<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tomar-scone-privacy-01" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="SCONE Privacy">SCONE Privacy Properties and Incentives for Abuse</title>
    <seriesInfo name="Internet-Draft" value="draft-tomar-scone-privacy-01"/>
    <author initials="A." surname="Tomar" fullname="Anoop Tomar">
      <organization>Meta</organization>
      <address>
        <email>anooptomar@meta.com</email>
      </address>
    </author>
    <author initials="W." surname="Eddy" fullname="Wesley Eddy">
      <organization>Meta</organization>
      <address>
        <email>wesleyeddy@meta.com</email>
      </address>
    </author>
    <author initials="A." surname="Tiwari" fullname="Abhishek Tiwari">
      <organization>Meta</organization>
      <address>
        <email>atiwari@meta.com</email>
      </address>
    </author>
    <author initials="M." surname="Joras" fullname="Matt Joras">
      <organization>Meta</organization>
      <address>
        <email>mjoras@meta.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="07"/>
    <area>Web and Internet Transport</area>
    <workgroup>SCONE</workgroup>
    <keyword>Privacy</keyword>
    <abstract>
      <?line 71?>

<t>This document discusses privacy properties of the SCONE metadata or
network-to-host signals.  This covers questions that were raised during the
IETF 119 BoF and subsequent discussions.  It is not intended to be published as
a separate RFC but might be incorporated as a part of the security
considerations or other content within eventual SCONE RFCs together with
other documents covering security considerations.  Other documents will address additional aspects of the security considerations for SCONE metadata.</t>
    </abstract>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The general problem statement for Standard Communication with Network Elements (SCONE) is described in the video optimization requirements document <xref target="I-D.joras-scone-video-optimization-requirements"/>,
including the shaping or throttling that Communication Service
Providers (CSPs) perform <xref target="ABR-Video-Shaping"/>.</t>
      <t>There were questions rasied at the IETF 119 BoF on SCONEPRO (that led to SCONE) regarding privacy considerations, include:</t>
      <ol spacing="normal" type="1"><li>
          <t>What are the privacy properties of the SCONE signal?  If making the signal available to applications is the goal, does that have unwanted properties?</t>
        </li>
        <li>
          <t>Can the signal be designed so that there is no incentive to fake it, similar to ECN?</t>
        </li>
      </ol>
      <t>This document provides additional context necessary, and then directly
addresses these questions.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="scone-context">
      <name>SCONE Context</name>
      <t>SCONE is focusing on streaming video optimization use-cases through network-assisted application-level self-adaptation of media/video bit rate.  SCONE addresses the following high-level problem statement:</t>
      <ol spacing="normal" type="1"><li>
          <t>Currently Communication Service Provider (CSP) networks (mainly cellular and satellite networks) perform bit-rate throttling (either shaping or policing) of streaming video flows.  The motivation behind throttling may vary across CSPs. For example, the motivation can be:  </t>
          <ul spacing="normal">
            <li>
              <t>To support different data rates based on the subscribers' data plans;</t>
            </li>
            <li>
              <t>To reduce egress towards radio base-stations in downlink direction;</t>
            </li>
            <li>
              <t>To limit the overall capacity/bandwidth required and to manage capex requirements (e.g. need for more RF spectrum and deployment of more radio base-stations), etc.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>To perform throttling, CSP networks need to detect streaming video flows, which uses deep packet inspection and trial decryption of QUIC initial packets in order to decode and read the Server Name Indication (SNI) field present in initial ClientHello messages.  This requires significant compute resources.  Throttling (shaping or policing) also requires nontrivial compute and memory resources.  For details refer to <xref target="ABR-Video-Shaping"/>.</t>
        </li>
        <li>
          <t>Throttling in the CSP network has a significant negative impact on streaming video application quality of experience (QoE), and it also degrades mobile User Equipment (UE) battery performance.</t>
        </li>
        <li>
          <t>An equivalent reduction in network traffic can be achieved more intelligently via self-adaptation by Content Application Providers (CAPs), because CAPs can actually measure QoE parameters and can tune their self adaptation strategy much more effectively than the QoE-blind approach taken by CSP's network throttlers.  Hence, this approach of self-adaptation by CAPs is much superior in terms of end user QoE compared to CSP-led network throttling.</t>
        </li>
        <li>
          <t>CSPs currently use intentional (artificial) network throttling as a way to create service differentiation between users on different payment plans and to enforce fair usage plans.</t>
        </li>
        <li>
          <t>CAPs do not and should not have access to subscriber payment plan information.</t>
        </li>
        <li>
          <t>There is a need for a solution to the above multi-objective optimization problem which achieves both: (a) superior user QoE, and (b) differentiated data limitation consistent with subscriber plans.</t>
        </li>
        <li>
          <t>One potential solution to this problem is self-adaptation of video sessions by CAPs.  Since the subscriber plan information must live within the CSP network domain, the CSP network can abstract out the different traffic profiles suited to different subscriber plans and provide the abstracted information to application-clients running on the UEs for CAP self-adaptation implementations.</t>
        </li>
      </ol>
