Re: [ippm] Fw: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt

"Ackermann, Michael" <MAckermann@bcbsm.com> Sat, 03 July 2021 01:50 UTC

Return-Path: <mackermann@bcbsm.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59FF63A13DE for <ippm@ietfa.amsl.com>; Fri, 2 Jul 2021 18:50:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); domainkeys=pass (1024-bit key) header.from=MAckermann@bcbsm.com header.d=bcbsm.com; dkim=pass (1024-bit key) header.d=bcbsm.com header.b=ZfaSNzOG; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=bcbsm.onmicrosoft.com header.b=kyNyUwIK
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MWx2drqt0h4h for <ippm@ietfa.amsl.com>; Fri, 2 Jul 2021 18:50:04 -0700 (PDT)
Received: from mx.z120.zixworks.com (bcbsm.zixworks.com [199.30.235.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 05A843A13DF for <ippm@ietf.org>; Fri, 2 Jul 2021 18:50:03 -0700 (PDT)
Received: from 127.0.0.1 (ZixVPM [127.0.0.1]) by Outbound.z120.zixworks.com (Proprietary) with SMTP id 73617C0EDF for <ippm@ietf.org>; Fri, 2 Jul 2021 20:50:02 -0500 (CDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ZIXVPM1670e2ded26; d=bcbsm.com; h=From:To:Subject:Date; b=a/+RJijsZoF8w4RdfcOkpPP4zu9CruCmmIr3tCp6G8urJnnqJgpfVatNaGK6/j98 H0UConesGZK0Lc9iB7wH5yGRXAIsGYTPio+ZM6cph3OeML4DPLmrLlMafrMsq0 kgWLMHb7HvrDib6PVB+RatzweT59OyIt4h6eOe53OFcFI=;
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bcbsm.com; s=ZIXVPM1670e2ded26; t=1625277002; bh=4BoAkrm/5GZqwJM+Pu5EiuEf7TRahGoEvQFaLltMn0w=; h=From:To:Subject:Date; b=ZfaSNzOGgZey5f2s5qawIQJMAkXEYF5gcJ+LGR/QIkDs9Mpw9UwykcATnNXe8KyY5 tYAzcm1H7oO5pc+TpmocsAJD+5M6f+/nfK0Z5PS91PKhtsxRBWjJLlRT8Exn045dC3 CPpUzLPQZaPu3LzP/LIPz0Run5s6G4DLm7ASoZ68=
Received: from imsva1.bcbsm.com (inetmta03.bcbsm.com [12.107.172.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.z120.zixworks.com (Proprietary) with ESMTPS id 68B84C0EDB; Fri, 2 Jul 2021 20:50:00 -0500 (CDT)
Received: from imsva1.bcbsm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1AB9892065; Fri, 2 Jul 2021 21:50:00 -0400 (EDT)
X-IMSS-DKIM-Authentication-Result: imsva1.bcbsm.com; sigcount=1; dkim=pass(1024-bit key) header.i=@bcbsm.onmicrosoft.com state=0
Received: from imsva1.bcbsm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D53DA92053; Fri, 2 Jul 2021 21:49:59 -0400 (EDT)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (unknown [104.47.55.172]) by imsva1.bcbsm.com (Postfix) with ESMTPS; Fri, 2 Jul 2021 21:49:59 -0400 (EDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=a/aev7a2TZNrMoDBrVYQCV2GRc+csDXTPz5wnBN8ux22sPolPx7VEevleNfP/rXkxfgjHlMMhhjRvwc/0D2WRhQG9rQe7xlDhQy4rLdbRIK6C/cQOiPpzl1hp0yYC5XQ+MdipLpLlPYE3B3699XEsrgRQfLYioucbtJlkrYSsPh98WZ/mcSB+Bdcvxo2bQrEP2HdM59//1bxKZSLh0CdotliIOZAS5j+MGpBYZKvg7RQVBWxkKfdpFgYCIuujfp8NS4mm0OQ3J0DkoEMymHHo0JfcJ/B4vcspghpC4WRjq3/ACF8mZGMQLUNibgNV4eu4vht24nRj/9ZIUGgpQZryg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0Y8wYojmJr1NY3Ng7BcQF+U13RViZZRTcHlPRamvtTo=; b=L4ZHVWH4N3B6FgTDOAGuWzZvBAiLWe9eWvQ3NC1c1qbo7o+5+woWH/3Y6bp7+oTQ2M9F+gh2ZezG86jS4bHc33vNDFcbJIeIQc2Ad5Sl01E9gStO2CzJDiHRnygHzkwA+xT4bAngqfasUlM1DxNtWV+DvwvvACtoJrImVfQHIh5ut15Vzqz0PFo41RSScu/xHHz9RLgo+d+Edt/5sMkYzGkt9in/Dh0WBAWKwSkPW1tOM3k+4xtHvk8EsiWndf+LI6R2T3ODLHsCVWqJzG11USE+84xB1I2dij7aXMFy2VGf3wONKdYCLcKyGLZw7Bf1cIakxgN8fFPNReotFmy8Iw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=bcbsm.com; dmarc=pass action=none header.from=bcbsm.com; dkim=pass header.d=bcbsm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bcbsm.onmicrosoft.com; s=selector2-bcbsm-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0Y8wYojmJr1NY3Ng7BcQF+U13RViZZRTcHlPRamvtTo=; b=kyNyUwIKQJ6sKOei5lrNItEcQhSlsomHj0E2wRC0fL1mdASQa4D3h37iw4dh4B5jGbguqTSHm1CheI+X2rBaqc2dJhNKDUGDNzWobWX5onqclCOQKr4iXaOp6f5/kWQYQwOBpcp/wcEMbQtHwIRWCoqLAbTPA14+1fhCkn3OZUY=
