Re: [ippm] WGLC for STAMP Extensions

"MORTON, ALFRED C (AL)" <acm@research.att.com> Thu, 11 June 2020 13:46 UTC

Return-Path: <acm@research.att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 463563A0844 for <ippm@ietfa.amsl.com>; Thu, 11 Jun 2020 06:46:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.799
X-Spam-Level:
X-Spam-Status: No, score=-1.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jSsW9iXgEuUi for <ippm@ietfa.amsl.com>; Thu, 11 Jun 2020 06:46:08 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69B903A097D for <ippm@ietf.org>; Thu, 11 Jun 2020 06:45:57 -0700 (PDT)
Received: from pps.filterd (m0049287.ppops.net [127.0.0.1]) by m0049287.ppops.net-00191d01. (8.16.0.42/8.16.0.42) with SMTP id 05BDfUBj012698; Thu, 11 Jun 2020 09:45:55 -0400
Received: from tlpd255.enaf.dadc.sbc.com (sbcsmtp3.sbc.com [144.160.112.28]) by m0049287.ppops.net-00191d01. with ESMTP id 31kdwfwr4h-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 11 Jun 2020 09:45:55 -0400
Received: from enaf.dadc.sbc.com (localhost [127.0.0.1]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id 05BDjsK3055917; Thu, 11 Jun 2020 08:45:54 -0500
Received: from zlp30493.vci.att.com (zlp30493.vci.att.com [135.46.181.176]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id 05BDjq3L055896 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 11 Jun 2020 08:45:52 -0500
Received: from zlp30493.vci.att.com (zlp30493.vci.att.com [127.0.0.1]) by zlp30493.vci.att.com (Service) with ESMTP id B6A06400A0A9; Thu, 11 Jun 2020 13:45:52 +0000 (GMT)
Received: from clph811.sldc.sbc.com (unknown [135.41.107.12]) by zlp30493.vci.att.com (Service) with ESMTP id 86AAC400A0A2; Thu, 11 Jun 2020 13:45:52 +0000 (GMT)
Received: from sldc.sbc.com (localhost [127.0.0.1]) by clph811.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id 05BDjq90015063; Thu, 11 Jun 2020 08:45:52 -0500
Received: from mail-green.research.att.com (mail-green.research.att.com [135.207.255.15]) by clph811.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id 05BDjjHu013845; Thu, 11 Jun 2020 08:45:45 -0500
Received: from exchange.research.att.com (njmtcas1.research.att.com [135.207.255.86]) by mail-green.research.att.com (Postfix) with ESMTPS id 51D5C10A32B8; Thu, 11 Jun 2020 09:45:44 -0400 (EDT)
Received: from njmtexg5.research.att.com ([fe80::b09c:ff13:4487:78b6]) by njmtcas1.research.att.com ([fe80::e881:676b:51b6:905d%12]) with mapi id 14.03.0487.000; Thu, 11 Jun 2020 09:45:44 -0400
From: "MORTON, ALFRED C (AL)" <acm@research.att.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: Ian Swett <ianswett=40google.com@dmarc.ietf.org>, "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>
Thread-Topic: [ippm] WGLC for STAMP Extensions
Thread-Index: AQHWMH+zIm8IFplxiU+BDn5LcTudQKjL9+HQgAVQowCAAL8XMIAA1euAgACuj7A=
Date: Thu, 11 Jun 2020 13:45:43 +0000
Message-ID: <4D7F4AD313D3FC43A053B309F97543CF0108A636B4@njmtexg5.research.att.com>
References: <CAKcm_gMVc88xpkOMmV7L-ybVCBzw+LhNS6Jw3=iB2gutR0ZhxA@mail.gmail.com> <4D7F4AD313D3FC43A053B309F97543CF0108A608DC@njmtexg5.research.att.com> <CA+RyBmW8hHqidEu_Br6zKpsjfQFVcK14ELhebzcCETMO4WQhMA@mail.gmail.com> <4D7F4AD313D3FC43A053B309F97543CF0108A6311B@njmtexg5.research.att.com> <CA+RyBmUsMGTHGyNbDecHjE5M39rfXz5t2VzC8mMjYBM75WQbXw@mail.gmail.com>
In-Reply-To: <CA+RyBmUsMGTHGyNbDecHjE5M39rfXz5t2VzC8mMjYBM75WQbXw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [107.77.194.113]
Content-Type: multipart/alternative; boundary="_000_4D7F4AD313D3FC43A053B309F97543CF0108A636B4njmtexg5resea_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.687 definitions=2020-06-11_14:2020-06-11, 2020-06-11 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 mlxscore=0 spamscore=0 mlxlogscore=999 cotscore=-2147483648 adultscore=0 bulkscore=0 lowpriorityscore=0 phishscore=0 suspectscore=0 priorityscore=1501 malwarescore=0 clxscore=1015 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006110106
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/A-03IWsYi1NeT0-Vc68Mvkt02D8>
Subject: Re: [ippm] WGLC for STAMP Extensions
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jun 2020 13:46:10 -0000

