RFC 9508 | ICN Ping | March 2024 |
Mastorakis, et al. | Experimental | [Page] |
This document presents the design of an Information-Centric Networking (ICN) Ping protocol. It includes the operations of both the client and the forwarder.¶
This document is a product of the Information-Centric Networking Research Group (ICNRG) of the IRTF.¶
This document is not an Internet Standards Track specification; it is published for examination, experimental implementation, and evaluation.¶
This document defines an Experimental Protocol for the Internet community. This document is a product of the Internet Research Task Force (IRTF). The IRTF publishes the results of Internet-related research and development activities. These results might not be suitable for deployment. This RFC represents the consensus of the Information-Centric Networking Research Group of the Internet Research Task Force (IRTF). Documents approved for publication by the IRSG are not candidates for any level of Internet Standard; see Section 2 of RFC 7841.¶
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc9508.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
Ascertaining data plane reachability to a destination and taking coarse performance measurements of Round-Trip Time (RTT) are fundamental facilities for network administration and troubleshooting. In IP, where routing and forwarding are based on IP addresses, ICMP Echo Request and ICMP Echo Reply packets are the protocol mechanisms used for this purpose, generally exercised through the familiar ping utility. In Information-Centric Networking (ICN), where routing and forwarding are based on name prefixes, the ability to ascertain the reachability of names is required.¶
This document proposes protocol mechanisms for a ping equivalent in ICN networks (Content-Centric Networking (CCNx) [RFC8609] and Named Data Networking (NDN) [NDNTLV]). A non-normative section (Appendix A) suggests useful properties for an ICN Ping client application, analogous to IP ping, that originates Echo Requests and processes Echo Replies.¶
In order to carry out meaningful experimentation and deployment of ICN protocols, new tools analogous to ping and traceroute used for TCP/IP are needed to manage and debug the operation of ICN architectures and protocols. This document describes the design of a management and debugging protocol analogous to the ping protocol of TCP/IP; this new management and debugging protocol will aid the experimental deployment of ICN protocols. As the community continues its experimentation with ICN architectures and protocols, the design of ICN Ping might change accordingly. ICN Ping is designed as a "first line of defense" tool to troubleshoot ICN architectures and protocols. As such, this document is classified as an Experimental RFC. Note that a measurement application is needed to make proper use of ICN Ping in order to compute various statistics, such as average, maximum, and minimum Round-Trip Time (RTT) values, variance in RTTs, and loss rates.¶
This RFC represents the consensus of the Information-Centric Networking Research Group (ICNRG) of the Internet Research Task Force (IRTF).¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This specification uses the terminology defined in [RFC8793]. To aid the reader, we additionally define the following terms:¶
In IP-based ping, an IP address is specified by the user either directly or via translation of a domain name through DNS. The ping client application sends a number of ICMP Echo Request packets with the specified IP address as the IP destination address and an IP address from the client's host as the IP source address.¶
Each ICMP Echo Request is forwarded across the network based on its destination IP address. If it eventually reaches the destination, the destination responds by sending back an ICMP Echo Reply packet to the IP source address from the ICMP Echo Request.¶
If an ICMP Echo Request does not reach the destination or the Echo Reply is lost, the ping client times out. Any ICMP error messages generated in response to the ICMP Echo Request message, such as "No route to destination", are returned to the client and reported.¶
In ICN, the communication paradigm is based exclusively on named objects. An Interest message is forwarded across the network based on the name prefix that it carries. Eventually, a Content Object is retrieved from either a producer application or some forwarder's Content Store (CS).¶
IP-based ping was built as an add-on measurement and debugging tool on top of an already-existing network architecture. In ICN, we have the opportunity to incorporate diagnostic mechanisms directly in the network-layer protocol and, hopefully, provide more powerful diagnostic capability than can be realized through the layered ICMP Echo approach.¶
