TAPS Working Group
Internet Engineering Task Force (IETF) T. Pauly, Ed.
Internet-Draft
Request for Comments: 9621 Apple Inc.
Intended status:
Category: Standards Track B. Trammell, Ed.
Expires: 12 May 2024
ISSN: 2070-1721 Google Switzerland GmbH
A. Brunstrom
Karlstad University
G. Fairhurst
University of Aberdeen
C. S. Perkins
University of Glasgow
9
November 2023 2024
Architecture and Requirements for Transport Services
draft-ietf-taps-arch-19
Abstract
This document describes an architecture for exposing transport
protocol features to applications for network communication. This
system that exposes transport
protocol features to applications for network communication. The
Transport Services Application Programming Interface (API) is based
on an asynchronous, event-driven interaction pattern. This API uses
messages for representing data transfer to applications, applications and describes
how a Transport Services Implementation can use multiple IP
addresses, multiple protocols, and multiple paths, paths and can provide
multiple application streams. This document provides the
architecture and requirements. It defines common terminology and
concepts to be used in definitions of a Transport Service Services API and a
Transport Services Implementation.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list It represents the consensus of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid the IETF community. It has
received public review and has been approved for a maximum publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 7841.
Information about the current status of six months this document, any errata,
and how to provide feedback on it may be updated, replaced, or obsoleted by other documents obtained at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 12 May 2024.
https://www.rfc-editor.org/info/rfc9621.
Copyright Notice
Copyright (c) 2023 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info)
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Background . . . . . . . . . . . . . . . . . . . . . . . 4
1.2. Overview . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3. Specification of Requirements . . . . . . . . . . . . . . 5
1.4. Glossary of Key Terms . . . . . . . . . . . . . . . . . . 5
2. API Model . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1. Event-Driven API . . . . . . . . . . . . . . . . . . . . 10
2.2. Data Transfer Using Messages . . . . . . . . . . . . . . 11
2.3. Flexible Implementation . . . . . . . . . . . . . . . . . 12
2.4. Coexistence . . . . . . . . . . . . . . . . . . . . . . . 13
3. API and Implementation Requirements . . . . . . . . . . . . . 13
3.1. Provide Common APIs for Common Features . . . . . . . . . 14
3.2. Allow Access to Specialized Features . . . . . . . . . . 15
3.3. Select Between Equivalent Protocol Stacks . . . . . . . . 16
3.4. Maintain Interoperability . . . . . . . . . . . . . . . . 17
3.5. Support Monitoring . . . . . . . . . . . . . . . . . . . 17
4. Transport Services Architecture and Concepts . . . . . . . . 18
4.1. Transport Services API Concepts . . . . . . . . . . . . . 20
4.1.1. Endpoint Objects . . . . . . . . . . . . . . . . . . 22
4.1.2. Connections and Related Objects . . . . . . . . . . . 22
4.1.3. Pre-establishment . . . . . . . . . . . . . . . . . . 24 Preestablishment
4.1.4. Establishment Actions . . . . . . . . . . . . . . . . 24
4.1.5. Data Transfer Objects and Actions . . . . . . . . . . 25
4.1.6. Event Handling . . . . . . . . . . . . . . . . . . . 26
4.1.7. Termination Actions . . . . . . . . . . . . . . . . . 27
4.1.8. Connection Groups . . . . . . . . . . . . . . . . . . 28
4.2. Transport Services Implementation . . . . . . . . . . . . 28
4.2.1. Candidate Gathering . . . . . . . . . . . . . . . . . 30
4.2.2. Candidate Racing . . . . . . . . . . . . . . . . . . 30
4.2.3. Separating Connection Contexts . . . . . . . . . . . 30
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 31
6. Security and Privacy Considerations . . . . . . . . . . . . . 31
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 32
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 32
8.1.
7.1. Normative References . . . . . . . . . . . . . . . . . . 32
8.2.
7.2. Informative References . . . . . . . . . . . . . . . . . 33
Acknowledgements
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 35
1. Introduction
Many application programming interfaces Application Programming Interfaces (APIs) to provide transport
interfaces to networks have been deployed, perhaps the most widely
known and imitated being the BSD Socket [POSIX] interface (Socket
API). API) [POSIX].
The naming of objects and functions across these APIs is not
consistent and varies varies, depending on the protocol being used. For
example, the concept of sending and receiving streams of data is conceptually the
same for both an unencrypted Transmission Control Protocol (TCP)
stream and operating on an encrypted Transport Layer Security (TLS)
[RFC8446]
stream [RFC8446] over TCP, but applications cannot use the same
socket send() and recv() calls on top of both kinds of connections.
Similarly, terminology for the implementation of transport protocols
varies based on the context of the protocols themselves: terms such
as "flow", "stream", "message", and "connection" can take on many
different meanings. This variety can lead to confusion when trying
to understand the similarities and differences between protocols, protocols and
how applications can use them effectively.
The goal of the Transport Services System architecture is to provide
a flexible and reusable system with a common interface for transport
protocols. An application uses the Transport Services System through
an abstract Connection (we use capitalization to distinguish these
from the underlying connections of, e.g., for example, TCP). This provides
flexible connection establishment allowing an application to request
or require a set of properties.
As applications adopt this interface, they will benefit from a wide
set of transport features that can evolve over time, time and will ensure
that the system providing the interface can optimize its behavior
based on the application requirements and network conditions, without
requiring changes to the applications. This flexibility enables
faster deployment of new features and protocols.
This architecture can also support applications by offering racing
mechanisms (attempting multiple IP addresses, protocols, or network
paths in parallel), which otherwise need to be implemented in each
application separately (see Section 4.2.2). Racing selects one or
more candidates candidates, each with equivalent protocol stacks Protocol Stacks that are used
to identify an optimal combination of a transport protocol instance
such as TCP, UDP, or another transport, together with configuration
of parameters and interfaces. A Connection represents an object
that, once established, can be used to send and receive messages. A
Connection can also be created from another Connection, by cloning,
and then forms a part of a Connection Group whose Connections share
properties.
This document was developed in parallel with the specification of the
Transport Services API [I-D.ietf-taps-interface] [RFC9622] and implementation guidelines [I-D.ietf-taps-impl].
[RFC9623]. Although following the Transport Services architecture
does not require all APIs and implementations to be identical, a
common minimal set of features represented in a consistent fashion
will enable applications to be easily ported from one implementation
of the Transport Services System to another.
1.1. Background
The architecture of the Transport Services System is based on the
survey of services provided by IETF transport protocols and
congestion control mechanisms [RFC8095], [RFC8095] and the distilled minimal set
of the features offered by transport protocols [RFC8923]. These
documents identified common features and patterns across all
transport protocols developed thus far in the IETF.
Since transport security is an increasingly relevant aspect of using
transport protocols on the Internet, this document also considers the
impact of transport security protocols on the feature-set feature set exposed by
Transport Services [RFC8922].
One of the key insights to come from identifying the minimal set of
features provided by transport protocols [RFC8923] was that features
either (1) require application interaction and guidance (referred to
in that document as Functional or Optimizing Features), Features) or else (2) can be
handled automatically by an implementation of the Transport Services
System (referred to as Automatable Features). Among the identified
Functional and Optimizing Features, some are common across all or
nearly all transport protocols, while others present features that,
if specified, would only be useful with a subset of protocols, but
would not harm the functionality of other protocols. For example,
some protocols can deliver messages faster more quickly for applications
that do not require messages to arrive in the order in which they
were sent. This functionality needs to be explicitly allowed by the
application, since reordering messages would be undesirable in many
cases.
1.2. Overview
This document describes
The following sections describe the Transport Services System in three
sections: System:
* Section 2 describes how the Transport Services API model differs
from that of traditional socket-based APIs. Specifically, it
offers asynchronous event-driven interaction, the use of messages
for data transfer, and the flexibility to use different transport
protocols and paths without requiring major changes to the
application.
