endpoints, at the expense of making internal network topology | ||||
universally public, which may be in conflict with the business goals | ||||
of each network's operator. Furthermore, properties related to | ||||
individual components of the path may change frequently and may | ||||
quickly become outdated. However, aggregating the properties of | ||||
individual components to distill end-to-end properties for the entire | ||||
path is not trivial.</t> | ||||
</section> | </section> | |||
<section anchor="discovery-distribution-and-trustworthiness-of-path-proper ties" numbered="true" toc="default"> | <section anchor="discovery-distribution-and-trustworthiness-of-path-proper ties" numbered="true" toc="default"> | |||
<name>Discovery, Distribution, and Trustworthiness of Path Properties</n ame> | <name>Discovery, Distribution, and Trustworthiness of Path Properties</n ame> | |||
<t>The second question: how do endpoints and applications get access to accurate, | <t>The second question: how do endpoints and applications get access to accurate, | |||
useful, and trustworthy path properties?</t> | useful, and trustworthy path properties?</t> | |||
<t>Once endpoints and networks have a shared vocabulary for expressing p | <t>Once endpoints and networks have a shared vocabulary for expressing | |||
ath | path properties, the network must have some method for distributing | |||
properties, the network must have some method for distributing those path | those path properties to the endpoints. Regardless of how path | |||
properties to the endpoints. Regardless of how path property information is | property information is distributed, the endpoints require a method to | |||
distributed, the endpoints require a method to authenticate | authenticate the properties in order to determine that they originated | |||
the properties -- to determine that they originated from and pertain to the | from and pertain to the path that they purport to.</t> | |||
path that they purport to.</t> | ||||
<t>Choices in distribution and authentication methods will have impacts on the | <t>Choices in distribution and authentication methods will have impacts on the | |||
scalability of a path-aware architecture. Possible dimensions in the space of | scalability of a path-aware architecture. Possible dimensions in the space of | |||
distribution methods include in-band versus out-of-band, push versus pull | distribution methods include in band versus out of band, push versus pull | |||
versus publish-subscribe, and so on. There are temporal issues with path | versus publish subscribe, and so on. There are temporal issues with path | |||
property dissemination as well, especially with dynamic properties, since the | property dissemination as well, especially with dynamic properties, since the | |||
measurement or elicitation of dynamic properties may be outdated by the time | measurement or elicitation of dynamic properties may be outdated by the time | |||
that information is available at the endpoints, and interactions between the | that information is available at the endpoints, and interactions between the | |||
measurement and dissemination delay may exhibit pathological behavior for | measurement and dissemination delay may exhibit pathological behavior for | |||
unlucky points in the parameter space.</t> | unlucky points in the parameter space.</t> | |||
</section> | </section> | |||
<section anchor="supporting-path-selection" numbered="true" toc="default"> | <section anchor="supporting-path-selection" numbered="true" toc="default"> | |||
<name>Supporting Path Selection</name> | <name>Supporting Path Selection</name> | |||
<t>The third question: how can endpoints select paths to use for traffic | <t>The third question: how can endpoints select paths to use for | |||
in a way | traffic in a way that can be trusted by the network, the endpoints, | |||
that can be trusted by the network, the endpoints, and the applications using th | and the applications using them?</t> | |||
em?</t> | <t>Access to trustworthy path properties is only half of the challenge | |||
<t>Access to trustworthy path properties is only half of the challenge i | in establishing a path-aware architecture. Endpoints must be able to | |||
n | use this information in order to select paths for specific traffic | |||
establishing a path-aware architecture. Endpoints must be able to use this | they send. As with the dissemination of path properties, choices made | |||
information in order to select paths for specific traffic they send. As with the | in path-selection methods will also have an impact on the trade-off | |||
dissemination of path properties, choices made in path selection methods will | between scalability and expressiveness of a path-aware | |||
also have an impact on the tradeoff between scalability and expressiveness of a | architecture. One key choice here is between in-band and out-of-band | |||
path-aware architecture. One key choice here is between in-band and | control of path selection. Another is granularity of path selection | |||
out-of-band control of path selection. Another is granularity of path selection | (whether per packet, per flow, or per larger aggregate), which also | |||
(whether per packet, per flow, or per larger aggregate), which also has a large | has a large impact on the scalability/expressiveness trade-off. Path | |||
impact on the scalabilty/expressiveness tradeoff. Path selection must, like | selection must, like path property information, be trustworthy, such | |||
path property information, be trustworthy, such that the result of a path | that the result of a path selection at an endpoint is | |||
selection at an endpoint is predictable. Moreover, any path selection mechanism | predictable. Moreover, any path-selection mechanism should aim to | |||
should aim to provide an outcome that is not worse than using a single path, or | provide an outcome that is not worse than using a single path or | |||
selecting paths at random.</t> | selecting paths at random.</t> | |||