      <t>For details, refer to the proof of concept trial <xref target="I-D.ihlar-scone-masque-mediabitrate"/> and YouTube plan aware streaming <xref target="YouTube"/>.</t>
      <t>The SCONE network rate-limiting information (metadata) and the means of
conveying the information is to be defined by the IETF.</t>
    </section>
    <section anchor="privacy-properties">
      <name>Privacy Properties</name>
      <t>This document section describes the privacy properties of the SCONE signal and considerations with regard to making the signal available to applications.</t>
      <t>It is required that the SCONE signal shall not carry information that includes either:</t>
      <ul spacing="normal">
        <li>
          <t>Any Personal Identifiable Information (PII) that can be used to identify the subscriber such as International Mobile Subscriber Identity (IMSI). IMSI is a unique 15-digit number that identifies every user uniquely within a mobile network.</t>
        </li>
        <li>
          <t>Network’s policy associated with a subscriber - the CSP Network stores subscriber policies in network elements such as HSS (Home Subscriber Server)/UDM(Unified Data Management)/PCRF(Policy and Charging Rules function) to support various subscriber specific features in the network.</t>
        </li>
      </ul>
      <t>To help describe the SCONE approach to meet these privacy requirements, as well as to ensure the signal does not have unwanted properties, the next subsections provide an example and then general approach.</t>
      <section anchor="mobile-network-example">
        <name>Mobile Network Example</name>
        <t>Using a mobile network as a reference, the diagram in <xref target="mobile-diagram"/> explains how CSP networks implement throttling to support different data rates based on the subscribers' data plans.</t>
        <figure anchor="mobile-diagram">
          <name>Mobile Network Data Flow</name>
          <artwork><![CDATA[
                 +-----+                                           
                 | HSS |                                           
                 +-----+                                           
                    |                                              
                 +-----+          +------+                         
                 | MME |          | PCRF |                         
                /+-----+\         +------+                         
               /         \            |                            
              /           \           |         ___  __            
             /             \          |        /   )(  \                  
+----+   +-----+        +------+  +------+    (         )   +-----+
| UE |---| eNB |--------| S-GW |--| P-GW |---( Internet )---| CDN |
+----+   +-----+        +------+  +------+    (        _)   +-----+
                                               (__(___)
]]></artwork>
        </figure>
        <t>In order to perform throttling to enable different data-rates based on the subscribers’ data plans, the CSP network need to support following high-level functionalities:</t>
        <ol spacing="normal" type="1"><li>
            <t>Detect the streaming video flows.</t>
          </li>
          <li>
            <t>Identify the bearer associated with the flow.  </t>
            <ul spacing="normal">
              <li>
                <t>Bearer is a logical pipe between UE (Mobile phone) and P-GW (PDN Gateway) to carry packets belonging to one or more IP flows. IP flows (aka service data flows -SDFs) may belong to one or more services. All the service data flows within a bearer gets the same level of QoS.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Identify the subscriber who is using this service/flow by using mapping between bearer and subscriber ID (IMSI).</t>
          </li>
          <li>
            <t>Extract the network’s policy associated with a subscriber.</t>
          </li>
          <li>
            <t>Activate throttling to limit the flow’s bit-rate according to subscribers’ data plans.</t>
          </li>
        </ol>
        <t>This is performed in the network element which is on the data path and has access to the subscriber policies through standard interface with PCRF (Policy Charging and Rule function). In a 4G network this network-element is P-GW (PDN Gateway) and in a 5G network this network-element is UPF (User Plane Function). 
Note - UPF is not shown in above diagram as above diagram is for 4G mobile network. UPF is equivalent to P-GW in the 5G mobile network.</t>
      </section>
      <section anchor="scones-approach">
        <name>SCONE's Approach</name>
        <t>To meet the privacy requirements as well as to ensure that signal does not have unwanted properties, SCONE proposes following approach:</t>
        <ol spacing="normal" type="1"><li>
            <t>Use an on-path interface between the user's application end-point and network element  to exchange the SCONE signal. This should be the same on-path interface that has already been established between application end-point and network element to carry the video flow whose bit-rate needs to be regulated. Due to the usage of an on-path interface there is no need to exchange additional subscriber specific information (that could have been otherwise used to identify the subscriber) between CSP network and application end-point to establish association between the flow and scone signaling.</t>
          </li>
          <li>
            <t>Network elements to be involved in SCONE signaling should be on data-path and should have access to the subscriber policies. This network element should calculate the target bit-rate for the specific flow based on subscribers’ data plan, network configuration &amp; capacity and CSP network policy and share only the just enough information (for e.g. video/media bit-rate etc. Exact metadata and data-types to be defined during the solution definition phase of SCONE) with application end-point via SCONE signaling. This would ensure that SCONE signal does not carry the network's policy associated with a subscriber and it does not carry unwanted network information/properties.</t>
          </li>
        </ol>