* Section 3 explains the fundamental requirements for a Transport
Services System. These principles are intended to make sure that
transport protocols can continue to be enhanced and evolve without
requiring significant changes by application developers.
* Section 4 presents the Transport Services Implementation and
defines the concepts that are used by the API
[I-D.ietf-taps-interface] [RFC9622] and
described in the implementation guidelines [I-D.ietf-taps-impl]. [RFC9623]. This
introduces the Preconnection, which allows applications to
configure Connection Properties.
1.3. Specification of Requirements
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
1.4. Glossary of Key Terms
This subsection provides a glossary of key terms related to the
Transport Services architecture. It provides a short description of
key terms that are later defined later in this document.
*
Application: An entity that uses the transport layer for end-to-
end end-to-end
delivery of data across the network [RFC8095].
*
Cached State: The state and history that the Transport Services
Implementation keeps for each set of the associated Endpoints that
have been used previously.
*
Candidate Path: One path that is available to an application and
conforms to the Selection Properties and System Policy during
racing.
*
Candidate Protocol Stack: One Protocol Stack that can be used by an
application for a Connection during racing.
*
Client: The peer responsible for initiating a Connection.
*
Clone: A Connection that was created from another Connection, Connection and
that forms a part of a Connection Group.
*
Connection: Shared state of two or more Endpoints that persists
across Messages that are transmitted and received between these
Endpoints [RFC8303]. When this document (and and other Transport
Services documents) documents use the capitalized "Connection" term, it
refers to a Connection object that is being offered by the
Transport Services system, as opposed to more generic uses of the
word "connection".
*
Connection Context: A set of stored properties across Connections,
such as cached protocol state, cached path state, and heuristics,
which can include one or more Connection Groups.
*
Connection Group: A set of Connections that share properties and
caches.
*
Connection Property: A Transport Property that controls per-
Connection behavior of a Transport Services implementation.
* Implementation.
Endpoint: An entity that communicates with one or more other
endpoints using a transport protocol.
*
Endpoint Identifier: An identifier that specifies one side of a
Connection (local or remote), such as a hostname or URL.
*
Equivalent Protocol Stacks: Protocol Stacks that can be safely
swapped or raced in parallel during establishment of a Connection.
*
Event: A primitive that is invoked by an Endpoint [RFC8303].
*
Framer: A data translation layer that can be added to a Connection
to define how application-layer Messages are transmitted over a
Protocol Stack.
*
Local Endpoint: The local Endpoint.
*
Local Endpoint Identifier: A representation of the application's
identifier for itself that it uses for a Connection.
*
Message: A unit of data that can be transferred between two
Endpoints over a Connection.
*
Message Property: A property that can be used to specify details
about Message transmission, transmission or obtain details about the
transmission after receiving a Message.
*
Parameter: A value passed between an application and a transport
protocol by a primitive [RFC8303].
*
Path: A representation of an available set of properties that a
Local Endpoint can use to communicate with a Remote Endpoint.
*
Peer: An Endpoint application party to a Connection.
*
Preconnection: an An object that represents a Connection that has not
yet been established.
*
Preference: A preference to prohibit, avoid, ignore, prefer, for prohibiting, avoiding, ignoring,
preferring, or
require requiring a specific Transport Feature.
* transport feature.
Primitive: A function call that is used to locally communicate
between an application and an Endpoint, which is related to one or
more Transport Features transport features [RFC8303].
*
Protocol Instance: A single instance of one protocol, including any
state necessary to establish connectivity or send and receive
Messages.
*
Protocol Stack: A set of Protocol Instances that are used together
to establish connectivity or send and receive Messages.
*
Racing: The attempt to select between multiple Protocol Stacks based
on the Selection and Connection Properties communicated by the
application, along with any Security Parameters.
*
Remote Endpoint: The peer that a local Endpoint can communicate with
when a Connection is established.
*
Remote Endpoint Identifier: A representation of the application's
identifier for a peer that can participate in establishing a
Connection.
*
Rendezvous: The action of establishing a peer-to-peer Connection
with a Remote Endpoint.
*
Security Parameters: Parameters that define an application's
requirements for authentication and encryption on a Connection.
*
Selection Property: A Transport Property that can be set to
influence the selection of paths between the Local and Remote
Endpoints.
Server: The peer responsible for responding to a Connection
initiation.
*
Socket: The combination of a destination IP address and a
destination port number [RFC8303].
*
System Policy: The input from an operating system or other global
preferences that can constrain or influence how an implementation
will gather Candidate Paths and Protocol Stacks and race the
candidates during establishment of a Connection.
* Selection Property: A Transport Property that can be set to
influence the selection of paths between the Local and Remote
Endpoints.
*
Transport Feature: A specific end-to-end feature that the transport
layer provides to an application.
*
Transport Property: A property that expresses requirements,
prohibitions of a transport protocol and preferences the
services it provides [RFC8095].
*
Transport Service: A set of transport features, without an
association to not associated with
any given framing protocol, that provides a complete service to an
application.
*
Transport Services Implementation: This consists of all All objects and protocol
instances used internally to a system or library to implement the
functionality needed to provide a transport service across a
network, as required by the abstract interface.
*
Transport Services System: The Transport Services Implementation and
the Transport Services API.
2. API Model
The traditional model of using sockets can be represented as follows
(see figure Figure 1):
* Applications create connections and transfer data using the Socket
API.
* The Socket API provides the interface to the implementations of
TCP and UDP (typically implemented in the system's kernel).
* TCP and UDP in the kernel send and receive data over the available
network-layer interfaces.
* Sockets are bound directly to transport-layer and network-layer
addresses, obtained via a separate resolution step, usually
performed by a system-provided DNS stub resolver.
+-----------------------------------------------------+
| Application |
+-----------------------------------------------------+
| | |
+------------+ +------------+ +--------------+
| DNS stub Stub | | Stream API | | Datagram API |
| resolver Resolver | +------------+ +--------------+
+------------+ | |
+---------------------------------+
| TCP UDP |
| Kernel Networking Stack |
+---------------------------------+
|
+-----------------------------------------------------+
| Network Layer Network-Layer Interface |
+-----------------------------------------------------+
Figure 1: Socket API Model
The architecture of the Transport Services System is an evolution of
this general model of interaction. It both modernizes the API
presented to applications by the transport layer and enriches the
capabilities of the Transport Services Implementation below this API.
The Transport Services API [I-D.ietf-taps-interface] [RFC9622] defines the interface for an
application to create Connections and transfer data. It combines
interfaces for multiple interaction patterns into a unified whole
(see figure Figure 2). This offers generic functions and also the protocol-specific protocol-
specific mappings for TCP, UDP, UDP-Lite, and other protocol layers.
These mapping mappings are extensible. Future documents could define similar
mappings for new layers and for other transport protocols, such as
QUIC [RFC9000].
+-----------------------------------------------------+
| Application |
+-----------------------------------------------------+
|
+-----------------------------------------------------+
| Transport Services API |
+-----------------------------------------------------+
|
+-----------------------------------------------------+
| Transport Services Implementation |
| (Using: (Using DNS, UDP, TCP, SCTP, DCCP, TLS, QUIC, etc) etc.) |
+-----------------------------------------------------+
|
+-----------------------------------------------------+
| Network Layer Network-Layer Interface |
+-----------------------------------------------------+
Figure 2: Transport Services API Model
By combining name resolution with connection establishment and data
transfer in a single API, it allows for more flexible implementations
to provide path and transport protocol agility on the application's
behalf.
The Transport Services Implementation [I-D.ietf-taps-impl] [RFC9623] is the component of
the Transport Services System that implements the
transport layer transport-layer
protocols and other functions needed to send and receive data. It is
responsible for mapping the API to a specific available transport
Protocol Stack and managing the available network interfaces and
paths.
