Internet DRAFT - draft-uberti-mmusic-nombis
draft-uberti-mmusic-nombis
Network Working Group J. Uberti
Internet-Draft Google
Intended status: Standards Track J. Lennox
Expires: September 10, 2015 Vidyo
March 09, 2015
Improvements to ICE Candidate Nomination
draft-uberti-mmusic-nombis-00
Abstract
This document makes recommendations for simplifying and improving the
procedures for candidate nomination in Interactive Connectivity
Establishment (ICE).
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on September 10, 2015.
Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Uberti & Lennox Expires September 10, 2015 [Page 1]
Internet-Draft IceNom March 2015
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Goals and Requirements . . . . . . . . . . . . . . . . . . . 3
3.1. Minimize Call Setup Latency . . . . . . . . . . . . . . . 3
3.2. Allow Controlling Endpoint to Make Dynamic Decisions . . 3
3.3. Allow Selected Pair Change At Any Time Without Signaling 4
3.4. Allow Continuous Addition of Candidates . . . . . . . . . 4
3.5. Maintain Backwards Compatibility . . . . . . . . . . . . 4
3.6. Minimize Complexity Increase . . . . . . . . . . . . . . 5
4. Deprecating Aggressive Nomination . . . . . . . . . . . . . . 5
4.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 5
4.2. Operation . . . . . . . . . . . . . . . . . . . . . . . . 5
4.3. Backwards Compatibility . . . . . . . . . . . . . . . . . 6
4.4. Examples . . . . . . . . . . . . . . . . . . . . . . . . 6
5. Introducing Continuous Nomination . . . . . . . . . . . . . . 7
5.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 7
5.2. Operation . . . . . . . . . . . . . . . . . . . . . . . . 8
5.3. Backwards Compatibility . . . . . . . . . . . . . . . . . 9
5.4. Examples . . . . . . . . . . . . . . . . . . . . . . . . 9
5.4.1. Switching Between Pairs Based on RTT . . . . . . . . 9
5.4.2. Switching To A New TURN Server . . . . . . . . . . . 9
5.4.3. Switching From WLAN to WWAN . . . . . . . . . . . . . 10
6. Security Considerations . . . . . . . . . . . . . . . . . . . 10
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 10
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 10
9.1. Normative References . . . . . . . . . . . . . . . . . . 10
9.2. Informative References . . . . . . . . . . . . . . . . . 11
Appendix A. Change log . . . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12
1. Introduction
Interactive Connectivity Establishment (ICE) attempts to find the
'best' path for connectivity between two peers; in ICE parlance,
these paths are known as 'candidate pairs'. During the ICE process,
one endpoint, known as the 'controlling' endpoint, selects a
candidate pair as the best pair; this action is known as nomination.
ICE supports two different mechanisms for performing nomination,
known as Regular Nomination, and Aggressive Nomination.
However, each of these modes have flaws that restrict their
usefulness. Regular Nomination, as currently speced, requires a best
pair to be chosen before media transmission can start, causing
unnecessary call setup delay. Aggressive Nomination, while avoiding
this delay, gives the controlling endpoint much less discretion into
Uberti & Lennox Expires September 10, 2015 [Page 2]
Internet-Draft IceNom March 2015
which candidate pair is chosen, preventing it from making decisions
based on dynamic factors such as RTT or loss rate. Needless to say,
the presence of both modes also adds nontrivial complexity.
Lastly, ICE is currently defined as a finite process, where the
decision on the optimal candidate pair is made during call setup and
infrequently (if ever) changed. While this may be acceptable for
endpoints with static network configurations, it fails to meet the
needs of mobile endpoints, who may need to seamlessly move between
networks, or be connected to multiple networks simultaneously. In
these cases, the controlling endpoint may want to maintain multiple
potential candidate pairs, and make dynamic decisions to switch
between them as conditions change.
To address these challenges, this document makes two proposals for
refactoring ICE nomination - merging Regular and Aggressive
Nomination, and introducing a new mode, known as Continuous
Nomination. This makes ICE substantially more flexible without
increasing complexity.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Goals and Requirements
The goals for improved ICE nomination are enumerated below.