        <t>Note - Information such as video/media bit-rate, that is required to be shared by a network device with client application end-point using SCONE signal can already be learnt by application end-point currently, through various mechanisms (the effect of on-path throttlers is clearly visible by observing application traffic by third party tools like PCAP). So as part of SCONE scope we are not proposing, network to share any information with application endpoints which can not be known without SCONE, rather objective is that such information be made explicit.</t>
      </section>
    </section>
    <section anchor="incentives-for-abuse">
      <name>Incentives for Abuse</name>
      <t>In early discussion, at the IETF 119 BoF session, it was pointed out that possible incentives for abuse need to be considered, and that a good example existing network-to-host signalling case is Explicit Congestion Notification (ECN), for which the impact of both lying/cheating hosts and network devices has been analyzed, and for which there are no strong incentives for either hosts or network devices to unnecessarily forge or tamper with ECN codepoints.</t>
      <t>Note, why ECN is not suitable as a method to meet SCONE requirements is a separate topic, discussed in another document <xref target="I-D.tomar-sconepro-ecn"/>, while the discussion below is focused on considering ECN operation only as an inspiration for properties SCONE signaling should have.</t>
      <t>ECN is an extension to the Internet Protocol.  ECN allows end-to-end
notification of network congestion without dropping packets. ECN is an optional
feature that may be used between two ECN-enabled endpoints when the underlying
network infrastructure also supports it.  In general both classic ECN <xref target="RFC3168"/> and L4S ECN <xref target="RFC9330"/> <xref target="RFC9331"/> <xref target="RFC9332"/> are mechanisms to
send end-to-end notification of network congestion. And it relies on following
principles:</t>
      <ol spacing="normal" type="1"><li>
          <t>Sender to set the ECT code-points correctly for a particular flow.</t>
        </li>
        <li>
          <t>Receiver to send the feedback back to the sender correctly based on CE value.</t>
        </li>
        <li>
          <t>Network elements to set the CE bit correctly based on actual congestion
conditions in the network.</t>
        </li>
        <li>
          <t>ECN codepoints are not bleached or remarked within the network, other than
to set the CE bit when appropriate.</t>
        </li>
      </ol>
      <t>The case of SCONE is similar in many ways to ECN:</t>
      <ul spacing="normal">
        <li>
          <t>Any network device which can alter ECN bits can simply drop the packets. And packet drop may have more negative impact on application’s performance compared to using ECN bits to indicate congestion in the network.</t>
        </li>
        <li>
          <t>Similarly any network device which can send SCONE signaling can throttle the application flow. Throttling may have a more negative impact on application’s performance compared to using SCONE signaling to influence the incoming flow bit-rate from the sender. So like ECN, there should not be any incentive for the network device to fake the SCONE signal.</t>
        </li>
        <li>
          <t>Regarding faking CE bit (either setting or clearing it), there is no incentive either way, because both cases may have more negative impact on application’s performance within the network faking the ECN signals</t>
        </li>
        <li>
          <t>Similarly, faking SCONE signaling (sending incorrect meta-data)  there is no incentive because sending incorrect meta-data may have more negative impact on application’s performance within the network faking the SCONE signals</t>
        </li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>SCONE security considerations are discussed in the other documents
covering specific network-to-host signaling methods and their implications.
This document provides answers to questions regarding privacy of the SCONE signaling and metadata.  There are no additional security considerations raised by this.</t>
      <t>Other security considerations for SCONE signalling will be covered in separate Internet-Drafts (such as <xref target="I-D.thoji-scone-protocol"/>).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3168">
          <front>
            <title>The Addition of Explicit Congestion Notification (ECN) to IP</title>
            <author fullname="K. Ramakrishnan" initials="K." surname="Ramakrishnan"/>
            <author fullname="S. Floyd" initials="S." surname="Floyd"/>
            <author fullname="D. Black" initials="D." surname="Black"/>
            <date month="September" year="2001"/>
            <abstract>
              <t>This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3168"/>
          <seriesInfo name="DOI" value="10.17487/RFC3168"/>
        </reference>
        <reference anchor="RFC9330">
          <front>
            <title>Low Latency, Low Loss, and Scalable Throughput (L4S) Internet Service: Architecture</title>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This document describes the L4S architecture, which enables Internet applications to achieve low queuing latency, low congestion loss, and scalable throughput control. L4S is based on the insight that the root cause of queuing delay is in the capacity-seeking congestion controllers of senders, not in the queue itself. With the L4S architecture, all Internet applications could (but do not have to) transition away from congestion control algorithms that cause substantial queuing delay and instead adopt a new class of congestion controls that can seek capacity with very little queuing. These are aided by a modified form of Explicit Congestion Notification (ECN) from the network. With this new architecture, applications can have both low latency and high throughput.</t>
              <t>The architecture primarily concerns incremental deployment. It defines mechanisms that allow the new class of L4S congestion controls to coexist with 'Classic' congestion controls in a shared network. The aim is for L4S latency and throughput to be usually much better (and rarely worse) while typically not impacting Classic performance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9330"/>
