<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-joras-sconepro-quic-protocol-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="QUIC for network property communication">A new QUIC version for network property communication</title>
    <seriesInfo name="Internet-Draft" value="draft-joras-sconepro-quic-protocol-00"/>
    <author fullname="Matt Joras">
      <organization>Meta Platforms, Inc.</organization>
      <address>
        <email>matt.joras@gmail.com</email>
      </address>
    </author>
    <author fullname="Marcus Ihlar">
      <organization>Ericsson</organization>
      <address>
        <email>marcus.ihlar@ericsson.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 30?>

<t>This document describes a new QUIC version. The proposed wire format and a set
of procedures can be used to communicate network properties between a content
endpoint and an on-path device. This is achieved by sending messages in this new
QUIC version format adjacent to already established QUIC version 1 or version 2
connections on the same UDP 4-tuple. The network properties are intended to
enable self-adaptation of video media rates by content endpoints.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Secure Communication of Network Properties Working Group mailing list (sadcdn@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/sadcdn/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/mjoras/sconepro-quic-protocol"/>.</t>
    </note>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The basic idea of the QUIC version described in this document is to create an
independent message flow between a client endpoint and devices in the network,
in parallel to an end-to-end QUIC connection [RFC 9000], to exchange network
properties. This independent flow uses a separate version of QUIC. This document
will not describe what information is exchanged for these properties, but rather
the overall way in which the communication functions.</t>
      <t>The new version of QUIC described in this document adheres to the
version-independent properties of QUIC specified in RFC 8999. This version of
QUIC uses long headers for all its communication. The version of QUIC defined in
this document protects packets using publicly known keys, which means that
confidentiality and integrity of protocol payload cannot be guaranteed. The
document describes how a connection can be upgraded to a QUIC version that
supports full TLS protection.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="new-quic-version">
      <name>New QUIC Version</name>
      <t>RFC 8999 defines the version independent properties of QUIC to consist of
long and short header packets and version negotiation packets. This document
defines a new version of QUIC which exclusively uses Long header packets.</t>
      <t>This version of QUIC has a single packet type, and a set of frame types
used to communicate network properties. Furthermore, packets are protected
using publicly-know keys, similar to the way Initial packets are protected
in QUIC version 1.</t>
    </section>
    <section anchor="quic-long-header-packet-format">
      <name>QUIC Long Header Packet Format</name>
      <t>This version of QUIC only uses long header packets with the following format:</t>
      <artwork><![CDATA[
Long Header Packet {
  Header Form (1) = 1,
  Fixed Bit (1) = 0,
  Forward Bit (1) = 0,
  Packet Type (2) = 0,
  Reserved Bits (3),
  Version (32),
  Destination Connection ID Length (8),
  Destination Connection ID (8..160),
  Source Connection ID Length (8),
  Source Connection ID (8..160),
  Payload (..),
}
]]></artwork>
      <dl>
        <dt>Header Form:</dt>
        <dd>
          <t>The most significant bit (0x80) of byte 0 (the first byte) is
set to 1 for long headers.</t>
        </dd>
        <dt>Fixed Bit:</dt>
        <dd>
          <t>The next bit (0x40) of byte 0 is set to 1.</t>
        </dd>
        <dt>Forward Bit:</dt>
        <dd>
          <t>The next bit (0x20) of byte 0 indicates if a network device that replies
to this packet should consume or forward it. By default it <bcp14>SHOULD</bcp14> be set to 0.</t>
        </dd>
        <dt>Packet Type:</dt>
        <dd>
          <t>The next two bits contain a packet type. A single packet type
is defined for this protocol with the value 0b00. Future extensions <bcp14>MAY</bcp14> add
new packet types. A network device <bcp14>MUST</bcp14> ignore packets with unknown packet
types and <bcp14>SHOULD</bcp14> forward such packets.</t>
