<?xmlversion='1.0' encoding='utf-8'?> <?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> <!-- <xi:strict="yes" ?> <xi:compact="yes" ?> <xi:subcompact="no" ?> -->version="1.0" encoding="UTF-8"?> <!DOCTYPE rfc [ <!ENTITY nbsp " "> <!ENTITY zwsp "​"> <!ENTITY nbhy "‑"> <!ENTITY wj "⁠"> ]> <rfc xmlns:xi="http://www.w3.org/2001/XInclude" submissionType="IRTF" category="exp" consensus="true" docName="draft-irtf-icnrg-icnping-12" number="9508" ipr="trust200902" obsoletes="" updates=""submissionType="IRTF"xml:lang="en" tocInclude="true" tocDepth="4" symRefs="true" sortRefs="true" version="3"> <front> <title abbrev="ICNPing">ICNPing">Information-Centric Networking (ICN) Ping Protocol Specification</title> <seriesInfoname="Internet-Draft" value="draft-irtf-icnrg-icnping-12"/>name="RFC" value="9508"/> <author fullname="Spyridon Mastorakis" initials="S" surname="Mastorakis"> <organization>University of Notre Dame</organization> <address> <postal> <street/> <city>South Bend</city> <region>IN</region> <code/><country>US</country><country>United States of America</country> </postal> <email>smastor2@nd.edu</email> </address> </author> <author fullname="Dave Oran" initials="D" surname="Oran"> <organization>Network Systems Research and Design</organization> <address> <postal> <street/> <city>Cambridge</city> <region>MA</region> <code/><country>US</country><country>United States of America</country> </postal> <email>daveoran@orandom.net</email> </address> </author> <author fullname="Jim Gibson" initials="J" surname="Gibson"> <organization>Unaffiliated</organization> <address> <postal> <street/> <city>Belmont</city> <region>MA</region> <code/><country>US</country><country>United States of America</country> </postal> <email>jcgibson61@gmail.com</email> </address> </author> <author fullname="Ilya Moiseenko" initials="I" surname="Moiseenko"> <organization>AppleInc</organization>Inc.</organization> <address> <postal> <street/> <city>Cupertino</city> <region>CA</region> <code/><country>US</country><country>United States of America</country> </postal> <email>iliamo@mailbox.org</email><!-- uri and facsimile elements may also be added --></address> </author> <author fullname="Ralph Droms" initials="R" surname="Droms"> <organization>Unaffiliated</organization> <address> <postal> <street/> <city>Hopkinton</city> <region>MA</region> <code/><country>US</country><country>United States of America</country> </postal> <email>rdroms.ietf@gmail.com</email> </address> </author> <dateyear="2023"/> <!-- Meta-data Declarations --> <area>IRTF</area> <workgroup>ICNRG</workgroup>year="2024" month="March" /> <workgroup>Information-Centric Networking</workgroup> <keyword>ICN</keyword> <keyword>Network Management</keyword> <abstract> <t>This document presents the design of anICNInformation-Centric Networking (ICN) Ping protocol. It includes the operations of both the client and the forwarder.</t> <t>This document is a product of the Information-Centric Networking Research Group (ICNRG) of the IRTF.</t> </abstract> </front> <middle> <section numbered="true" toc="default"> <name>Introduction</name> <t>Ascertaining data plane reachability to a destination and taking coarse performance measurements ofround trip timeRound-Trip Time (RTT) are fundamental facilities for network administration and troubleshooting. In IP, where routing and forwarding are based on IP addresses, ICMPechoEcho Request and ICMPecho responseEcho Reply packets are the protocol mechanisms used for this purpose, generally exercised through the familiar ping utility. InICN,Information-Centric Networking (ICN), where routing and forwarding are based on name prefixes, the ability to ascertain the reachability of names is required.</t> <t> This document proposes protocol mechanisms for a ping equivalent in ICN networks (<xreftarget="RFC8609">CCNx</xref>target="RFC8609">Content-Centric Networking (CCNx)</xref> and <xreftarget="NDNTLV">NDN</xref>) networks.target="NDNTLV">Named Data Networking (NDN)</xref>). A non-normativeappendixsection (<xref target="app-additional"/>) suggests useful properties for an ICNpingPing client application, analogous to IP ping, that originatesecho requestsEcho Requests and processesecho replies.</t>Echo Replies.</t> <t> In order to carry out meaningful experimentation and deployment of ICN protocols, new tools analogous to ping and traceroute used for TCP/IP are needed to manage and debug the operation of ICN architectures andprotocols are needed analogous to ping and traceroute used for TCP/IP.protocols. This document describes the design of a management and debugging protocol analogous to the ping protocol ofTCP/IP, whichTCP/IP; this new management and debugging protocol will aid the experimental deployment of ICN protocols. As the community continues its experimentation with ICN architectures and protocols, the design of ICN Ping might change accordingly. ICN Ping is designed as a "first line of defense" tool to troubleshoot ICN architectures and protocols. As such, this document is classified as anexperimentalExperimental RFC. Note that a measurement application is needed to make proper use of ICN Ping in order to compute various statistics, such asthe variance,average,maximummaximum, and minimumRTT values as well asRound-Trip Time (RTT) values, variance in RTTs, and loss rates.