3.1. Minimize Call Setup Latency
Modern ICE agents will often have multiple network interfaces and
multiple servers from which to obtain ICE candidates. While some ICE
checks may succeed quickly, finishing the entire set of checks can
easily take multiple seconds; this concern is discussed in [RFC5245],
Section 8.1.1.1. As a result, ICE endpoints MUST be able to start
transmitting media immediately upon a successful ICE check, and MUST
retain the ability to switch if a better candidate pair becomes
available later.
3.2. Allow Controlling Endpoint to Make Dynamic Decisions
While an ICE endpoint will assign various priority values to its ICE
candidates, these priorities are static and can only be based on a
priori knowledge; the shortcomings of this approach are discussed in
the first paragraph of Section 2.6 in [RFC5245]. To properly make
choices in multi-network and multi-server scenarios, the controlling
Uberti & Lennox Expires September 10, 2015 [Page 3]
Internet-Draft IceNom March 2015
endpoint MUST be able to make dynamic decisions about the selected
candidate pair based on observed network performance. For example,
RTT could be used to evaluate which TURN servers to use, as described
in [I-D.williams-peer-redirect] To ensure symmetric flows, this
implies that the controlling endpoint MUST be able to communicate its
choice to the controlled side.
3.3. Allow Selected Pair Change At Any Time Without Signaling
Expanding on the requirement above, the need to make dynamic
decisions is not limited to call setup. A multihomed endpoint may
need to switch interfaces based on mobility considerations, or a
robust endpoint may want to keep multiple network paths warm and
switch immediately if connectivity is interrupted on one of them. As
the signaling channel may be affected by the event necessitating the
switch, this implies that the controlling endpoint MUST be able to
change the selected pair and indicate this to the remote side without
signaling. The need for this functionality has been stated in
[I-D.wing-mmusic-ice-mobility] and [I-D.singh-avtcore-mprtp].
The rules in [RFC5245] ensure that the controlled endpoint keeps its
candidate needed for the selected pair alive. However, in order for
alternate pairs to remain available, the controlled endpoint must
keep the associated candidates alive as well, following the
procedures outlined in [RFC5245], Section 4.1.1.4. This implies that
the controlling endpoint MUST have some way to indicate to the
controlled side that specific candidates are to be kept alive.
3.4. Allow Continuous Addition of Candidates
In certain network mobility scenarios, networks may come up and down
while the call is active. In order to allow candidates gathered on
newly available networks to be used for the selected pair or backup
pairs, the endpoint MUST be able to gather candidates on these
networks and communicate them to the remote side. While this could
be done using an ICE restart, as described in [RFC5245], Section 9.1,
the ICE restart may have unintended consequences, such as causing the
remote side to regather all candidates. Instead, it would be best if
the new candidates could be trickled, as discussed in
[I-D.ietf-mmusic-trickle-ice], but even after ICE processing has
completed.
3.5. Maintain Backwards Compatibility
To prevent interoperability problems, ICE endpoints that support the
functionality listed above MUST still maintain [RFC5245] compliance
when interacting with existing endpoints. However, the ideal
Uberti & Lennox Expires September 10, 2015 [Page 4]
Internet-Draft IceNom March 2015
solution SHOULD allow some improvements to occur when only the
controlling side supports the new functionality.
3.6. Minimize Complexity Increase
Increased functionality typically leads to increased complexity,
which leads to more edge cases, and more implementation bugs. This
suggests that in addition to proposing new ICE functionality, the
ideal solution SHOULD deprecate superfluous functionality.
4. Deprecating Aggressive Nomination
4.1. Overview
The main benefits of Regular Nomination are that the controlling side
can dynamically choose which candidate pair to use, and a clear
signal when the nomination process has completed, via the presence of
the USE-CANDIDATE flag in a Binding Request. The main benefit of
Aggressive Nomination is that it is only necessary to send a single
Binding Request before starting the transmission of media, reducing
setup latency. Why don't we have both?
By preserving the dynamic behavior of Regular Nomination, but
allowing media transmission to start upon a single successful
connectivity check, as in Aggressive Nomination, the requirements of
Section 3.1 and Section 3.2 can be met, while meeting the
compatibility requirement from Section 3.5 and, since Aggressive
Nomination is no longer needed, the complexity requirement from
Section 3.6.
