<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-shi-quic-structured-connection-id-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Structured Connection ID">Structured Connection ID Carrying Metadata</title>
    <seriesInfo name="Internet-Draft" value="draft-shi-quic-structured-connection-id-04"/>
    <author initials="H." surname="Shi" fullname="Hang Shi">
      <organization>Huawei Technologies</organization>
      <address>
        <postal>
          <country>China</country>
        </postal>
        <email>shihang9@huawei.com</email>
      </address>
    </author>
    <author initials="M." surname="Han" fullname="Mengyao Han">
      <organization>China Unicom</organization>
      <address>
        <email>hanmy12@chinaunicom.cn</email>
      </address>
    </author>
    <date year="2025" month="April" day="14"/>
    <area>Transport</area>
    <workgroup>QUIC</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 42?>

<t>This document describes a mechanism to carry the metadata in the QUIC connection ID to communicate with the intermediary.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://VMatrix1900.github.io/draft-quic-structured-connection-id/draft-shi-quic-structured-connection-id.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-shi-quic-structured-connection-id/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/VMatrix1900/draft-quic-structured-connection-id"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Nowadays, media applications are usually able to dynamically adjust the size and quality of the stream to adapt to fluctuating network conditions. However, for the high throughput and low latency media traffic, adaptation only by the endpoint is not good enough, especially when the network condition is challenging, such as the wireless networks discussed in <xref target="I-D.kaippallimalil-tsvwg-media-hdr-wireless"/>. To this end, it is desirable to have the intermediary performing optimization for the endpoint. For example, low-priority packets can be dropped to save the resource when the network is congested.</t>
      <t>One example of such an intermediary is the relay in the Media over QUIC working group. To quote the charter from the MoQ working group. "Media over QUIC (moq) will develop a simple low-latency media delivery solution for ingest and distribution of media. This solution addresses use cases including live streaming, gaming, and media conferencing and will scale efficiently." "Even when media content is end-to-end encrypted, the relays can access metadata needed for caching (such as timestamp), making media forwarding decisions (such as drop or delay under congestion), and so on."</t>
      <t>Due to the end-to-end encryption of the QUIC, the intermediary does not have the necessary metadata to perform optimization. A similar problem exists when the media is encrypted and transferred using SRTP <xref target="RFC3711"/>. To solve the problem, <xref target="I-D.ietf-avtext-framemarking"/> defines an extension of the RTP header containing the video frame information. This document defines an extension of the QUIC header, using the connection ID to carry the necessary metadata. To mitigate the linkability between the multiple connection IDs of the same connection and protect privacy, the metadata <bcp14>MAY</bcp14> be encrypted and only decrypted by an authenticated intermediary. Similar to <xref target="I-D.ietf-quic-load-balancers"/>, a configuration agent is used to distribute the encryption parameters and the template of the metadata.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses terms in the <xref target="I-D.ietf-quic-load-balancers"/>:</t>
      <ul spacing="normal">
        <li>
          <t>"client" and "server" refer to the QUIC endpoint.</t>
        </li>
        <li>
          <t>Intermediary refers to a network element that forwards QUIC packets and does not possess the QUIC connection keys. Such an intermediary can be QUIC proxy defined in the MASQUE working group, wireless node described in the <xref target="I-D.kwbdgrr-tsvwg-net-collab-rqmts"/>, and relay defined in the Media over QUIC working group.</t>
        </li>
        <li>
          <t>CID: Connection ID in the QUIC header.</t>
        </li>
        <li>
          <t>Configuration agent: An entity that distributes the encryption parameter and the template of the metadata field.</t>
        </li>
      </ul>
      <t>All wire formats will be depicted using the notation defined in <xref section="1.3" sectionFormat="of" target="RFC9000"/>.</t>
      <section anchor="requirements-language">
        <name>Requirements Language</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="architecture">
      <name>Architecture</name>
      <figure anchor="arch">
        <name>Levarage Metadata In QUIC CID to communicate with intermediary</name>
        <artwork><![CDATA[
                             + ----------------+
                             | Configuration   |
         +-------------------+ agent(Optional) +-----------------+
        /                    +------+----------+                  \
       /Config Parameters and template of the Metadata field in CID\
      /                             |                               \
     /          _______             |              _______           \
+---V----+     (       )     +------v-------+     (       )     +-----v----+
| Client +----( Network )----+ Intermediary +----( Network )----+  Server  |
+--------+     (_______)     +--------------+     (_______)     +----------+

]]></artwork>
      </figure>
