PPSP A. Bakker Internet-Draft Vrije Universiteit Amsterdam Intended status: Standards Track R. Petrocco Expires: October 6, 2014 V. Grishchenko Technische Universiteit Delft April 4, 2014 Peer-to-Peer Streaming Peer Protocol (PPSPP) draft-ietf-ppsp-peer-protocol-09 Abstract The Peer-to-Peer Streaming Peer Protocol (PPSPP) is a protocol for disseminating the same content to a group of interested parties in a streaming fashion. PPSPP supports streaming of both pre-recorded (on-demand) and live audio/video content. It is based on the peer- to-peer paradigm, where clients consuming the content are put on equal footing with the servers initially providing the content, to create a system where everyone can potentially provide upload bandwidth. It has been designed to provide short time-till-playback for the end user, and to prevent disruption of the streams by malicious peers. PPSPP has also been designed to be flexible and extensible. It can use different mechanisms to optimize peer uploading, prevent freeriding, and work with different peer discovery schemes (centralized trackers or Distributed Hash Tables). It supports multiple methods for content integrity protection and chunk addressing. Designed as a generic protocol that can run on top of various transport protocols, it currently runs on top of UDP using LEDBAT for congestion control. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on October 6, 2014. Bakker, et al. Expires October 6, 2014 [Page 1] Internet-Draft PPSP Peer Protocol April 2014 Copyright Notice Copyright (c) 2014 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.1. Purpose . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2. Requirements Language . . . . . . . . . . . . . . . . . . 7 1.3. Terminology . . . . . . . . . . . . . . . . . . . . . . . 7 2. Overall Operation . . . . . . . . . . . . . . . . . . . . . . 9 2.1. Example: Joining a Swarm . . . . . . . . . . . . . . . . . 9 2.2. Example: Exchanging Chunks . . . . . . . . . . . . . . . . 10 2.3. Example: Leaving a Swarm . . . . . . . . . . . . . . . . . 11 3. Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1. HANDSHAKE . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2. HAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.3. DATA . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.4. ACK . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.5. INTEGRITY . . . . . . . . . . . . . . . . . . . . . . . . 13 3.6. SIGNED_INTEGRITY . . . . . . . . . . . . . . . . . . . . . 13 3.7. REQUEST . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.8. CANCEL . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.9. CHOKE and UNCHOKE . . . . . . . . . . . . . . . . . . . . 14 3.10. Peer Address Exchange . . . . . . . . . . . . . . . . . . 14 3.10.1. PEX_REQ and PEX_RES Messages . . . . . . . . . . . . 14 3.11. Channels . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.12. Keep Alive Signalling . . . . . . . . . . . . . . . . . . 17 4. Chunk Addressing Schemes . . . . . . . . . . . . . . . . . . . 17 4.1. Start-End Ranges . . . . . . . . . . . . . . . . . . . . . 18 4.1.1. Chunk Ranges . . . . . . . . . . . . . . . . . . . . 18 4.1.2. Byte Ranges . . . . . . . . . . . . . . . . . . . . . 18 4.2. Bin Numbers . . . . . . . . . . . . . . . . . . . . . . . 18 4.3. In Messages . . . . . . . . . . . . . . . . . . . . . . . 20 4.3.1. In HAVE Messages . . . . . . . . . . . . . . . . . . 20 4.3.2. In ACK Messages . . . . . . . . . . . . . . . . . . . 20 Bakker, et al. Expires October 6, 2014 [Page 2] Internet-Draft PPSP Peer Protocol April 2014 5. Content Integrity Protection . . . . . . . . . . . . . . . . . 21 5.1. Merkle Hash Tree Scheme . . . . . . . . . . . . . . . . . 21 5.2. Content Integrity Verification . . . . . . . . . . . . . . 22 5.3. The Atomic Datagram Principle . . . . . . . . . . . . . . 23 5.4. INTEGRITY Messages . . . . . . . . . . . . . . . . . . . . 24 5.5. Discussion and Overhead . . . . . . . . . . . . . . . . . 24 5.6. Automatic Detection of Content Size . . . . . . . . . . . 25 5.6.1. Peak Hashes . . . . . . . . . . . . . . . . . . . . . 26 5.6.2. Procedure . . . . . . . . . . . . . . . . . . . . . . 28 6. Live Streaming . . . . . . . . . . . . . . . . . . . . . . . . 28 6.1. Content Authentication . . . . . . . . . . . . . . . . . . 28 6.1.1. Sign All . . . . . . . . . . . . . . . . . . . . . . 29 6.1.2. Unified Merkle Tree . . . . . . . . . . . . . . . . . 