Re: [ippm] Last Call: draft-ietf-ippm-more-twamp (More Features for the Two-Way Active Measurement Protocol - TWAMP) to Proposed Standard

Joel Jaeggli <joelja@bogus.com> Sun, 17 May 2009 17:31 UTC

Return-Path: <joelja@bogus.com>
X-Original-To: ippm@core3.amsl.com
Delivered-To: ippm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 128963A68F4 for <ippm@core3.amsl.com>; Sun, 17 May 2009 10:31:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vSlcxWlpcFl8 for <ippm@core3.amsl.com>; Sun, 17 May 2009 10:31:40 -0700 (PDT)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) by core3.amsl.com (Postfix) with ESMTP id 9420A3A68C1 for <ippm@ietf.org>; Sun, 17 May 2009 10:31:39 -0700 (PDT)
Received: from [192.168.1.233] ([84.205.97.124]) (authenticated bits=0) by nagasaki.bogus.com (8.14.3/8.14.3) with ESMTP id n4HHV9bp088015 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sun, 17 May 2009 17:31:15 GMT (envelope-from joelja@bogus.com)
Message-ID: <4A1049DC.3070002@bogus.com>
Date: Sun, 17 May 2009 10:31:08 -0700
From: Joel Jaeggli <joelja@bogus.com>
User-Agent: Thunderbird 2.0.0.21 (X11/20090409)
MIME-Version: 1.0
To: Al Morton <acmorton@att.com>
References: <EDC652A26FB23C4EB6384A4584434A04016D4D2F@307622ANEX5.global.avaya.com> <200905171705.n4HH5t4G016149@klph001.kcdc.att.com>
In-Reply-To: <200905171705.n4HH5t4G016149@klph001.kcdc.att.com>
X-Enigmail-Version: 0.95.7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: ClamAV 0.94.2/9365/Sat May 16 12:41:29 2009 on nagasaki.bogus.com
X-Virus-Status: Clean
X-Mailman-Approved-At: Sun, 17 May 2009 11:17:01 -0700
Cc: amanda.baber@icann.org, "Romascanu, Dan (Dan)" <dromasca@avaya.com>, khedayat@exfo.com, ippm@ietf.org
Subject: Re: [ippm] Last Call: draft-ietf-ippm-more-twamp (More Features for the Two-Way Active Measurement Protocol - TWAMP) to Proposed Standard
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ippm>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 May 2009 17:31:41 -0000

Your proposed changes capture my observations.

joel

Al Morton wrote:
> Joel,
> thanks for your Sunday-morning comments,
> please see proposed resolutions in-line.
> Al
> 
> At 05:24 AM 5/17/2009, Romascanu, Dan (Dan) wrote:
>> Please find below the OPS-DIR review for draft-ietf-ippm-more-twamp
>> performed by Joel Jaeggli.
>>
>> Please consider these comments together with the other IETF LC comments.
>> ...
>> From: ops-dir-bounces@ietf.org [mailto:ops-dir-bounces@ietf.org] On
>> Behalf Of Joel Jaeggli
>> Sent: Sunday, May 17, 2009 11:37 AM
>>
>> review for opsdir of:
>>
>> http://tools.ietf.org/html/draft-ietf-ippm-more-twamp-01
>>
>> section 4 -
>>
>>    "This section describes OPTIONAL extensions.  When the Server has
>>    identified the ability to support the mixed security mode, the
>>    Control-Client has selected the mixed security mode in its Set-Up-
>>    Response, and the Server responds with a zero Accept field in the
>>    Server-Start message, then these extensions are conditionally
>>    REQUIRED."
>>
>> When I read the introduction to section 4 the following statement, it
>> sent me scrambling for the other conditions that would make the above
>> statement required.
>>
>> It should be sufficient to say:
>>
>>    When the Server has identified the ability to support the mixed
>>    security mode, the Control-Client has selected the mixed security
>>    mode in its Set-Up-Response, and the Server responds with a zero
>>    Accept field in the Server-Start message, these extensions are
>>    REQUIRED.
> 
>     When the Server has identified the ability to support the mixed
>     security mode, the Control-Client has selected the mixed security
>     mode in its Set-Up-Response, and the Server responds with a zero
>     Accept field in the Server-Start message, then these extensions are
>     conditionally REQUIRED.                   ^^^^
>     ^^^^^^^^^^^^^
> So, we would delete the first sentence and the words marked in the
> paragraph above.
> 
> This tightens-up some text that we recently added to the draft.
> We would be depending on the OPTIONAL designation of this
> feature in section 2 (Scope) to cover the entire memo.
> 
> Your revisions work for me, does anyone else see a problem
> with Joel's paragraph above?
> 
> --------------------------------------------------------------------
> 
>> regarding 6.1 and 6.2 registry specification and management, 6.1 states:
>>         "Thus, this registry can contain a total of 32 possible bit
>>         positions and corresponding values."
>>
>> Certainly while there are 32 bits in the field, each has two states
>> (e.g. 64) and the sum of the possible positions is significantly greater
>> than 32 e.g. 2^32
> 
> TWAMP has inherited a partial set of bit position assignments,
> and this memo assigns what is likely to be that "last" mutually
> exclusive Mode/bit position (as a command from the Control-Client).
> 
> But Future Modes/bit positions will designate features that
> WILL be used in combination with one of the four Security Modes.
> And, if we start to run out of bit positions, the likely strategy
> would be to use an octet or more in combinations.
> 
> 
>> 6.2 states:
>>
>>    For the TWAMP-Modes registry, we expect that new features will be
>>    assigned using monotonically increasing bit positions and in the
>>    range [0-31] and the corresponding values, unless there is a good
>>    reason to do otherwise.
>>
>> at some future date values in the registry for some bit positions might
>> be encoded in some more complex fashion.
> 
> Right. So let's allow that from the start.
> 
> 6.1  OLD
>    ... Modes are indicated by setting bits in the 32-bit Modes Field.
>        Thus, this registry can contain a total of 32 possible bit
>        positions and corresponding values.
> 
> 6.1  NEW
>    ... Modes are currently indicated by setting single bits in the
> 32-bit Modes Field. However, more complex encoding may be used in the
> future. Thus, this registry can contain a total of 2^32 possible
> assignments.
> 
> ---------------------------------
> (the revision below also addresses Amanda Barber's LC-comment,
> representing IANA)
> 
> 6.2  OLD
> 
> Because the TWAMP-Modes registry can contain only thirty-two values, and
> because TWAMP is an IETF protocol, this registry must be updated only by
> "IETF Consensus" as specified in RFC5226 (an RFC documenting registry
> use that is approved by the IESG). For the TWAMP-Modes registry, we
> expect that new features will be assigned using monotonically increasing
> bit positions and in the range [0-31] and the corresponding values,
> unless there is a good reason to do otherwise.
> 
> 6.2  NEW
> 
> Because the TWAMP-Modes registry can contain a maximum of 2^32 values,
> and because TWAMP is an IETF protocol, this registry must be updated
> only by "IETF Review" as specified in RFC5226 (an RFC documenting
> registry use that is approved by the IESG). For the TWAMP-Modes
> registry, we expect that new features will be assigned using
> monotonically increasing single bit positions and in the range [0-31],
> unless there is a good reason to do otherwise
> (more complex encoding than single bit positions may be used in the
> future, to access the 2^32 value space).
>