An ICN network differs from an IP network in at least four important ways (four of which are as follows):¶
These differences introduce new challenges, new opportunities, and new requirements regarding the design of an ICN Ping protocol. Following this communication model, a ping client should be able to express Ping Echo Requests with some name prefix and receive responses.¶
Our goals are as follows:¶
To this end, a ping name can represent:¶
In order to provide stable and reliable diagnostics, it is desirable that the packet encoding of a Ping Echo Request enable the forwarders to distinguish a ping from a normal Interest, while diverging as little as possible from the forwarding behavior for an Interest packet. In the same way, the encoding of a Ping Echo Reply should minimize any processing differences from those employed for a data packet by the forwarders.¶
The ping protocol should also enable relatively robust RTT measurements. To this end, it is valuable to have a mechanism to steer consecutive Ping Echo Requests for the same name towards an individual path. Such a capability was initially published in [PATHSTEERING] and has been specified for CCNx and NDN in [RFC9531].¶
In the case of Ping Echo Requests for the same name from different sources, it is also important to have a mechanism to avoid those requests being aggregated in the PIT. To this end, we need some encoding in the Ping Echo Requests to make each request for a common name unique, hence avoiding PIT aggregation and further enabling the exact match of a response with a particular ping packet. However, avoiding PIT aggregation could lead to PIT DoS attacks.¶
In this section, we describe the Echo packet formats according to the CCNx packet format [RFC8569], where messages exist within outermost containments (packets). Specifically, we propose two types of ping packets: an Echo Request and an Echo Reply.¶
The format of the Ping Echo Request packet is presented below:¶
The existing packet header fields have the same definition as the header fields of a CCNx Interest packet. The value of the packet type field is PT_ECHO_REQUEST. See Section 9 for the value assignment.¶
Compared to the typical format of a CCNx packet header [RFC8609], there is a new optional fixed header added to the packet header:¶
The message format of an Echo Request is presented below:¶
The Echo Request message is of type T_DISCOVERY. The Name TLV has the structure described in [RFC8609]. The name consists of the prefix that we would like to ping appended with a nonce typed name segment (T_NONCE) as its last segment. The nonce can be encoded as a base64-encoded string with the URL-safe alphabet as defined in Section 5 of [RFC4648], with padding omitted. See Section 9 for the value assigned to this name segment type. The value of this TLV is a 64-bit nonce. The purpose of the nonce is to avoid Interest aggregation and allow client matching of replies with requests. As described below, the nonce is ignored for CS checking.¶
The format of a Ping Echo Reply packet is presented below:¶
The header of an Echo Reply consists of the header fields of a CCNx Content Object and a hop-by-hop Path Label TLV. The value of the packet type field is PT_ECHO_REPLY. See Section 9 for the value assignment. The Path Label header TLV (Section 3.1 of [RFC9531]) is as defined for the Echo Request packet.¶
A Ping Echo Reply message is of type T_OBJECT and contains a Name TLV (name of the corresponding Echo Request), a PayloadType TLV, and an ExpiryTime TLV with a value of 0 to indicate that Echo Replies must not be returned from network caches.¶
The PayloadType TLV is presented below. It is of type T_PAYLOADTYPE_DATA, and the data schema consists of three TLVs:¶
The goal of including the name of the sender in the Echo Reply is to enable the user to reach this entity directly to ask for further management/administrative information using generic Interest-Data exchanges or by employing a more comprehensive management tool, such as CCNinfo [RFC9344], after a successful verification of the sender's name.¶
The types of the Echo Reply Code field are as follows:¶
In this section, we present the ICN Ping Echo Request and Reply packet formats according to the NDN packet format specification [NDNTLV].¶
An Echo Request is encoded as an NDN Interest packet. Its format is as follows:¶
The name field of an Echo Request consists of the name prefix to be pinged, a nonce value (it can be the value of the Nonce field), and the suffix "ping" to denote that this Interest is a ping request (added as a KeywordNameComponent [NDNTLV]). When the "ApplicationParameters" element is present, a ParametersSha256DigestComponent (Section 6) is added as the last name segment.¶