Yes, the new text does it, thanks Greg.
Al

From: Greg Mirsky [mailto:gregimirsky@gmail.com]
Sent: Wednesday, June 10, 2020 7:21 PM
To: MORTON, ALFRED C (AL) <acm@research.att.com>
Cc: Ian Swett <ianswett=40google.com@dmarc.ietf.org>; IETF IPPM WG (ippm@ietf.org) <ippm@ietf.org>
Subject: Re: [ippm] WGLC for STAMP Extensions

Hi Al,
many thanks for your quick response, much appreciated. We'll need some more time to discuss your suggestion related to the Access Report TLV. I've front-copied the other open issue and added my notes under the tag GIM2>> below.

   An implementation of STAMP Session-Reflector that supports this
   specification SHOULD identify a STAMP Session using the SSID in
   combination with elements of the usual 4-tuple
[acm] <insert> for the session. If the Session-Reflector finds that
the SSID and 4-tuple combination changes during a test session, then
the Session-Reflector MUST discard the non-matching packet(s) and take
no further action on them.
   .  A conforming...
GIM>> We've discussed the scenario and couldn't define how a Session-Reflector can distinguish between a new STAMP test session and the event of a change in identifiers, i.e., SSID and 4-tuple of the ongoing test session. Could you kindly help us here?

[acm] Thanks, I’m surprised that a new test session (with new SSID) can begin without any Session-Reflector agreement or communication from the Session-Reflector’s management interface. Since the Sending address and port could be spoofed, Session-Reflectors could receive lots of unexpected traffic, if you know what I mean...
GIM2>> Thank you for the clarification. I was not thinking out of a box. Please review the proposed new text below. I hope it captures the scenario you've pointed out.
OLD TEXT:
   An implementation of STAMP Session-Reflector that supports this
   specification SHOULD identify a STAMP Session using the SSID in
   combination with elements of the usual 4-tuple for the session.  A
   conforming implementation of STAMP Session-Reflector MUST copy the
   SSID value from the received test packet and put it into the
   reflected packet, as displayed in Figure 2.
NEW TEXT:
   An implementation of STAMP Session-Reflector that supports this
   specification SHOULD identify a STAMP Session using the SSID in
   combination with elements of the usual 4-tuple for the session.
   Before a test session commenced, a Session-Reflector MUST be
   provisioned with all the elements that identify the STAMP Session.  A
   STAMP Session-Reflector MUST discard the non-matching STAMP test
   packet(s).  The means of provisioning the STAMP Session
   identification is outside the scope of this specification.  A
   conforming implementation of STAMP Session-Reflector MUST copy the
   SSID value from the received test packet and put it into the
   reflected packet, as displayed in Figure 2.

Would the new text address your concern?

Regards,
Greg


On Wed, Jun 10, 2020 at 8:01 AM MORTON, ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>> wrote:
Hi Greg, Thanks for all replies.
Let’s concentrate on those needing some additional thought...
Al


   An implementation of STAMP Session-Reflector that supports this
   specification SHOULD identify a STAMP Session using the SSID in
   combination with elements of the usual 4-tuple
[acm] <insert> for the session. If the Session-Reflector finds that
the SSID and 4-tuple combination changes during a test session, then
the Session-Reflector MUST discard the non-matching packet(s) and take
no further action on them.
   .  A conforming...
GIM>> We've discussed the scenario and couldn't define how a Session-Reflector can distinguish between a new STAMP test session and the event of a change in identifiers, i.e., SSID and 4-tuple of the ongoing test session. Could you kindly help us here?