          <seriesInfo name="DOI" value="10.17487/RFC9330"/>
        </reference>
        <reference anchor="RFC9331">
          <front>
            <title>The Explicit Congestion Notification (ECN) Protocol for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This specification defines the protocol to be used for a new network service called Low Latency, Low Loss, and Scalable throughput (L4S). L4S uses an Explicit Congestion Notification (ECN) scheme at the IP layer that is similar to the original (or 'Classic') ECN approach, except as specified within. L4S uses 'Scalable' congestion control, which induces much more frequent control signals from the network, and it responds to them with much more fine-grained adjustments so that very low (typically sub-millisecond on average) and consistently low queuing delay becomes possible for L4S traffic without compromising link utilization. Thus, even capacity-seeking (TCP-like) traffic can have high bandwidth and very low delay at the same time, even during periods of high traffic load.</t>
              <t>The L4S identifier defined in this document distinguishes L4S from 'Classic' (e.g., TCP-Reno-friendly) traffic. Then, network bottlenecks can be incrementally modified to distinguish and isolate existing traffic that still follows the Classic behaviour, to prevent it from degrading the low queuing delay and low loss of L4S traffic. This Experimental specification defines the rules that L4S transports and network elements need to follow, with the intention that L4S flows neither harm each other's performance nor that of Classic traffic. It also suggests open questions to be investigated during experimentation. Examples of new Active Queue Management (AQM) marking algorithms and new transports (whether TCP-like or real time) are specified separately.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9331"/>
          <seriesInfo name="DOI" value="10.17487/RFC9331"/>
        </reference>
        <reference anchor="RFC9332">
          <front>
            <title>Dual-Queue Coupled Active Queue Management (AQM) for Low Latency, Low Loss, and Scalable Throughput (L4S)</title>
            <author fullname="K. De Schepper" initials="K." surname="De Schepper"/>
            <author fullname="B. Briscoe" initials="B." role="editor" surname="Briscoe"/>
            <author fullname="G. White" initials="G." surname="White"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>This specification defines a framework for coupling the Active Queue Management (AQM) algorithms in two queues intended for flows with different responses to congestion. This provides a way for the Internet to transition from the scaling problems of standard TCP-Reno-friendly ('Classic') congestion controls to the family of 'Scalable' congestion controls. These are designed for consistently very low queuing latency, very low congestion loss, and scaling of per-flow throughput by using Explicit Congestion Notification (ECN) in a modified way. Until the Coupled Dual Queue (DualQ), these Scalable L4S congestion controls could only be deployed where a clean-slate environment could be arranged, such as in private data centres.</t>
              <t>This specification first explains how a Coupled DualQ works. It then gives the normative requirements that are necessary for it to work well. All this is independent of which two AQMs are used, but pseudocode examples of specific AQMs are given in appendices.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9332"/>
          <seriesInfo name="DOI" value="10.17487/RFC9332"/>
        </reference>
        <reference anchor="I-D.joras-scone-video-optimization-requirements">
          <front>
            <title>SCONE Video Optimization Requirements</title>
            <author fullname="Matt Joras" initials="M." surname="Joras">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Anoop Tomar" initials="A." surname="Tomar">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Abhishek Tiwari" initials="A." surname="Tiwari">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <author fullname="Alan Frindell" initials="A." surname="Frindell">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="4" month="November" year="2024"/>
            <abstract>
              <t>   These are the requirements for the "Video Optimization" use-case for
   SCONE, which broadly speaking seeks to optimize video playback
   experience in mobile networks by cooperative communication between
   video content providers and the providers of network services to end
   users.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/mjoras/sadcdn-video-optimization-requirements.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-joras-scone-video-optimization-requirements-00"/>
        </reference>
        <reference anchor="I-D.tomar-sconepro-ecn">
          <front>
            <title>SCONEPRO Need for Defining A New On-Path Signaling Mechanism</title>
            <author fullname="Anoop Tomar" initials="A." surname="Tomar">
              <organization>Meta</organization>
            </author>
            <author fullname="Marcus Ihlar" initials="L. M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Wesley Eddy" initials="W." surname="Eddy">
              <organization>Meta</organization>
            </author>
            <author fullname="Ian Swett" initials="I." surname="Swett">
              <organization>Google</organization>
            </author>
            <author fullname="Abhishek Tiwari" initials="A." surname="Tiwari">
              <organization>Meta</organization>
            </author>
            <author fullname="Matt Joras" initials="M." surname="Joras">
              <organization>Meta</organization>
            </author>
            <date day="23" month="May" year="2024"/>
            <abstract>
              <t>   This document discusses the need for defining a new on-path signaling
   mechanism and addresses the question “why can't we use Explicit
   Congestion Notification (ECN)” for the SCONEPRO use-case.

