Manageability of the QUIC Transport Protocol
draft-ietf-quic-manageability-04
Network Working Group M. Kuehlewind
Internet-Draft B. Trammell
Intended status: Informational ETH Zurich
Expires: October 26, 2019 April 24, 2019
Manageability of the QUIC Transport Protocol
draft-ietf-quic-manageability-04
Abstract
This document discusses manageability of the QUIC transport protocol,
focusing on caveats impacting network operations involving QUIC
traffic. Its intended audience is network operators, as well as
content providers that rely on the use of QUIC-aware middleboxes,
e.g. for load balancing.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 26, 2019.
Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Kuehlewind & Trammell Expires October 26, 2019 [Page 1]
Internet-Draft QUIC Manageability April 2019
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Notational Conventions . . . . . . . . . . . . . . . . . 3
2. Features of the QUIC Wire Image . . . . . . . . . . . . . . . 3
2.1. QUIC Packet Header Structure . . . . . . . . . . . . . . 4
2.2. Coalesced Packets . . . . . . . . . . . . . . . . . . . . 6
2.3. Use of Port Numbers . . . . . . . . . . . . . . . . . . . 6
2.4. The QUIC handshake . . . . . . . . . . . . . . . . . . . 6
2.5. Integrity Protection of the Wire Image . . . . . . . . . 10
2.6. Connection ID and Rebinding . . . . . . . . . . . . . . . 10
2.7. Packet Numbers . . . . . . . . . . . . . . . . . . . . . 11
2.8. Version Negotiation and Greasing . . . . . . . . . . . . 11
3. Network-visible information about QUIC flows . . . . . . . . 11
3.1. Identifying QUIC traffic . . . . . . . . . . . . . . . . 11
3.1.1. Identifying Negotiated Version . . . . . . . . . . . 12
3.1.2. Rejection of Garbage Traffic . . . . . . . . . . . . 12
3.2. Connection confirmation . . . . . . . . . . . . . . . . . 12
3.3. Application Identification . . . . . . . . . . . . . . . 13
3.4. Flow association . . . . . . . . . . . . . . . . . . . . 13
3.5. Flow teardown . . . . . . . . . . . . . . . . . . . . . . 14
3.6. Flow symmetry measurement . . . . . . . . . . . . . . . . 14
3.7. Round-Trip Time (RTT) Measurement . . . . . . . . . . . . 14
3.7.1. Measuring initial RTT . . . . . . . . . . . . . . . . 14
3.7.2. Using the Spin Bit for Passive RTT Measurement . . . 15
4. Specific Network Management Tasks . . . . . . . . . . . . . . 16
4.1. Stateful treatment of QUIC traffic . . . . . . . . . . . 16
4.2. Passive network performance measurement and
troubleshooting . . . . . . . . . . . . . . . . . . . . . 16
4.3. Server cooperation with load balancers . . . . . . . . . 16
4.4. DDoS Detection and Mitigation . . . . . . . . . . . . . . 17
4.5. Distinguishing acknowledgment traffic . . . . . . . . . . 17
4.6. QoS support and ECMP . . . . . . . . . . . . . . . . . . 17
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18
6. Security Considerations . . . . . . . . . . . . . . . . . . . 18
7. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 18
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 18
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
9.1. Normative References . . . . . . . . . . . . . . . . . . 19
9.2. Informative References . . . . . . . . . . . . . . . . . 19
Show full document text