Re: [ippm] draft-morton-ippm-capacity-metric-protocol
Ruediger.Geib@telekom.de Fri, 28 January 2022 08:51 UTC
Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37FDB3A247B for <ippm@ietfa.amsl.com>; Fri, 28 Jan 2022 00:51:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.672
X-Spam-Level:
X-Spam-Status: No, score=-2.672 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q2qXTV90qqWi for <ippm@ietfa.amsl.com>; Fri, 28 Jan 2022 00:51:12 -0800 (PST)
Received: from mailout41.telekom.de (mailout41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B0B03A2479 for <ippm@ietf.org>; Fri, 28 Jan 2022 00:51:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1643359871; x=1674895871; h=from:to:cc:subject:date:message-id:mime-version; bh=/VHyMigKX1/63j6BVivfod5ykxmK2qULrcBUAx5ohZs=; b=HRIJfsmCuC1u45sAF2OoY6n7CXASOBTjrmM7Vz+tp/bsSlC3gH319fZE X+MW7XmSfVPz5lLZwVB3ZxOTi/dBWam8pddYPtVYPJu0IQuP05oUtNa2I d/7paK8ljAGVb9qNmZvMbnZdlXr++8dnTaNd/FMhnBHnMeS2aADgxOigS BS+AvQdidqAMChiQW5zrZHNsmuwvsIHFBs6W6dEBIvmHpSRKh4r3Qb5Mj EJ9w90OEx7HMvb/Jr35PEttTqbDX+3/nNmW/o/B8v68Ry4RypNTiI0BbW vBcFBSzobKzXi9s8Y2yBJzSuRpWna9WCsZ7+ArMv6Y1AGuZROwCxuOe7w Q==;
IronPort-SDR: rtIbaH0CMwcQH9uXYXzPIKM4jfRTnPUp/zA6TNR0eX4/QYmlCvG2xCK8RP7RCPA4ifacKQZQ5w utV8mVq06aqA==
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23:xIEyGqjYC5THnvzgLWoT+lVMdXBQXuAji2hC6mlwRA09TyX+rayTdZUguiMc7Qx7ZJhOo7690cW7IE80l6QFgrX5TI3DYOCOggLBRuxfBODZsl/d8kPFh4lg/JYlX69iCMDhSXhW5PyKhjVQyuxQpeVvJprY4dvj8w==
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by mailout41.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 28 Jan 2022 09:51:08 +0100
IronPort-SDR: nZabAc++bYCEXwavKnx5a5KZr2gA5W2GxyerWwbruTdBbcrduQ10cjPf/aeEkA3k0Lb+gcRn2t 8/iedeGCkSvRdackAJlMfRO7w8xgCIO4M=
X-IronPort-AV: E=Sophos;i="5.88,323,1635199200"; d="scan'208,217";a="450710621"
X-MGA-submission: MDE8P4DJ8xJpm6YIqIsHXH0M7NEVsjVQLcMINTADtHBL0y0XlPebX4nvOhMPmfAxiSIeM8gZbplPROsCRvosiY2EsLvIUS3NPdmDax566+FS35G9TPWkB6Cfn0LsvuPaTHrpfVXvWQ6Wxaj4IutNvBYFgQKwOj0yivee9rM0Kh/FDw==
Received: from he199743.emea1.cds.t-internal.com ([10.169.119.51]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-SHA256; 28 Jan 2022 09:51:09 +0100
Received: from HE199743.EMEA1.cds.t-internal.com (10.169.119.51) by HE199743.emea1.cds.t-internal.com (10.169.119.51) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Fri, 28 Jan 2022 09:51:07 +0100
Received: from HE104162.emea1.cds.t-internal.com (10.171.40.37) by HE199743.EMEA1.cds.t-internal.com (10.169.119.51) with Microsoft SMTP Server (TLS) id 15.0.1497.28 via Frontend Transport; Fri, 28 Jan 2022 09:51:07 +0100
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.171) by O365mail04.telekom.de (172.30.0.231) with Microsoft SMTP Server (TLS) id 15.0.1497.28; Fri, 28 Jan 2022 09:51:08 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Kro24U567uAfIeB8dl4xBYaGNpvx4BzZYEV/xZRAsbCCSvOh4EUxzX5Zxq6r8u+BQ/HsmseSptfKpFtQOyJp4sDc8EpK3XbxFoedRbN+ZmsN4P3Jap1S56giRvbzieTSWKMhw3knsMfbLsL5COUkZ3NSgMZqluQUGafkCKJQQqRPnHLsDmqfEcvRrqg3dKfxm+fCTV7tzfwl8e0nSjUgtFOUBBObIl6i29QlGuNPX5pzKukSD6xMHTHJvA7LPMA/UvcfLfvaN49NUuJLq5MeNZhSxhyuQ8PePWUeN3Y27AIV9UDqbz9mXfC/8Aq+dZohFuHZbtzWcXl9tAO6gSwK5Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/VHyMigKX1/63j6BVivfod5ykxmK2qULrcBUAx5ohZs=; b=eZGpye0wmpl6/24y+wEFRFH4ZTv6s239IcGzUPCSOCp4PZwlTsnFHslXSrP0Kv4nqJPWIq/sAITHUuy5SL/PEgSMeq1T88/w6Kojoo2+VEMC5xSsQVmLFU2lxutjPjPc0Y7SZ8xCurB1I616CySmcFW0FehbI/xUnGrky5hdQf2moyRZoD/AISVOyoM9LYtv7sv875iZRbaOYKqcagkLUHHVXQeeXfzYxobO2NcpuKtaIYufH3z8t5HPtfXzN0GjUG8apeJlDGbTUepkas0p16a7yQgiDtrjAqNnJKkesb4IXYeTOPmpslGB8B2SpX/L/53a5NXVNAWeh1C8VvVwOA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
Received: from FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:2c::12) by BE1P281MB1604.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:1b::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.5; Fri, 28 Jan 2022 08:51:05 +0000
Received: from FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM ([fe80::b811:77c:d23c:7437]) by FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM ([fe80::b811:77c:d23c:7437%5]) with mapi id 15.20.4951.006; Fri, 28 Jan 2022 08:51:05 +0000
From: Ruediger.Geib@telekom.de
To: acmorton@att.com
CC: ippm@ietf.org
Thread-Topic: Re: [ippm] draft-morton-ippm-capacity-metric-protocol
Thread-Index: AdgUHhuHrIQIhUOsSdWaY99B1Bg0dw==
Date: Fri, 28 Jan 2022 08:51:05 +0000
Message-ID: <FR2P281MB06118B01D6536BEE41D7A6749C229@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b7d6b2f0-9cde-4521-45ab-08d9e23b5209
x-ms-traffictypediagnostic: BE1P281MB1604:EE_