30 6.1.2.1. Signed Munro Hashes . . . . . . . . . . . . . . . 30 6.1.2.2. Munro Signature Calculation . . . . . . . . . . . 33 6.1.2.3. Procedure . . . . . . . . . . . . . . . . . . . . 33 6.1.2.4. Secure Tune In . . . . . . . . . . . . . . . . . . 33 6.2. Forgetting Chunks . . . . . . . . . . . . . . . . . . . . 34 7. Protocol Options . . . . . . . . . . . . . . . . . . . . . . . 35 7.1. End Option . . . . . . . . . . . . . . . . . . . . . . . . 35 7.2. Version . . . . . . . . . . . . . . . . . . . . . . . . . 35 7.3. Minimum Version . . . . . . . . . . . . . . . . . . . . . 36 7.4. Swarm Identifier . . . . . . . . . . . . . . . . . . . . . 36 7.5. Content Integrity Protection Method . . . . . . . . . . . 37 7.6. Merkle Tree Hash Function . . . . . . . . . . . . . . . . 37 7.7. Live Signature Algorithm . . . . . . . . . . . . . . . . . 38 7.8. Chunk Addressing Method . . . . . . . . . . . . . . . . . 38 7.9. Live Discard Window . . . . . . . . . . . . . . . . . . . 39 7.10. Supported Messages . . . . . . . . . . . . . . . . . . . . 40 8. UDP Encapsulation . . . . . . . . . . . . . . . . . . . . . . 40 8.1. Chunk Size . . . . . . . . . . . . . . . . . . . . . . . . 40 8.2. Datagrams and Messages . . . . . . . . . . . . . . . . . . 41 8.3. Channels . . . . . . . . . . . . . . . . . . . . . . . . . 42 8.4. HANDSHAKE . . . . . . . . . . . . . . . . . . . . . . . . 43 8.5. HAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 8.6. DATA . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 8.7. ACK . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 8.8. INTEGRITY . . . . . . . . . . . . . . . . . . . . . . . . 46 8.9. SIGNED_INTEGRITY . . . . . . . . . . . . . . . . . . . . . 47 8.10. REQUEST . . . . . . . . . . . . . . . . . . . . . . . . . 48 8.11. CANCEL . . . . . . . . . . . . . . . . . . . . . . . . . . 48 8.12. CHOKE and UNCHOKE . . . . . . . . . . . . . . . . . . . . 49 8.13. PEX_REQ, PEX_RESv4, PEX_RESv6 and PEX_REScert . . . . . . 49 8.14. KEEPALIVE . . . . . . . . . . . . . . . . . . . . . . . . 51 8.15. Detecting a Dead Peer . . . . . . . . . . . . . . . . . . 51 8.16. Flow and Congestion Control . . . . . . . . . . . . . . . 52 8.17. Example of Operation . . . . . . . . . . . . . . . . . . . 52 9. Extensibility . . . . . . . . . . . . . . . . . . . . . . . . 57 Bakker, et al. Expires October 6, 2014 [Page 3] Internet-Draft PPSP Peer Protocol April 2014 9.1. Chunk Picking Algorithms . . . . . . . . . . . . . . . . . 57 9.2. Reciprocity Algorithms . . . . . . . . . . . . . . . . . . 57 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 57 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 58 11.1. PPSP Peer Protocol Message Type Registry . . . . . . . . . 58 11.2. PPSP Peer Protocol Option Registry . . . . . . . . . . . . 58 11.3. PPSP Peer Protocol Version Number Registry . . . . . . . . 58 11.4. PPSP Peer Protocol Content Integrity Protection Method Registry . . . . . . . . . . . . . . . . . . . . . . . . . 58 11.5. PPSP Peer Protocol Merkle Hash Tree Function Registry . . 58 11.6. PPSP Peer Protocol Chunk Addressing Method Registry . . . 58 12. Manageability Considerations . . . . . . . . . . . . . . . . . 58 12.1. Operations . . . . . . . . . . . . . . . . . . . . . . . . 59 12.1.1. Installation and Initial Setup . . . . . . . . . . . 59 12.1.2. Requirements on Other Protocols and Functional Components . . . . . . . . . . . . . . . . . . . . . 60 12.1.3. Migration Path . . . . . . . . . . . . . . . . . . . 60 12.1.4. Impact on Network Operation . . . . . . . . . . . . . 60 12.1.5. Verifying Correct Operation . . . . . . . . . . . . . 60 12.1.6. Configuration . . . . . . . . . . . . . . . . . . . . 61 12.2. Management Considerations . . . . . . . . . . . . . . . . 61 12.2.1. Management Interoperability and Information . . . . . 62 12.2.2. Fault Management . . . . . . . . . . . . . . . . . . 62 12.2.3. Configuration Management . . . . . . . . . . . . . . 62 12.2.4. Accounting Management . . . . . . . . . . . . . . . . 63 12.2.5. Performance Management . . . . . . . . . . . . . . . 63 12.2.6. Security Management . . . . . . . . . . . . . . . . . 63 13. Security Considerations . . . . . . . . . . . . . . . . . . . 63 13.1. Security of the Handshake Procedure . . . . . . . . . . . 63 13.1.1. Protection Against Attack 1 . . . . . . . . . . . . . 64 13.1.2. Protection Against Attack 2 . . . . . . . . . . . . . 