[acm] Thanks, I’m surprised that a new test session (with new SSID) can begin without any Session-Reflector agreement or communication from the Session-Reflector’s management interface. Since the Sending address and port could be spoofed, Session-Reflectors could receive lots of unexpected traffic, if you know what I mean...


...
 …                 | 2     |   Non-3GPP  | This document |
                  +-------+-------------+---------------+
[acm] these seem overly broad, and unlikely to be extended because they *cover everything*!!
GIM>> Here we've turned to our 3GPP expert. The current (Rel-16) specification of ATSSS defines only two access types - 3GPP and Non-3GPP. Creating a sub-registry and leaving a space for new types might help to accommodate potential changes in 5G specification and the development of new specifications, e.g., 6G, in the future.
[acm]
Yes, but your examples of 5G and 6G would fall under the general category of “3GPP” (which I accidentally delated above).
Maybe some additional detail would help, like “3GPP-LTE”, “3GPP-5G”, and make “Non-3GPP” the first entry so that expansion with new technologies starts at 2, 3, …
                            Table 8: Access IDs

...

              +-------+---------------------+---------------+
              | Value |     Description     | Reference     |
              +-------+---------------------+---------------+
              | 1     |  Network available  | This document |
              | 2     | Network unavailable | This document |
              +-------+---------------------+---------------+
[acm] these seem overly broad, and imply knowledge where the STAMP end-point has limited insights!!
GIM>>  These are defined in ATSSS specification of Performance Measurement Function. The value for the Return Code field is passed to STAMP system and it only transports it. Would a new text clarify the role of a STAMP system:
OLD TEXT:
   o  Return Code - one octet long field that identifies the report
      signal, e.g., available, unavailable.  The value is one of those
      listed in Section 5.5.
NEW TEXT:
   o  Return Code - one octet long field that identifies the report
      signal, e.g., available, unavailable.  The value is passed,
      supplied to the STAMP end-point through some mechanism that is
      outside the scope of this document.  The value is one of those
      listed in Section 5.5.
[acm]
OK
                          Table 10: Return Codes

...

6.  Security Considerations

   Use of HMAC in authenticated mode may be used to simultaneously
   verify both the data integrity and the authentication of the STAMP
   test packets.
[acm] That's it? At least add reference to STAMP 8762 Security Section?
GIM>> Thank you for your suggestion. The new text is below:
NEW TEXT:
   This document defines extensions to STAMP [RFC8762] and inherits all
   the security considerations applicable to the base protocol.
   Additionally, the HMAC TLV is defined in this document to protect the
   integrity of optional STAMP extensions.  The use of HMAC TLV is
   discussed in detail in Section 4.8.

[acm] OK
[acm] I suspect there will be some challenges for "Location" in future


From: ippm [mailto:ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org>] On Behalf Of Ian Swett
Sent: Friday, May 22, 2020 5:26 PM
To: IETF IPPM WG (ippm@ietf.org<mailto:ippm@ietf.org>) <ippm@ietf.org<mailto:ippm@ietf.org>>
Subject: [ippm] WGLC for STAMP Extensions

Hi IPPM,

At our virtual interim meeting, we decided draft-ietf-ippm-stamp-option-tlv was ready for last call. This email starts a two-week WGLC for this draft.

The latest version can be found here: https://tools.ietf.org/html/draft-ietf-ippm-stamp-option-tlv-04<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dippm-2Dstamp-2Doption-2Dtlv-2D04&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=-FQ_7VkardtUOemNdXjWGCdxDzw_8jcaV16Ots-GfRo&s=zadhVvE6IwVbJd0BcDUJdpX4xXqA4i60susVdbT5Pvg&e=>

This last call will end on Monday, June 8th. Please reply to ippm@ietf.org<mailto:ippm@ietf.org> with your reviews and comments.

Thanks,
Ian & Tommy
_______________________________________________
ippm mailing list
ippm@ietf.org<mailto:ippm@ietf.org>
https://www.ietf.org/mailman/listinfo/ippm<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_ippm&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=AJPt25JReJLCcKTac6bW207kN8j0F2v7N7paNXkrS0Y&s=9RnqOZ8tzteJbGK2PJMpE2Y8RqKl-bvq-QfiStX4ywc&e=>