   The SCONEPRO objective is to optimize user QoE for streaming media/
   video services through network assisted application-level self-
   adaptation.  This requires a Communication Service Provider’s (CSP’s)
   network device to send streaming media/video traffic profile
   characteristics (e.g. for allowed average media/video bit-rate, burst
   rate etc.) with the client application endpoint to enable content
   self adaptation implementations by content application providers
   (CAPs).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tomar-sconepro-ecn-01"/>
        </reference>
        <reference anchor="ABR-Video-Shaping" target="https://datatracker.ietf.org/meeting/119/materials/slides-119-sconepro-how-networks-shape-traffic-02">
          <front>
            <title>ABR Video Shaping</title>
            <author initials="M." surname="Ihlar" fullname="Marcus Ihlar">
              <organization/>
            </author>
            <date year="2024" month="March" day="21"/>
          </front>
        </reference>
        <reference anchor="I-D.ihlar-scone-masque-mediabitrate">
          <front>
            <title>MASQUE extension for signaling throughput advice</title>
            <author fullname="Marcus Ihlar" initials="L. M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   This document specifies a new Capsule (RFC9297) that can be used with
   CONNECT-UDP (RFC9298), CONNECT-IP (RFC9484), or other future CONNECT
   extensions to signal throughput advice for traffic that is proxied
   through an HTTP server.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ihlar-scone-masque-mediabitrate-02"/>
        </reference>
        <reference anchor="YouTube" target="https://datatracker.ietf.org/meeting/119/materials/slides-119-sconepro-youtube-plan-aware-streaming-01">
          <front>
            <title>YouTube Plan Aware Streaming</title>
            <author>
              <organization>YouTube</organization>
            </author>
            <date year="2024" month="March" day="21"/>
          </front>
        </reference>
        <reference anchor="I-D.thoji-scone-protocol">
          <front>
            <title>Standard Communication with Network Elements (SCONE) Protocol</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christian Huitema" initials="C." surname="Huitema">
              <organization>Private Octopus Inc.</organization>
            </author>
            <author fullname="Kazuho Oku" initials="K." surname="Oku">
              <organization>Fastly</organization>
            </author>
            <author fullname="Matt Joras" initials="M." surname="Joras">
              <organization>Meta</organization>
            </author>
            <author fullname="Marcus Ihlar" initials="L. M." surname="Ihlar">
              <organization>Ericsson</organization>