65 13.1.3. Protection Against Attack 3 . . . . . . . . . . . . . 65 13.2. Secure Peer Address Exchange . . . . . . . . . . . . . . . 66 13.2.1. Protection against the Amplification Attack . . . . . 66 13.2.2. Example: Tracker as Certification Authority . . . . . 67 13.2.3. Protection Against Eclipse Attacks . . . . . . . . . 68 13.3. Support for Closed Swarms (PPSP.SEC.REQ-1) . . . . . . . . 68 13.4. Confidentiality of Streamed Content (PPSP.SEC.REQ-2+3) . . 68 13.5. Strength of the Hash Function for Merkle Hash Trees . . . 69 13.6. Limit Potential Damage and Resource Exhaustion by Bad or Broken Peers (PPSP.SEC.REQ-4+6) . . . . . . . . . . . . 69 13.6.1. HANDSHAKE . . . . . . . . . . . . . . . . . . . . . . 69 13.6.2. HAVE . . . . . . . . . . . . . . . . . . . . . . . . 69 13.6.3. DATA . . . . . . . . . . . . . . . . . . . . . . . . 70 13.6.4. ACK . . . . . . . . . . . . . . . . . . . . . . . . . 70 13.6.5. INTEGRITY and SIGNED_INTEGRITY . . . . . . . . . . . 70 13.6.6. REQUEST . . . . . . . . . . . . . . . . . . . . . . . 71 13.6.7. CANCEL . . . . . . . . . . . . . . . . . . . . . . . 71 Bakker, et al. Expires October 6, 2014 [Page 4] Internet-Draft PPSP Peer Protocol April 2014 13.6.8. CHOKE . . . . . . . . . . . . . . . . . . . . . . . . 71 13.6.9. UNCHOKE . . . . . . . . . . . . . . . . . . . . . . . 71 13.6.10. PEX_RES . . . . . . . . . . . . . . . . . . . . . . . 72 13.6.11. Unsolicited Messages in General . . . . . . . . . . . 72 13.7. Exclude Bad or Broken Peers (PPSP.SEC.REQ-5) . . . . . . . 72 14. References . . . . . . . . . . . . . . . . . . . . . . . . . . 72 14.1. Normative References . . . . . . . . . . . . . . . . . . . 72 14.2. Informative References . . . . . . . . . . . . . . . . . . 73 Appendix A. Revision History . . . . . . . . . . . . . . . . . . 77 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 95 Bakker, et al. Expires October 6, 2014 [Page 5] Internet-Draft PPSP Peer Protocol April 2014 1. Introduction 1.1. Purpose This document describes the Peer-to-Peer Streaming Peer Protocol (PPSPP), designed for disseminating the same content to a group of interested parties in a streaming fashion. PPSPP supports streaming of both pre-recorded (on-demand) and live audio/video content. It is based on the peer-to-peer paradigm where clients consuming the content are put on equal footing with the servers initially providing the content, to create a system where everyone can potentially provide upload bandwidth. PPSPP has been designed to provide short time-till-playback for the end user, and to prevent disruption of the streams by malicious peers. Central in this design is a simple method of identifying content based on self-certification. In particular, content in PPSPP is identified by a single cryptographic hash that is the root hash in a Merkle hash tree calculated recursively from the content [MERKLE][ABMRKL]. This self-certifying hash tree allows every peer to directly detect when a malicious peer tries to distribute fake content. The tree can be used for both static and live content. Moreover, it ensures only a small amount of information is needed to start a download and to verify incoming chunks of content, thus ensuring short start-up times. PPSPP has also been designed to be extensible for different transports and use cases. Hence, PPSPP is a generic protocol which can run directly on top of UDP, TCP, or other protocols. As such, PPSPP defines a common set of messages that make up the protocol, which can have different representations on the wire depending on the lower-level protocol used. When the lower-level transport allows, PPSPP can also use different congestion control algorithms. At present, PPSPP is set to run on top of UDP using LEDBAT for congestion control [RFC6817]. Using LEDBAT enables PPSPP to serve the content after playback (seeding) without disrupting the user who may have moved to different tasks that use its network connection. PPSPP is also flexible and extensible in the mechanisms it uses to promote client contribution and prevent freeriding, that is, how to deal with peers that only download content but never upload to others. It also allows different schemes for chunk addressing and content integrity protection, if the defaults are not fit for a particular use case. In addition, it can work with different peer discovery schemes, such as centralized trackers or fast Distributed Hash Tables [JIM11]. Finally, in this default setup, PPSPP maintains only a small amount of state per peer. A reference implementation of Bakker, et al. Expires October 6, 2014 [Page 6] Internet-Draft PPSP Peer Protocol April 2014 PPSPP over UDP is available [SWIFTIMPL]. 