</t> <t>Thisdocument is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation. This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Research Task Force (IRTF). The IRTF publishes the results of Internet-related research and development activities. These results might not be suitable for deployment. ThisRFC represents the consensus of the Information-Centric Networking Research Group (ICNRG) of the Internet Research Task Force(IRTF). Documents approved for publication by the IRSG are not candidates for any level of Internet Standard; see Section 2 of RFC 7841.</t>(IRTF).</t> <section numbered="true" toc="default"> <name>Requirements Language</name> <t>The key words"MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY","<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and"OPTIONAL""<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described inBCP 14BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t> </section> <section numbered="true" toc="default"> <name>Terminology</name> <t>This specification uses the terminology defined in <xref target="RFC8793"/>. To aid theunderstanding of readers,reader, we additionally define the following terms:</t><ul> <li>Producer's name: The<dl spacing="normal"> <dt>Producer's Name:</dt><dd>The name prefix that a request must carry in order to reach a producer over an ICNnetwork.</li> <li>Named Data: Anetwork.</dd> <dt>Named Data:</dt><dd>A synonym for acontent object.</li> <li>Round TripContent Object.</dd> <dt>Round-Trip Time(RTT): The(RTT):</dt><dd>The time between sending a request for a specific piece of named data and receiving the corresponding piece of nameddata.</li> <li>Sender: Andata.</dd> <dt>Sender:</dt><dd>An entity that sends a request for named data or a piece of nameddata.</li> <li>Namedata.</dd> <dt>Name of asender: AnSender:</dt><dd>An alias of a producer'sname.</li> <li>Border forwarder: Thename.</dd> <dt>Border Forwarder:</dt><dd>The forwarder that is the border of a network region where a producer's name is directly routable (i.e., the producer's name is present in the FIB of forwarders within this networkregion).</li> </ul>region).</dd> </dl> </section> </section> <section numbered="true" toc="default"> <name>Background on IP-Based Ping Operation</name> <t>In IP-based ping, an IP address is specified by the user eitherdirectly,directly or via translation of a domain name through DNS. The ping client application sends a number of ICMP Echo Request packets with the specified IP address as the IP destination address and an IP address from the client's host as the IP source address.</t> <t>Each ICMP Echo Request is forwarded across the network based on its destination IP address. If it eventually reaches the destination, the destination responds by sending back an ICMP Echo Reply packet to the IP source address from the ICMP Echo Request.</t> <t>If an ICMP Echo Request does not reach the destination or the EchoreplyReply is lost, the ping client times out. Any ICMP errormessages, such as "no route to destination",messages generatedbyin response to the ICMP Echo Requestmessagemessage, such as "No route to destination", are returned to the client and reported.</t> </section> <section numbered="true" toc="default"> <name>Ping Functionality Challenges and Opportunities in ICN</name> <t> In ICN, the communication paradigm is based exclusively on named objects. An Interest message is forwarded across the network based on the name prefix that it carries. Eventually, acontent objectContent Object is retrievedeitherfrom either a producer application or some forwarder's Content Store (CS).</t> <t>IP-based ping was built as an add-on measurement and debugging tool on top of analready existingalready-existing network architecture. In ICN, we have the opportunity to incorporate diagnostic mechanisms directly in thenetwork layer protocol, and hopefullynetwork-layer protocol and, hopefully, provide more powerful diagnostic capability than can be realized through the layered ICMP Echo approach.</t> <t>An ICN network differs from an IP network in at least4four importantways:</t>ways (four of which are as follows):</t> <ul spacing="normal"> <li>IP identifies interfaces to an IP network with a fixed-lengthaddress,address and delivers IP packets to one or more of these interfaces. ICN identifies units of data in the network with avariable lengthvariable-length name consisting of a hierarchical list of name components.</li> <li>An IP-based network depends on the IP packets having source IP addresses that are used as the destination address for replies. On the other hand, ICN Interests do not have sourceaddressesaddresses, and they are forwarded based on names, which do not refer to a uniqueend-point.endpoint. Data packets follow the reverse path of the Interests based on hop-by-hop state created during Interest forwarding.</li> <li>An IP network supports multi-path,single destination,single-destination, stateless packet forwarding and delivery viaunicast,unicast; a limited form of multi-destination selected delivery withanycast,anycast; and group-based multi-destination delivery via multicast. In contrast, ICN supports multi-path and multi-destination stateful Interest forwarding and multi-destination delivery of named data. This single forwarding semantic subsumes the functions of unicast, anycast, and multicast. As a result, consecutive (or retransmitted) ICN Interest messages may be forwarded through an ICN network along differentpaths,paths and may be forwarded to different data sources (e.g., end-nodeapplications,applications and in-network storage) holding a copy of the requested unit of data. This can lead to a significant variance inround-trip times, whichRTTs; such variance, while resulting in a more robust overall forwarding architecture, has implications for a network troubleshooting mechanism like ping.