        </dd>
        <dt>Reserved Bits:</dt>
        <dd>
          <t>These bits are reserved for future use and <bcp14>SHOULD</bcp14> be set to 0.</t>
        </dd>
        <dt>Version:</dt>
        <dd>
          <t>This QUIC version uses the value 0x5509c337, which was chosen at random.</t>
        </dd>
        <dt>Destination Connection ID Length:</dt>
        <dd>
          <t>The byte following the version contains the length in bytes of the Destination
Connection ID field that follows it.  This length is encoded as an 8-bit
unsigned integer.</t>
        </dd>
        <dt>Destination Connection ID:</dt>
        <dd>
          <t>The Destination Connection ID field follows the Destination Connection ID
Length field, which indicates the length of this field. A Destination
Connection ID <bcp14>MUST</bcp14> be at least 8 bytes long.</t>
        </dd>
        <dt>Source Connection ID Length:</dt>
        <dd>
          <t>The byte following the Destination Connection ID contains the length in bytes
of the Source Connection ID field that follows it.  This length is encoded as
an 8-bit unsigned integer.</t>
        </dd>
        <dt>Source Connection ID:</dt>
        <dd>
          <t>The Source Connection ID field follows the Source Connection ID Length field,
which indicates the length of this field. A Source Connection ID <bcp14>MUST</bcp14> be at
least 8 bytes long.</t>
        </dd>
      </dl>
    </section>
    <section anchor="packet-protection">
      <name>Packet Protection</name>
      <t>This version of QUIC uses packet protection as defined for Initial packets in
section 5 of [QUIC-TLS].</t>
      <t>This version of QUIC does not use packet numbers, therefore nonces are created
by combining the initial Destination Connection ID with the Source Connection
ID of the packet. A sender <bcp14>MUST</bcp14> generate a Source Connection ID with a high
probability of being unique for each packet.</t>
      <section anchor="public-salt">
        <name>Public Salt</name>
        <t>A publicly known salt is used to derive the secrets, specifically
sconepro_salt=0x6784619005cadc9bb961ec4d31b76892eb1b567e.</t>
      </section>
      <section anchor="hkdf-labels">
        <name>HKDF Labels</name>
        <t>The labels used in [QUIC-TLS] to derive packet protection keys (Section 5.1),
header protection keys (Section 5.4) change from "quic key" to "quicscone key",
from "quic iv" to "quicscone iv", from "quic hp" to "quicscone hp", to meet the
guidance for new versions in Section 9.6 of that document.</t>
      </section>
    </section>
    <section anchor="frames">
      <name>Frames</name>
      <t>The payload of a packet using this QUIC version consists of a sequence of
frames. Frames consist of a type field optionally followed by type-specific
payload.</t>
      <section anchor="padding-frame">
        <name>Padding Frame</name>
        <t>Padding frames are defined in section 19.1 of [RFC9000] and are used to
increase the size of a packet.</t>
        <artwork><![CDATA[
PADDING Frame {
  Type (i) = 0x00,
}
]]></artwork>
      </section>
      <section anchor="data-frame">
        <name>Data Frame</name>
        <artwork><![CDATA[
DATA Frame {
  Type (i) = 0x01,
  Length (i),
  Payload (..),
}
]]></artwork>
        <dl>
          <dt>Length:</dt>
          <dd>
            <t>The length of the DATA Frame payload in bytes.</t>
          </dd>
          <dt>Payload:</dt>
          <dd>
            <t>SCONEPRO specific payload such as media bitrate information.</t>
          </dd>
        </dl>
      </section>
      <section anchor="alternative-hosts-frame">
        <name>Alternative Hosts Frame</name>
        <t>Used to communicate alternative endpoints. This can be used to
send a new request of QUIC version but to the network device's
IP address and port instead of using the same 4-tuple than the
corresponsing end-to-end QUIC connection. Alternatively, it can also
be used to setup a full QUIC version 1 connection from the client to the nextwork
device to obtain confidentiality and authentication of the communication.</t>
        <artwork><![CDATA[
Alternative Hosts Frame {
  Type (i) = 0x02,
  Host (..)..,
}
]]></artwork>
        <dl>
          <dt>Host:</dt>
          <dd>
            <t>A tuple consisting of a host name, port and a QUIC protocol version. (TODO
define format)</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="communication-overview">