1.2. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 1.3. Terminology message The basic unit of PPSPP communication. A message will have different representations on the wire depending on the transport protocol used. Messages are typically multiplexed into a datagram for transmission. datagram A sequence of messages that is offered as a unit to the underlying transport protocol (UDP, etc.). The datagram is PPSPP's Protocol Data Unit (PDU). content Either a live transmission, a pre-recorded multimedia asset, or a file. chunk The basic unit in which the content is divided. E.g. a block of N kilobyte. chunk ID Unique identifier for a chunk of content (e.g. an integer). Its type depends on the chunk addressing scheme used. chunk specification An expression that denotes one or more chunk IDs. chunk addressing scheme Scheme for identifying chunks and expressing the chunk availability map of a peer in a compact fashion. chunk availability map The set of chunks a peer has successfully downloaded and checked the integrity of. bin A number denoting a specific binary interval of the content (i.e., one or more consecutive chunks) in the bin numbers chunk addressing scheme (see Section 4). Bakker, et al. Expires October 6, 2014 [Page 7] Internet-Draft PPSP Peer Protocol April 2014 content integrity protection scheme Scheme for protecting the integrity of the content while it is being distributed via the peer-to-peer network. I.e. methods for receiving peers to detect whether a requested chunk has been maliciously modified by the sending peer. hash The result of applying a cryptographic hash function, more specifically a modification detection code (MDC) [HAC01], such as SHA-1 [FIPS180-4], to a piece of data. Merkle hash tree A tree of hashes whose base is formed by the hashes of the chunks of content, and its higher nodes are calculated by recursively computing the hash of the concatenation of the two child hashes (see Section 5.1). root hash The root in a Merkle hash tree calculated recursively from the content (see Section 5.1). swarm A group of peers participating in the distribution of the same content. swarm ID Unique identifier for a swarm of peers, in PPSPP a sequence of bytes. When Merkle hash trees are used for content integrity protection, the identifier is the so-called root hash of the content (video-on-demand). For live streaming, the swarm ID is a public key. tracker An entity that records the addresses of peers participating in a swarm, usually for a set of swarms, and makes this membership information available to other peers on request. choking When a peer A is choking peer B it means that A is currently not willing to accept requests for content from B. seeding Peer A is said to be seeding when A has downloaded a static content asset completely and is now offering it for others to download. Bakker, et al. Expires October 6, 2014 [Page 8] Internet-Draft PPSP Peer Protocol April 2014 leeching Peer A is said to be leeching when A has not completely downloaded a static content asset yet or is not offering to upload it to others. channel A logical connection between two peers. The channel concept allows peers to use the same transport address for communicating with different peers. channel ID Unique, randomly chosen identifier for a channel, local to each peer. So the two peers logically connected by a channel each have a different channel ID for the channel. In this document the prefixes kilo, mega, etc. denote base 1024. 2. Overall Operation The basic unit of communication in PPSPP is the message. Multiple messages are multiplexed into a single datagram for transmission. A datagram (and hence the messages it contains) will have different representations on the wire depending on the transport protocol used (see Section 8). The overall operation of PPSPP is illustrated in the following examples. The examples assume that UDP is used for transport, the Merkle Hash Tree scheme is used for content integrity protection, and that a specific policy is used for selecting which chunks to download. 2.1. Example: Joining a Swarm Consider a user who wants to watch a video. To play the video, the user clicks on the play button of a HTML5