</li> <li>In the case of multiple Interests with the same name arriving at a forwarder, a number of Interests may be aggregated in a common Pending Interest Table (PIT) entry and only one of them forwarded onward. Depending on the lifetime of a PIT entry, theround-trip timeRTT of an Interest-Data exchange mightsignificantlyvary significantly (e.g., it might be shorter than the fullround-trip timeRTT to reach the original content producer). To this end, theround-trip timeRTT experienced by consumers might also vary.</li> </ul> <t>These differences introduce new challenges, newopportunitiesopportunities, and new requirementsinregarding the design of an ICNpingPing protocol. Following this communication model, a ping client should be able to expressping echo requestsPing Echo Requests with some name prefix and receive responses.</t> <t>Our goals arethe following:</t>as follows:</t> <ul spacing="normal"> <li>Test the reachability and the operational state of an ICN forwarder.</li> <li>Test the reachability of a producer or a data repository (in the sense of whether Interests for a prefix that it serves can be forwarded toit)it), and discover the forwarder with local connectivity to (an instance of) this producer or repository.</li> <li>Test whether a specific named object is cached in some on-path CS (e.g., a video segment withathe name"/video/_seq=1”),"/video/_seq=1"), and, if so, return the administrative name of the corresponding forwarder (e.g., a forwarder withanthe administrative name"/ISP/forwarder1”).</li>"/ISP&wj;/forwarder1").</li> <li>Perform some simple network performance measurements, such as RTT and loss rate.</li> </ul> <t>To this end, a ping name can represent:</t> <ul spacing="normal"> <li>An administrative name that has been assigned to a forwarder.</li> <li>A name that includes an application's namespace as a prefix.</li> <li>A named object that might reside in some in-network storage.</li> </ul> <t>In order to provide stable and reliable diagnostics, it is desirable that the packet encoding of aping echo requestPing Echo Request enable the forwarders to distinguish a ping from a normal Interest, whilealso allowing for forwarding behavior to bediverging assimilarlittle as possibleto that offrom the forwarding behavior for an Interest packet. In the same way, the encoding of aping echo replyPing Echo Reply shouldallow for forwarderminimize any processingas close as possible to that useddifferences from those employed for a datapackets.</t>packet by the forwarders.</t> <t>The ping protocol should also enable relatively robustround-trip timeRTT measurements. To this end, it is valuable to have a mechanism to steer consecutiveping echo requestsPing Echo Requests for the same name towards an individual path. Such a capability was initially published in <xref target="PATHSTEERING" format="default"/> and has been specified for CCNx and NDN in <xreftarget="I-D.irtf-icnrg-pathsteering"/>.</t> <t>It is also important, intarget="RFC9531"/>.</t> <t>In the case ofping echo requestsPing Echo Requests for the same name from differentsourcessources, it is also important to have a mechanism to avoid those requests being aggregated in the PIT. To this end, we need some encoding in theping echo requestsPing Echo Requests to make each request for a common name unique, hence avoiding PIT aggregation and further enabling the exact match of a response with a particular ping packet. However, avoiding PIT aggregation could lead to PIT DoS attacks.</t> </section> <section numbered="true" toc="default"> <name>ICN Ping Echo CCNx Packet Formats</name> <t>In this section, we describe the EchoPacket Formatpacket formats according to the CCNx packet format <xref target="RFC8569" format="default"/>, where messages exist within outermost containments (packets). Specifically, wespecifypropose two types of pingpackets,packets: anecho requestEcho Request and anecho reply packet type.</t>Echo Reply.</t> <section numbered="true" toc="default"> <name>ICN Ping Echo Request CCNx Packet Format</name> <t>The format of theping echo requestPing Echo Request packet is presented below:</t> <figure align="center" anchor="ping-packet"> <name>Echo Request CCNx Packet Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+---------------+---------------+ | | | | | Version |PT_ECHO_REQUEST| PacketLength | | | | | +---------------+---------------+---------------+---------------+ | | | | | | HopLimit | Reserved | Flags | HeaderLength | | | | | | +---------------+---------------+---------------+---------------+ / / / PathlabelLabel TLV / / / +---------------+---------------+---------------+---------------+ | | | Echo Request Message TLVs | | | +---------------+---------------+---------------+---------------+ ]]></artwork> </figure> <t>The existing packet header fields have the same definition as the header fields of a CCNx Interest packet. The value of the packet type field is <em>PT_ECHO_REQUEST</em>.See See <xref target="IANA"/> for the valueassignments.</t>assignment.</t> <t>Compared to the typical format of a CCNx packet headerfrom<xreftarget="RFC8569"target="RFC8609" format="default"/>,in order to enable path steering of Echo Requests,there isana new optional fixed headerPath label TLV as specified in section 3.1 of <xref target="I-D.irtf-icnrg-pathsteering"/>added to the packet header:</t> <ul> <li>A Path Steering hop-by-hop header TLV, which is constructed hop by hop in the Ping Echo Reply and included in the Ping Echo Request to steer consecutive requests expressed by a client towards a common forwarding path or different forwarding paths. The Path Label TLV is specified in <xref target="RFC9531" sectionFormat="of"/>.