<t>Path selection may be exposed in terms of the properties of the path or the identity | <t>Path selection may be exposed in terms of the properties of the path or the identity | |||
of elements of the path. In the latter case, a path may be identified at any of | of elements of the path. In the latter case, a path may be identified at any of | |||
multiple layers (e.g. routing domain identifier, network layer address, higher-l ayer | multiple layers (e.g., routing domain identifier, network-layer address, higher- layer | |||
identifier or name, and so on). In this case, care must be taken to present | identifier or name, and so on). In this case, care must be taken to present | |||
semantically useful information to those making decisions about which path(s) | semantically useful information to those making decisions about which path(s) | |||
to trust.</t> | to trust.</t> | |||
</section> | </section> | |||
<section anchor="interfaces-for-path-awareness" numbered="true" toc="defau lt"> | <section anchor="interfaces-for-path-awareness" numbered="true" toc="defau lt"> | |||
<name>Interfaces for Path Awareness</name> | <name>Interfaces for Path Awareness</name> | |||
<t>The fourth question: how can interfaces among the network, transport, | <t>The fourth question: how can interfaces among the network, | |||
and | transport, and application layers support the use of path | |||
application layers support the use of path awareness?</t> | awareness?</t> | |||
<t>In order for applications to make effective use of a path-aware netwo | <t>In order for applications to make effective use of a path-aware | |||
rking | networking architecture, the control interfaces presented by the | |||
architecture, the control interfaces presented by the network and transport | network and transport layers must also expose path properties to the | |||
layers must also expose path properties to the application in a useful way, and | application in a useful way, and provide a useful set of paths among | |||
provide a useful set of paths among which the application can select. Path | which the application can select. Path selection must be possible | |||
selection must be possible based not only on the preferences and policies of the | based not only on the preferences and policies of the application | |||
application developer, but of end-users as well. Also, the path selection | developer, but of end users as well. Also, the path-selection | |||
interfaces presented to applications and end users will need to support multiple | interfaces presented to applications and end users will need to | |||
levels of granularity. Most applications' requirements can be satisfied with the | support multiple levels of granularity. Most applications' | |||
expression of path selection policies in terms of properties of the paths, while | requirements can be satisfied with the expression of path-selection | |||
some applications may need finer-grained, per-path control. These interfaces | policies in terms of properties of the paths, while some applications | |||
will need to support incremental development and deployment of applications, and | may need finer-grained, per-path control. These interfaces will need | |||
provide sensible defaults, to avoid hindering their adoption.</t> | to support incremental development and deployment of applications, and | |||
provide sensible defaults, to avoid hindering their adoption.</t> | ||||
</section> | </section> | |||
<section anchor="implications-of-path-awareness-for-the-transport-and-appl ication-layers" numbered="true" toc="default"> | <section anchor="implications-of-path-awareness-for-the-transport-and-appl ication-layers" numbered="true" toc="default"> | |||
<name>Implications of Path Awareness for the Transport and Application L ayers</name> | <name>Implications of Path Awareness for the Transport and Application L ayers</name> | |||
<t>The fifth question: how should transport-layer and higher layer proto | <t>The fifth question: how should transport-layer and higher-layer | |||
cols be | protocols be redesigned to work most effectively over a path-aware | |||
redesigned to work most effectively over a path-aware networking layer?</t> | networking layer?</t> | |||
<t>In the current Internet, the basic assumption that at a given time al l | <t>In the current Internet, the basic assumption that at a given time al l | |||
traffic for a given flow will receive the same network treatment and traverse | traffic for a given flow will receive the same network treatment and traverse | |||
the same path or equivalend paths often holds. In a path aware network, | the same path or equivalent paths often holds. In a path-aware network, | |||
this assumption is more easily violated. The weakening of this assumption | this assumption is more easily violated. The weakening of this assumption | |||
has implications for the design of protocols above any path-aware network layer. </t> | has implications for the design of protocols above any path-aware network layer. </t> | |||
<t>For example, one advantage of multipath communication is that a given | <t>For example, one advantage of multipath communication is that a given | |||
end-to-end flow can be "sprayed" along multiple paths in order to confound | end-to-end flow can be "sprayed" along multiple paths in order to confound | |||
attempts to collect data or metadata from those flows for pervasive | attempts to collect data or metadata from those flows for pervasive | |||
surveillance purposes <xref target="RFC7624" format="default"/>. However, the be nefits of this approach are | surveillance purposes <xref target="RFC7624" format="default"/>. However, the be nefits of this approach are | |||
reduced if the upper-layer protocols use linkable identifiers on packets | reduced if the upper-layer protocols use linkable identifiers on packets | |||
belonging to the same flow across different paths. Clients may mitigate | belonging to the same flow across different paths. Clients may mitigate | |||