      <name>Communication Overview</name>
      <t>The goal of this QUIC version is to provide a way to communicate properties
between an on-path network device and a QUIC client endpoint, with the QUIC
client responsible for the initiation of that communication.</t>
      <t>Before establishing the communication, a QUIC client usually establishes a
QUIC version 1 or 2 end-to-end connection as per RFC 9000. Once this is done,
the client opportunistically sends a QUIC long header packet destined to the
same endpoint IP address and port using this new version. This packet can be
parsed by any capable network element on the path that supports this new QUIC
version. If the Forward Bit is set, a capable element <bcp14>MUST</bcp14> forward these packets
and send an Alternative Hosts Frame with its own IP address and port number to
be used for further communication. This option can be used if more than one
capable device might be on the path and needs to see the contents. All capable
elements are able to respond to the initial packet in a similar fashion, by
creating their own QUIC packets for this QUIC version and sending them to the
QUIC client matching the IP/port tuple being utilized by the end-to-end QUIC
connection.</t>
      <t>The QUIC client must be able to distinguish the end-to-end QUIC version 1 or 2
packets and the new QUIC version packets. This can be done by looking for the
pattern of packets, combined with trial decryption.</t>
      <section anchor="use-of-connection-ids">
        <name>Use of Connection IDs</name>
        <t>SCONEPRO QUIC packets contain both Source and Destination Connection IDs. A
client who initiates SCONEPRO communication sets both Source and Destination
Connection IDs to randomly generated values. A network device that 'responds'
to a SCONEPRO QUIC packet sets the Destination Connection ID to the value of
the Source Connection ID of the packet it responds to. The network device sets
the Source Connection ID to a randomly generated value.</t>
      </section>
    </section>
    <section anchor="on-path-verification">
      <name>On Path Verification</name>
      <t>Communication using this new QUIC version <bcp14>MUST</bcp14> only be done with network elements that can be
verified to be on the same network path as an end to end QUIC flow. This is
because this communication is only meant to be done with network elements
that have the ability to, for example, modify and drop packets relevant to an
end-to-end QUIC flow. As QUIC packets for this new version are themselves carried in
separate UDP datagrams from the end to end QUIC flow, there is not an inherent
guarantee that they were generated by a network element.</t>
      <t>A capable network device <bcp14>MUST</bcp14> set the Destination Connection ID Length and
Destination Connection ID fields to the values received in the most recently
observed new version QUIC packet sent by a client.</t>
    </section>
    <section anchor="extensibility-to-provide-confidentiality-and-authenticity">
      <name>Extensibility To Provide Confidentiality and Authenticity</name>
      <t>The use of keys derived from a publicly known salt does not allow for
confidentiality or authenticity of the communication. The only manner of
authenticity defined in this document is verification of the on-path nature of
a network element. It may be desirable for this version of QUIC to be extended to allow for
confidentiality and authenticity.</t>
      <t>Confidentiality with this protocol could be achieved by further leveraging the
provisions of QUIC version 1 to do a TLS handshake between the QUIC
client and a capable network element. Authenticity could similarly
leverage the provisions of TLS. However, this comes with significant
complications. TLS achieves authenticity by using Public Key Infrastructure
(PKI), where each participant can choose to trust the certificate offered by
their peer. While this PKI exists today for Internet endpoints, there is no
such existing PKI for network elements. It is important to note that conducting
a TLS handshake would restrict the communication between the QUIC client and
exactly one on-path network element.</t>
      <t>Alternatively, a network element could advertise a set of hosts to which the
client can connect using QUIC version 1.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD - QUIC version.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 317?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