x-microsoft-antispam-prvs: <BE1P281MB1604781397614AA7F4D88CCC9C229@BE1P281MB1604.DEUP281.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(122000001)(82960400001)(316002)(2906002)(66574015)(83380400001)(38100700002)(5660300002)(30864003)(9326002)(52536014)(64756008)(86362001)(6916009)(166002)(4326008)(966005)(186003)(26005)(76116006)(8676002)(8936002)(508600001)(38070700005)(66446008)(66556008)(9686003)(6506007)(7696005)(66476007)(66946007)(53546011)(55016003)(71200400001)(33656002)(20210929001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_FR2P281MB06118B01D6536BEE41D7A6749C229FR2P281MB0611DEUP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: b7d6b2f0-9cde-4521-45ab-08d9e23b5209
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jan 2022 08:51:05.6298 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 9L/NxRw6D4BYo8h7xrhpPOxFjBiR20+MDt0eVNsrGp0gEsca0tMA4lJJmUgeth+FQ3snIN8fcrBBurthk7eZxtIn//nO6E9GF5z+Tw/PWGs=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BE1P281MB1604
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/1SsN9cla2oKAs5dAqWuIJZiRdes>
Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jan 2022 08:51:20 -0000
Hi Al, Thanks for clarifications, I agree to your proposals. Yes, if a test running for 10 sec at line-speed can reliably only be invoked willingly by the party having to cope with the congested link, then an emergency-stop likely isn't required. Regards, Ruediger ################## Hi Rüdiger, Thanks again for your comments! We discussed some of them at our coding project meeting today. Please see [acm] for replies. All proposals below are implemented in the working text. Al ############ Some comments: Section 3. Protocol Overview The client requires configuration of a test direction parameter (upstream or downstream test) as well as the hostname or IP address of the server in order to begin the setup and configuration exchanges with the server. RG: The draft also mentions a sender and a receiver. Both, client and server may act as sender and receiver. This depends on the test direction, upstream or downstream. Words to that appear in "9. Method of Measurement", at the end of the doc. [acm] OK. Let's try this for the paragraph above: The client requires configuration of a test direction parameter (upstream or downstream test, where the client performs the role of ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ sender or receiver, respectively) as well as the hostname or IP address ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ of the server in order to begin the setup and configuration exchanges with the server. 4. Stopping the Test: The server initiates the phase to stop the test by setting the STOP1 indication in load PDUs or sstatus feedback messages. ( ^^^^) RG: Would it be worth a thought to enable the client to terminate a test? [acm] This sentence in section 3 might benefit from some clarification. I added: 4. Stopping the Test: When the specified test duration has been reached, the server ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ initiates the phase to stop the test by setting the STOP1 indication in load PDUs or status feedback messages. The client acknowledges by setting the STOP2 in load PDUs or status feedback messages. ... IOW, neither the server nor the client can stop a test prematurely in normal operation. Note that the protocol overlays the STOP indication on existing measurement and feedback traffic. It's very simple to implement. Alternatively, a client (or server) can stop sending traffic (load PDUs or status feedback messages, depending on its role). An activity timer will expire at the opposite end, and both client and server will close the connection. The timer value can be set to expire as quickly as needed (some may be sensitive to the amount of load PDUs sent after a test appears to fail). ########## 5. Setup Request and Response Exchange The message format isn't "TLV". Is the protocol extensible (e.g. could security be adapted to future needs)? [acm] All the message formats/PDUs are extensible. A specific set of formats match a protocol version number (currently 8 in the draft you reviewed). Our goal is to make version 9 and higher backward-compatible. We should be able to add fields to the PDUs and leave earlier parts untouched... ########## 6.2. Test Activation Request - server response .....The remaining 28 octets of the Test Activation Request (normally read RG: A bit worrying, seems to be set by the sender in the reply to a request only. See editorials... [acm] Here's the full context: If the client has requested an upstream test, the server SHALL include the transmission parameters from the first row of the sending rate table. The remaining 28 octets of the Test Activation Request (normally read from the first row of the sending rate table) are called the Sending Rate Structure, and SHALL be organized as