Re: [ippm] draft-morton-ippm-capacity-metric-protocol

"MORTON JR., AL" <acmorton@att.com> Fri, 28 January 2022 01:14 UTC

Return-Path: <acmorton@att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFD143A121F; Thu, 27 Jan 2022 17:14:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.798
X-Spam-Level:
X-Spam-Status: No, score=-1.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=att.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id flRe-IE0ukLZ; Thu, 27 Jan 2022 17:14:21 -0800 (PST)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC10B3A1216; Thu, 27 Jan 2022 17:14:21 -0800 (PST)
Received: from pps.filterd (m0288873.ppops.net [127.0.0.1]) by m0288873.ppops.net-00191d01. (8.16.1.2/8.16.1.2) with SMTP id 20RMpE6Q002776; Thu, 27 Jan 2022 20:14:21 -0500
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0288873.ppops.net-00191d01. with ESMTP id 3duwy50umq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 27 Jan 2022 20:14:20 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 20S1EJlk032337; Thu, 27 Jan 2022 20:14:19 -0500
Received: from zlp27127.vci.att.com (zlp27127.vci.att.com [135.66.87.31]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 20S1EEo5032262 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 27 Jan 2022 20:14:14 -0500
Received: from zlp27127.vci.att.com (zlp27127.vci.att.com [127.0.0.1]) by zlp27127.vci.att.com (Service) with ESMTP id F037B4009E86; Fri, 28 Jan 2022 01:14:13 +0000 (GMT)
Received: from MISOUT7MSGEX2AA.ITServices.sbc.com (unknown [135.66.184.199]) by zlp27127.vci.att.com (Service) with ESMTP id C87BC4009E7D; Fri, 28 Jan 2022 01:14:13 +0000 (GMT)
Received: from MISOUT7MSGEX2CD.ITServices.sbc.com (135.66.184.224) by MISOUT7MSGEX2AA.ITServices.sbc.com (135.66.184.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.17; Thu, 27 Jan 2022 20:14:13 -0500
Received: from MISOUT7MSGETA02.tmg.ad.att.com (144.160.12.220) by MISOUT7MSGEX2CD.ITServices.sbc.com (135.66.184.224) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.17 via Frontend Transport; Thu, 27 Jan 2022 20:14:13 -0500
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (104.47.55.168) by edgeso2.exch.att.com (144.160.12.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.17; Thu, 27 Jan 2022 20:14:12 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RLV35gzTPatMbq6CEV1ifThDZ5V0to7Jtm++bfKJTal7S8xc5vAQxDFQ3wLWqXaiMGad8cuTKsWHrJcay9jnphHK7p3RJK2dTTIYQJonorybck1OemLKvx865jH1AfEWVmXFYqsQvyqHuy3R+KsKnsEVvy+II4JaxRDm8TopMePa++EfL9u9fYF1FHZQIZewi0rNyBjgBLTETLd2rT3EwZzUIi2TblhDWP29V152DY5aIQY7PnMTScSRJ+fiJ01WPE4Jy75AsWgK7Jp1jpOKg2cc56ABg8nzRv1Eab4Y18vH45LwYvycj6Ua3+5Wfqs+8fATAR03jJDsi3lr/zuP9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fToltLd9jwNAjKXS9vMoDous1KzBVfD5O9l3YX3XXuU=; b=FFRl+oFsd00Fq/lIMEGG8WK4xDvPFDo0I4c/fnGmZkG+UPfQFW/8nqWCox68YaStbABosrObvBLYfJZyoIyfOMSocCZbMbiawjOu7QqiN9p52FXHlCNOAr8ZB+9Hb3ggO9+ms2q0xzKcLrjRTR6Mrhr1Am5WF4mtPYa6llbtTQeEBc8cU1c9JTS9Dv0ur8zBojX1KP/JwlZCclVuByOnQqVgoY0t7qEvRfY5jPEYDvWL5wtIJ5a3Cmm5Vr1Pb/5KFd8IURpN96nHxEhCXeKH6+NSmjLgxVCo4VW+YXKJ/PGuHHKZ0b5+PXC4frosi3MiDZxaR01c1SwfqVJHx4SUjQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=att.onmicrosoft.com; s=selector2-att-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fToltLd9jwNAjKXS9vMoDous1KzBVfD5O9l3YX3XXuU=; b=z+EpMK6QZjffHit9oyaZw9+uMnA1A5zKrtKCIKTQ02v+cj8JYbxrwFHZb+FJHSVJ727ubZSnSXDHwX+LhCVnL3Qj5JO9arW8YC54vKrf6U04QerI7PUlOcByNIlTwSj1khOiwa6Yh8PSrGYHmZGy/zoerY8p45AyUkI4u/NXoLY=