An Echo Request MAY carry a Path Label TLV in the NDN Link Adaptation Protocol [NDNLPv2] as specified in [RFC9531].¶
Since the NDN packet format does not provide a mechanism to prevent the network from caching specific data packets, we use the MustBeFresh TLV for Echo Requests (in combination with a FreshnessPeriod TLV with a value of 1 for Echo Replies) to avoid fetching cached Echo Replies with an expired freshness period [REALTIME].¶
An Echo Reply is encoded as an NDN Data packet. Its format is as follows:¶
An Echo Reply MAY carry a Path Label TLV in the NDN Link Adaptation Protocol [NDNLPv2] as specified in [RFC9531], since it might be modified in a hop-by-hop fashion by the forwarders along the reverse path.¶
The name of an Echo Reply is the name of the corresponding Echo Request while the format of the MetaInfo field is as follows:¶
The value of the ContentType TLV is 0. The value of the FreshnessPeriod TLV is 1, so that the replies are treated as stale data (almost instantly) as they are received by a forwarder.¶
The content of an Echo Reply consists of the following two TLVs: Sender's Name (with a structure similar to an NDN Name TLV) and Echo Reply Code. There is no need to have a separate TLV for the sender's signature in the content of the reply, since every NDN Data packet carries the signature of the data producer.¶
The Echo Reply Code TLV format is as follows (with the values specified in Section 4.2):¶
We present the workflow of the forwarder's operation in Figure 11 below. When a forwarder receives an Echo Request, it first extracts the message's base name (i.e., the request name with the Nonce name segment excluded as well as the suffix "ping" and the ParametersSha256DigestComponent in the case of an Echo Request with the NDN packet format).¶
In some cases, the forwarder originates an Echo Reply, sending the reply downstream through the face on which the Echo Request was received. This Echo Reply includes the forwarder's own name and signature and the appropriate Echo Reply Code based on the condition that triggered the generation of the reply. It also includes a Path Label TLV, initially containing a null value (since the Echo Reply originator does not forward the request and thus does not make a path choice).¶
The forwarder generates and returns an Echo Reply in the following cases:¶
If none of the conditions for replying to the Echo Request are met, the forwarder will attempt to forward the Echo Request upstream based on the Path Steering value (if present), the results of the FIB LNPM lookup and PIT creation. These lookups are based on including the Nonce and the suffix "ping" as name segments of the Name in the case of an Echo Request with the NDN packet format. If no valid next hop is found, an InterestReturn is sent downstream indicating "No Route" (as with a failed attempt to forward an ordinary Interest).¶
A received Echo Reply will be matched to an existing PIT entry as usual. On the reverse path, the Path Steering TLV of an Echo Reply will be updated by each forwarder to encode its next-hop choice. When included in subsequent Echo Requests, this Path Label TLV allows the forwarders to steer the Echo Requests along the same path.¶
In this section, we elaborate on two alternative design approaches in cases where the pinged prefix corresponds to a locally scoped namespace not directly routable from the client's local network.¶
The first approach leverages the NDN Link Object [SNAMP]. Specifically, the ping client attaches to the expressed request a Link Object that contains a number of routable name prefixes, based on which the request can be forwarded until it reaches a network region where the request name itself is routable. A Link Object is created and signed by a data producer allowed to publish data under a locally scoped namespace. The way that a client retrieves a Link Object depends on various network design factors and is out of scope for this document.¶
At the time of this writing, and based on usage of the Link Object by the NDN team [NDNLPv2], a forwarder at the border of the region where an Interest name becomes routable must remove the Link Object from incoming Interests. The Interest state maintained along the entire forwarding path is based on the Interest name regardless of whether it was forwarded based on its name or a routable prefix in the Link Object.¶
The second approach is based on prepending a routable prefix to the locally scoped name. The resulting prefix will be the name of the Echo Requests expressed by the client. In this way, a request will be forwarded based on the routable part of its name. When it reaches the network region where the original locally scoped name is routable, the border forwarder rewrites the request name and deletes its routable part. There are two conditions for a forwarder to perform this rewriting operation on a request:¶