There are key differences between the architecture of the Transport
Services System and the architecture of the Socket API: the API. The API of
the Transport Services System System:
* is asynchronous and event-driven; it driven by events;
* uses messages for representing data transfer to applications; and it
* describes how a Transport Services Implementation can resolve
Endpoint Identifiers to use multiple IP addresses, multiple
protocols, and multiple paths, paths and to provide multiple application
streams.
2.1. Event-Driven API
Originally, the Socket API presented a blocking interface for
establishing connections and transferring data. However, most modern
applications interact with the network asynchronously. Emulation of
an asynchronous interface using the Socket API can use a try-and-fail
model: If if the application wants to read, read but data has not yet been
received from the peer, the call to read will fail. The application
then waits and can try again later.
In contrast to the Socket API, all interactions using the Transport
Services API are expected to be asynchronous. The API is defined
around an event-driven model (see Section 4.1.6), which models this
asynchronous interaction. Other forms of asynchronous communication
could also be available to applications, depending on the platform
implementing the interface.
For example, when an application that uses the Transport Services API
wants to receive data, it issues an asynchronous call to receive new
data from the Connection. When delivered data becomes available,
this data is delivered to the application using asynchronous events
that contain the data. Error handling is also asynchronous,
resulting in asynchronous error events.
This API also delivers events regarding the lifetime of a connection
and changes in the available network links, which were not previously
made explicit in the Socket API.
Using asynchronous events allows for a more natural interaction model
when establishing connections and transferring data. Events in time
more closely reflect the nature of interactions over networks, as
opposed to how the Socket API represents network resources as file
system objects that may be temporarily unavailable.
Separate from events, callbacks are also provided for asynchronous
interactions with the Transport Services API that are not directly
related to events on the network or network interfaces.
2.2. Data Transfer Using Messages
The Socket API provides a message interface for datagram protocols
like UDP, UDP but provides an unstructured stream abstraction for TCP.
While TCP has the ability to send and receive data as a byte-stream,
most applications need to interpret structure within this byte-
stream. For example, HTTP/1.1 uses character delimiters to segment
messages over a byte-stream [RFC9112]; TLS record headers carry a
version, content type, and length [RFC8446]; and HTTP/2 uses frames
to segment its headers and bodies [RFC9113].
The Transport Services API represents data as messages, so that it
more closely matches the way applications use the network. A
message-based abstraction provides many benefits, such as:
* providing additional information to the Protocol Stack;
* the ability to associate deadlines with messages, for applications
that care about timing;
* the ability to control reliability, which messages to retransmit
when there is packet loss, and how best to make use of the data
that arrived;
* the ability to automatically assign messages and connections to
underlying transport connections to utilize multi-streaming and
pooled connections.
Allowing applications to interact with messages is backwards- backward-
compatible with existing protocols and APIs because it does not
change the wire format of any protocol. Instead, it provides the
Protocol Stack with additional information to allow it to make better
use of modern transport services, Transport Services, while simplifying the application's
role in parsing data. For protocols that inherently use a streaming
abstraction, framers (Section 4.1.5) bridge the gap between the two
abstractions.
2.3. Flexible Implementation
The Socket API for protocols like TCP is generally limited to
connecting to a single address over a single interface (IP source
address). It also presents a single stream to the application.
Software layers built upon this API often propagate this limitation
of a single-address single-stream model. The Transport Services
architecture is designed: designed to:
* to handle multiple candidate endpoints, protocols, and paths;
* to support candidate protocol racing to select the most optimal stack
in each situation;
* to support multipath and multistreaming protocols;
* to provide state caching and application control over it.
A Transport Services Implementation is intended to be flexible at
connection establishment time, considering many different options and
trying to select the most optimal combinations by racing them and
measuring the results (see Section Sections 4.2.1 and Section 4.2.2). This requires
applications to specify identifiers for the Local and Remote Endpoint
that are higher-level at a higher level than IP addresses, such as a hostname or URL, which
URL. These identifiers are used by a Transport Services
Implementation for resolution, path selection, and racing. An
implementation can further implement fallback mechanisms if
connection establishment of for one protocol fails or performance is detected
determined to be unsatisfactory.
Information used in connection establishment (e.g. (e.g., cryptographic
resumption tokens, information about usability of certain protocols
on the path, results of racing in previous connections) are is cached in
the Transport Services Implementation. Applications have control
over whether this information is used for a specific establishment,
in order to allow tradeoffs trade-offs between efficiency and linkability.
Flexibility after connection establishment is also important.
Transport protocols that can migrate between multiple network-layer
interfaces need to be able to process and react to interface changes.
Protocols that support multiple application-layer streams need to
support initiating and receiving new streams using existing
connections.
2.4. Coexistence
While the architecture of the Transport Services System is designed
as an enhanced replacement for the Socket API, it need not replace it
entirely on a system or platform; indeed, coexistence has been
recommended for incremental deployability [RFC8170]. The
architecture is therefore designed such that it can run alongside
(or, indeed, on top of) an existing Socket API implementation; only
applications built to on the Transport Services API are managed by the
system's Transport Services Implementation.
3. API and Implementation Requirements
One goal of the architecture is to redefine the interface between
applications and transports in a way that allows the transport layer
to evolve and improve without fundamentally changing the contract
with the application. This requires a careful consideration of how to
expose the capabilities of protocols. The architecture also
encompasses system policies that can influence and inform how
transport protocols use a network path or interface.
There are several ways the Transport Services System can offer
flexibility to an application: it can application. It can:
* provide access to transport protocols and protocol features; it can
* use these protocols across multiple paths that could have
different performance and functional characteristics; and it can
* communicate with different remote systems to optimize performance,
robustness to failure, or some other metric.
Beyond these, if the Transport Services API remains the same over
time, new protocols and features can be added to the Transport
Services Implementation without requiring changes in applications for
adoption. Similarly, this can provide a common basis for utilizing
information about a network path or interface, enabling evolution
below the transport layer.
The normative requirements described in this section allow Transport
Services APIs and the Transport Services Implementation to provide
this functionality without causing incompatibility or introducing
security vulnerabilities.
3.1. Provide Common APIs for Common Features
Any functionality that is common across multiple transport protocols
SHOULD be made accessible through a unified set of calls using the
Transport Services API. As a baseline, any Transport Services API
SHOULD allow access to the minimal set of features offered by
transport protocols [RFC8923]. If that minimal set is updated or
expanded in the future, the Transport Services API ought to be
extended to match.
An application can specify constraints and preferences for the
protocols, features, and network interfaces it will use via
Properties. Properties are used by an application to declare its
preferences for how the transport service should operate at each
stage in the lifetime of a connection. Transport Properties are
subdivided into the following:
* Selection Properties, which specify which paths and Protocol
Stacks can be used and are preferred by the application;
* Connection Properties, which inform decisions made during
connection establishment and fine-tune the established connection;
and
* Message Properties, which can be set on individual Messages.
It is RECOMMENDED that the Transport Services API offers offer properties
that are common to multiple transport protocols. This enables a
Transport Services System to appropriately select between protocols
that offer equivalent features. Similarly, it is RECOMMENDED that
the Properties offered by the Transport Services API are be applicable to
a variety of network layer network-layer interfaces and paths, which permits to permit racing of
different network paths without affecting the applications using the
API. Each is expected to have a default value.
It is RECOMMENDED that the default values for Properties are be selected
to ensure correctness for the widest set of applications, while
providing the widest set of options for selection. For example,
since both applications that require reliability and those that do
not require reliability can function correctly when a protocol
provides reliability, reliability ought to be enabled by default. As
another example, the default value for a Property regarding the
selection of network interfaces ought to permit as many interfaces as
possible.
Applications using the Transport Services API need to be designed to
be robust to the automated selection provided by the Transport
Services System. This automated selection is constrained by the
properties and preferences expressed by the application and requires
applications to explicitly set properties that define any necessary
constraints on protocol, path, and interface selection.