4.2. Operation
Since media may be transmitted as soon as all components have a valid
pair, as indicated in [RFC5245], Page 69, an ICE Agent can begin
transmitting media as soon as this occurs, even if it has not sent a
Binding Request with USE-CANDIDATE.
This pair can change as more pairs are added to the Valid list on the
controlling side. When nomination completes, and a final pair is
selected, this is communicated to the controlled side via the typical
Binding Request with USE-CANDIDATE.
On the controlled side, the same process can occur, with the ICE
Agent transmitting media as soon as a valid pair exists. To
encourage use of symmetric RTP, the controlled ICE Agent SHOULD use
the same candidate pair on which it received media from the
controlling side. [Doesn't need to be secure media, since the
Uberti & Lennox Expires September 10, 2015 [Page 5]
Internet-Draft IceNom March 2015
controlling side will finalize this preference through USE-CANDIDATE
shortly.]
As this is legal ICE behavior, no negotiation of this mechanism
should be needed. In the event the receiver drops any packets that
arrive before a Binding Request with USE-CANDIDATE set, this will
simply lead to brief media clipping and will resolve itself once
nomination completes.
4.3. Backwards Compatibility
When acting in the controlled role, new implementations MUST NOT use
Aggressive Nomination.
When acting in the controlled role, and the controlling side is using
Aggressive Nomination (e.g. sending USE-CANDIDATE in its initial
Binding Requests), the standard PRIORITY-based mechanism outlined in
[RFC5245], Section 8.1.1.2 should be used to determine the reverse
media path.
Note that if implementations would prefer to just avoid Aggressive
Nomination altogether, they MAY indicate some TBD pseudo-option in
the ice-options attribute. Because compliant implementations MUST
NOT use Aggressive Nomination if an unknown ICE option is
encountered, this effectively prohibits the use of Aggressive
Nomination. [N.B. this could be the ice-options:continuous option
described below]
4.4. Examples
An example call setup using Regular Nomination as described above is
shown here. Alice is in the controlling role, and Bob is in the
controlled role; Alice has a single host candidate and Bob has both
host and relay candidates.
Alice's initial check to Bob's host candidate fails, but the check to
his relay candidate succeeds, so Alice starts transmitting media on
her host-relay pair. Bob's initial check from his host candidate to
Alice's host candidate succeeds, so he starts transmitting media over
this host-host pair to Alice. However, when Alice's host check is
later retransmitted, it succeeds, and Alice determines that the host-
host pair has a better RTT than the host-relay pair, so she cuts
media over to use the host-host pair. Eventually, Alice concludes
Regular Nomination by sending a final check to Bob with the USE-
CANDIDATE flag set. If Bob had selected a different pair to use than
Alice, this action would have forced Bob to use the same pair.
Uberti & Lennox Expires September 10, 2015 [Page 6]
Internet-Draft IceNom March 2015
Alice Network Bob
|(1) STUN Req (Bob host) | |
|---------------------------------------------------------->|
|(2) STUN Res (Bob host) | |
| Lost|<----------------------------|
|(3) STUN Req (Bob relay) | |
|---------------------------------------------------------->|
|(4) STUN Res (Bob relay) | |
|<----------------------------------------------------------|
|(5) RTP starts (Bob relay) | |
|==========================================================>|
|(6) STUN Req (Alice host) | |
|<----------------------------------------------------------|
|(7) STUN Res (Alice host) | |
|---------------------------------------------------------->|
|(8) RTP starts (Alice host) | |
|<==========================================================|
|(9) STUN Req (Bob host) | |
|---------------------------------------------------------->|
|(10) STUN Req (Bob host) | |
|<----------------------------------------------------------|
|(11) RTP switch (Bob host) | |
|==========================================================>|
|(12) STUN Req (Bob host, U-C)| |
|---------------------------------------------------------->|
|(13) STUN Res (Bob host) | |
|<----------------------------------------------------------|
5. Introducing Continuous Nomination
5.1. Overview
As discussed above, in mobile environments there can be multiple
possible valid candidate pairs, and these can change at various
points in the call, as new interfaces go up and down, signal strength
for wireless interfaces changes, and new relay servers are
discovered.