            </author>
            <date day="6" month="May" year="2025"/>
            <abstract>
              <t>   On-path network elements can sometimes be configured to apply rate
   limits to flows that pass them.  This document describes a method for
   signaling to endpoints that rate limiting policies are in force and
   what that rate limit is.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-thoji-scone-protocol-00"/>
        </reference>
      </references>
    </references>
    <?line 259?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document represents collaboration and inputs from others, including:</t>
      <ul spacing="normal">
        <li>
          <t>Spencer Dawkins</t>
        </li>
        <li>
          <t>Alan Frindell</t>
        </li>
        <li>
          <t>Bryan Tan</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA7Vb/3IbR3L+f59iQlfFQIwFRUm+s5m7cyiSspgyKZ4oxeW6
u1INdgfAmoud9c4uIZzEVF4j/+VZ8ih5knzdPbM/AFCy73wsWwAWMz09Pf3j
655GHMdRndW5OVYHN6cvr87VdZXd6WSDV1uaqs6MU7pI1UWRmKLO7vBxbit1
MmucOYj0bFaZu+25B1Fqk0KvQDSt9LyOa7vSVewSW5i4lDHxo6Mo0bVZ2Gpz
rLJibqMoK6tjVVeNqx8/evT1o8eRrow+Vt+bmWehNlVhavW60oUrbVVHa1vd
LirblMeKOYhuzQbP0mP1elnZus6zYtE9O0l1SVtQz7I6foXF1X9kqbHdAM9/
FLkaC77VORg+VhvjIocN1G9/amxt3LEqbFRmx+pPtU0myoGRyswd3m1W9OYv
UaSbemmr40ipGP8r7A+zTqbqNQmCn4h4Tgpry95TWy10kf1V15ktjtWlqTU/
Niud5ccQAkazLP9tha+miV0NV/h+qs7TdNNb4HvjcrPpnn58gTWPNhj8wAK0
hWytq6y/h9kyc0tz2//mE/uoeeQDa1xO1b/bSrveEpe6rnsPP0599SMN7IhH
ha1Wms79GCoGRWs/KfXq+emTo9985d9+/eTJo+7tUff2MWYqdRGfTZm21+Q7
Up4YJ5KtPDNxZX5qssqsYCru2E/pKX9Z2dgkBVM7efYqZvWLb5a6hJ4e8yZq
XS1MfayWdV2648PDVNe6rnRya6ppZur5FJs/XBlTY8bh0dHXh9iMqTKdu0OX
g5yL8bBbbWnXMUyG7ARsYyETg9p8niUx7IsXFOsHO2INyrPDX3Z6HI6oO5Iq
aZy6WOZedcEoHj9+9Php/OhJ/PgoSCyjEV5iK+1+avBi0kzPMjBSG5bFD7Z5
3czMP0QCG9vUoB2XuS5iDb0zsYO96hWmkxPqycCzoa4xVJ3QUHUThj4oDnDT
zvyoIDD1x6x1gha+w+YgFcVxrPTM0RbrKHoNY1Jwnw3pkEozByk7OF3vNvHa
umU7V/XSiONTpO4kKfAT+QOH28X5u1q5bFFAPFOlmHpi70zlFE7CkdI6UNE1
bB/brXTmTKrSpsKWiXp0cf76uYJA1TP7nL2wa2YOWt7jjmiA9kWtQLyweIGj
LlLQqa2COMtmlpOHSBXsVytnSk0nT7alZk2tVtliWdPArEhsBb+OL2ms0goj
67BPZxKwVW8iSNDhnCst3CMaWXxfYV+0LnaS1cusUOYOHxqdewFhNezUQrVo
LI2JZFoQthcMbTwspYZLYZMvt6asszxXOk0r4xy9ZjQQa2pXmqR227xvEeRQ
Ojy/acQKscrSNDdR9BlFvcqmTUITSD2MWpgCBHJShVluVgrBqmaXI+QodOkq
Vad2tWqKLOGleMPqShRDnefiotSIFx/TwcFwkiqbQfKQHfHM7k313Zvqu7dO
Sd+//4We8f5+Akec5E3qtUw58Tl0lnUbuEUvh9u4MdVdlpgI6IQWgRqPTm+u
3VjBKMizg5kdx3p/P2XBQb9ZyTvFB8cZqVrNTAxUndYi2Vy/eqlGzEguCu0l
VpkFhExcBsscHu1EyQ7JwR1N1fdEgRwKLfQpWxZ7/QYmNVcrfdsKiR8rfYcw
p3HyxI0uy9zLxtEp0riF1fkEx2O8ZS81IE9TrHVBdtUt+k0UPZ6qU130qcMM
oQl4j6HOCoGaZcfGTbsSHEirz/UtntdAPjhouHl6dn569c22GyvltAYWwtb6
rlaFSWA7utpM2L1grQKOpYL15JvIWxbvxLje0U3JNE5tQTbOe6e5Z2aeFUzf
iaUA2ClCdk4dXL65eX0wkVd19ZLfvzr/45uLV+dn9P7mxcl337VvIj/i5sXL
N9+dde+6macvLy/Pr85kMp6qwaPo4PLkhwPZ0cHL69cXL69OvjsQy+oLhjXC