Received: from CH0PR02MB7980.namprd02.prod.outlook.com (2603:10b6:610:105::17) by SA1PR02MB8400.namprd02.prod.outlook.com (2603:10b6:806:1f4::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.15; Fri, 28 Jan 2022 01:14:11 +0000
Received: from CH0PR02MB7980.namprd02.prod.outlook.com ([fe80::cd34:2582:613:215b]) by CH0PR02MB7980.namprd02.prod.outlook.com ([fe80::cd34:2582:613:215b%4]) with mapi id 15.20.4930.018; Fri, 28 Jan 2022 01:14:10 +0000
From: "MORTON JR., AL" <acmorton@att.com>
To: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>, "marcus.ihlar=40ericsson.com@dmarc.ietf.org" <marcus.ihlar=40ericsson.com@dmarc.ietf.org>
CC: "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: draft-morton-ippm-capacity-metric-protocol
Thread-Index: AdfquL0WtV/2rjPHSECEUqMgTJWSZwAewXAACivjRQA=
Date: Fri, 28 Jan 2022 01:14:10 +0000
Message-ID: <CH0PR02MB7980214B8DCD7DAB8762D6E4D3229@CH0PR02MB7980.namprd02.prod.outlook.com>
References: <AM0PR07MB41318B1FCDCF77FBF8E220EDE26D9@AM0PR07MB4131.eurprd07.prod.outlook.com> <FR2P281MB0611DCCDFF10C22558470EC09C6E9@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
In-Reply-To: <FR2P281MB0611DCCDFF10C22558470EC09C6E9@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ef15221f-3c69-4d95-bc5d-08d9e1fb7d92
x-ms-traffictypediagnostic: SA1PR02MB8400:EE_
x-microsoft-antispam-prvs: <SA1PR02MB8400BC7BEF919E866059780FD3229@SA1PR02MB8400.namprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR02MB7980.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(316002)(110136005)(71200400001)(186003)(9686003)(76116006)(66946007)(7696005)(53546011)(6506007)(82202003)(26005)(4326008)(166002)(83380400001)(82960400001)(5660300002)(33656002)(52536014)(38070700005)(30864003)(8936002)(2906002)(966005)(66574015)(508600001)(38100700002)(8676002)(55016003)(66476007)(64756008)(122000001)(66446008)(66556008)(86362001)(579004)(559001)(20210929001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH0PR02MB7980214B8DCD7DAB8762D6E4D3229CH0PR02MB7980namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR02MB7980.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ef15221f-3c69-4d95-bc5d-08d9e1fb7d92
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Jan 2022 01:14:10.8507 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e741d71c-c6b6-47b0-803c-0f3b32b07556
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: l9EcT+raAHRnxM7tW3rn3lGfaKsxsidM3FWLiuH0goKpBwfAHglhSFa7JXUYor8R
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR02MB8400
X-OriginatorOrg: att.com
X-TM-SNTS-SMTP: BF9E4E144025A2040211D713664BEA5B613092F6D9136B7BC5FF1A42CBD434E02
X-Proofpoint-GUID: WVdzon2zO6k65nVWraOFkJ04o7RAX0-n
X-Proofpoint-ORIG-GUID: WVdzon2zO6k65nVWraOFkJ04o7RAX0-n
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-01-27_06,2022-01-27_01,2021-12-02_01
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 malwarescore=0 adultscore=0 lowpriorityscore=0 priorityscore=1501 mlxlogscore=999 bulkscore=0 impostorscore=0 mlxscore=0 suspectscore=0 clxscore=1011 spamscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2201280003
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/G9_nl5i3v55uPwZfnrKaHlIr2h8>
Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jan 2022 01:14:26 -0000

Hi Rüdiger, Thanks again for your comments!

We discussed some of them at our coding project meeting today.
Please see [acm] for replies.

All proposals below are implemented in the working text.

Al

############

Some comments:

Section  3.  Protocol Overview

   The client requires configuration of a test direction parameter
   (upstream or downstream test) as well as the hostname or IP address
   of the server in order to begin the setup and configuration exchanges
   with the server.

RG: The draft also mentions a sender and a receiver. Both, client and server
may act as sender and receiver. This depends on the test direction,
upstream or downstream.

Words to that appear in "9.  Method of Measurement", at the end of the doc.

[acm]
OK. Let's try this for the paragraph above:

The client requires configuration of a test direction parameter
(upstream or downstream test, where the client performs the role of
                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
sender or receiver, respectively) as well as the hostname or IP address
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
of the server in order to begin the setup and configuration exchanges
with the server.


4.  Stopping the Test: The server initiates the phase to stop the
       test by setting the STOP1 indication in load PDUs or sstatus
       feedback messages.                                  ( ^^^^)

RG: Would it be worth a thought to enable the client to terminate a test?

[acm]
This sentence in section 3 might benefit from some clarification. I added:

4. Stopping the Test: When the specified test duration has been reached, the server
                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
   initiates the phase to stop the test by setting the STOP1 indication in load
   PDUs or status feedback messages. The client acknowledges by setting the STOP2
   in load PDUs or status feedback messages. ...

IOW, neither the server nor the client can stop a test prematurely in normal
operation. Note that the protocol overlays the STOP indication on existing
measurement and feedback traffic. It's very simple to implement.

Alternatively, a client (or server) can stop sending traffic
(load PDUs or status feedback messages, depending on its role).
An activity timer will expire at the opposite end, and both
client and server will close the connection. The timer value
can be set to expire as quickly as needed (some may be sensitive
to the amount of load PDUs sent after a test appears to fail).


##########


5.  Setup Request and Response Exchange


The message format isn't "TLV". Is the protocol extensible (e.g. could security be adapted to future needs)?

[acm]
All the message formats/PDUs are extensible. A specific set of formats match a
protocol version number (currently 8 in the draft you reviewed).
Our goal is to make version 9 and higher backward-compatible.
We should be able to add fields to the PDUs and leave earlier parts
untouched...


##########

6.2.  Test Activation Request - server response

.....The remaining 28 octets of the Test Activation Request (normally read

RG: A bit worrying, seems to be set by the sender in the reply to a request only. See editorials...

[acm]
Here's the full context:
   If the client has requested an upstream test, the server SHALL include
   the transmission parameters from the first row of the sending rate table.

   The remaining 28 octets of the Test Activation Request (normally read
   from the first row of the sending rate table) are called the
   Sending Rate Structure, and SHALL be organized as follows:
...

So, the Test Activation Response (the new name for section 6.2)
uses the Sending Rate Structure to communicate a starting send rate
for the test, IF the client is the sender, as in an upstream test.

Perhaps we can clarify:
   If the client has requested an upstream test, the server SHALL include
   the transmission parameters from the first row of the sending rate table
   in the Sending Rate Structure (defined below).


##########


7.1.  Test Packet PDU and Roles

.... On the other hand, the test configuration MAY use a fixed sending
   rate requested by the client,

RG: contains descriptive text about the method (e.g. decision on the
sending rate). The text there certainly is correct. I wonder, whether
a reference replacing the text would be sufficient?

[acm]
Actually, I don't see anything except protocol details near the OTOH
sentence above.

We can add a second clarifying sentence in the paragraph below:
   The client MAY communicate the desired fixed rate in its activation
   request. The reasons to conduct a fixed-rate test include stable measurement
   at the maximum determined by the load adjustment (search) algorithm,
   or the desire to test at a known subscribed rate without searching.


RG:  Does the MAY here introduce a new method? If it does, would that require
to update the RFC specifying the method?

[acm]
I don't think an update is necessary. We mentioned this possibility
immediately, in RFC 9097 Section 2:

   *  If a network operator is certain of the IP-Layer Capacity to be
      validated, then testing MAY start with a fixed-rate test at the
      IP-Layer Capacity and avoid activating the load adjustment
      algorithm.

###########

10.  Security Considerations


RG: would a receiver (client and host) require an "Emergency Stop" message?

[acm]
When would the client or server send this message?

As mentioned above, either end can initiate a premature stop, and timer
expiration takes care of the test termination at the opposite end.

RG: If yes, should it require authentication in order to avoid an attacker
from unwanted test termination?

[acm]
No "Emergency Stop" message, no attack.

#########


RG: Would a three-way-handshake make sense to activate testing?
(noting that the sender in that case also must be protected against
opening of unbounded numbers of tests). A three way handshake protects
against forged test set up messages.

[acm]
The combination of Test Setup and Test Activation define a 4-way handshake.


RG: What else could be forged?
[acm] everything in the current version, except the Authentication string.


RG: Do these require authentication or at least a discussion?

    Response message feedback (indicating ramp-up/no drop where there's congestion or the other way around, congestion where there is none).
    Stop messages (unwanted termination)
    Could a host or a client be tricked into persistently acting as a sender?

[acm]
Yes, of course! We want to supply sufficient AUTH and integrity options when
needed.  That's partly why we petitioned for WG Adoption, to get an early SEC-DIR
review or two.