3.2. Allow Access to Specialized Features
There are applications that will need to control fine-grained details
of transport protocols to optimize their behavior and ensure
compatibility with remote systems. It is therefore RECOMMENDED that
the Transport Services API and the Transport Services Implementation
permit more specialized protocol features to be used.
A
Some specialized feature features could be needed by an application only when
using a specific protocol, protocol and not when using others. For example, if
an application is using TCP, it could require control over the User
Timeout Option for TCP [RFC5482]; these options [RFC5482]. Such features would not take
effect for other transport protocols. In such cases, the API ought
to expose the features in such a way that they take effect when a
particular protocol is selected, selected but do not imply that only that
protocol could be used. For example, if the API allows an
application to specify a preference to use for using the User Timeout
Option, communication would not fail when a protocol such as UDP is
selected.
Other specialized features, however, can also be strictly required by
an application and thus further constrain the set of protocols that
can be used. For example, if an application requires support for
automatic handover or failover for a connection, only Protocol Stacks
that provide this feature are eligible to be used, e.g., Protocol
Stacks that include a multipath protocol or a protocol that supports
connection migration. A Transport Services API needs to allow
applications to define such requirements and constrain the options
available to a Transport Services Implementation. Since such options
are not part of the core/common features, it will generally be simple
for an application to modify its set of constraints and change the
set of allowable protocol features without changing the core
implementation.
To control these specialized features, the application can declare
its preference – preference: whether the presence of a specific feature is
prohibited, should be avoided, can be ignored, is preferred, or is
required in the pre-establishment preestablishment phase. An implementation of a
Transport Services API would honor this preference and allow the
application to query the availability of each specialized feature
after a successful establishment.
3.3. Select Between Equivalent Protocol Stacks
A Transport Services Implementation can attempt to use, and select between
between, multiple Protocol Stacks based on the Selection and
Connection Properties communicated by the application, along with any
Security Parameters. The implementation can only attempt to use
multiple Protocol Stacks when they are "equivalent", which means that
the stacks can provide the same Transport Properties and interface
expectations as requested by the application. Equivalent Protocol
Stacks can be safely swapped or raced in parallel (see Section 4.2.2)
during connection establishment.
The following two examples show non-equivalent Protocol Stacks:
* If the application requires preservation of message boundaries, a
Protocol Stack that runs UDP as the top-level interface to the
application is not equivalent to a Protocol Stack that runs TCP as
the top-level interface. A UDP stack would allow an application
to read out message boundaries based on datagrams sent from the
remote system, whereas TCP does not preserve message boundaries on
its own, own but needs a framing protocol on top to determine message
boundaries.
* If the application specifies that it requires reliable
transmission of data, then a Protocol Stack using UDP without any
reliability layer on top would not be allowed to replace a
Protocol Stack using TCP.
The following example shows Equivalent equivalent Protocol Stacks:
* If the application does not require reliable transmission of data,
then a Protocol Stack that adds reliability could be regarded as
an Equivalent equivalent Protocol Stack as long as providing this would not
conflict with any other application-requested properties.
A Transport Services Implementation can race different security
protocols, e.g., if the System Policy is explicitly configured to
consider them equivalent. A Transport Services implementation Implementation SHOULD
only race Protocol Stacks where the transport security protocols
within the stacks are identical. To ensure that security protocols
are not incorrectly swapped, a Transport Services Implementation MUST
only select Protocol Stacks that meet application requirements
([RFC8922]).
[RFC8922]. A Transport Services Implementation MUST NOT
automatically fall back from secure protocols to insecure protocols, protocols
or fall back to weaker versions of secure protocols. A Transport
Services Implementation MAY allow applications to explicitly specify
which versions of a protocol ought to be permitted, e.g., to allow a
minimum version of TLS 1.2 in case if TLS 1.3 is not available.
A Transport Services Implementation MAY specify security properties
relating to how the system operates (e.g., requirements,
prohibitions, and preferences for the use of DNS Security Extensions
(DNSSEC) or DNS over HTTPS (DoH)).
3.4. Maintain Interoperability
It is important to note that neither the Transport Services API
[I-D.ietf-taps-interface]
[RFC9622] nor the guidelines for implementation of the Transport Service
Services System [I-D.ietf-taps-impl] [RFC9623] define new protocols or protocol
capabilities that affect what is communicated across the network. A
Transport Services System MUST NOT require that a peer on the other
side of a connection uses use the same API or implementation. A Transport
Services Implementation acting as a connection initiator is able to
communicate with any existing Endpoint that implements the transport
protocol(s) and all the required properties selected. Similarly, a
Transport Services Implementation acting as a Listener can receive
connections for any protocol that is supported from an existing
initiator that implements the protocol, independent independently of whether or
not the initiator uses the Transport Services System or not. System.
A Transport Services Implemenation Implementation makes decisions that select
protocols and interfaces. In normal use, a given version of a
Transport Services System SHOULD result in consistent protocol and
interface selection decisions for the same network conditions conditions, given
the same set of Properties. This is intended to provide predictable
outcomes to the application using the API.
3.5. Support Monitoring
The Transport Services API increases the layer of abstraction for
applications, and it enables greater automation below the API. Such
increased abstraction comes at the cost of increased complexity when
application programmers, users users, or system administrators try to
understand why any issues and failures may be happening. Transport
Services systems should therefore offer monitoring functions that
provide relevant debug and diagnostics information. For example,
such monitoring functions could indicate the protocol(s) in use, the
number of open connections per protocol, and any statistics that
these protocols may offer.
4. Transport Services Architecture and Concepts
This section of the document describes the architecture non-
normatively non-normatively and explains
the operation of a Transport Services Implementation. The concepts
defined in this document are intended primarily for use in the
documents and specifications that describe the Transport Services
System. This includes the architecture, the Transport Services API API,
and the associated Transport Services Implementation. While the
specific terminology can be used in some implementations, it is
expected that there will remain a variety of terms used by running
code.
The architecture divides the concepts for the Transport Services
System into two categories:
1. API concepts, which are intended to be exposed to applications;
and
2. System-implementation concepts, which are intended to be
internally used by a Transport Services Implementation.
The following diagram summarizes the top-level concepts in a
Transport Services System and how they relate to one another.
+-----------------------------------------------------+
| Application |
+-+----------------+------^-------+--------^----------+
| | | | |
pre- | data | events
establishment | transfer | |
| establishment | termination |
| | | | |
| +--v------v-------v+ |
+-v-------------+ Connection(s) +-------+----------+
| Transport +--------+---------+ |
| Services | |
| API | +-------------+ |
+------------------------+--+ Framer(s) |-----------+
| +-------------+
+------------------------|----------------------------+
| Transport | |
| System | +-----------------+ |
| Implementation | | Cached | |
| | | State | |
| (Candidate Gathering) | +-----------------+ |
| | |
| (Candidate Racing) | +-----------------+ |
| | | System | |
| | | Policy | |
| +----------v-----+ +-----------------+ |
| | Protocol | |
+-------------+ Stack(s) +----------------------+
+-------+--------+
V
+-----------------------------------------------------+
| Network Layer Network-Layer Interface |
+-----------------------------------------------------+
Figure 3: Concepts and Relationships in the Architecture of the
Transport Services System
The Transport Services Implementation includes the Cached State and
System Policy.
The System Policy provides input from an operating system or other
global preferences that can constrain or influence how an
implementation will gather Candidate Paths and Protocol Stacks and
race the candidates when establishing a Connection. As the details
of System Policy configuration and enforcement are largely platform- dependent
on the platform and implementation- dependent, implementation and do not affect application-level application-
level interoperability, the Transport Services API
[I-D.ietf-taps-interface] [RFC9622] does not
specify an interface for reading or writing System Policy.