linkability by opting to not re-use cleartext connection identifiers, such as | linkability by opting to not reuse cleartext connection identifiers, such as | |||
TLS session IDs or tickets, on separate paths. The privacy-conscious | TLS session IDs or tickets, on separate paths. The privacy-conscious | |||
strategies required for effective privacy in a path-aware Internet are only | strategies required for effective privacy in a path-aware Internet are only | |||
possible if higher-layer protocols such as TLS permit clients to obtain | possible if higher-layer protocols such as TLS permit clients to obtain | |||
unlinkable identifiers.</t> | unlinkable identifiers.</t> | |||
</section> | </section> | |||
<section anchor="what-is-an-endpoint" numbered="true" toc="default"> | <section anchor="what-is-an-endpoint" numbered="true" toc="default"> | |||
<name>What is an Endpoint?</name> | <name>What is an Endpoint?</name> | |||
<t>The sixth question: how is path awareness (in terms of vocabulary and | <t>The sixth question: how is path awareness (in terms of vocabulary and | |||
interfaces) different when applied to tunnel and overlay endpoints?</t> | interfaces) different when applied to tunnel and overlay endpoints?</t> | |||
<t>The vision of path-aware networking articulated so far makes an assum ption | <t>The vision of path-aware networking articulated so far makes an assum ption | |||
skipping to change at line 254 ¶ | skipping to change at line 301 ¶ | |||
are running (terminals with user agents, servers, and so on). However, | are running (terminals with user agents, servers, and so on). However, | |||
incremental deployment may require that a path-aware network "core" be used to | incremental deployment may require that a path-aware network "core" be used to | |||
interconnect islands of legacy protocol networks. In these cases, it is the | interconnect islands of legacy protocol networks. In these cases, it is the | |||
gateways, not the application endpoints, that receive path properties and make | gateways, not the application endpoints, that receive path properties and make | |||
path selections for that traffic. The interfaces provided by this gateway are | path selections for that traffic. The interfaces provided by this gateway are | |||
necessarily different than those a path-aware networking layer provides to its | necessarily different than those a path-aware networking layer provides to its | |||
transport and application layers, and the path property information the | transport and application layers, and the path property information the | |||
gateway needs and makes available over those interfaces may also be different.</ t> | gateway needs and makes available over those interfaces may also be different.</ t> | |||
</section> | </section> | |||
<section anchor="operating-a-path-aware-network" numbered="true" toc="defa ult"> | <section anchor="operating-a-path-aware-network" numbered="true" toc="defa ult"> | |||
<name>Operating a Path Aware Network</name> | <name>Operating a Path-Aware Network</name> | |||
<t>The seventh question: how can a path aware network in a path aware in | <t>The seventh question: how can a path-aware network in a path-aware in | |||
ternetwork | ternetwork | |||
be effectively operated, given control inputs from network administrators, | be effectively operated, given control inputs from network administrators, | |||
application designers, and end users?</t> | application designers, and end users?</t> | |||
<t>The network operations model in the current Internet architecture ass | <t>The network operations model in the current Internet architecture | |||
umes that | assumes that traffic flows are controlled by the decisions and | |||
traffic flows are controlled by the decisions and policies made by network | policies made by network operators as expressed in interdomain and | |||
operators, as expressed in interdomain and intradomain routing protocols. In | intradomain routing protocols. In a network providing path selection | |||
a network providing path selection to the endpoints, however, this assumption | to the endpoints, however, this assumption no longer holds, as | |||
no longer holds, as endpoints may react to path properties by selecting | endpoints may react to path properties by selecting alternate | |||
alternate paths. Competing control inputs from path-aware endpoints and the rout | paths. Competing control inputs from path-aware endpoints and the | |||
ing | routing control plane may lead to more difficult traffic engineering | |||
control plane may lead to more difficult traffic engineering or nonconvergent | or non-convergent forwarding, especially if the endpoints' and | |||
forwarding, especially if the endpoints' and operators' notion of the "best" pat | operators' notion of the "best" path for given traffic diverges | |||
h | significantly. The degree of difficulty may depend on the fidelity of | |||
for given traffic diverges significantly. The degree of difficulty may depend on | information made available to path-selection algorithms at the | |||
the fidelity of information made available to path selection algorithms at | endpoints. Explicit path selection can also specify outbound paths, | |||
the endpoints. Explicit path selection can also specify | while BGP policies are expressed in terms of inbound traffic.</t> | |||
outbound paths, while BGP policies are expressed in terms of inbound traffic.</t | <t>A concept for path-aware network operations will need to have clear | |||
> | methods for the resolution of apparent (if not actual) conflicts of | |||
<t>A concept for path aware network operations will need to have clear m | intent between the network's operator and the path selection at an | |||
ethods | endpoint. It will also need a set of safety principles to ensure that | |||
for the resolution of apparent (if not actual) conflicts of intent between the | increasing path control does not lead to decreasing connectivity; one | |||