</li> </ul> <t>The message format of anecho requestEcho Request is presented below:</t> <figure align="center" anchor="echo-request"> <name>Echo Request Message Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+---------------+---------------+ | | | | MessageType =0x00050x05 | MessageLength | | | | +---------------+---------------+---------------+---------------+ | | | Name TLV | | | +---------------+---------------+---------------+---------------+ ]]></artwork> </figure> <t>Theecho requestEcho Request message is of type T_DISCOVERY. The Name TLV has the structure described in <xref target="RFC8609"/>. The name consists of the prefix that we would like to ping appended with a nonce typed name segment (T_NONCE) as its last segment. The nonce can be encoded as a base64-encoded string with the URL-safe alphabet as defined inSection 5 of<xreftarget="RFC4648"/>,target="RFC4648" sectionFormat="of" section="5"/>, with padding omitted. See <xref target="IANA"/> for the value assigned to this name segment type. The value of this TLV is a 64-bit nonce. The purpose of the nonce is to avoid Interest aggregation and allow client matching of replies with requests. As described below, the nonce is ignored for CS checking.</t> <figure align="center"> <name>T_NONCE Name Segment TLV for Echo Requestmessages</name>Messages</name> <artwork align="left" name="" type="" alt=""><![CDATA[ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+---------------+---------------+ | | | | T_NONCE_Type | T_NONCE_Length = 8 | | | | +---------------+---------------+---------------+---------------+ | | | | | | | T_NONCE_Value | | | | | +---------------+---------------+---------------+---------------+ ]]></artwork> </figure> </section><!-- This PI places the pagebreak correctly (before the section title) in the text output. --><section anchor="CCNxReply" numbered="true" toc="default"><name>Ping<name>ICN Ping Echo Reply CCNx Packet Format</name> <t>The format of aping echo replyPing Echo Reply packet is presented below:</t> <figure align="center"> <name>Echo Reply CCNx Packet Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+---------------+---------------+ | | | | | Version | PT_ECHO_REPLY | PacketLength | | | | | +---------------+---------------+---------------+---------------+ | | | | | Reserved | Flags | HeaderLength | | | | | +---------------+---------------+---------------+---------------+ / / / PathlabelLabel TLV / / / +---------------+---------------+---------------+---------------+ | | | Echo Reply Message TLVs | | | +---------------+---------------+---------------+---------------+ ]]></artwork> </figure> <t>The header of anecho replyEcho Reply consists of the header fields of a CCNx Content Object and a hop-by-hop PathlabelLabel TLV. The value of the packet type field is PT_ECHO_REPLY. See <xref target="IANA"/> for the valueassignments.assignment. The PathlabelLabel header TLVfrom section 3.1 of <xref target="I-D.irtf-icnrg-pathsteering"/>(<xref target="RFC9531" sectionFormat="of" section="3.1"/>) is as defined for theecho requestEcho Request packet.</t> <t>Aping echo replyPing Echo Reply message is of typeT_OBJECT,T_OBJECT and contains a Name TLV (name of the correspondingecho request),Echo Request), a PayloadTypeTLVTLV, and an ExpiryTime TLV with a value of 0 to indicate thatecho repliesEcho Replies must not be returned from network caches.</t> <figure align="center"> <name>Echo Reply Message Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+---------------+---------------+ | | | | MessageType =0x00050x06 | MessageLength | | | | +---------------+---------------+---------------+---------------+ | | | Name TLV | | | +---------------+---------------+---------------+---------------+ | | | PayloadType TLV | | | +---------------+---------------+---------------+---------------+ | | | ExpiryTime TLV | | | +---------------+---------------+---------------+---------------+ ]]></artwork> </figure> <t>The PayloadType TLV is presented below. It is of type T_PAYLOADTYPE_DATA, and the data schema consists of3 TLVs: 1) thethree TLVs:</t> <ol type="%d)"> <li>the name of the sender of this reply (with the same structure as a CCNx NameTLV), 2) theTLV),</li> <li>the sender's signature of their own name (with the same structure as a CCNx ValidationPayload TLV),3) aand</li> <li>a TLV with a return code to indicate what led to the generation of this reply (i.e., the existence of a local application, a CShithit, or a match with a forwarder's administrative name as specified in <xref target="forwarder"format="default"/>).</t>format="default"/>).</li> </ol> <figure align="center"> <name>Echo ReplyMessagePayloadType TLV Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------+---------------+---------------+---------------+ | | | | T_PAYLOADTYPE_DATA | Length | | | | +---------------+---------------+---------------+---------------+ / / / Sender's Name TLV / / / +---------------+---------------+---------------+---------------+ / / / Sender's Signature TLV / / / +---------------+---------------+---------------+---------------+ / / / Echo Reply Code / / / +---------------+---------------+---------------+---------------+ ]]></artwork> </figure> <t>The goal of including the name of the sender in theecho replyEcho Reply is to enable the user to reach this entity directly to ask for further management/administrative information using generic Interest-Data exchanges or by employing a more comprehensive managementtooltool, such as <xreftarget="RFC9344">CCNinfo</xref>target="RFC9344">CCNinfo</xref>, after a successful verification of the sender's name.