The Cached State is the state and history that the Transport Services
Implementation keeps for each set of associated Endpoints that have
previously been used. An application ought to explicitly request any
required or desired properties via the Transport Services API.
4.1. Transport Services API Concepts
Fundamentally, a Transport Services API needs to provide Connection
objects (Section 4.1.2) that allow applications to establish
communication,
communication and then send and receive data. These could be exposed
as handles or referenced objects, depending on the chosen programming
language.
Beyond the Connection objects, there are several high-level groups of
actions that any Transport Services API needs to provide:
* Pre-establishment Preestablishment (Section 4.1.3) encompasses the properties that
an application can pass to describe its intent, requirements,
prohibitions, and preferences for its networking operations.
These properties apply to multiple transport protocols, unless
otherwise specified. Properties specified during pre-
establishment preestablishment
can have a large impact on the rest of the interface: they modify
how establishment occurs, they influence the expectations around data
transfer, and they determine the set of events that will be supported.
* Establishment (Section 4.1.4) focuses on the actions that an
application takes on the Connection objects to prepare for data
transfer.
* Data Transfer transfer (Section 4.1.5) consists of how an application
represents the data to be sent and received, the functions
required to send and receive that data, and how the application is
notified of the status of its data transfer.
* Event Handling handling (Section 4.1.6) defines categories of notifications
that an application can receive during the lifetime of a
Connection. Events also provide opportunities for the application
to interact with the underlying transport by querying state or
updating maintenance options.
* Termination (Section 4.1.7) focuses on the methods by which data
transmission is stopped, stopped and connection state is torn down.
The diagram below provides a high-level view of the actions and
events during the lifetime of a Connection object. Note that some
actions are alternatives (e.g., whether to initiate a connection or
to
listen for incoming connections), while others are optional (e.g.,
setting Connection and Message Properties in pre-establishment) preestablishment) or
have been omitted for brevity and simplicity.
Pre-establishment
Preestablishment : Established : Termination
----------------- : ----------- : -----------
: :
+-- Local Endpoint : Message :
+-- Remote Endpoint : Receive() | :
+-- Transport Properties : Send() | :
+-- Security Parameters : | :
| : | :
| InitiateWithSend() | Close() :
| +---------------+ Initiate() +-----+------+ Abort() :
+---+ Preconnection |------------->| Connection |-----------> Closed
+---------------+ Rendezvous() +------------+ :
Listen() | : | | :
| : | v :
v : | Connection :
+----------+ : | Ready :
| Listener |----------------------+ :
+----------+ Connection Received :
: :
Figure 4: The lifetime Lifetime of a Connection object Object
In this diagram, the lifetime of a Connection object is divided into
three phases: pre-establishment, preestablishment, the Established state, and
Termination.
Pre-establishment
termination of a connection.
Preestablishment is based around a Preconnection object, that
contains object containing
various sub-objects that describe the properties and parameters of
desired Connections (Local and Remote Endpoints, Transport
Properties, and Security Parameters). A Preconnection can be used to
start listening for inbound connections, connections -- in which case a Listener
object is created, created -- or can be used to establish a new connection
directly using Initiate (for outbound connections) or Rendezvous (for
peer-to-peer connections).
Once a Connection is in the Established state, an application can
send and receive Message objects, objects and can receive state updates.
Closing or aborting a connection, either locally or from the peer,
can terminate a connection.
4.1.1. Endpoint Objects
An Endpoint Identifier specifies one side of a transport connection.
Endpoints can be Local Endpoints or Remote Endpoints, and the
Endpoint Identifiers can respectively represent an identity that the
application uses for the source or destination of a connection. An
Endpoint Identifier can be specified at various levels of
abstraction. An Endpoint Identifier at a higher level of abstraction
(such as a hostname) can be resolved to more concrete identities
(such as IP addresses). A Remote Endpoint Identifier can also
represent a multicast group or anycast address. In the case of
multicast, this selects a multicast transport will be selected for communication.
*
Remote Endpoint Identifier: The Remote Endpoint Identifier
represents the application's identifier for a peer that can
participate in a transport connection; connection, for example, the
combination of a DNS name for the peer and a service name/port.
*
Local Endpoint Identifier: The Local Endpoint Identifier represents
the application's identifier for itself that it uses for transport connections;
connections, for example, a local IP address and port.
4.1.2. Connections and Related Objects
*
Connection: A Connection object represents one or more active
transport protocol instances that can send and/or receive Messages
between Local and Remote Endpoints. It is an abstraction that
represents the communication. The Connection object holds state
pertaining to the underlying transport protocol instances and any
ongoing data transfers. For example, an active Connection can
represent a connection-oriented protocol such as TCP, or it can
represent a fully-specified fully specified 5-tuple for a connectionless protocol
such as UDP, where the Connection remains an abstraction at the
endpoints. It can also represent a pool of transport protocol
instances, e.g., a set of TCP and QUIC connections to equivalent
endpoints, or a stream of a multi-streaming transport protocol
instance. Connections can be created from a Preconnection or by a
Listener.
*
Preconnection: A Preconnection object is a representation of a
Connection that has not yet been established. It has state that
describes parameters of the Connection: the Local Endpoint
Identifier from which that Connection will be established, the
Remote Endpoint Identifier (Section 4.1.3) to which it will connect, and Transport
Properties that influence the paths and protocols a Connection
will use. A Preconnection can be either fully specified
(representing a single possible Connection), Connection) or it
can be partially specified
(representing a family of possible Connections). The Local
Endpoint (Section 4.1.3) is required for a Preconnection used to
Listen for incoming Connections, Connections but is optional if it is used to
Initiate a Connection. The Remote Endpoint Identifier is required
in a Preconnection that is used to Initiate a Connection, Connection but is
optional if it is used to Listen for incoming Connections. The
Local Endpoint Identifier and the Remote Endpoint Identifier are
both required if a peer-to-peer Rendezvous is to occur based on
the Preconnection.
*
Transport Properties: Transport Properties allow the application to
express their requirements, prohibitions, and preferences and configure
a Transport Services Implementation. There are three kinds of
Transport Properties:
-
Selection Properties (Section 4.1.3): Selection Properties can
only be specified on a Preconnection.
-
Connection Properties (Section 4.1.3): Connection Properties can
be specified on a Preconnection and changed on the Connection.
-
Message Properties (Section 4.1.5): Message Properties can be
specified as defaults on a Preconnection or a Connection, Connection and
can also be specified during data transfer to affect specific
Messages.
*
Listener: A Listener object accepts incoming transport protocol
connections from Remote Endpoints and generates corresponding
Connection objects. It is created from a Preconnection object
that specifies the type of incoming Connections it will accept.
4.1.3. Pre-establishment
* Preestablishment
Selection Properties: The Selection Properties consist of the properties
that an application can set to influence the selection of paths
between the Local and Remote Endpoints, to influence the selection of
transport protocols, or to configure the behavior of generic
transport protocol features. These properties can take the form
of requirements, prohibitions, or preferences. Examples of
properties that influence path selection include the interface
type (such as a Wi-Fi connection, connection or a Cellular LTE connection),
requirements around the largest Message that can be sent, or
preferences for throughput and latency. Examples of properties
that influence protocol selection and configuration of transport
protocol features include reliability, multipath support, and fast
open support.
*
support for TCP Fast Open.
Connection Properties: The Connection Properties are used to configure
protocol-specific options and control per-connection behavior of a
Transport Services Implementation; for example, a
protocol-specific protocol-
specific Connection Property can express that if TCP is used, the
implementation ought to use the User Timeout Option. Note that
the presence of such a property does not require that a specific
protocol will be used. In general, these properties do not explicitly
determine the selection of paths or protocols, protocols but can be used by
an implementation during connection establishment. Connection
Properties are specified on a Preconnection prior to Connection establishment,
establishment and can be modified on the Connection later.