However, under 5245 rules, once a candidate pair is selected and
confirmed, via USE-CANDIDATE, nomination has completed and cannot be
restarted without performing an ICE restart. This is overly complex
in many cases, and especially problematic in some specific ones,
namely a wifi-cellular handover, where the signaling path for
communicating an ICE restart may be impacted by the handover.
To address this situation, this section introduces the concept of
"continuous nomination", where the controlling ICE endpoint can
adjust the selected candidate pair at any time. By allowing ICE
Uberti & Lennox Expires September 10, 2015 [Page 7]
Internet-Draft IceNom March 2015
processing to occur continuously during a call, rather than just at
call setup, the requirements expressed in Section 3.3 and Section 3.4
can be met.
5.2. Operation
Under continuous nomination, ICE never concludes; new candidates can
always be trickled, and a new candidate pair can be selected by the
controlling side at any time.
When selecting a new candidate pair, the controlling side informs the
controlled side of the chosen path by sending a new Binding Request
with a USE-CANDIDATE attribute. The decision about which candidate
pair to use is fully dynamic; the controlling side can use metrics
such as RTT or loss rate to change the selected pair at any time. If
Binding Requests need to be sent for any other reason, such as
consent checks [I-D.ietf-rtcweb-stun-consent-freshness], any checks
sent on the selected pair MUST include a USE-CANDIDATE attribute.
Upon receipt of a Binding Request with USE-CANDIDATE, the controlled
side MUST switch its media path to the candidate pair on which the
Binding Request was received.
During continuous nomination, the controlling side may still elect to
prune certain candidate pairs; for example, an implementation may
choose to drop relay candidates once a successful connection has been
established. The controlled side, however, should follow the
controlling side's lead in terms of deciding whether any pairs should
be pruned. [TODO: should the controlled side have any say in the
matter, e.g. to eliminate certain candidates?] The controlling ICE
Agent informs the remote side of its preferences by continuing to
send Binding Requests to the remote side on each candidate pair that
it wants to retain. The controlled ICE Agent SHOULD prune any
candidate pairs that have not received a Binding Request in N seconds
(30?), and SHOULD NOT keep alive any candidates that are not
associated with a live candidate pair. [TODO: decide if this
implicit timeout approach is correct, or if we should have some sort
of approach similar to TURN LIFETIME indicating when a pair should be
GCed, with LIFETIME==0 indicating immediate GC.] One side benefit of
doing this is that the continuous exchange of Binding Requests across
all candidate pairs allows the RTT and loss rate for each to be
reliably determined and kept up to date.
If the endpoints have negotiated Trickle ICE support
[I-D.ietf-mmusic-trickle-ice], and new candidates become available on
either side, the endpoint may send these candidates to the remote
side using the existing Trickle ICE mechanisms. Once all of the new
candidates have been transmitted, the endpoint MUST send an end-of-
Uberti & Lennox Expires September 10, 2015 [Page 8]
Internet-Draft IceNom March 2015
candidates messages, which indicates that no more candidates will be
sent in the near future.
At any point, either side may perform an ICE restart, which will
result in both sides gathering new ICE candidates, starting a new
continuous nomination sequence, and upon successful completion,
discarding all candidates from the previous nomination sequence.
5.3. Backwards Compatibility
Since standard ICE implementations may not expect the selected pair
to change after a USE-CANDIDATE attribute is received, support for
continuous nomination is explicitly indicated via a new "continuous"
value for ice-options. If the remote side does not support the
"continuous" option, the controlling side MUST fall back to Regular
Nomination, as specified in [RFC5245], Sectiom 8.1.1.
5.4. Examples
5.4.1. Switching Between Pairs Based on RTT
Alice and Bob have set up a call using ICE and have established
multiple valid pairs. The currently selected pair is for a peer-to-
peer route, as it had the highest initial priority value. However,
they have also kept alive a selected pair that goes through their
TURN servers. At a certain point, Alice detects, via the
connectivity checks that she continues to do on the relayed pair,
that it actually has a better RTT than the peer-to-peer path. She
then decides to switch media over to this path.
As mentioned above, this is easily handled by Alice immediately
switching her media to the relayed path; future STUN checks on this
path also include the USE-CANDIDATE attribute.
5.4.2. Switching To A New TURN Server
Alice and Bob have set up a call using ICE, and are currently sending
their media through Alice's TURN server. At a certain point, Alice's
application discovers a new TURN server that it thinks might provide
a better path for this call.