</t> <t>The types of the Echo Reply Code field arethe following:</t> <ulas follows:</t> <dl spacing="normal"><li>T_ECHO_RETURN_FORWARDER: Indicates<dt>T_ECHO_RETURN_FORWARDER:</dt><dd>Indicates that the target name matched the administrative name of aforwarder.</li> <li>T_ECHO_RETURN_APPLICATION: Indicatesforwarder.</dd> <dt>T_ECHO_RETURN_APPLICATION:</dt><dd>Indicates that the target name matched a prefix served by anapplication.</li> <li>T_ECHO_RETURN_OBJECT: Indicatesapplication.</dd> <dt>T_ECHO_RETURN_OBJECT:</dt><dd>Indicates that the target name matched the name of an object in a forwarder'sCS.</li> </ul>CS.</dd> </dl> </section> </section> <section numbered="true" toc="default"> <name>ICN Ping Echo NDN Packet Formats</name> <t>In this section, we present the ICN Ping Echo Request and ReplyFormatpacket formats according to the NDN packet format specification <xref target="NDNTLV" format="default"/>.</t> <section numbered="true" toc="default"> <name>ICN Ping Echo Request NDN Packet Format</name> <t>Anecho requestEcho Request is encoded as an NDN Interest packet. Its format isthe following:</t>as follows:</t> <figure align="center"> <name>Echo Request NDN Packet Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ EchoRequest = INTEREST-TYPE TLV-LENGTH Name MustBeFresh Nonce ApplicationParameters? ]]></artwork> </figure> <t>The name field of anecho requestEcho Request consists of the name prefix to be pinged, a nonce value (it can be the value of the Noncefield)field), and the suffix "ping" to denote that this Interest is a ping request (added as aKeywordNameComponent).KeywordNameComponent <xref target="NDNTLV"/>). When the "ApplicationParameters" element is present, aparametersSha256DigestComponentParametersSha256DigestComponent (<xref target="forwarder"/>) is added as the last name segment.</t> <t>Anecho request MAYEcho Request <bcp14>MAY</bcp14> carry a PathlabelLabel TLV in the <xref target="NDNLPv2">NDN Link Adaptation Protocol</xref> as specified in <xreftarget="I-D.irtf-icnrg-pathsteering"/>.</t>target="RFC9531"/>.</t> <t>Since the NDN packet format does not provide a mechanism to prevent the network from caching specific data packets, we use the MustBeFreshelementTLV forecho requestsEcho Requests (in combination with aFreshness PeriodFreshnessPeriod TLVofwith a value of 1 forecho replies)Echo Replies) to avoid fetching cachedecho repliesEcho Replies with an expired freshness period <xref target="REALTIME" format="default"/>.</t> </section> <section numbered="true" toc="default"><name>Ping<name>ICN Ping Echo Reply NDN Packet Format</name> <t>Anecho replyEcho Reply is encoded as an NDN Data packet. Its format isthe following:</t>as follows:</t> <figure align="center"> <name>Echo Reply NDN Packet Format</name> <artwork align="left" name="" type="" alt=""><![CDATA[ EchoReply = DATA-TLV TLV-LENGTH Name MetaInfo Content Signature ]]></artwork> </figure> <t>Anecho reply MAY containEcho Reply <bcp14>MAY</bcp14> carry a PathlabelLabel TLV in the <xref target="NDNLPv2">NDN Link Adaptation Protocol</xref> as specified in <xreftarget="I-D.irtf-icnrg-pathsteering"/>,target="RFC9531"/>, since it might be modified in a hop-by-hop fashion by the forwarders along the reverse path.</t> <t>The name of anecho replyEcho Reply is the name of the correspondingecho request,Echo Request while the format of the MetaInfo field isthe following:</t>as follows:</t> <figure align="center"> <name>MetaInfo TLV</name> <artwork align="left" name="" type="" alt=""><![CDATA[ MetaInfo = META-INFO-TYPE TLV-LENGTH ContentType FreshnessPeriod ]]></artwork> </figure> <t>The value of the ContentType TLV is 0. The value of the FreshnessPeriod TLV is 1, so that the replies are treated as stale data (almost instantly) as they are received by a forwarder.</t> <t>The content of anecho replyEcho Reply consists of the following2two TLVs: Sender'snameName (with a structure similarasto an NDN Name TLV) and Echo Reply Code. There is no need to have a separate TLV for the sender's signature in the content of the reply, since every NDNdataData packet carries the signature of the data producer.</t> <t>The Echo Reply Code TLV format isthe followingas follows (with the values specified in <xref target="CCNxReply" format="default"/>):</t> <figure align="center"> <name>Echo Reply Code TLV</name> <artwork align="left" name="" type="" alt=""><![CDATA[ EchoReplyCode = ECHOREPLYCODE-TLV-TYPE TLV-LENGTH 2*OCTET ]]></artwork> </figure> </section> </section> <section anchor="forwarder" numbered="true" toc="default"> <name>Forwarder Handling</name> <t>We present the workflow of the forwarder's operation in <xreftarget="forwarder-operation"/>.target="forwarder-operation"/> below. When a forwarder receives anecho request,Echo Request, it first extracts the message's base name (i.e., the request name with the Nonce name segment excluded as well as the suffix "ping" and the ParametersSha256DigestComponent in the case of anecho requestEcho Request with the NDN packet format).</t> <t>In some cases, the forwarder originates anecho reply,Echo Reply, sending the reply downstream through the face on which theecho requestEcho Request was received. Thisecho replyEcho Reply includes the forwarder's own name and signature and the appropriateecho reply codeEcho Reply Code based on the condition that triggered thereply generation.generation of the reply. It also includes a PathlabelLabel TLV, initially containing a null value (since theecho replyEcho Reply originatordiddoes not forward the requestand, thus,and thus does not make a path choice).