Changes made to Connection Properties after Connection
establishment take effect on a best-effort basis.
*
Security Parameters: Security Parameters define an application's
requirements for authentication and encryption on a Connection.
They are used by Transport Security transport security protocols (such as those
described in [RFC8922]) to establish secure Connections. Examples
of parameters that can be set include local identities, private
keys, supported cryptographic algorithms, and requirements for
validating trust of remote identities. Security Parameters are
primarily associated with a Preconnection object, but properties
related to identities can be associated directly with Endpoints.
4.1.4. Establishment Actions
*
Initiate: The primary action that an application can take to create
a Connection to a Remote Endpoint, Endpoint and prepare any required local
or remote state to enable the transmission of Messages. For some
protocols, this will initiate a client-to-server style client-to-server-style handshake;
for other protocols, this will just establish local state (e.g.,
with connectionless protocols such as UDP). The process of
identifying options for connecting, such as resolution of the
Remote Endpoint Identifier, occurs in response to the Initiate
call.
*
Listen: Enables a Listener to accept incoming connections. The
Listener will then create Connection objects as incoming
connections are accepted (Section 4.1.6). Listeners by default
register with multiple paths, protocols, and Local Endpoints,
unless constrained by Selection Properties and/or the specified
Local Endpoint Identifier(s). Connections can be accepted on any
of the available paths or endpoints.
*
Rendezvous: The action of establishing a peer-to-peer connection
with a Remote Endpoint. It simultaneously attempts to initiate a
connection to a Remote Endpoint while listening for an incoming
connection from that Endpoint. The process of identifying options
for the connection, such as resolution of the Remote Endpoint
Identifier(s), occurs in response to the Rendezvous call. As with
Listeners, the set of local paths and endpoints is constrained by
Selection Properties. If successful, the Rendezvous call
generates and asynchronously returns a Connection object to
represent the established peer-to-peer connection. The processes
by which connections are initiated during a Rendezvous action will
depend on the set of Local and Remote Endpoints configured on the
Preconnection. For example, if the Local and Remote Endpoints are
TCP host candidates, then a TCP simultaneous open [RFC9293] might
be performed. However, if the set of Local Endpoints includes
server reflexive
server-reflexive candidates, such as those provided by STUN
(Session Traversal Utilities for NAT) [RFC5389], [RFC8489], a Rendezvous
action will race candidates in the style of the ICE (Interactive
Connection
Connectivity Establishment) algorithm [RFC8445] to perform NAT
binding discovery and initiate a peer-to-peer connection.
4.1.5. Data Transfer Objects and Actions
*
Message: A Message object is a unit of data that can be represented
as bytes that can be transferred between two endpoints over a
transport connection. The bytes within a Message are assumed to
be ordered. If an application does not care about the order in
which a peer receives two distinct spans of bytes, those spans of
bytes are considered independent Messages. Messages are sent in
the payload of IP packets. One packet can carry one or more
Messages or parts of a Message.
*
Message Properties: Message Properties are used to specify details
about Message transmission. They can be specified directly on
individual Messages, Messages or can be set on a Preconnection or Connection
as defaults. These properties might only apply to how a Message
is sent (such as how the transport will treat prioritization and reliability),
reliability) but can also include properties that specific
protocols encode and communicate to the Remote Endpoint. When
receiving Messages, Message Properties can contain information
about the received Message, such as metadata generated at the
receiver and information signalled signaled by the Remote Endpoint. For
example, a Message can be marked with a Message Property
indicating that it is the final Message on a Connection.
*
Send: The Send action to transmit transmits a Message over a Connection to the
Remote Endpoint. The interface to Send can accept Message
Properties specific to how the Message content is to be sent. The
status of the Send operation is delivered back to the sending
application in an event (Section 4.1.6).
*
Receive: An The Receive action that indicates that the application is ready
to asynchronously accept a Message over a Connection from a Remote
Endpoint, while the Message content itself will be delivered in an
event (Section 4.1.6). The interface to Receive can include
Message Properties specific to the Message that is to be delivered
to the application.
*
Framer: A Framer is a data translation layer that can be added to a
Connection. Framers allow extending a Connection's Protocol Stack
to define how to encapsulate or encode outbound Messages, Messages and how
to decapsulate or decode inbound data into Messages. In this way,
message boundaries can be preserved when using a Connection
object, even with a protocol that otherwise presents unstructured
streams, such as TCP. This is designed based on the fact that
many of the current application protocols evolved over TCP, which
does not provide message boundary preservation, and since many of
these protocols require message boundaries to function, each application layer
application-layer protocol has defined its own framing. For
example, when an HTTP application sends and receives HTTP messages
over a byte-stream transport, it must parse the boundaries of HTTP
messages from the stream of bytes.
4.1.6. Event Handling
The following categories of events can be delivered to an
application:
*
Connection Ready: Signals to an application that a given Connection
is ready to send and/or receive Messages. If the Connection
relies on handshakes to establish state between peers, then it is
assumed that these steps have been taken.
*
Connection Closed: Signals to an application that a given Connection
is no longer usable for sending or receiving Messages. The event
delivers a reason or error to the application that describes the
nature of the termination.
*
Connection Received: Signals to an application that a given Listener
has received a Connection.
*
Message Received: Delivers received Message content to the
application, based on a Receive action. To allow an application
to limit the occurrence of such events, each call to Receive will
be paired with a single Receive event. This can include an error
if the Receive action cannot be satisfied, e.g., due to the
Connection being closed.
*
Message Sent: Notifies the application of the status of its Send
action. This might indicate a failure if the Message cannot be
sent,
sent or an indication might indicate that the Message has been processed by the
Transport Services System.
*
Path Properties Changed: Notifies the application that a property of
the Connection has changed that might influence how and where data
is sent and/or received.
4.1.7. Termination Actions
*
Close: The action an application takes on a Connection to indicate
that it no longer intends to send data, data or is no longer willing to
receive data, and that the data. The protocol should signal this state to the Remote
Endpoint if the transport protocol allows this. permits it. (Note that this is
distinct from the concept of "half-closing" a bidirectional
connection, such as when a FIN is sent in one direction of a TCP
connection [RFC9293]. The end of a stream can also be indicated
using Message Properties when sending.)
*
Abort: The action the application takes on a Connection to indicate a Close and also indicate
that the Transport Services System should not attempt to deliver
any outstanding data, data and that it should immediately close and drop
the connection. This is intended for immediate, usually abnormal,
termination of a connection.
4.1.8. Connection Groups
A Connection Group is a set of Connections that shares Connection
Properties and cached state generated by protocols. A Connection
Group represents state for managing Connections within a single
application,
application and does not require end-to-end protocol signaling. For
transport protocols that support multiplexing, only Connections
within the same Connection Group are allowed to be multiplexed
together.
The API allows a Connection to be created from another Connection.
This adds the new Connection to the Connection Group. A change to
one of the Connection Properties on any Connection in the Connection
Group automatically changes the Connection Property for all others.
All Connections in a Connection Group share the same set of
Connection Properties except for the Connection Priority. These
Connection Properties are said to be entangled.
Passive Connections can also be added to a Connection Group, e.g.,
when a Listener receives a new Connection that is just a new stream
of an already active already-active multi-streaming protocol instance.
While Connection Groups are managed by the Transport Services
Implementation, an application can define different Connection
Contexts for different Connection Groups to explicitly control
caching boundaries, as discussed in Section 4.2.3.
4.2. Transport Services Implementation
This section defines the key architectural concepts for the Transport
Services Implementation within the Transport Services System.
The Transport Services System consists of the Transport Services
Implementation and the Transport Services API. The Transport
Services Implementation consists of all objects and protocol
instances used internally to a system or library to implement the
functionality needed to provide a transport service across a network,
as required by the abstract interface.
*
Path: Represents an available set of properties that a Local
Endpoint can use to communicate with a Remote Endpoint, such as
routes, addresses, and physical and virtual network interfaces.