network's operator and the path selection at an endpoint. It will also need | such safety principle could be "the existence of at least one path | |||
set of safety principles to ensure that increasing path control does not lead | between two endpoints guarantees the selection of at least one path | |||
to decreasing connectivity; one such safety principle could be "the existence | between those endpoints."</t> | |||
of at least one path between two endpoints guarantees the selection of at | ||||
least one path between those endpoints."</t> | ||||
</section> | </section> | |||
<section anchor="deploying-a-path-aware-network" numbered="true" toc="defa ult"> | <section anchor="deploying-a-path-aware-network" numbered="true" toc="defa ult"> | |||
<name>Deploying a Path Aware Network</name> | <name>Deploying a Path-Aware Network</name> | |||
<t>The eighth question: how can the incentives of network operators and | <t>The eighth question: how can the incentives of network operators and | |||
end-users | end users | |||
be aligned to realize the vision of path aware networking, and how can the | be aligned to realize the vision of path-aware networking, and how can the | |||
transition from current ("path-oblivious") to path-aware networking be managed?< /t> | transition from current ("path-oblivious") to path-aware networking be managed?< /t> | |||
<t>The vision presented in the introduction discusses path aware network | <t>The vision presented in the introduction discusses path-aware | |||
ing from | networking from the point of view of the benefits accruing at the | |||
the point of view of the benefits accruing at the endpoints, to designers of | endpoints, to designers of transport protocols and applications as | |||
transport protocols and applications as well as to the end users of those | well as to the end users of those applications. However, this vision | |||
applications. However, this vision requires action not only at the endpoints but | requires action not only at the endpoints but also within the | |||
also within the interconnected networks offering path aware connectivity. While | interconnected networks offering path-aware connectivity. While the | |||
the specific actions required are a matter of the design and implementation of a | specific actions required are a matter of the design and | |||
specific realization of a path aware protocol stack, it is clear than any path | implementation of a specific realization of a path-aware protocol | |||
aware architecture will require network operators to give up some control of | stack, it is clear that any path-aware architecture will require | |||
their networks over to endpoint-driven control inputs.</t> | network operators to give up some control of their networks over to | |||
<t>Here the question of apparent versus actual conflicts of intent arise | endpoint-driven control inputs.</t> | |||
s again: | <t>Here, the question of apparent versus actual conflicts of intent | |||
certain network operations requirements may appear essential, but are merely | arises again: certain network operation requirements may appear | |||
accidents of the interfaces provided by current routing and management | essential but are merely accidents of the interfaces provided by | |||
protocols. For example, related (but adjacent) to path aware networking, the | current routing and management protocols. For example, related (but | |||
widespread use of the TCP wire image <xref target="RFC8546" format="default"/> i | adjacent) to path-aware networking, the widespread use of the TCP wire | |||
n network monitoring for DDoS | image <xref target="RFC8546" format="default"/> in network monitoring | |||
prevention appears in conflict with the deployment of encrypted transports, only | for DDoS prevention appears in conflict with the deployment of | |||
because path signaling <xref target="RFC8558" format="default"/> has been implic | encrypted transports, only because path signaling <xref | |||
it in the deployment of past | target="RFC8558" format="default"/> has been implicit in the | |||
transport protocols.</t> | deployment of past transport protocols.</t> | |||
<t>Similarly, incentives for deployment must show how existing network o | <t>Similarly, incentives for deployment must show how existing network | |||
perations | operation requirements are met through new path selection and property | |||
requirements are met through new path selection and property dissemination | dissemination mechanisms.</t> | |||
mechanisms.</t> | <t>The incentives for network operators and equipment vendors need to | |||
<t>The incentives for network operators and equipment vendors need to be | be made clear, in terms of a plan to transition <xref target="RFC8170" | |||
made | format="default"/> an internetwork to path-aware operation, one | |||
clear, in terms of a plan to transition <xref target="RFC8170" format="default"/ | network and facility at a time. This plan to transition must also take | |||
> an internetwork to | into account that the dynamics of path-aware networking early in this | |||
path-aware operation, one network and facility at a time. This plan to | transition (when few endpoints and flows in the Internet use path | |||
transition must also take into account that the dynamics of path aware | selection) may be different than those later in the transition.</t> | |||
networking early in this transition (when few endpoints and flows in the | ||||
Internet use path selection) may be different than those later in the | ||||
transition.</t> | ||||
<t>Aspects of data security and information management in a network that explicitly | <t>Aspects of data security and information management in a network that explicitly | |||
radiates more information about the network's deployment and configuration, and | radiates more information about the network's deployment and configuration, and | |||
implicitly radiates information about endpoint configuration and preference | implicitly radiates information about endpoint configuration and preference | |||