The state along the path depends on whether the request is traversing the portion of the network where the locally scoped name is routable. In this case, the forwarding can be based entirely on the locally scoped name. However, where a portion of the path lies outside the region where the locally scoped name is routable, the border router has to rewrite the name of a reply and prepend the routable prefix of the corresponding request to ensure that the generated replies will reach the client.¶
A reflection attack could be mounted by a compromised forwarder in the case of an Echo Reply with the CCNx packet format if that forwarder includes in the reply the name of a victim forwarder. This could convince a client to direct the future administrative traffic towards the victim. To foil such reflection attacks, the forwarder that generates a reply must sign the name included in the payload. In this way, the client is able to verify that the included name is legitimate and refers to the forwarder that generated the reply. Alternatively, the forwarder could include in the reply payload their routable prefix(es) encoded as a signed NDN Link Object [SNAMP].¶
Interest flooding attack amplification is possible in the case of the second approach for dealing with locally scoped namespaces as described in Section 7. To eliminate such amplification, a border forwarder will have to maintain extra state in order to prepend the correct routable prefix to the name of an outgoing reply, since the forwarder might be attached to multiple network regions (reachable under different prefixes) or a network region attached to this forwarder might be reachable under multiple routable prefixes.¶
Another example of an attack could be the ICN equivalent of port knocking, where an attacker tries to discover certain forwarder implementations for the purpose of exploiting potential vulnerabilities.¶
IANA has assigned 0x05 to "PT_ECHO_REQUEST" and 0x06 to "PT_ECHO_REPLY" in the "CCNx Packet Types" registry established by [RFC8609].¶
IANA has assigned 0x0003 to "T_NONCE" in the "CCNx Name Segment Types" registry established by [RFC8609].¶
IANA has created a new registry called "CCNx Echo Reply Codes". The registration procedure is Specification Required [RFC8126]. In this registry, IANA has assigned 0x01 to "T_ECHO_RETURN_FORWARDER", 0x02 to "T_ECHO_RETURN_APPLICATION", and 0x03 to "T_ECHO_RETURN_OBJECT".¶
This section is an informative appendix regarding the proposed ping client operation.¶
The ping client application is responsible for generating Echo Requests for prefixes provided by users.¶
When generating a series of Echo Requests for a specific name, the first Echo Request will typically not include a Path Label TLV, since no TLV value is known. After an Echo Reply containing a Path Label TLV is received, each subsequent Echo Request can include the received Path Steering value in the Path Label header TLV to drive the requests towards a common path as part of checking network performance. To discover more paths, a client can omit the Path Steering TLV in future requests. Moreover, for each new Ping Echo Request, the client has to generate a new nonce and record the time that the request was expressed. It will also set the lifetime of an Echo Request, which will have semantics identical to the lifetime of an Interest.¶
Further, the client application might not wish to receive Echo Replies due to CS hits. A mechanism to achieve that in CCNx would be to use a Content Object Hash Restriction TLV with a value of 0 in the payload of an Echo Request message. In NDN, the exclude filter selector can be used.¶
When it receives an Echo Reply, the client would typically match the reply to a sent request and compute the RTT of the request. It should parse the Path Label value and decode the reply's payload to parse the sender's name and signature. The client should verify that both the received message and the forwarder's name have been signed by the key of the forwarder, whose name is included in the payload of the reply (by fetching this forwarder's public key and verifying the contained signature). The client can also decode the Echo Reply Code TLV to understand the condition that triggered the generation of the reply.¶
In the case that an Echo Reply is not received for a request within a certain time interval (lifetime of the request), the client should time out and send a new request with a new nonce value up to some maximum number of requests to be sent specified by the user.¶
The authors would like to thank Mark Stapp for the fruitful discussion on the objectives of the ICN Ping protocol.¶