</t> <t>The forwarder generates and returns anecho replyEcho Reply in the following cases:</t> <ul spacing="normal"> <li>Assuming that a forwarder has been given one or more administrative names, theecho requestEcho Request base name exactly matches any of the forwarder's administrativename(s).</li>names.</li> <li>Theecho request'sEcho Request's base name exactly matches the name of acontent-objectContent Object residing in the forwarder's CS (unless the ping client application has chosen not to receive replies due to CS hits as specified in <xref target="app-additional" format="default"/>).</li> <li>Theecho requestEcho Request base name matches (in a Longest Name Prefix Match (LNPM) manner) a FIB entry with an outgoing face referring to a local application.</li> </ul> <t>If none of the conditionsto replyfor replying to theecho requestEcho Request are met, the forwarder will attempt to forward theecho requestEcho Request upstream based on thepath steeringPath Steering value (if present), the results of the FIBLPMLNPM lookup and PITcreation (basedcreation. These lookups are based onthe nameincluding thenonce typed name segmentNonce and the suffix "ping" as name segments of the Name in the case of anecho requestEcho Request with the NDN packetformat).format. If no validnext-hopnext hop is found, an InterestReturn is sent downstream indicating"no route""No Route" (as with a failed attempt to forward an ordinary Interest).</t> <t>A receivedecho replyEcho Reply will be matched to an existing PIT entry as usual. On the reverse path, thepath steeringPath Steering TLV of anecho replyEcho Reply will be updated by each forwarder to encode its next-hop choice. When included in subsequentecho requests,Echo Requests, this PathlabelLabel TLV allows the forwarders to steer theecho requestsEcho Requests along the same path.</t> <figure align="center" anchor="forwarder-operation"> <name>Forwarder Operation</name> <artwork><![CDATA[ ------------------------------------------------------------------------ FORWARD PATH ------------------------------------------------------------------------ Request +------+ +-----+ +-----+(path label) +--------+(match)Request ------> |Admin |->| CS |->| PIT | ------------>| Label |-------------> | Name | +-----+ +-----+ | Lookup | |Lookup| | | \ (no path label)+--------+ +------+ | | \ |\(path label mismatch) Reply | | | \ | \ <---------+ | v \ | \ (base matches | aggregate \ | \ admin name) | \ | \ | (base \ | +------+ Request Reply | matches +----------|---->| FIB | -------> <---------+ cached object) | +------+ | (no | | (baseInterest-ReturnInterestReturn (NACK) v route)| | matches <----------------------------------------------+<-------+ | local app <----------------------------------------------------------+ face) Reply ------------------------------------------------------------------------ REVERSE PATH ------------------------------------------------------------------------Interest-return(NACK)InterestReturn (NACK) +-----+ (update path label)Interest-Return(NACK)InterestReturn (NACK) <---------------------| |<----------------------------------------- | | Reply +------+ | PIT | (update path label) Reply <------| CS |<------| |<----------------------------------------- +------+ | | +-----+ | | (no match) v ]]></artwork> </figure> </section> <section anchor="local" numbered="true" toc="default"> <name>Protocol OperationFor Locally-Scopedfor Locally Scoped Namespaces</name> <t>In this section, we elaborate on2two alternative design approaches in casesthatwhere the pinged prefix corresponds to alocally-scopedlocally scoped namespace not directly routable from the client's local network.</t> <t>The first approach leverages the NDN Link Object <xref target="SNAMP" format="default"/>. Specifically, the ping client attaches to the expressed request aLINKLink Object that contains a number of routable name prefixes, based on which the request can be forwarded until it reaches a network region where the request name itself is routable. ALINKLink Object is created and signed by a data producer allowed to publish data under alocally-scopedlocally scoped namespace. The way that a client retrieves aLINKLink Object depends on various network design factors and is out ofthescopeoffor this document.</t> <t> At thecurrent draft.</t> <t>Basedtime of this writing, and based onthe currentusage of theLINKLink Object by the NDNteam,team <xref target="NDNLPv2"/>, a forwarder at the border of the region where an Interest name becomes routable must remove theLINKLink Object from incoming Interests. The Interest state maintained along the entire forwarding path is based on the Interest name regardless of whether it was forwarded based on its name or a routable prefix in theLINKLink Object.</t> <t>The second approach is based on prepending a routable prefix to thelocally-scopedlocally scoped name. The resulting prefix will be the name of theecho requestsEcho Requests expressed by the client. In this way, a request will be forwarded based on the routable part of its name. When it reaches the network region where the originallocally-scopedlocally scoped name is routable, the border forwarder rewrites the request name and deletes its routable part. There are two conditions for a forwarder to perform this rewriting operation on arequest: 1) therequest:</t> <ol type="%d)"> <li>the routable part of the request name matches a routable name of the network region adjacent to the forwarder (assuming that a forwarder is aware of thosenames) and 2) thenames), and</li> <li>the remaining part of the request name is routable across the network region of thisforwarder.