through path selection, must also be addressed.</t> | through path selection, must also be addressed.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="acknowledgments" numbered="true" toc="default"> | ||||
<name>Acknowledgments</name> | <!-- [rfced] Please provide text for a Security Considerations section per the R | |||
<t>Many thanks to Adrian Perrig, Jean-Pierre Smith, Mirja Kuehlewind, Oliv | FC Style Guide (see section 4.8.5 of RFC 7322 <https://www.rfc-editor.org/rfc/rf | |||
ier | c7322.html#section-4.8.5>). | |||
Bonaventure, Martin Thomson, Shwetha Bhandari, Chris Wood, Lee Howard, Mohamed | ||||
Boucadair, Thorben Krueger, Gorry Fairhurst, Spencer Dawkins, Reese Enghardt, | In addition, please consider whether an IANA Considerations section should be ad | |||
Laurent Ciavaglia, Stephen Farrell, and Richard Yang, for discussions | ded. While the section is not required in RFCs, IANA prefers that a section be | |||
leading to questions in this document, and for feedback on the document itself.< | included to clearly indicate that "this document has no IANA actions." | |||
/t> | --> | |||
<t>This work is partially supported by the European Commission under Horiz | ||||
on 2020 | ||||
grant agreement no. 688421 Measurement and Architecture for a Middleboxed | ||||
Internet (MAMI), and by the Swiss State Secretariat for Education, Research, and | ||||
Innovation under contract no. 15.0268. This support does not imply endorsement.< | ||||
/t> | ||||
</section> | ||||
</middle> | </middle> | |||
<back> | <back> | |||
<references> | <references> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="RFC4655"> | ||||
<front> | ||||
<title>A Path Computation Element (PCE)-Based Architecture</title> | ||||
<author fullname="A. Farrel" initials="A." surname="Farrel"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J.-P. Vasseur" initials="J.-P." surname="Vasseur"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="J. Ash" initials="J." surname="Ash"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2006"/> | ||||
<abstract> | ||||
<t>Constraint-based path computation is a fundamental building block | ||||
for traffic engineering systems such as Multiprotocol Label Switching (MPLS) an | ||||
d Generalized Multiprotocol Label Switching (GMPLS) networks. Path computation | ||||
in large, multi-domain, multi-region, or multi-layer networks is complex and may | ||||
require special computational components and cooperation between the different | ||||
network domains.</t> | ||||
<t>This document specifies the architecture for a Path Computation E | ||||
lement (PCE)-based model to address this problem space. This document does not | ||||
attempt to provide a detailed description of all the architectural components, b | ||||
ut rather it describes a set of building blocks for the PCE architecture from wh | ||||
ich solutions may be constructed. This memo provides information for the Intern | ||||
et community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4655"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4655"/> | ||||
</reference> | ||||
<reference anchor="RFC8446"> | ||||
<front> | ||||
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title> | ||||
<author fullname="E. Rescorla" initials="E." surname="Rescorla"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2018"/> | ||||
<abstract> | ||||
<t>This document specifies version 1.3 of the Transport Layer Securi | ||||
ty (TLS) protocol. TLS allows client/server applications to communicate over th | ||||
e Internet in a way that is designed to prevent eavesdropping, tampering, and me | ||||
ssage forgery.</t> | ||||
<t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077 | ||||
, 5246, and 6961. This document also specifies new requirements for TLS 1.2 imp | ||||
lementations.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8446"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8446"/> | ||||
</reference> | ||||
<reference anchor="RFC7285"> | ||||
<front> | ||||
<title>Application-Layer Traffic Optimization (ALTO) Protocol</title> | ||||
<author fullname="R. Alimi" initials="R." role="editor" surname="Alimi | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Penno" initials="R." role="editor" surname="Penno | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="Y. Yang" initials="Y." role="editor" surname="Yang"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Kiesel" initials="S." surname="Kiesel"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Previdi" initials="S." surname="Previdi"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="W. Roome" initials="W." surname="Roome"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="S. Shalunov" initials="S." surname="Shalunov"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="R. Woundy" initials="R." surname="Woundy"> | ||||
<organization/> | ||||
</author> | ||||
<date month="September" year="2014"/> | ||||
<abstract> | ||||
<t>Applications using the Internet already have access to some topol | ||||
ogy information of Internet Service Provider (ISP) networks. For example, views | ||||
to Internet routing tables at Looking Glass servers are available and can be pr | ||||
actically downloaded to many network application clients. What is missing is kn | ||||
owledge of the underlying network topologies from the point of view of ISPs. In | ||||
other words, what an ISP prefers in terms of traffic optimization -- and a way | ||||
to distribute it.</t> | ||||
<t>The Application-Layer Traffic Optimization (ALTO) services define | ||||
d in this document provide network information (e.g., basic network location str | ||||
ucture and preferences of network paths) with the goal of modifying network reso | ||||
urce consumption patterns while maintaining or improving application performance | ||||
. The basic information of ALTO is based on abstract maps of a network. These | ||||
maps provide a simplified view, yet enough information about a network for appli | ||||
cations to effectively utilize them. Additional services are built on top of th | ||||