follows: ... So, the Test Activation Response (the new name for section 6.2) uses the Sending Rate Structure to communicate a starting send rate for the test, IF the client is the sender, as in an upstream test. Perhaps we can clarify: If the client has requested an upstream test, the server SHALL include the transmission parameters from the first row of the sending rate table in the Sending Rate Structure (defined below). ########## 7.1. Test Packet PDU and Roles .... On the other hand, the test configuration MAY use a fixed sending rate requested by the client, RG: contains descriptive text about the method (e.g. decision on the sending rate). The text there certainly is correct. I wonder, whether a reference replacing the text would be sufficient? [acm] Actually, I don't see anything except protocol details near the OTOH sentence above. We can add a second clarifying sentence in the paragraph below: The client MAY communicate the desired fixed rate in its activation request. The reasons to conduct a fixed-rate test include stable measurement at the maximum determined by the load adjustment (search) algorithm, or the desire to test at a known subscribed rate without searching. RG: Does the MAY here introduce a new method? If it does, would that require to update the RFC specifying the method? [acm] I don't think an update is necessary. We mentioned this possibility immediately, in RFC 9097 Section 2: * If a network operator is certain of the IP-Layer Capacity to be validated, then testing MAY start with a fixed-rate test at the IP-Layer Capacity and avoid activating the load adjustment algorithm. ########### 10. Security Considerations RG: would a receiver (client and host) require an "Emergency Stop" message? [acm] When would the client or server send this message? As mentioned above, either end can initiate a premature stop, and timer expiration takes care of the test termination at the opposite end. RG: If yes, should it require authentication in order to avoid an attacker from unwanted test termination? [acm] No "Emergency Stop" message, no attack. ######### RG: Would a three-way-handshake make sense to activate testing? (noting that the sender in that case also must be protected against opening of unbounded numbers of tests). A three way handshake protects against forged test set up messages. [acm] The combination of Test Setup and Test Activation define a 4-way handshake. RG: What else could be forged? [acm] everything in the current version, except the Authentication string. RG: Do these require authentication or at least a discussion? Response message feedback (indicating ramp-up/no drop where there's congestion or the other way around, congestion where there is none). Stop messages (unwanted termination) Could a host or a client be tricked into persistently acting as a sender? [acm] Yes, of course! We want to supply sufficient AUTH and integrity options when needed. That's partly why we petitioned for WG Adoption, to get an early SEC-DIR review or two. However: I have begin to think that we only need 4 security modes of operation: 1. Unauthenticated (in the protocol now) 2. Password-protected test setup (in the protocol now) 3. Encrypted Test Setup exchanges 4. Run the protocol inside an encrypted tunnel #4 will have performance implications for high capacity measurements on small hosts (in residences, GWs, WLAN devices, etc.) FYI - a client cannot be tricked into persistently acting as a sender. The command that starts the client process determines this role. ######## Editorials [acm] Thanks for these! I'll get to them in a second pass... From: ippm <ippm-bounces@ietf.org><mailto:<ippm-bounces@ietf.org>> On Behalf Of Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de> Sent: Tuesday, December 7, 2021 3:01 AM To: marcus.ihlar=40ericsson.com@dmarc.ietf.org<mailto:marcus.ihlar=40ericsson.com@dmarc.ietf.org> Cc: ippm@ietf.org<mailto:ippm@ietf.org> Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol Hi Marcus, I support adoption. Regards, Ruediger Some comments: Section 3. Protocol Overview The client requires configuration of a test direction parameter (upstream or downstream test) as well as the hostname or IP address of the server in order to begin the setup and configuration exchanges with the server. RG: The draft also mentions a sender and a receiver. Both, client and server may act as sender and receiver. This depends on the test direction, upstream or downstream. Words to that appear in "9. Method of Measurement", at the end of the doc. 4. Stopping the Test: The server initiates the phase to stop the test by setting the STOP1 indication in load PDUs or sstatus feedback messages. ( ^^^^) RG: Would it be worth a thought to