iu9DECsrI64vGljjs9Pr//2fo6fQ7X+CF3sMFb2/9x++OvrtU3xYQ2qymi3y
jf8IkUGCZWlwMKCi4akSGESNUDAh9+oADgpFZwtp/sufSDJ/OVa/myXl0dM/
+Ae04cHDILPBQ5bZ7pOdySLEPY/2LNNKc/B8S9JDfk9+GHwOcu89/N03cCxG
xUdfffOHiFRIDO5UdDGK5GNGjhmRjT1SoVq4sM8lIg2KEy0aikRksVQh+mpE
RsfH2dlonCMq5QgH+TzWlI0IEVg/Y6JDWQDQSFEQRLwRhgZmAN7y3K6JnyUi
pye5EwzE75w2VYUP0Im9flQFP8pudBx4h1cFliZNSkyeN2TZHPpBOs8zhO4w
rvO74DnmqN7z3yOTcbjseffSQhR4P6Y9bwt2jm0JSjFqZeFkhNeZQThP+4RX
eqPu4DKUTiqLwEshYKqeg755p1dlblj5+zQSTXQYbKoYCRdgTEkZJFzNfG4q
RjOEnmgLTs00oSDrHSMAD9ti5T6XQQQl3b92tCqD+GyUWTAKqC2QY0rBJc0s
k4pdHTw0fBuMDpu49U4Oj3uUciiWBCOCIt5idQLkcDjDCayzFFHch9JU/KWF
NAq9MDTSvBuG6JGZLqY4LIwlaLCyFaEuxdikalZMIDVlbjfsjUgNLaPAHc7H
E2XqZMoRA3yGU+/OZEKH0OkPrwneUji0pN5/0hP4qSxZkgkR/DAl4B5QPuFH
5pDOjbdI4B4DkmpTBnOBEzpV7OwJCPE0li6cvalk4cSmhudj6VSiK5Qe314h
gQGsSoMtjG6uLsZqnpmcoiPCTEEstNRP8wxPXkDzIWoKVQvTQmkvbcfRM0NW
hRiLyLYqG1gCntumSvzozir2mgOcsu3IFXBIAAkZx0mhRjtZGZzPZkCYlB5C
BiQgbuay+YdA0JNpnxGP83rnBqhAqLu/mQI4h8N9toKY633+sOffEKB1TjgX
R2TeQUsgOljG6I/2fCzxCerNW01hLZogwcrOMmCZNw6sn2P7Javi6A0w1gxp
v8F+vbZpkMImnk7VCdA9ht7pnMay+fHq2FHYic9yveHDUSwz+MlUFJyCLRzZ
QjwjxLzjkWcbCQogf9LbXh92nlyTVcxMoqHAij7yYhASZACyK6Ndg8Wwd8pj
oHQ1TSQh0Li6KRgNZhUvrnqLO86MFyDRwDyYYwMvldA5gDAwmZwcKMdIrQoO
MZXFHpE83xrh/ub6c9dJQ04d60NlXtCZTASJtBPJHe+RAe0Kw5gRuEwcqGUw
ga2sGLUi0SMDrnibpKu6EssHAzFB5i0WoDY4wy+n7LNV0oYnkiHnjR4ejpD5
kQ7CBMZ7aEh6uEYcwFIJ9LGmJEtiWuvSsxA/6rUxHKohf1v0fH6pxfOxRw/+
1FCNCHTmGmfTkL3L9+D7N1MRSWo50eWguLQNHAd9ZKCtk0SiQC9wDNZRbQ3K
FiD5W7JJj69156uhkjZvmP/a8mnrGWICTiKvs9jOfhR1GIKRAALEr3qdRzhD
onsMiY67IwxHJkY5mo0HUqMSAAU6Dkc+gFJ249r8erA5L5yvpuoldLq0fIo4
w+EOMtfyh7d7IJB4EwQDrigE9SMQREnHVizeESUk45CkkUx8AWDbuaWWQM1k
5zlbrS/AKNtI/O10JHgSMD+HpwLrTVb76NYO2hYHi9WnPf70ZAFG9B3TwxQu
TjjWwJM3ReHRJ01+cy6lAshjR3AZ4R1SLh0So15ImHQxQRJPCznjP5xmYsra
h1ZJ4D9RqEOWQXsKNTIWP5fTevHg/Xv/dUi5PX4NkiY6MSuVxJ9ODqNQ/xiH
LJD8J1V35lTvuTObkAX3Z2XOZ08pZX4Q7WzTZvKcIe5eZmynps4DjZBwuV+Q
oYsvH1Z02DikOCDY7Gen72BYSmgtvgvJ93BRwAfgQvI3ia4QHQfqRDN84cEp
gd8AvTEiJoQA98e+9SIlA51nzMVF/xSuL4CEmIiPm40TTc9kymbbCh0FBvhi
uZvR3nlfSky/6cbJkgAGo4vLm4vxVNGLuDwkJdA1dfRlnGYLwIOiWdEM2Yrn
lDZzR1CA/ZbMoDxXDF0HEOH1jGpoodb1f//1305gFrIF52wi7o2PSfd3Erd+
IVTJXG0Z2vVMm+GacX2gYUItLYjixc2NGr2wq8H+BXqOD9+cXY7eELgCD2fk
Yi8ZvBOF8eH16avno2vPK1TrdKmrBanPq4b8zrwpWFfHElwkf0EalNlmwCWB
Zwqdao6w2FTCLm2uEw8g/NLkZav1PS3roATBXVP7ykuwiH5+wVWEtaEKqJPA
yYCnp+xchGpD454a1MQz9k5cqBijaz0nlNBndF1xKJQ/A6Nk6J8FlWsrnDIr
it5wFr+tIQIf2DcGMEQuXwOTrkha79/L+Ng/g/MDnM0RPpxa2vUw12k98KB2
+SukmNjZf+LPXzT0/r6I6e+LnecP/+3S+MCK+uHvovFr8MGs/KK/n8GHPPgI
Z/vkcXl53mflgyJ7/AhzOzQOPR9//tv5OGzf/bn/+KMS2qJx2HvfJ9LRePv2
Lf3zMI3DwacekQ/9EePRFpee1Bdhy1vH0gmjL5ZRO3HcTYk+APOoD3j7QZmr
Z/yO/z6om/jb7+kzjse/i0dda8CYx5yeXakPfysfb/t87G7vo3+jt2/x39ux
2O37Y/XZ0I/ITePvD7a8FUeC57ldH9wDBPSqGLt1FvGzHLmHfiX+uF9BHOx5
ll0QHAo2wWntLTKGCEQ5Ppy3lBjPpMTD6+0v6HHV6KKPIGYGwLHaCchc3cSc