e maps.</t> | ||||
<t>This document describes a protocol implementing the ALTO services | ||||
. Although the ALTO services would primarily be provided by ISPs, other entities | ||||
, such as content service providers, could also provide ALTO services. Applicat | ||||
ions that could use the ALTO services are those that have a choice to which end | ||||
points to connect. Examples of such applications are peer-to-peer (P2P) and con | ||||
tent delivery networks.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7285"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7285"/> | ||||
</reference> | ||||
<reference anchor="RFC7624"> | ||||
<front> | ||||
<title>Confidentiality in the Face of Pervasive Surveillance: A Threat | ||||
Model and Problem Statement</title> | ||||
<author fullname="R. Barnes" initials="R." surname="Barnes"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="B. Schneier" initials="B." surname="Schneier"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="C. Jennings" initials="C." surname="Jennings"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="T. Hardie" initials="T." surname="Hardie"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="B. Trammell" initials="B." surname="Trammell"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="C. Huitema" initials="C." surname="Huitema"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="D. Borkmann" initials="D." surname="Borkmann"> | ||||
<organization/> | ||||
</author> | ||||
<date month="August" year="2015"/> | ||||
<abstract> | ||||
<t>Since the initial revelations of pervasive surveillance in 2013, | ||||
several classes of attacks on Internet communications have been discovered. In | ||||
this document, we develop a threat model that describes these attacks on Interne | ||||
t confidentiality. We assume an attacker that is interested in undetected, indi | ||||
scriminate eavesdropping. The threat model is based on published, verified atta | ||||
cks.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7624"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7624"/> | ||||
</reference> | ||||
<reference anchor="RFC8546"> | ||||
<front> | ||||
<title>The Wire Image of a Network Protocol</title> | ||||
<author fullname="B. Trammell" initials="B." surname="Trammell"> | ||||
<organization/> | ||||
</author> | ||||
<author fullname="M. Kuehlewind" initials="M." surname="Kuehlewind"> | ||||
<organization/> | ||||
</author> | ||||
<date month="April" year="2019"/> | ||||
<abstract> | ||||
<t>This document defines the wire image, an abstraction of the infor | ||||
mation available to an on-path non-participant in a networking protocol. This a | ||||
bstraction is intended to shed light on the implications that increased encrypti | ||||
on has for network functions that use the wire image.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8546"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8546"/> | ||||
</reference> | ||||
<reference anchor="RFC8558"> | ||||
<front> | ||||
<title>Transport Protocol Path Signals</title> | ||||
<author fullname="T. Hardie" initials="T." role="editor" surname="Hard | ||||
ie"> | ||||
<organization/> | ||||
</author> | ||||
<date month="April" year="2019"/> | ||||
<abstract> | ||||
<t>This document discusses the nature of signals seen by on-path ele | ||||
ments examining transport protocols, contrasting implicit and explicit signals. | ||||
For example, TCP's state machine uses a series of well-known messages that are | ||||
exchanged in the clear. Because these are visible to network elements on the pa | ||||
th between the two nodes setting up the transport connection, they are often use | ||||
d as signals by those network elements. In transports that do not exchange thes | ||||
e messages in the clear, on-path network elements lack those signals. Often, the | ||||
removal of those signals is intended by those moving the messages to confidenti | ||||
al channels. Where the endpoints desire that network elements along the path re | ||||
ceive these signals, this document recommends explicit signals be used.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8558"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8558"/> | ||||
</reference> | ||||
<reference anchor="RFC8170"> | ||||
<front> | ||||
<title>Planning for Protocol Adoption and Subsequent Transitions</titl | ||||
e> | ||||
<author fullname="D. Thaler" initials="D." role="editor" surname="Thal | ||||
er"> | ||||
<organization/> | ||||
</author> | ||||
<date month="May" year="2017"/> | ||||
<abstract> | ||||
<t>Over the many years since the introduction of the Internet Protoc | ||||
ol, we have seen a number of transitions throughout the protocol stack, such as | ||||
deploying a new protocol, or updating or replacing an existing protocol. Many p | ||||
rotocols and technologies were not designed to enable smooth transition to alter | ||||
natives or to easily deploy extensions; thus, some transitions, such as the intr | ||||
oduction of IPv6, have been difficult. This document attempts to summarize some | ||||
basic principles to enable future transitions, and it also summarizes what make | ||||
s for a good transition plan.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8170"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8170"/> | ||||
</reference> | ||||
</references> | ||||
</back> | ||||
<!-- ##markdown-source: | ||||
H4sIALUe8GEAA71c2ZIbR3Z9z6/IaD2oGQH0ULSkoVsPcpOiKM6IEq1mmGE7 | ||||
HI5EVQLIYaEKqqVBaEL/7nOXXApAa+bJD5rpJlC53OXcc5fq5XJpxjA2/ta+ | ||||
nPret6P9ee9b+++TH8bQtYMNrX3nxq29O7je25/8eOj6j6HdGLda9f7h1r67 | ||||
+8n+Gr9u6q5q3Q7L1b1bj8vQj+vl3rX9Zpm+s/zimand6G9Nhf/ddP3xFrus | ||||
O2PCvr+1Yz8N47OnT//16TNDe236btrfXj6E/eW1+eiP+K2+tW/a0fetH5ff | ||||
0dbGDKNr6/91TdfiOEc/mH24tf89dtXCDl0/9n494Kfjjn74H2PcNG67/tZY | ||||
u8R/Fkcabu2LG/u+d7udbxr+R7nbiz64dv5B129u7euu2zTe3h/C+JvvG2xv | ||||
X+9WP/AX/M6FBhf14/rfRn3yptryZwMO40c8j5u7h+XrqWmW7xo3/ma/4M+r | ||||
MEJGz58+/dL+19QHfarqpnYk4RX7GdN2/c6N4QHiNSTV/NtyubRuhb1cBem8 | ||||
abEAnnfDaMfOjltv970fyAKiIK3rq20YfTVOvV9YZ/fQwdKxDoJ+J1lD8VW7 | ||||