</t>forwarder.</li> </ol> <t>The statemaintainedalong thepath,path depends on whether the request is traversing the portion of the network where thelocally-scopedlocally scoped name isnot routable, isroutable. In this case, the forwarding can be based entirely on theroutable prefix along withlocally scoped name. However, where a portion of thelocally-scoped prefix. Withinpath lies outside thenetworkregionthatwhere thelocally-scoped prefixlocally scoped name is routable, thestate is based only on it. To ensure that the generated replies reach the ping client, theborderforwarderrouter hasalsoto rewrite the name of a reply and prepend the routable prefix of the correspondingecho request.</t>request to ensure that the generated replies will reach the client.</t> </section> <section numbered="true" toc="default"> <name>Security Considerations</name> <t>A reflection attack could be mounted by a compromised forwarder in the case of anecho replyEcho Reply with the CCNx packet format if that forwarder includes in the reply the name of a victim forwarder. This could convince a client to direct the future administrative traffic towards the victim. To foil such reflection attacks, the forwarder that generates a reply must sign the name included in the payload. In this way, the client is able to verify that the included name is legitimate and refers to the forwarder that generated the reply. Alternatively, the forwarder could include in the reply payload their routable prefix(es) encoded as a signed NDN Link Object <xref target="SNAMP" format="default"/>.</t> <t>Interest flooding attack amplification is possible in the case of the second approachto dealfor dealing withlocally-scopedlocally scoped namespaces as described in <xref target="local" format="default"/>. To eliminate such amplification, a border forwarder will have to maintain extra state in order to prepend the correct routable prefix to the name of an outgoing reply, since the forwarder might be attached to multiple network regions (reachable under different prefixes) or a network region attached to this forwarder might be reachable under multiple routable prefixes.</t> <t>Another example of an attack could be the ICN equivalent of port knocking, where an attacker tries to discover certain forwarder implementations for the purpose of exploiting potential vulnerabilities.</t> </section> <section anchor="IANA" numbered="true" toc="default"><name>IANA Considerations</name> <t>IANAwill assignhas assigned 0x05 to "PT_ECHO_REQUEST" and 0x06 to "PT_ECHO_REPLY" in theCCNx"CCNx PacketTypesTypes" registry established by <xref target="RFC8609"/>.</t> <t>IANAwill assignhas assigned 0x0003 to "T_NONCE" in the "CCNx Name SegmentType IANA Registry for CCNxTypes" registry established by <xref target="RFC8609"/>.</t> <t> IANAwill create an "Echohas created a new registry called "CCNx Echo ReplyCode" registry.Codes". The registration procedure is Specification Required <xref target="RFC8126"/>. In this registry, IANAwill assignhas assigned 0x01 to "T_ECHO_RETURN_FORWARDER", 0x02 to "T_ECHO_RETURN_APPLICATION", and 0x03 to"T_ECHO_RETURN_OBJECT" in the "Echo Reply Code" registry. </t> </section> <section anchor="Acknowledgements" numbered="true" toc="default"> <name>Acknowledgements</name> <t>The authors would like to thank Mark Stapp for the fruitful discussion on the objectives of the ICN ping protocol.</t>"T_ECHO_RETURN_OBJECT".</t> </section> </middle> <back> <references><name>References</name> <references><name>Normative References</name> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml"/> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8569.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8569.xml"/> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8609.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8609.xml"/> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8793.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8793.xml"/> </references> <references><name>Informative References</name> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9344.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml"/> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9344.xml"/> <xi:includehref="https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-icnrg-pathsteering.xml"/>href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml"/> <!-- draft-irtf-icnrg-pathsteering (RFC-to-be 9531) "Long way" to fix author initials --> <reference anchor="RFC9531" target="https://www.rfc-editor.org/info/rfc9531"> <front> <title>Path Steering in Content-Centric Networking (CCNx) and Named Data Networking (NDN)</title> <author fullname="Ilya Moiseenko" initials="I." surname="Moiseenko"> <organization>Apple, Inc.</organization> </author> <author fullname="David R. Oran" initials="D." surname="Oran"> <organization>Network Systems Research and Design</organization> </author> <date month="March" year="2024"/> </front> <seriesInfo name="RFC" value="9531"/> <seriesInfo name="DOI" value="10.17487/RFC9531"/> </reference> <reference anchor="NDNTLV" target="https://named-data.net/doc/NDN-packet-spec/current/"> <front> <title>NDN Packet FormatSpecification.