qa+IPZNhDBNyuwBSylWZlaZN6aAkIy/LcgngKuiRFWN0DSX4FrSRJHLEFLQU
akUzk9ti4QWKmSrUxy6uA9vhHTKnW91llyREeR7fnD13Y65GCrltWn4OaJ0g
SMpF4A6VFsR4oSyIPR5LdSoRPFW87A1J8smWJHtxf720JCqpW3O+5Vc7pIUI
G8tXK0ROeg1CDIfhL3cDYjsLWI1LLufvJD/q4YifC60k3z9JuBhrtnS5q3gS
k0yyLSUjlbZyxzbIprd0eeohPeWXYi7dHeYWSPOJceaCgQgVTQxj91z9atP3
7XwzYL9Q53fhopWvbuY6kcRTokaAcS2EI/oE4zoUh4OkU3/6ba+8kbUlmziw
jEd79JlLaTT9y09Pf3MNfri+Ro0NRj3vOIiukKzD0GiIv7yXWyGizfWG4LhI
NIMHmaSkYH8LfAdivQodpMl78Kfy5c4chnCMPz93VHBjYMcwNUDQvQD0Ifyp
618AQAX20hPruLstOL4AMI8V+zlIkPAosnRWmO7Ugx0Rl5SffO4GJVFTpHFp
s0LKRdsayXy/S5a6WPRRuLA/lSqzLzF5mM5uYZcLf9WLtXMqeJNLAk8GWhq6
LwKfP5+51mt2/QDsSuBpIIzWTil2hEwcqW+Tkx9AYGhMsCOposGL7RVg/345
xKFWJr0r4305zqCIIJkrC4vPm0XAXR7rzH0ymR23EuoHRl2kD0iMuAzibR1g
v+AYvJq4Viqs+HOlIqhExavtLDLcBt/Z/E78WF8huDml1QYqW1Dkbx2Y/2qr
DvmAI/PKtX3mngZCbcIHydOlJ6s78Tk3apheqskRJmCPh3z1pKu52WKeLRqp
mqh/bq+5JO/tib/s0mG3pGoTX3DT2j9Svc8U7IsHWkDM8cUXa+whF7E61uka
i9JDxLK2Z4rvwUiS9aY02zWlrhmqK2imbacBcAd2TartG0Mk/O1VGLpo2DpN
fwhrlnnffw1KPq0X66zRy+fzn1fc8DcvW3RadxiE3RPjYeciSVV9nOgXi0K9
Y5+UJ7580y9msVD5DLlOp7u6rGFIxFxLAfQB+Ql8GUiGa7etwwNa0hUGEvm9
FNr7hkkbxkMBZWXI4WRu5ciPhBsXOtjgsLpLFNpYQmvx7ZHLCI1jTTtjwCWh
o1091I+5NpkBL1BTG91b2NwB/twaIIaTawTjG0viDC1vfpsJTgExjjtF6OQk
TvGFaxv3rTcNXQyrgftUkeXgPBAi6RFRSO62oLBPM6gCzotPqFRB9/fdbUPm
W4r47PtLgcJKp4arJPAuNekMN6/tdo1zhiOy6xoIJ3ubsPxdwIR0d02yIebJ
xXCRHjMgCpF+NlxI00JtLAFzoUpr0tBmRP1YamFt2laYzLvMcWF6f/8kO19q
9SApnPt90i3hQnqSFGyEb03FC52fXo0nzIzImmvX/g51zlcyKqei9mGyNJqX
pbXcIA6LZTgO6xzLNPjY/DVsYkC8CjpCWZjl8vpAJL4XQxbB5+01IKemCM1Y
GQ4HkxacytQQj2+ZpO4uRRfrokZTcQx0kb/hrwKGbLKaU1Qus8HNLm3a1hNF
sQcwjhO8ti+0tmWWTNreVwG6xbBZ099Z7PZW399zW0FufEkvKBhnaOu2tUfi
VNAKkj6xTx7PX0dRlCHuC+5GyPxjEmTvTuCB0EzxF6LxAuEaZg3f3rvLa+sV
174ReKqYAZ1zSkgOC8qHl6joKxUUpxdAg94Fo03BGCd2Psedqo4DWwqGinxN
WAxAMlfBRS1oWXMPXyxFhnTgMwLILSAzVt6oFzkqDcVrEqbOV/y+lIDjrak9
uKvcsvInOTVIJczj+/e+Ed9fMn339KZ7Tl353O/m2/J77x/T+Mr0fXdtI0d3
0p0I1adFSB0FHCArk/NdT9GlARESjyLJ4CB8veOGepu5OuN8anJ++pqNIvaC
QtYq/Yv+JpdcepZwG5WvbgD5vYKpZXeBkL/zmsNjzXB6iv8J2E0W7Ki2OOv0
HOErb4y0duzDkoFFjKSusj00pF+hJwy6bxPIvefi4Ol0ywW0gQnKglyJaFYQ
I8zy1iORIY2Jb9amJoZol0HWMU68IHZqgZNrxKSPsfj62DecgviKwh6SYue7
T9v7rm180YY8ndfUbIJ9YEnp2nBUxN+wCUm2GUyIFMO3JfGXZDKMr7nAs6c7
phdvpUDSNa8M+iMEzLRMUFoiLUmmb9tbB6Bobzeyd3JQH9slK9W2h+LOE49j
5F66Bw9YOfsdQu1m9a+03W12eNdzaHC44KefAHABURKKNt+o7KpnC4yVGDpB
fhMf/XqNGLOAhUKvcshXtoQVWph38m4S86u2w3sul7heRduuRlPXvo2LsSBf
adfjwM52u7SfBUXtmobEEXL36N+lV7tmFngW93QVfgIyUJ9JGLR9KiOSstzQ
e4fBqVIs9/MP7C/s6SNz/5Gb7O8B2+Te3vCji9PBFX3o8n3oNxnk0AbYg9sx
h7/7iLqfioQMeD9oZCti/OPCDWZW8Y1hd+3/UK984daUa0BJe79Y2PnZwZ6+
hFBvbH9TonyLkQeI/ZLKA0LwPwSSnIVw3kuv85/6HUsPK/NvYxh73xHwJlG2
GC8AoPiMfiCKlCtkkx7X7fmt1P39mHs6Lk6uTnaOdChDwsvYJ4/USeiuoN/V
UFwlIicJJTzANws5z/fH0nZg0t8fzKFBhm5ihkQr45tDKcDnuZ5ZDwqlFls2
+IL9FOtK+wMQ/mUfmV1JTq5SZ3oNpXUUo6iF5jm0KDV5js/Pqg0evEZcjKL/
B0fLR+mYOwAA

-->

</rfc>