enable the client to terminate a test? ########## 5. Setup Request and Response Exchange The message format isn't "TLV". Is the protocol extensible (e.g. could security be adapted to future needs)? ########## 6.2. Test Activation Request - server response .....The remaining 28 octets of the Test Activation Request (normally read RG: A bit worrying, seems to be set by the sender in the reply to a request only. See editorials... ########## 7.1. Test Packet PDU and Roles .... On the other hand, the test configuration MAY use a fixed sending rate requested by the client, RG: contains descriptive text about the method (e.g. decision on the sending rate). The text there certainly is correct. I wonder, whether a reference replacing the text would be sufficient? RG: Does the MAY here introduce a new method? If it does, would that require to update the RFC specifying the method? ########### 10. Security Considerations RG: would a receiver (client and host) require an "Emergency Stop" message? If yes, should it require authentication in order to avoid an attacker from unwanted test termination? Would a three-way-handshake make sense to activate testing? (noting that the sender in that case also must be protected against opening of unbounded numbers of tests). A three way handshake protects against forged test set up messages. What else could be forged? Do these require authentication or at least a discussion? * Response message feedback (indicating ramp-up/no drop where there's congestion or the other way around, congestion where there is none). * Stop messages (unwanted termination) * Could a host or a client be tricked into persistently acting as a sender? ######## Editorials 6.2. Test Activation Request - server response ... When the server sends the Test Activation response back, it SHALL set the cmd Response field to: RG: Server Test Activation Reply (or Response - please apply stringently through the text) When the server responds by a Test Activation Reply, it... ---- The server SHALL include all the test parameters again to make the client aware of any changes. RG: The server SHALL repeat all test parameters to indicate changes to the client. ---- 8. Stopping the Test When the test duration timer on the server expires, it SHALL set the connection test action to STOP and also starts marking all outgoing load or status PDUs with a test action of STOP1. RG: ...and mark all outgoing load... ---- 10. Security Considerations A. Unathenticated mode (for all phases) Unauthenticated ^^^^ Von: ippm ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org%3cmailto:ippm-bounces@ietf.org>> Im Auftrag von Marcus Ihlar Gesendet: Montag, 6. Dezember 2021 16:53 An: ippm@ietf.org<mailto:ippm@ietf.org<mailto:ippm@ietf.org%3cmailto:ippm@ietf.org>> Betreff: [ippm] draft-morton-ippm-capacity-metric-protocol Hi IPPM, This email starts an adoption call for draft-morton-ippm-capacity-metric-protocol, " Test Protocol for One-way IP Capacity Measurement". This document is intended for Standards Track and defines a protocol for measuring Network Capacity metrics defined in RFC 9097 (https://datatracker.ietf.org/doc/rfc9097/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc9097/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGox6tI3-r$><https://datatracker.ietf.org/doc/rfc9097/%3Chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc9097/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGox6tI3-r$%3E>)$>) https://datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGoww_Z_IZ$><https://datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/%3Chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGoww_Z_IZ$%3E> https://datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGo-rAHSKU$><https://datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02%3Chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGo-rAHSKU$%3E> This adoption call will last until Monday, December 20. Please review the document, and reply to this email thread to indicate if you think IPPM should adopt this document. BR, Marcus
- [ippm] draft-morton-ippm-capacity-metric-protocol Marcus Ihlar
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… Ruediger.Geib
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… LI, CHEN
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… Lincoln Lavoie
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… Greg Mirsky
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… can desem
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… Marcus Ihlar
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… Ruediger.Geib
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… MORTON JR., AL
- Re: [ippm] draft-morton-ippm-capacity-metric-prot… MORTON JR., AL