*
Protocol Instance: A single instance of one protocol, including any
state necessary to establish connectivity or send and receive
Messages.
*
Protocol Stack: A set of Protocol Instances (including relevant
application, security, transport, or Internet protocols) that are
used together to establish connectivity or send and receive
Messages. A single stack can be simple (a single transport
protocol instance (e.g., one application
stream carried TCP running over IP), IP) or it can be complex (multiple (e.g,. multiple
application protocol streams going through a single security and
transport protocol, carried over IP; or, a multi-path multipath transport protocol
over
using multiple transport sub-flows).
* subflows over IP).
Candidate Path: One path that is available to an application and
conforms to the Selection Properties and System Policy, of which
there can be several. Candidate Paths are identified during the
gathering phase (Section 4.2.1) and can be used during the racing
phase (Section 4.2.2).
*
Candidate Protocol Stack: One Protocol Stack that can be used by an
application for a Connection, for which there can be several
candidates. Candidate Protocol Stacks are identified during the
gathering phase (Section 4.2.1) and are started during the racing
phase (Section 4.2.2).
*
System Policy: The input from an operating system or other global
preferences that can constrain or influence how an implementation
will gather candidate paths and Protocol Stacks (Section 4.2.1)
and race the candidates during establishment (Section 4.2.2).
Specific aspects of the System Policy either apply to either all
Connections or only certain ones, Connections, depending on the runtime
context and properties of the Connection.
*
Cached State: The state and history that the implementation keeps
for each set of associated Endpoints that have been used
previously. This can include DNS results, TLS session state,
previous success and quality of transport protocols over certain
paths, as well as other information. This caching does not imply
that the same decisions are necessarily made for subsequent
connections,
connections; rather, it means that cached state is used by a
Transport Services Implementation to inform functions such as
choosing the candidates to be raced, selecting appropriate
transport parameters, etc. An application SHOULD NOT rely on
specific caching behaviour, instead behavior; instead, it ought to explicitly request
any required or desired properties via the Transport Services API.
4.2.1. Candidate Gathering
*
Candidate Path Selection: Candidate Path Selection represents the
act of choosing one or more paths that are available to use based
on the Selection Properties and any available Local and Remote
Endpoint Identifiers provided by the application, as well as the
policies and heuristics of a Transport Services implementation.
* Implementation.
Candidate Protocol Selection: Candidate Protocol Selection
represents the act of choosing one or more sets of Protocol Stacks
that are available to use based on the Transport Properties
provided by the application, and the heuristics or policies within
the Transport Services Implementation.
4.2.2. Candidate Racing
Connection establishment attempts for a set of candidates may be
performed simultaneously, synchronously, serially, or using some
combination of all of these. We refer to this process as racing,
borrowing terminology from Happy Eyeballs [RFC8305].
*
Protocol Option Racing: Protocol Option Racing is the act of
attempting to establish, or scheduling attempts to establish,
multiple Protocol Stacks that differ based on the composition of
protocols or the options used for protocols.
*
Path Racing: Path Racing is the act of attempting to establish, or
scheduling attempts to establish, multiple Protocol Stacks that
differ based on a selection from the available Paths. Since
different Paths will have distinct configurations (see [RFC7556])
for local addresses and DNS servers, attempts across different
Paths will perform separate DNS resolution steps, which can lead
to further racing of the resolved Remote Endpoint Identifiers.
*
Remote Endpoint Racing: Remote Endpoint Racing is the act of
attempting to establish, or scheduling attempts to establish,
multiple Protocol Stacks that differ based on the specific
representation of the Remote Endpoint Identifier, such as a
particular IP address that was resolved from a DNS hostname.
4.2.3. Separating Connection Contexts
A Transport Services Implementation can by default share stored
properties across Connections within an application, such as cached
protocol state, cached path state, and heuristics. This provides
efficiency and convenience for the application, since the Transport
Services System can automatically optimize behavior.
The Transport Services API can allow applications to explicitly
define Connection Contexts that force separation of Cached State and
Protocol Stacks. For example, a web browser application could use
Connection Contexts with separate caches when implementing different
tabs. Possible reasons to isolate Connections using separate
Connection Contexts include:
* Privacy include privacy concerns about re-using regarding:
* reusing cached protocol state that state, as this can lead to linkability.
Sensitive state could include TLS session state [RFC8446] and HTTP
cookies [RFC6265]. These concerns could be addressed using
Connection Contexts with separate caches, such as for different
browser tabs.
* Privacy concerns about allowing Connections to multiplex together, which can tell a
Remote Endpoint that all of the Connections are coming from the
same application. Using Connection Contexts avoids the
Connections being multiplexed in a an HTTP/2 or QUIC stream.
5. IANA Considerations
This document has no actions for IANA. IANA actions.
6. Security and Privacy Considerations
The Transport Services System does not recommend the use of specific
security protocols or algorithms. Its goal is to offer ease of use
for existing protocols by providing a generic security-related
interface. Each provided interface translates to an existing
protocol-specific interface provided by supported security protocols.
For example, trust verification callbacks are common parts of TLS
APIs; a Transport Services API exposes similar functionality
[RFC8922].
As described above in Section 3.3, if a Transport Services
Implementation races between two different Protocol Stacks, both need
to use the same security protocols and options. However, a Transport
Services Implementation can race different security protocols, e.g.,
if the application explicitly specifies that it considers them
equivalent.
The application controls whether information from previous racing
attempts,
attempts or other information about past communications that was
cached by the Transport Services System is used during establishment.
This allows applications to make tradeoffs trade-offs between efficiency
(through racing) and privacy (via information that might leak from
the cache toward an on-path observer). Some applications have
features (e.g. (e.g., "incognito mode") that align with this functionality.
Applications need to ensure that they use security APIs
appropriately. In cases where applications use an interface to
provide sensitive keying material, e.g., access to private keys or
copies of pre-shared keys (PSKs), key use needs to be validated and
scoped to the intended protocols and roles. For example, if an
application provides a certificate to only be used as client
authentication for outbound TLS and QUIC connections, the Transport
Services System MUST NOT use this automatically in other contexts
(such as server authentication for inbound connections, connections or in other
another
security protocol handshake handshakes that is are not equivalent to TLS).
A Transport Services System MUST NOT automatically fall back from
secure protocols to insecure protocols, protocols or fall back to weaker
versions of secure protocols (see Section 3.3). For example, if an
application requests a specific version of TLS, TLS but the desired
version of TLS is not available, its connection will fail. As
described in Section 3.3, the Transport Services API can allow
applications to specify minimum versions that are allowed to be used
by the Transport Services System.
8.
7. References
8.1.
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/rfc/rfc2119>.
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.
8.2. <https://www.rfc-editor.org/info/rfc8174>.
7.2. Informative References
[I-D.ietf-taps-impl]
Brunstrom, A., Pauly, T., Enghardt, R., Tiesel, P. S., and
M. Welzl, "Implementing Interfaces to Transport Services",
Work in Progress, Internet-Draft, draft-ietf-taps-impl-16,
5 June 2023, <https://datatracker.ietf.org/doc/html/draft-
ietf-taps-impl-16>.
[I-D.ietf-taps-interface]
Trammell, B., Welzl, M., Enghardt, R., Fairhurst, G.,
Kühlewind, M., Perkins, C., Tiesel, P. S., and T. Pauly,
"An Abstract Application Layer Interface to Transport
Services", Work in Progress, Internet-Draft, draft-ietf-
taps-interface-22, 6 July 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-taps-
interface-22>.
[POSIX] "IEEE Std. 1003.1-2008 Standard for Information Technology -- Portable
Operating System Interface (POSIX). Open
group Technical Standard: Base Specifications, Issue 7",
2008.