      <t><xref target="arch"/> shows the architecture of the optimization intermediary. The sender, which can be either the client or server based on the direction of communication, incorporates metadata into the connection ID field as outlined in the referenced section (See <xref target="format"/>). This metadata allows the intermediary to execute optimizations tailored to the information provided. Given that various applications may require the disclosure of distinct metadata to the intermediary, a standardized template is adopted to specify the metadata's content and structure. There are two primary methods for obtaining this template:</t>
      <ol spacing="normal" type="1"><li>
          <t>For each category of application, a specific template is crafted and cataloged within a new IANA registry. This approach leverages the global accessibility of the template definition, eliminating the need for its distribution by the configuration agent. The responsibility for developing these templates falls to the respective working groups or documents, which is beyond the scope of this document.</t>
        </li>
        <li>
          <t>The configuration agent, operating within its domain, defines and disseminates the template. This strategy ensures the template's relevance and effectiveness is confined to the domain under the agent's control, tailored according to the capabilities of the network devices present.</t>
        </li>
      </ol>
      <t>If the network between the intermediary and endpoints is not trusted, the metadata <bcp14>MUST</bcp14> be encrypted. In such scenarios, the encryption parameters must be exclusively shared with authenticated intermediaries, potentially via the configuration agent. A viable encryption strategy might involve adopting the algorithm proposed in <xref target="I-D.ietf-quic-load-balancers"/>, ensuring the security of the metadata.</t>
      <t>The metadata field can also be modified by the intermediary, enabling the intermediary to pass the signal such as throughput advice as defined by SCONE WG to the end host.</t>
    </section>
    <section anchor="format">
      <name>Structured Connection ID</name>
      <figure anchor="cid-format">
        <name>Format of structured CID</name>
        <artwork><![CDATA[
Structured Connection ID {
  Config Parameters (8),
  Metadata (40...152),
}
]]></artwork>
      </figure>
      <t>The format of the structured connection ID is shown in <xref target="cid-format"/>. The content and the format of the metadata field are defined by a template, carrying the information such as media characteristics in <xref section="3.1" sectionFormat="of" target="I-D.ietf-avtext-framemarking"/> and metadata in <xref target="I-D.kwbdgrr-tsvwg-net-collab-rqmts"/></t>
    </section>
    <section anchor="coexistence-with-quic-load-balancer">
      <name>Coexistence with QUIC Load Balancer</name>
      <t>As both the Metadata and Server ID share the same field within the Connection ID (CID), it's crucial to devise mechanisms that prevent conflicts and ensure their seamless coexistence.</t>
      <t>If an intermediary serves dual roles as both the load balancer and the optimization node, and if both entities are underpinned by a unified trust relationship, then it is feasible to consolidate the Metadata and the Server ID specified in <xref target="I-D.ietf-quic-load-balancers"/>. This consolidation allows for the utilization of a singular Config Parameter and a shared encryption/decryption methodology.</t>
      <t>Conversely, if the load balancer and the optimization node are separated, the Server ID and the Metadata needs to be segregated too. One option is to split the CID into two segments: one for the Server ID and the other for the metadata. Each segment would be governed by its own set of Config Parameters and subjected to individual encryption protocols, ensuring the integrity and segregation of the transmitted information.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3711">
          <front>
            <title>The Secure Real-time Transport Protocol (SRTP)</title>
            <author fullname="M. Baugher" initials="M." surname="Baugher"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="M. Naslund" initials="M." surname="Naslund"/>
            <author fullname="E. Carrara" initials="E." surname="Carrara"/>
            <author fullname="K. Norrman" initials="K." surname="Norrman"/>
            <date month="March" year="2004"/>
            <abstract>
              <t>This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3711"/>
          <seriesInfo name="DOI" value="10.17487/RFC3711"/>
        </reference>
        <reference anchor="RFC9000">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.kaippallimalil-tsvwg-media-hdr-wireless">
          <front>
            <title>Media Handling Considerations for Wireless Networks</title>
            <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
              <organization>Tencent America LLC</organization>
            </author>
            <date day="10" month="August" year="2024"/>
            <abstract>
              <t>   Wireless networks like 5G cellular or Wi-Fi experience significant
   variations in link capacity over short intervals due to wireless
   channel conditions, interference, or the end-user's movement.  These
   variations in capacity take place in the order of hundreds of
   milliseconds and is much too fast for end-to-end congestion signaling
   by itself to convey the changes for an application to adapt.  Media
   applications on the other hand demand both high throughput and low
   latency, and may adjust the size and quality of a stream to network
   bandwidth available or dynamic change in content coded.  However,
   catering to such media flows over a radio link with rapid changes in
   capacity requires the buffers and congestion to be managed carefully.