dYPFJzbs9hC0w5L7vtv7fgweMg2j9Z/23eAH3TV+ZLu1cQ8Qk1tBiukUtOtA | ||||
Z/Rtve+wMdRGosWDD6HGY7hk/ow+Mm6/bwKsiy0YT06Dp72G2W7498E3OHLc | ||||
YQtL22z5UGlzrG3wD6GHXbr1OlQ39sM2NLRcGOJqR5zcXtEqlqXT+mG4sq7p | ||||
vauPuGwYRnaknWuPJpkpxN9id19bleNgocgtvjdAotii7mAzLd/IPgRnXb0L | ||||
bSAFkkYNq2DtKrkKnVrXsY07+p4UtoYlHR9TG2kBSw8iGYPjVH5PAqz6bhhk | ||||
Edlc/6UUzI0x70kC8PdpR0YjCv21xI1i32wptiN8caRs++zpsy8WWNaNZgfT | ||||
tyuP7YaD7yETPE/7Qb9h0y7w/w++6fa0lWi/9vumO/LWWClvZcorDjf2zWgP | ||||
tFsfNqF1JI5DH8YRZ4DQ1nBE7BGGahqGeGzaNqONKdCG1I1r1vYXCIws3r4m | ||||
cLLXwMBfXj+Rg5HxrzzW30+rJgxbfJ0srXX7YduNplKYJUXzorwjJDnsocob | ||||
cdNdqOvGG/MZybvv6qkiodI6dLDlGQz+/bNA3/ud3ZrOH3d5xJXPjCU7k7Nm | ||||
BR0u/RqmP8JD+odQ+Whh2c2mgQ8PbZDRdtNoH3wf1sGtQhPEI/CAmXm3+DuJ | ||||
doXNSUZjW6yZXQsWYAuzkTMaHH/bdk23Ye+F1VgHRe72ZDj4oV/i39plefra | ||||
N/CU/ig3njmMETygXTZw2J5NY+5hbKV70XgBP0tBr9pe+5vNjZiKednt9tPI | ||||
iGNfNZ7t8vrdy1dP7N///u0v37/88uuvvvr9dzaQ+249kgKX3/l1aLHOBwje | ||||
3gEsokqtub7/bvnh7qcnFkjWd67CWdW8cOwjnxqrQICA7BERYVQrY+AwJ9dQ | ||||
HIEvqKmd4HprC7y0Ff0+DPBqlbGBYX6ECZGeYR4bLNmSX47wJ37C1TWOQejV | ||||
NBZ+2o4TSxPuDC3gqjWfjn4QZy8eXtgVTAcWAw5ifTOQB9wR1rYDxY5snYjb | ||||
XWOHCU4Htbx/+Y4PqmYLMTTZ8qBxvuclQxYhuryiW+H7l9BTtzLv01l+5LPc | ||||
ezgX7XP9/sf7qN7nX375NdTLsgOPgAhInLJu73fd6E00nxv7Q3eAlLCFXHth | ||||
wxqngpHCsKAGxMcUuEm6K3Ku6DmG1Jdi5KlX6u3ao2hwL1C8c5BQXMZJuDNi | ||||
PnVn2260266pb6x9zy4xdDs/hh28ZOsgGggudNNAwRzEAR4hCFOYzMK4BJyV | ||||
wwpsKS9ev7Pb8DfYDgEFPBU/DdDui2MiHgt66o9oxYmlZvSBoI0GbwR/iKuZ | ||||
fFv5JKbr4cksnkfdTuS3qyOLiA05GjdWWTfd4YZkkL7N/jY3xSEpqTkqjSm1 | ||||
ZebaomWFXDyuM9mlOxXqYPqpbTlgsmR3xFpFfwwBZGo791GJiMgCj8kF7gp/ | ||||
ZqslKyb2AnYP1Ybf5KPrux/f//wk+4LY8p+fPf9KbXlF6pdwjd/8J7fbA14A | ||||
5KXSiO0knCIzEfjTGB7FtxRPhnp30YbMGeHMfk7WAmNhcE2Xy1EqecpDGIL6 | ||||
PcmRLQvP44hRieDWbmQ8BujPiCE9AIPoU2jSR0iGpUztBZ8rV1rkW7ID/gla | ||||
n0dXwgOOgdCeJyllMKAbmnhsUS5bIp9umFb8c0PsBw/RAYaCF8k9D3l/EyWo | ||||
AZKUSA/3buPtbmrGwGap1DM8sNyE3YEF/Y2ONGfDpiR9C0Z3AVgXWep+exwg | ||||
iCaHVyDJB0CgjXHyRO4L8gqJp0sRf/RUrHkcENHpfOuwmXox07TwQqArSauB | ||||
bEQcw95XIB9q8pAKvkPxjx1MESvei4Ss3gBGNjW1wa+40oD114wmlDkK56GD | ||||
IM1CsgFApVg6TP2DR5zjLyjmRV1XHeii+tDXz778/XcY8AdPAOuj4/5/5QwU | ||||
62vv6wWUDnOL1ItSPwRBU7iHb8GLPTAeSCOcDkAKrjo1Gn5iDP6XhAguMGDh | ||||
Rz6/4fNfLUQc+L4keBEkSXAbSsNU5iQHIBvbc4RArOYSHkMieqeZT757PEoA | ||||
oz5KhvgJQa2W4F9gkxo4i8auSJ+uJ2+MzBUwBN+hlbAGWTduPFA4poSIwc+w | ||||
hwVh4ZGGHs+TIAE0YtGR8JPsOeWZpUaZ8YvImDpBDbDF7jQN6sCf2GFgGk34 | ||||
zf/zEfMbqIIIwywTWU89EewLuY9KnYAHUhmIVz2eC81TICEes62YBDD/Yd8m | ||||
h/TtMCnYggVyYQci/Owzy0w4SNgz31PQnHpJKPnLhYgXpc8UaeUVIWLVhxUF | ||||
B7UrQ5cjdR6zA5TZSAQERFMqEJDvV91uN7URR9RwwDVKKctd4yaW1JLSs/Mi | ||||
A1Po9doTdcKFRy6WSIyo3egEute+v7E/zXGCuSSxOYWEumNGtt9L6kosTewd | ||||
Kv4nkr5vVI5J0in9Txkp2XUgMzUqHJsFSCcBFIV9xAUCR5HOpWSj9DIqyCBJ | ||||
VoqT+RRfriAqseAwzvkRLOQVnzRxodk1qMxRmkSpqSuyyK5loD5sqW6WtDYz | ||||
DX68UNpMv5kGJJNRFmkipAEokHluhFqWh+dErcDCYdrT1QmXe79BPtQQPmmq | ||||
HGNYEdvVZoUTrcFjoMhBrqJsQMVR6slkMki5FAvnSkIbrzdzLTLXLEyAHnEd | ||||
LRLiwLWmqIyBg/9VWDYRwBrM3itbQOLGlG8QaiDnI5Riaq1hgxW/o9JLvTAH | ||||
TvGFyCSDTAFRl2P1ZbRd1h62X3tiTXfDHBYI5UjzraSaXI0qEBe2ueWkkH2K | ||||
oFUpdRg11x2y55niSIzLK8rhkhz2rh+jbvJadh16qqQeuhLowcdI1IsiiXvo | ||||
KreCEz1ueVsQvpTlQ7OD31Gy7GuoM6EuLtvZR8yeHIXNYZBUkEEEdIkMbOQq | ||||
q1gYvkfpd2hq/olxHwdxHAkfWXuwakbxd1M6yyB5nkYaErFy6UsREjadPcv0 | ||||
8WZZfMQKtLRQhkHOelx5wAx4hmPkSJH5s9zEILlR6Iz3Oi9K9jDt0LMCSKPK | ||||
SAafw3c8n0nnO7taLGmXprdg16F8RgiGwAJVlcvIK+bBis9hfs4NI9nMXFzz | ||||
xhrnrkaznrj0nsQoZY+hpFKPtFBmgVzi8Z39j5mZ8pPvkpkS7YkWH296y8en | ||||
tTXhZdI8t+6EJvis92oKvv6Wy5aiXyHgp9WP1AJY+SKr4JxULU/EoRiXYT6a | ||||
C8V35R3l8gwA0CE4NURMlyWB8inZQHc7pPSFx65TPp9Sltaec4PToieBET/G | ||||
2bnJaKnkptihooQES1bNRPQL2XIQ9Iv0ZI94ps+KD5iTHaOQVRbYOj+VowBl | ||||
pKorzsfIIpFtyuXS2jdaEiqW37mjAGLD8Z6CGpU9q1QwKzJ7DRVaMmw73Ahb | ||||
xZLyemrV+3N+9g0tcPCMVsUepj62bneySSIuD66ZRNQ7T8XQIX2rEfpWg1sg | ||||
NlSJsBcCZ95K3Czao9hd7EdEaVawbO6msEPTAxqlDYcIrpSdVMgKoXGlmOt7 | ||||
hGYkDfwfLoO0WauW+EXrik9MIbN/kujfWCLNWp9Z5Dya7V2bbYbkv5RKQulh | ||||
0SLGbi+GFk2bCxUxTTywXe7cJ6oeeXO5QBlA0h5CPbnmxFJTPeyU3OGsI5cY | ||||
cEhkB2wvcFjpi9B9XZMLOfGAIOgU3LjGzPkG7EI4B4zTrJjuUeKOD8achqwo | ||||
uyUg3XSu4VOVF/x80NjXgYl/LynSDvn8ouxgsEEK9Pzjq5KjCC1EqsXMCYTK | ||||
CI8+AjZD9ZFr5BUReUiw5hCfi8NusyGOKGnpWZ/08v4cDgDHDSfXy7Fb+jk4 | ||||
XHB/4J+hGjA85yG4RhOySCgX9CM+Wk1KtrHee+rQQ2gUWJS/XgwQsOgOX59H | ||||
iLo7KX3OSnIbCuIVgTHje1VRDQhKAH7D+zTmpe2PpxEGkeRnQp35Dom6sJfC | ||||
ObaOUusTXI/OqRyh0Pu8X8bIIJVx0hwgZ9sJ2tZJUqyyiPpm3nOeJzcIv2Ue | ||||
QBIq73ScuSpx07gH5RDzOrJyGFxQz0QSLJoR5sSKlkuJdhJkUuoJ4qnNUjL1 | ||||
dd/tJKbhKUrstPzJh8xPcFLRU7yF/bzcdoGabPh2XRiPaDsfiGGWT6qtowsg | ||||
agqIzGFJEXGOgO+A9YEyojogus66uVJoId5bHifuHYNtaJcrbrUDW6hMMY3L | ||||
bs3/tMD9hm38AClwY9LPXO5YInRK9UFMdOisluK1kUltyq6nIimyDa08zYzj | ||||
WDB9lpWEQcQMTgulcU0PaSS0pXnCaKX3YXbeDZCGtMVh05x4pqLo+bMxnEf8 | ||||
iQks9X/MKVua18EvQDmFUkJtqYcMuct7cjLu38+uWwNZj3wY/2kbVkEoH/d6 | ||||
qbS88rCNoDRlapup+ni0avYhsgeqZ2Hz1EgHjN1Lvk3+yAh1HzNjASgAWH+K | ||||
T1VBKoeTAZEu1Yli5s/9qwOiTqq2c6YLiMiyTNTwgrhOmz5agqXMCVh2l5Dw | ||||
DzBPahwwj61r1jECIfAguaLYE1qD6zk2U6YNj3vQq3TtNI2hDQ+ZnwH8zKyh | ||||
yMlmciIBpWJGlBTDBPhVzcl7jMpmbgbnGfECVxE04S6mTpUURZkSQQwCe6co | ||||
3yqSRDaGc9S+W6+TUZbIwjnsjJwx2JhHRfUz8PIjdeH4cJb9PGSDj1BC1ZgC | ||||
R8r21PwaEApiMNUosMqmdy3FJcW8+TfN9WHr+Zt7+o9LLAv+mTpFzOXpFzy+ | ||||
oS6Nkgj/JFIkFRElpfwdMxdTlMp4/NOJQKIAdeKh0MBEndwmfNSocCl0LZJf | ||||
iBErkY8BhNLWqRmLpCYvT/XT7JJcY0b0BrUj47yxb0HSOiFM7fHcOIiBhWFn | ||||
pNNjXdhxeUjHBrAw1MMMTMBu4HY4zsgGj4/FH3OzS/OleD4lC1y1hNbqbnfe | ||||
tFSIjXkr4ZU0QS/VpMvOMVPqmnuHR0oK5nmj1wxNJ34amoXpuf8eR/XizrLG | ||||
OlDmPbKYEAqlGdj4WHaVYRatUMcqbnoS4p13NLUws7DbsIExSnfX5O/T+WlY | ||||
soiHT/IAipyScqoENSPS9FZ0w2kYJLxzTBQo9An/mwUjJiLEsTRfqAE4ZTVF | ||||
zF2HAUzEUIkLb/IkEIFVLoyQpWt1o6Mk4EJwKKaI3K5Tcp4xftYJNhfq21oD | ||||
5se0LDGv9JyWQ06HGbmg4bmlQAV3XWOG648MZkoIiiBUXCSVYk5i1nwCwugN | ||||
WGWMIzoAcRqRzqcZJFCqFhEvRTrJDeMnWnBTl2LpihpPlyNFiIdpB30OR2RQ | ||||
+8gHV47cjvyaw2TKzv0aqN1WWnVFbgmulJxwpjkdPiQvoGklcsXUu1aiBgCH | ||||
QBbZfzNgX5QzcfPTWQSf5hFSO5BjqxpM9FjDOTwftIgUhISklmLRz2NKIKiR | ||||