Alice gathers new candidates from this TURN server, and trickles them
to Bob. They perform connectivity checks using these candidates, and
Alice determines that the RTT when going through this TURN server is
better than the RTT of the current relayed path.
As in the previous example, this is easily handled by Alice switching
media to the new path, along with sending USE-CANDIDATE. If the old
Uberti & Lennox Expires September 10, 2015 [Page 9]
Internet-Draft IceNom March 2015
path is no longer needed, Alice can destroy the allocation on the old
TURN server, and Bob will stop checking it when it stops working.
5.4.3. Switching From WLAN to WWAN
Alice and Bob have set up a call using ICE, and are currently
exchanging their media directly via a peer-to-peer path. Alice is on
a mobile device, with both wifi and cellular interfaces, but for
power reasons, candidates have only been gathered on the wifi
interface. At a certain point, Alice leaves her home while the call
is active.
In response to the decreasing wifi signal strength, Alice starts to
collect candidates on the cellular interface, and trickles them to
Bob. They perform connectivity checks using these candidates, and,
because of the low wifi signal strength, these candidates are
preferred over the existing selected pair.
As in the previous examples, Alice can easily switch media to the new
selected pair. When Alice walks completely out of wifi range, and
the wifi interface goes down, the wifi candidates are pruned, and any
valid pairs on Bob's side that use those candidates will time out and
be pruned as well.
6. Security Considerations
TODO
7. IANA Considerations
A new ICE option "continuous" has been [will be] registered in the
"ICE Options" registry created by [RFC6336].
8. Acknowledgements
Several people provided significant input into this document,
including Martin Thomson, Brandon Williams, and Dan Wing. Emil Ivov
also provided several of the examples for continuous nomination.
9. References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Uberti & Lennox Expires September 10, 2015 [Page 10]
Internet-Draft IceNom March 2015
[RFC5245] Rosenberg, J., "Interactive Connectivity Establishment
(ICE): A Protocol for Network Address Translator (NAT)
Traversal for Offer/Answer Protocols", RFC 5245, April
2010.
[RFC6336] Westerlund, M. and C. Perkins, "IANA Registry for
Interactive Connectivity Establishment (ICE) Options", RFC
6336, July 2011.
9.2. Informative References
[I-D.ietf-mmusic-trickle-ice]
Ivov, E., Rescorla, E., and J. Uberti, "Trickle ICE:
Incremental Provisioning of Candidates for the Interactive
Connectivity Establishment (ICE) Protocol", draft-ietf-
mmusic-trickle-ice-02 (work in progress), January 2015.
[I-D.ietf-rtcweb-stun-consent-freshness]
Perumal, M., Wing, D., R, R., Reddy, T., and M. Thomson,
"STUN Usage for Consent Freshness", draft-ietf-rtcweb-
stun-consent-freshness-11 (work in progress), December
2014.
[I-D.singh-avtcore-mprtp]
Singh, V., Karkkainen, T., Ott, J., Ahsan, S., and L.
Eggert, "Multipath RTP (MPRTP)", draft-singh-avtcore-
mprtp-10 (work in progress), November 2014.
[I-D.williams-peer-redirect]
Williams, B. and T. Reddy, "Peer-specific Redirection for
Traversal Using Relays around NAT (TURN)", draft-williams-
peer-redirect-03 (work in progress), December 2014.
[I-D.wing-mmusic-ice-mobility]
Wing, D., Reddy, T., Patil, P., and P. Martinsen,
"Mobility with ICE (MICE)", draft-wing-mmusic-ice-
mobility-07 (work in progress), June 2014.
Appendix A. Change log
Changes in draft -00:
o Initial version, from mailing list discussion post-IETF 90.
Uberti & Lennox Expires September 10, 2015 [Page 11]
Internet-Draft IceNom March 2015
Authors' Addresses
Justin Uberti
Google
747 6th Ave S
Kirkland, WA 98033
USA
Email: justin@uberti.name
Jonathan Lennox
Vidyo
433 Hackensack Avenue
Hackensack, NJ 07601
USA
Email: jonathan@vidyo.com
Uberti & Lennox Expires September 10, 2015 [Page 12]