   Wireless networks need additional information to manage radio
   resources optimally to maximize network utilization and application
   performance.  This draft provides requirements on metadata about the
   media transported, its scalability, privacy, and other related
   considerations.

   Note: The solution in this draft will be revised to address
   requirements defined in [draft-kwbdgrr-tsvwg-net-collab-rqmts].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kaippallimalil-tsvwg-media-hdr-wireless-05"/>
        </reference>
        <reference anchor="I-D.ietf-avtext-framemarking">
          <front>
            <title>Video Frame Marking RTP Header Extension</title>
            <author fullname="Mo Zanaty" initials="M." surname="Zanaty">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Espen Berger" initials="E." surname="Berger">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Suhas Nandakumar" initials="S." surname="Nandakumar">
              <organization>Cisco Systems</organization>
            </author>
            <date day="4" month="March" year="2024"/>
            <abstract>
              <t>   This document describes a Video Frame Marking RTP header extension
   used to convey information about video frames that is critical for
   error recovery and packet forwarding in RTP middleboxes or network
   nodes.  It is most useful when media is encrypted, and essential when
   the middlebox or node has no access to the media decryption keys.  It
   is also useful for codec-agnostic processing of encrypted or
   unencrypted media, while it also supports extensions for codec-
   specific information.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-avtext-framemarking-16"/>
        </reference>
        <reference anchor="I-D.ietf-quic-load-balancers">
          <front>
            <title>QUIC-LB: Generating Routable QUIC Connection IDs</title>
            <author fullname="Martin Duke" initials="M." surname="Duke">
              <organization>Google</organization>
            </author>
            <author fullname="Nick Banks" initials="N." surname="Banks">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Christian Huitema" initials="C." surname="Huitema">
              <organization>Private Octopus Inc.</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   QUIC address migration allows clients to change their IP address
   while maintaining connection state.  To reduce the ability of an
   observer to link two IP addresses, clients and servers use new
   connection IDs when they communicate via different client addresses.
   This poses a problem for traditional "layer-4" load balancers that
   route packets via the IP address and port 4-tuple.  This
   specification provides a standardized means of securely encoding
   routing information in the server's connection IDs so that a properly
   configured load balancer can route packets with migrated addresses
   correctly.  As it proposes a structured connection ID format, it also
   provides a means of connection IDs self-encoding their length to aid
   some hardware offloads.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-load-balancers-20"/>
        </reference>
        <reference anchor="I-D.kwbdgrr-tsvwg-net-collab-rqmts">
          <front>
            <title>Requirements for Host-to-Network Collaboration Signaling</title>
            <author fullname="John Kaippallimalil" initials="J." surname="Kaippallimalil">
              <organization>Futurewei</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Sri Gundavelli" initials="S." surname="Gundavelli">
              <organization>Cisco</organization>
            </author>
            <author fullname="Sridharan Rajagopalan" initials="S." surname="Rajagopalan">
              <organization>Cloud Software Group Holdings, Inc.</organization>
            </author>
            <author fullname="Spencer Dawkins" initials="S." surname="Dawkins">
              <organization>Tencent America LLC</organization>
            </author>
            <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
              <organization>Orange</organization>
            </author>
            <date day="14" month="October" year="2024"/>
            <abstract>
              <t>   Collaborative signaling from host-to-network (i.e., client-to-network
   and server-to-network) can improve the user experience by informing
   the network about the nature and relative importance of packets
   (frames, streams, etc.) without having to disclose the content of the
   packets.  Moreover, the collaborative signaling may be enabled so
   that clients and servers are aware of the network's treatment of
   incoming packets.  Also, client-to-network collaboration can be put
   in place without revealing the identity of the remote servers.  This
   collaboration allows for differentiated services at the network
   (e.g., packet discard preference), the sender (e.g., adaptive
   transmission), or through cooperation of server/client and the
   network.

   This document lists some use cases that illustrate the need for a
   mechanism to share metadata and outlines host-to-network
   requirements.  The document focuses on signaling information about a
   UDP transport flow (UDP 4-tuple).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kwbdgrr-tsvwg-net-collab-rqmts-04"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