2rdjGBgMUhCOSF9E4GLmIgqmBK7LoDVwkMEJOTOa3Y+giC9E5ZR+uaHWPKUw | ||||
WGUZRxLIKmPFKQvNXBQGGK/cC+ywmA29MBo6Hz0ozY76kZIx+LWDcCnRg1oe | ||||
ulAD1tpamuIjT/+6uttrS4XwY1dcLaa/CUBSlv1+1us6G8pJddT1GdBouDqd | ||||
nuH2AAPuyWAcUQ+DsMg1KZGUJKtkEwkrmmOc3bhcBec1v310iFSsG+5EXfw0 | ||||
X6YtzjHVrCh3oIZDao8xiOmHPM7CGu195YOO3g3Uij4f2FH04dkMk74XwyPZ | ||||
9oNrvBaaB52IpFk2mXWc9QgiQhuZgMzHx29U6LHITwIEhDSjkUoM6ebgKSxx | ||||
51FrtflJQywqlJYQ9Z4beFk/MmcYOcpc9iL4G2l9pyoeNS5d/YAgSMM7VBgr | ||||
5nfKNnWIbWYdoShKPyxudfyrYd9jn5qmTAhZEwMQ6ZV0Po69GB2wHeQfuV8j | ||||
bWscFMzb8c9cI5BYvOaJnLWQ0AdH5NHMRmZS93E2J5OrXmxh8KJ1KOrjabiM | ||||
ZhBg5VNFPEpwB3gQ6UchbQqKTWg/cgKTWQmXFYQz03QoiUGnPpJ1yexVHIla | ||||
c4wYY/X+ZRMYSgnNdmEMxKyN7COJBMIn4YSsSSGn9xQnbNV414/+05hGr7qS | ||||
XQ3FuOmP9wAmAeM330m7LfCBySLwESW6Y9lPwLXhB9WRhoOGimY1DXfj/UZq | ||||
lhwCpEKVWYM+czaAWcwOeI6XJsVRCLwke4W001Quzr6nahKuqZKigZoVFY4o | ||||
bb+gEMHTD0q+YagxCf1Wa4jh0xk4Ugow741dl7FpXtwvwu+TQqEHGlDj0KC9 | ||||
ShlJ4h6oDADlVF2P8hDKCHmOntThqyapEIMbrV3PVI1vVaBGGsEtg2jsM5ft | ||||
3tkrL6R7TeDKGVE6QpwTvZZCHhW3ObITlUACKH0farqwnZV0PHqdmUfTFD3J | ||||
zGNVURHmAnhd0dzbFZ1+0mk/FrkaOrTV8JgJ5NYgFYXNpYmG4i2NNvaqHPfL | ||||
pS1H3IRc7MDjWFykPuGBRTmFDxiDyqW+OinDzMlNhOw8EigeNaNsTBaUGVN2 | ||||
LgdiLIp9Qwoc2bY4cRQ8/MNIm8dZqaEARPpHszG5ZvR4jbiQGZOmfPeyeKcz | ||||
8t2MabG+mdezJep1xEN/ToMB7kIfOdb7afb/Us50KRJn6LkwZkBdnBlt4e2J | ||||
MAqNyDnMfoJzcARKOUseSEIevzhh8kyQoigT41YXj0voGAQT167mhtk/nrCa | ||||
TZJk8sMRke6nZ25yllWkrGUGwpWu1TGexsTGlAwTKFmXSgLLTJN1Lb/2Tn+P | ||||
uXzCaXIz49IlxfrSrEdm/OdvFWxzeJ5ToLazFERhTEy75IC5jMj4QdWlOKxS | ||||
uOTqaFMRxbiGm305rtH7NH6USZZzVRdOdTJHL/OGvGZ8cA/88XwWBGFGVeZ7 | ||||
ZOCE13kauByFpfJF12IJXJsg1OibLDwpU9TklYWkU3xejNFAY58TamnUoO9d | ||||
0SspV1LiIuhRxqwHqAPvhoBK0zk0zkw9Q4Gk2m96zzQwHVwK5jIVZTmyUDJB | ||||
7zxJ4bCEBXkHpBxiP1G6azYd8sjtbkgt2dykehXH7U8eYt8mwJBy75GKnSud | ||||
l87pIL8KkqxbR+KyDafAHVp5NkIxTa/pW4lp8uIEQwpHnaWJXANm0hULxCaS | ||||
cxr2baaoFICDY5e+hiYpwsBaJ9c8SQ1kPRnNWc76Ged94zk4P1bAlDcS6aws | ||||
OJ751bLH4NZ+pPCIcEzEXF96pbZJnFxBmHapRZlcg0dD6fBk4IabeumL5aj/ | ||||
N5xTMFs73UsHTyhNkHY8AJSKIzyMwAsPIz89f33vUFKUzQRqCknpKwqzwUnY | ||||
1GNrcBTKxnalE8HEQv443niw0YvhRmYRaDwRDjWUL4Mkx4zwL1UcCjeuSalz | ||||
nMAaz1jf2dzxIo3s6cblpDhjVYwZ1zzbuOxWDXQBkn71JHrhOT1YEV614G71 | ||||
nHvm+lGItyxeD9WJMj9cPiofR5rAXEknqhz8IUJTyrpcVfWTvLN1GgfYtDSC | ||||
UhE5E5Yi0T3t6RcTPTmylC/eQP+zF0Rm6SBN68jl84yeXDdV9E7PSUU6aQUV | ||||
w28lJy1fn+iI5pwMPJY+oy+lSvkhNrVigzMlV0767lKDV4FqFYDDcnwpKrW5 | ||||
XB73FWvLn5Qnmb8QFXmxAJtOsx5tfgljzke0zCL8/dwDoIwNF5D3MsmQm1P6 | ||||
xnuW0YPvy2xkWfcXWBjw+oc41Rt9cgax2jMXhL0IsGDSZL5uA/5yayodObgA | ||||
9rPCJtPW/Z5kQkEFXu8aqdRygwFnosGbquK0MxUsH+H40V0je9LBd/gizxkX | ||||
ZGpWrImjQde8rQ5HJw+/ABsEFQci/3sa788Dip7fbT2QysKOCj/6gulX/IJp | ||||
IY1d1wbokR0bJ/nuu+6exu6IgnPUYYEMl2eh5hVS4Hx/3HPGGf2Ziw0NDVNV | ||||
booVfjJnmCq9b65n+uo5zpReeJdaGL++emGXPdD/EmDAbO7DDrykp+G6ArZ5 | ||||
pKZIRqmuPxDS0n8coOgo58ZhZsYhJjCmqTZ6Xe40QOcZqZMxDJMaiMONAPHJ | ||||
+R6JK9hfytHQRk3/GnkJA3vtDXvwYsZ+HBNVafanCKKC/uLPT/nl8fnfb0Cm | ||||
XYSPJACpHJYdHFi59rkphaf6rM4u645lzMrNHerIyZw5fIf+1khu1+ogyTAP | ||||
i6aINZ7Umd50Kta/5srLGlqYM3fJk8Ry0vtuNtte1NaT2NW8mG+TE/Zxlbwr | ||||
Uck0/S4FzDhuqWlTyZSjs0uGmqSts5T6LodBnhWwm1aPLw9EZpJYGLIOAuQX | ||||
HKUrEb0HYktLn6+a+uDzVyTFhGNHy0Rjn4tuUSiXCI+0cPm9gs/sXfWx7Q5I | ||||
TjfsN8a8pdBCopVX6+5q/qM373zfB8DXX7xrl+8CfvP2fheoK/429H9z9q+T | ||||
3zb+EGhq6meiOr43L7rW8Z8FoBbkW56Eh/11u4HOdL89gKE7+wJb0RtDC/ty | ||||
izBgP3QdlvgROc8P/KcD8GS3dTvQ5RfdVLnaBTgQVulBXOxf+8lviDC87vr+ | ||||
aL/Hh9upp7mE+z1JBPjoDjBM4NovnupMr9rNFouOC/Ojm9iKXgakR5smODwz | ||||
+j1Z6fcO12t07PCXUNET9j8dwbfO+8UJfiK3tZZ9z1/0yy+vxSH1NfBghYge | ||||
u5HpJQIQMN+s45yy1EnknRPJN9MbRLGG8Goi5IJmkDHvgtSNJ+pdQWx9+A2/ | ||||
PXv67KmhTiFUTzkk79N2N/br58+/fPaFfXsymXVXcgjp3bzlv0ey6j5B+sk3 | ||||
r9/evX2jf5VCD3N/wAkgPkrk7ykHGaFQJ9nbK9BUNff4yoEY/pu27R7EjOXg | ||||
8ucBKjnkF1/dPH329fP4Tra2/1LGQ17DpVoa2dhxuer/AMaY1nTUSgAA | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4655. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8446. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7285. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7624. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8546. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8558. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8170. | ||||
xml"/> | ||||
<!-- [rfced] Please review the "Inclusive Language" portion of the online | ||||
Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> | ||||
and let us know if any changes are needed. | ||||
Note that our scripts did not find any words of concern. | ||||
--> | --> | |||
</references> | ||||
<section anchor="acknowledgments" numbered="false" toc="default"> | ||||
<name>Acknowledgments</name> | ||||
<t>Many thanks to <contact fullname="Adrian Perrig"/>, <contact | ||||
fullname="Jean-Pierre Smith"/>, <contact fullname="Mirja Kühlewind"/>, | ||||
<contact fullname="Olivier Bonaventure"/>, <contact fullname="Martin | ||||
Thomson"/>, <contact fullname="Shwetha Bhandari"/>, <contact | ||||
fullname="Chris Wood"/>, <contact fullname="Lee Howard"/>, <contact | ||||
fullname="Mohamed Boucadair"/>, <contact fullname="Thorben Krüger"/>, | ||||
<contact fullname="Gorry Fairhurst"/>, <contact fullname="Spencer | ||||
Dawkins"/>, <contact fullname="Reese Enghardt"/>, <contact | ||||
fullname="Laurent Ciavaglia"/>, <contact fullname="Stephen Farrell"/>, | ||||
and <contact fullname="Richard Yang"/> for discussions leading to | ||||
questions in this document and for feedback on the document itself.</t> | ||||
<t>This work is partially supported by the European Commission under | ||||
Horizon 2020 grant agreement no. 688421 Measurement and Architecture for | ||||
a Middleboxed Internet (MAMI) and by the Swiss State Secretariat for | ||||
Education, Research, and Innovation under contract no. 15.0268. This | ||||
support does not imply endorsement.</t> | ||||
</section> | ||||
</back> | ||||
</rfc> | </rfc> | |||
End of changes. 33 change blocks. | ||||
621 lines changed or deleted | 314 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |