Internet-Draft | ECN Over Aggregating Tunnels | April 2023 |
Duke | Expires 27 October 2023 | [Page] |
Explicit Congestion Notification (ECN) provides two bits in the IP header for routers to signal congestion to endpoints without resorting to packet loss. RFC6040 provided guidance for how IP-in-IP tunnels should transfer (ECN) markings between inner and outer IP headers. However, that document implicitly assumes that no more than one inner packet is present in an outer packet. As numerous tunneling technologies have since emerged that break this assumption, further guidance is needed.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://martinduke.github.io/ecn-aggregating-tunnels/draft-duke-tsvwg-ecn-aggregating-tunnels.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-duke-tsvwg-ecn-aggregating-tunnels/.¶
Discussion of this document takes place on the Transport Area Working Group Working Group mailing list (mailto:tsvwg@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/tsvwg/. Subscribe at https://www.ietf.org/mailman/listinfo/tsvwg/.¶
Source for this draft and an issue tracker can be found at https://github.com/martinduke/ecn-aggregating-tunnels.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 27 October 2023.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Explicit Congestion Notification (ECN) [RFC3168] provides a means for routers to signal congestion to endpoints without dropping packets. This can achieve the goals of internet congestion control while not introducing a degraded quality of experience and/or delay due to packet retransmission. The internet community is also now experimenting with using unused ECN codepoints to provide extremely low-latency services [RFC9330].¶
To take full advantage of ECN, [RFC6040] provides rules for encapsulating and decapsulating nodes for IP-in-IP tunnels to propagate ECN markings from inner headers to outer headers on tunnel ingress, and from outer to inner headers on tunnel egress.¶
RFC6040 implicitly assumes that no more than one inner IP header is present in a tunnel packet. (RFC3168 is clear that an IP packet reassembled from fragments takes the highest congestion indication from its fragments). Nevertheless, there are several IP-in-IP tunnel architectures that allow multiple inner IP datagrams in a single tunnel packet. For examples, see [RFC9329], [I-D.ietf-ipsecme-iptfs], and [I-D.ietf-masque-connect-ip]. Existing specifications do not provide recommendations when IP packets with different ECN marks are encapsulated in the same tunnel IP packet.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
An encapsulator SHOULD NOT aggregate packets marked Not-ECT, ECT(0), and ECT(1) in the same tunnel packet unless doing so prevents unacceptable delay, packet reordering, or other degradation in metrics.¶
The encapsulator checks the following conditions in order, until it finds an applicable marking instruction. In two cases, these rules offer an optional behavior because they might cause RFC6040-compliant egress to throw an alarm and/or log an error. If the ingress believes these conditions apply to the egress and the alarms or errors would produce an unacceptable operational burden, it uses the optional behavior.¶
The following table summarizes the possible outcomes for all 16 combinations of inner header packet markings:¶
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | Present in Tunnel Packet ? | Outer | Applicable | +++++++++++++++++++++++++++++++++++++++ Header + Rule + | Not-ECT | ECT(0) | ECT(1) | CE | Marking | Number(s) | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | Y | N | N | any | Not-ECT | 1,4 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | N | Y | N | any | ECT(0) | 1,3 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | N | N | Y | N | ECT(1) | 1 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | N | N | N | Y | CE | 1 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | any | Y | Y | any | Not-ECT | 2 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | Y | Y | N | any | ECT(0)* | 3 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | Y | N | Y | any | Not-ECT | 4 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | N | N | Y | Y | ECT(1)* | 5 | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ | N | N | N | N | N/A | N/A | ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Table 1. Ingress Markings¶
* Ingress may mark outer packet Not-ECT to avoid errors and alarms at tunnel egress.¶
Encapsulators MUST, in the rules above, consider the marking of packet fragments where the inner IP header is not actually present in the tunnel packet being marked.¶
Decapsulators follow the guidance in Section 4.2 of [RFC6040], except that they SHOULD NOT raise an alarm or log an error under the following conditions:¶
These are expected behaviors in this specification.¶
When reassembling an inner packet from fragments scattered over multiple outer packets, decapsulators apply the strictest outcome applied to any of the packets. If any outer packet is dropped, the inner packet is dropped. Otherwise, if any outer packet is marked CE, the inner packet is dropped (if marked Not-ECT) or marked CE (if marked anything else). Other outer packet markings do not change the marking of the inner packet.¶
The above rules minimize the changes necessary to tunnel egress. Marking the outer header Not-ECT always allows the egress to preserve the inner header markings, although it may result in a packet drop where a CE marking would have been a better outcome.¶
Unless an outer header containing ECT(0) and ECT(1) inner headers is marked Not- ECT, it risks being marked CE. As ECT(0) and ECT(1) flows react differently to CE markings, one will respond inappropriately. However, they will both respond correctly to a packet drop due to the Not-ECT setting.¶
A Not-ECT inner header cannot be in an ECT(1) outer header because the outer header will be marked CE more aggressively than an ECT(0) header, and does not correspond to a packet loss for Not-ECT. Thus, the egress's drop of the inner Not-ECT packet on CE is inappropriate.¶
CE inner header are always preserved on egress, so they can coexist with any outer header codepoint.¶
The security considerations in [RFC6040] apply.¶
An attacker might attempt to degrade service by injecting packets into the ingress that force the outer header to be Not-ECT. They would inject ECT(1) if the legitimate traffic was mostly ECT(0), and Not-ECT otherwise. This is one reason tunnel encapsulators are encouraged to separate Not-ECT, ECT(0), and ECT(1) traffic.¶
This document has no IANA actions.¶
TODO acknowledge.¶
RFC Editor's Note: Please remove this section prior to publication of a final version of this document.¶