However:

I have begin to think that we only need 4 security modes of operation:
1. Unauthenticated (in the protocol now)
2. Password-protected test setup (in the protocol now)
3. Encrypted Test Setup exchanges
4. Run the protocol inside an encrypted tunnel

#4 will have performance implications for high capacity measurements
on small hosts (in residences, GWs, WLAN devices, etc.)

FYI -  a client cannot be tricked into persistently acting as a sender.
The command that starts the client process determines this role.


########


Editorials

[acm]
Thanks for these!  I'll get to them in a second pass...

From: ippm <ippm-bounces@ietf.org> On Behalf Of Ruediger.Geib@telekom.de
Sent: Tuesday, December 7, 2021 3:01 AM
To: marcus.ihlar=40ericsson.com@dmarc.ietf.org
Cc: ippm@ietf.org
Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol

Hi Marcus,

I support adoption.

Regards, Ruediger


Some comments:

Section  3.  Protocol Overview

   The client requires configuration of a test direction parameter
   (upstream or downstream test) as well as the hostname or IP address
   of the server in order to begin the setup and configuration exchanges
   with the server.

RG: The draft also mentions a sender and a receiver. Both, client and server
may act as sender and receiver. This depends on the test direction,
upstream or downstream.
Words to that appear in "9.  Method of Measurement", at the end of the doc.


4.  Stopping the Test: The server initiates the phase to stop the
       test by setting the STOP1 indication in load PDUs or sstatus
       feedback messages.                                                      ( ^^^^)

RG: Would it be worth a thought to enable the client to terminate a test?

##########

5.  Setup Request and Response Exchange

The message format isn't "TLV". Is the protocol extensible (e.g. could security be adapted to future needs)?

##########

6.2.  Test Activation Request - server response

.....The remaining 28 octets of the Test Activation Request (normally read

RG: A bit worrying, seems to be set by the sender in the reply to a request only. See editorials...

##########

7.1.  Test Packet PDU and Roles

.... On the other hand, the test configuration MAY use a fixed sending
   rate requested by the client,

RG: contains descriptive text about the method (e.g. decision on the sending rate). The text
there certainly is correct. I wonder, whether a reference replacing the text would be sufficient?

RG:  Does the MAY here introduce a new method? If it does, would that require to update the
RFC specifying the method?

###########

10.  Security Considerations

RG: would a receiver (client and host) require an "Emergency Stop" message? If yes, should it require authentication in order to avoid an attacker from unwanted test termination?

Would a three-way-handshake make sense to activate testing? (noting that the sender in that case also must be protected against opening of unbounded numbers of tests). A three way handshake protects against forged test set up messages.

What else could be forged? Do these require authentication or at least a discussion?

  *   Response message feedback (indicating ramp-up/no drop where there's congestion or the other way around, congestion where there is none).
  *   Stop messages (unwanted termination)
  *   Could a host or a client be tricked into persistently acting as a sender?
########


Editorials

6.2.  Test Activation Request - server response

...   When the server sends the Test Activation response back, it SHALL set
   the cmd Response field to:

RG: Server Test Activation Reply (or Response - please apply stringently through the text)
When the server responds by a Test Activation Reply, it...

----

   The server SHALL include all the test parameters again to make the
   client aware of any changes.

RG: The server SHALL repeat all test parameters to indicate changes to the client.

----

8.  Stopping the Test

   When the test duration timer on the server expires, it SHALL set the
   connection test action to STOP and also starts marking all outgoing
   load or status PDUs with a test action of STOP1.

RG: ...and mark all outgoing load...

----

10.  Security Considerations

A. Unathenticated mode (for all phases)

Unauthenticated
    ^^^^

Von: ippm <ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org>> Im Auftrag von Marcus Ihlar
Gesendet: Montag, 6. Dezember 2021 16:53
An: ippm@ietf.org<mailto:ippm@ietf.org>
Betreff: [ippm] draft-morton-ippm-capacity-metric-protocol

Hi IPPM,

This email starts an adoption call for draft-morton-ippm-capacity-metric-protocol, " Test Protocol for One-way IP Capacity Measurement".  This document is intended for Standards Track and defines a protocol for measuring Network Capacity metrics defined in RFC 9097 (https://datatracker.ietf.org/doc/rfc9097/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc9097/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGox6tI3-r$>)

https://datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGoww_Z_IZ$>
https://datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGo-rAHSKU$>

This adoption call will last until Monday, December 20. Please review the document, and reply to this email thread to indicate if you think IPPM should adopt this document.

BR,
Marcus