[RFC5389] Rosenberg, J., Mahy, R., Matthews, P., and D. Wing,
"Session Traversal Utilities for NAT (STUN)", RFC 5389, (POSIX(R))", IEEE
Std 1003.1-2008, DOI 10.17487/RFC5389, October 10.1109/IEEESTD.2008.4694976, 2008,
<https://www.rfc-editor.org/rfc/rfc5389>.
<https://ieeexplore.ieee.org/document/4694976>.
[RFC5482] Eggert, L. and F. Gont, "TCP User Timeout Option",
RFC 5482, DOI 10.17487/RFC5482, March 2009,
<https://www.rfc-editor.org/rfc/rfc5482>.
<https://www.rfc-editor.org/info/rfc5482>.
[RFC6265] Barth, A., "HTTP State Management Mechanism", RFC 6265,
DOI 10.17487/RFC6265, April 2011,
<https://www.rfc-editor.org/rfc/rfc6265>.
<https://www.rfc-editor.org/info/rfc6265>.
[RFC7556] Anipko, D., Ed., "Multiple Provisioning Domain
Architecture", RFC 7556, DOI 10.17487/RFC7556, June 2015,
<https://www.rfc-editor.org/rfc/rfc7556>.
<https://www.rfc-editor.org/info/rfc7556>.
[RFC8095] Fairhurst, G., Ed., Trammell, B., Ed., and M. Kuehlewind,
Ed., "Services Provided by IETF Transport Protocols and
Congestion Control Mechanisms", RFC 8095,
DOI 10.17487/RFC8095, March 2017,
<https://www.rfc-editor.org/rfc/rfc8095>.
<https://www.rfc-editor.org/info/rfc8095>.
[RFC8170] Thaler, D., Ed., "Planning for Protocol Adoption and
Subsequent Transitions", RFC 8170, DOI 10.17487/RFC8170,
May 2017, <https://www.rfc-editor.org/rfc/rfc8170>. <https://www.rfc-editor.org/info/rfc8170>.
[RFC8303] Welzl, M., Tuexen, M., and N. Khademi, "On the Usage of
Transport Features Provided by IETF Transport Protocols",
RFC 8303, DOI 10.17487/RFC8303, February 2018,
<https://www.rfc-editor.org/rfc/rfc8303>.
<https://www.rfc-editor.org/info/rfc8303>.
[RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2:
Better Connectivity Using Concurrency", RFC 8305,
DOI 10.17487/RFC8305, December 2017,
<https://www.rfc-editor.org/rfc/rfc8305>.
<https://www.rfc-editor.org/info/rfc8305>.
[RFC8445] Keranen, A., Holmberg, C., and J. Rosenberg, "Interactive
Connectivity Establishment (ICE): A Protocol for Network
Address Translator (NAT) Traversal", RFC 8445,
DOI 10.17487/RFC8445, July 2018,
<https://www.rfc-editor.org/rfc/rfc8445>.
<https://www.rfc-editor.org/info/rfc8445>.
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
<https://www.rfc-editor.org/rfc/rfc8446>.
<https://www.rfc-editor.org/info/rfc8446>.
[RFC8489] Petit-Huguenin, M., Salgueiro, G., Rosenberg, J., Wing,
D., Mahy, R., and P. Matthews, "Session Traversal
Utilities for NAT (STUN)", RFC 8489, DOI 10.17487/RFC8489,
February 2020, <https://www.rfc-editor.org/info/rfc8489>.
[RFC8922] Enghardt, T., Pauly, T., Perkins, C., Rose, K., and C.
Wood, "A Survey of the Interaction between Security
Protocols and Transport Services", RFC 8922,
DOI 10.17487/RFC8922, October 2020,
<https://www.rfc-editor.org/rfc/rfc8922>.
<https://www.rfc-editor.org/info/rfc8922>.
[RFC8923] Welzl, M. and S. Gjessing, "A Minimal Set of Transport
Services for End Systems", RFC 8923, DOI 10.17487/RFC8923,
October 2020, <https://www.rfc-editor.org/rfc/rfc8923>. <https://www.rfc-editor.org/info/rfc8923>.
[RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based
Multiplexed and Secure Transport", RFC 9000,
DOI 10.17487/RFC9000, May 2021,
<https://www.rfc-editor.org/rfc/rfc9000>.
<https://www.rfc-editor.org/info/rfc9000>.
[RFC9112] Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
Ed., "HTTP/1.1", STD 99, RFC 9112, DOI 10.17487/RFC9112,
June 2022, <https://www.rfc-editor.org/rfc/rfc9112>. <https://www.rfc-editor.org/info/rfc9112>.
[RFC9113] Thomson, M., Ed. and C. Benfield, Ed., "HTTP/2", RFC 9113,
DOI 10.17487/RFC9113, June 2022,
<https://www.rfc-editor.org/rfc/rfc9113>.
<https://www.rfc-editor.org/info/rfc9113>.
[RFC9293] Eddy, W., Ed., "Transmission Control Protocol (TCP)",
STD 7, RFC 9293, DOI 10.17487/RFC9293, August 2022,
<https://www.rfc-editor.org/rfc/rfc9293>.
7.
<https://www.rfc-editor.org/info/rfc9293>.
[RFC9622] Trammell, B., Ed., Welzl, M., Ed., Enghardt, R.,
Fairhurst, G., Kühlewind, M., Perkins, C. S., Tiesel, P.,
and T. Pauly, "An Abstract Application-Layer Interface to
Transport Services", RFC 9622, DOI 10.17487/RFC9622,
November 2024, <https://www.rfc-editor.org/info/rfc9622>.
[RFC9623] Brunstrom, A., Ed., Pauly, T., Ed., Enghardt, R., Tiesel,
P., and M. Welzl, "Implementing Interfaces to Transport
Services", RFC 9623, DOI 10.17487/RFC9623, November 2024,
<https://www.rfc-editor.org/info/rfc9623>.
Acknowledgements
This work has received funding from the European Union's Horizon 2020
research and innovation programme under grant agreements No. 644334
(NEAT), No. 688421 (MAMI) (MAMI), and No No. 815178 (5GENESIS).
This work has been supported by by:
* Leibniz Prize project funds of from the DFG - German Research
Foundation: Gottfried Wilhelm Leibniz-Preis 2011 (FKZ FE 570/4-1).
This work has been supported by
* the UK Engineering and Physical Sciences Research Council under
grant EP/R04144X/1.
Thanks to Reese Enghardt, Max Franke, Mirja Kuehlewind, Kühlewind, Jonathan
Lennox, and Michael Welzl for the discussions and feedback that
helped shape the architecture of the system described here.
Particular thanks is are also due to Philipp S. Tiesel and Christopher
A. Wood, who were both co-authors coauthors of this specification as it
progressed through the TAPS working group. Transport Services (TAPS) Working Group.
Thanks as well to Stuart Cheshire, Josh Graessley, David Schinazi,
and Eric Kinnear for their implementation and design efforts,
including Happy Eyeballs, that heavily influenced this work.
Authors' Addresses
Tommy Pauly (editor)
Apple Inc.
One Apple Park Way
Cupertino, California 95014, CA 95014
United States of America
Email: tpauly@apple.com
Brian Trammell (editor)
Google Switzerland GmbH
Gustav-Gull-Platz 1
CH- 8004
CH-8004 Zurich
Switzerland
Email: ietf@trammell.ch
Anna Brunstrom
Karlstad University
Universitetsgatan 2
651 88 Karlstad
Sweden
Email: anna.brunstrom@kau.se
Godred Fairhurst
University of Aberdeen
Fraser Noble Building
Aberdeen, AB24 3UE
United Kingdom
Email: gorry@erg.abdn.ac.uk
URI: http://www.erg.abdn.ac.uk/ https://erg.abdn.ac.uk/
Colin S. Perkins
University of Glasgow
School of Computing Science
Glasgow G12 8QQ
United Kingdom
Email: csp@csperkins.org