Last Call: <draft-ietf-ippm-ipsec-08.txt> (IKEv2-based Shared Secret Key for O/TWAMP) to Proposed Standard

The IESG <> Mon, 26 January 2015 15:26 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id C5C291A906E; Mon, 26 Jan 2015 07:26:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id U65A19dsX_v2; Mon, 26 Jan 2015 07:26:10 -0800 (PST)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id D64411A1A5A; Mon, 26 Jan 2015 07:26:09 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Last Call: <draft-ietf-ippm-ipsec-08.txt> (IKEv2-based Shared Secret Key for O/TWAMP) to Proposed Standard
X-Test-IDTracker: no
X-IETF-IDTracker: 5.10.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Mon, 26 Jan 2015 07:26:09 -0800
Archived-At: <>
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Mon, 26 Jan 2015 15:26:11 -0000

The IESG has received a request from the IP Performance Metrics WG (ippm)
to consider the following document:
- 'IKEv2-based Shared Secret Key for O/TWAMP'
  <draft-ietf-ippm-ipsec-08.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2015-02-09. Exceptionally, comments may be
sent to instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.


   The O/TWAMP security mechanism requires that both the client and
   server endpoints possess a shared secret.  Since the currently-
   standardized O/TWAMP security mechanism only supports a pre-shared
   key mode, large scale deployment of O/TWAMP is hindered
   significantly.  At the same time, recent trends point to wider IKEv2
   deployment which, in turn, calls for mechanisms and methods that
   enable tunnel end-users, as well as operators, to measure one-way and
   two- way network performance in a standardized manner.  This document
   describes the use of keys derived from an IKEv2 SA as the shared key
   in O/TWAMP.  If the shared key can be derived from the IKEv2 SA, O/
   TWAMP can support certificate-based key exchange, which would allow
   for more operational flexibility and efficiency.  The key derivation
   presented in this document can also facilitate automatic key

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.