</title> <author surname="NDN Project Team"> <organization/>Specification</title> <author> <organization>NDN project team</organization> </author> <dateyear="2021"/>month="February" year="2024"/> </front> </reference> <referenceanchor="SNAMP">anchor="SNAMP" target="https://ieeexplore.ieee.org/abstract/document/7179398"> <front> <title>SNAMP: Secure namespace mapping to scale NDN forwarding</title> <author initials="A" fullname="Alexander Afanasyev" surname="Afanasyev"> <organization/> </author> <authorsurname="et al">initials="C" fullname="Cheng Yi" surname="Yi"> <organization/> </author> <author initials="L" fullname="Lan Wang" surname="Wang"> <organization/> </author> <author initials="B" fullname="Beichuan Zhang" surname="Zhang"> <organization/> </author> <author initials="L" fullname="Lixia Zhang" surname="Zhang"> <organization/> </author> <date month="April" year="2015"/> </front> <refcontent>2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, China, pp. 281-286</refcontent> <seriesInfo name="DOI" value="10.1109/INFCOMW.2015.7179398"/> </reference> <referenceanchor="PATHSTEERING">anchor="PATHSTEERING" target="https://dl.acm.org/doi/10.1145/3125719.3125721"> <front> <title>Path switching in content centric and named data networks</title> <author initials="I" surname="Moiseenko"> <organization/> </author> <author initials="D" surname="Oran"> <organization/> </author> <date month="September" year="2017"/> </front><refcontent>in<refcontent>ICN '17: Proceedings of the 4th ACM Conference on Information-CentricNetworking</refcontent>Networking, pp. 66-76</refcontent> <seriesInfo name="DOI" value="10.1145/3125719.3125721"/> </reference> <referenceanchor="REALTIME">anchor="REALTIME" target="https://ieeexplore.ieee.org/document/8605992"> <front> <title>Real-Time Data Retrieval in Named Data Networking</title> <author initials="S" surname="Mastorakis"> <organization/> </author> <author initials="P" surname="Gusev"> <organization/> </author> <author initials="A" surname="Afanasyev"> <organization/> </author> <author initials="L" surname="Zhang"> <organization/> </author> <dateyear="2017"/>month="August" year="2018"/> </front><refcontent>in Proceedings of the<refcontent>2018 1st IEEE International Conference on HotTopics inInformation-CentricNetworking</refcontent>Networking (HotICN), Shenzhen, China, pp. 61-66</refcontent> <seriesInfo name="DOI" value="10.1109/HOTICN.2018.8605992"/> </reference> <reference anchor="NDNLPv2" target="https://redmine.named-data.net/projects/nfd/wiki/NDNLPv2"> <front><title>Named<title>NDNLPv2: Named Data Networking Link Adaptation Protocol v2</title><author surname="NDN team"/> <date>various</date><author> <organization>NDN team</organization> </author> <date year="2023" month="February"></date> </front> </reference> </references> </references> <section anchor="app-additional" numbered="true" toc="default"> <name>Ping Client Application (Consumer) Operation</name> <t>This section is an informative appendix regarding the proposed ping client operation.</t> <t>The ping client application is responsible for generatingecho requestsEcho Requests for prefixes provided by users.</t> <t>When generating a series ofecho requestsEcho Requests for a specific name, the firstecho requestEcho Request will typically not include a PathlabelLabel TLV, since no TLV value is known. After anecho replyEcho Reply containing a PathlabelLabel TLV is received, each subsequentecho requestEcho Request can include the receivedpath steeringPath Steering value in the PathlabelLabel header TLV to drive the requests towards a common path as part of checking network performance. To discover more paths, a client can omit thepath steeringPath Steering TLV in future requests. Moreover, for each newping echo request,Ping Echo Request, the client has to generate a new nonce and record the time that the request was expressed. It will also set the lifetime of anecho request,Echo Request, which will haveidenticalsemantics identical to the lifetime of an Interest.</t> <t>Further, the client application might not wish to receiveecho repliesEcho Replies due to CS hits. A mechanism to achieve that in CCNx would be to use a Content Object Hash Restriction TLV with a value of 0 in the payload of anecho requestEcho Request message. In NDN, the exclude filter selector can be used.</t> <t>When it receives anecho reply,Echo Reply, the client would typically match the reply to a sent request and compute theround-trip timeRTT of the request. It should parse the PathlabelLabel value and decode the reply's payload to parse thethesender's name and signature. The client should verify that both the received message and the forwarder's name have been signed by the key of the forwarder, whose name is included in the payload of the reply (by fetching this forwarder's public key and verifying the contained signature). The client can also decode the Echo Reply Code TLV to understand the condition that triggered the generation of the reply.</t> <t>In the case that anecho replyEcho Reply is not received for a request within a certain time interval (lifetime of the request), the client shouldtime-outtime out and send a new request with a new nonce value up to some maximum number of requests to be sent specified by the user.</t> </section><!-- Change Log v03 2021-10-25 DRO Update references v08 2023-04-20 DRO Keepalive + update Spiros' author info --><section anchor="Acknowledgements" numbered="false" toc="default"> <name>Acknowledgements</name> <t>The authors would like to thank <contact fullname="Mark Stapp"/> for the fruitful discussion on the objectives of the ICN Ping protocol.</t> </section> </back> </rfc>