Received: from DM6PR14MB3178.namprd14.prod.outlook.com (2603:10b6:5:118::30) by DM6PR14MB2315.namprd14.prod.outlook.com (2603:10b6:5:ad::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4287.22; Sat, 3 Jul 2021 01:49:58 +0000
Received: from DM6PR14MB3178.namprd14.prod.outlook.com ([fe80::d062:b51f:b11d:879f]) by DM6PR14MB3178.namprd14.prod.outlook.com ([fe80::d062:b51f:b11d:879f%3]) with mapi id 15.20.4264.026; Sat, 3 Jul 2021 01:49:58 +0000
From: "Ackermann, Michael" <MAckermann@bcbsm.com>
To: "Hamilton, Robert" <RHamilton@cas.org>, IETF IPPM WG <ippm@ietf.org>
CC: "draft-elkins-ippm-encrypted-pdmv2@ietf.org" <draft-elkins-ippm-encrypted-pdmv2@ietf.org>, "nalini.elkins@insidethestack.com" <nalini.elkins@insidethestack.com>
Thread-Topic: [ippm] Fw: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt
Thread-Index: AQHXVv9u2emgWGRbJEaxGlicZsG4X6r/Uh6AgC9BaoCAAVrEAIAAUCkAgABs4oA=
Date: Sat, 3 Jul 2021 01:49:58 +0000
Message-ID: <DM6PR14MB3178808509CB7772C1E552D4D71E9@DM6PR14MB3178.namprd14.prod.outlook.com>
References: <162256330634.19677.3885804345914692467@ietfa.amsl.com> <28584824.2341925.1622563579715@mail.yahoo.com> <721002155.671981.1625161479360@mail.yahoo.com> <eeaf7db6b5af4ef79bb51a543ab728df@huawei.com> <b91ddfb8d6014d7abf41e0d34971fe5e@cas.org>
In-Reply-To: <b91ddfb8d6014d7abf41e0d34971fe5e@cas.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cas.org; dkim=none (message not signed) header.d=none;cas.org; dmarc=none action=none header.from=bcbsm.com;
x-originating-ip: [165.225.63.41]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 26042c17-ed5a-462f-cbc9-08d93dc4dd56
x-ms-traffictypediagnostic: DM6PR14MB2315:
x-microsoft-antispam-prvs: <DM6PR14MB2315201BEF7FD8D7298C16D8D71E9@DM6PR14MB2315.namprd14.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR14MB3178.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(39850400004)(376002)(136003)(366004)(346002)(396003)(316002)(2906002)(66946007)(5660300002)(83380400001)(110136005)(54906003)(186003)(33656002)(478600001)(7696005)(966005)(8676002)(71200400001)(66574015)(26005)(8936002)(52536014)(55016002)(4326008)(6506007)(53546011)(86362001)(55236004)(64756008)(122000001)(15650500001)(66446008)(9686003)(76116006)(66476007)(66556008)(38100700002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?N3JHRjczUkczcDFjU1RYSWUwdjRmYXVPT0w3b0pyeTFEUWJRUHNRVXloek5V?= =?utf-8?B?S3JSajF3MXRxTWJxUXJ0MWYrclVDMk1SYkJQNW4wcWxzcGNNdjMxcDNaT1F6?= =?utf-8?B?TDVHaTBPT2xscHc3SWlCYnlWMW5IZFdaYk02TStWSHBFc1I4TUd4cVZOclNR?= =?utf-8?B?QkxHNmpQUXpkZG93NGx0cld0OFZXMktQSVNVUWFiRHhXNEg3dGM5VWw5djFD?= =?utf-8?B?SmVUcTV3RGFSc0U1Y1NkR0t2WnQvQlFSdWdQcVliemVSQnE3RWpraGk3TUUv?= =?utf-8?B?WTZLU2gwMm9hNE5NditnQ3FqTWpEbUt2K3NURjVxRjZDT3Z0ODNBc0Nka2Fl?= =?utf-8?B?TGR6NytJNEo0RmhUN0M5LzJyQ0hHK1M3Q1JkWXhZRldCN2M1RDM5SlJLYnFQ?= =?utf-8?B?OGNzMWcxeE56SEJyUkNrUnlDV0l6cFhsSmU2VE50VTVnNlQvMHk5Yk02RDR4?= =?utf-8?B?cXhLcVNhZTE4S0VzMTM3NnY0ZlVPcVZxd0Q1UWRYL2JJNFdYMmZyZGQ1NytK?= =?utf-8?B?RENSMDNQNndEd1BISTdzMHBRaFJjdEJ6SlNvMkVYQXR2Z21NcHJKcnJsYVNt?= =?utf-8?B?MTlwa2lranA2WXFlSEhTMjZjMHdFSk9xUXJpNXlyb0RoVVVoMEQ2Z3JZcG5M?= =?utf-8?B?d29mRjVjbTdZdUdXMjJnVHppVW12MnBzd3hDTDdaa21EcXZXZnpCNitiNGxh?= =?utf-8?B?TXdmVjByMjc5VUZhM0ZXUXpSQWQ0a2hiTnFmV00vL0dXbWVXUHBjcmZnN2VZ?= =?utf-8?B?ZU1PRUtvYzYwWmdNSHFOaTB0WWo0VDFDYVA4b2g3aXY1c0Mza3ZxVVZvOFlo?= =?utf-8?B?aFEyNjFkcWF1N09TYVFreVA4elBPZGdLalZtb2pSYktURkhMZVVndThxUVYr?= =?utf-8?B?R0VyUDBoUmp0QlpZTkFBTFdDNUJVd1hFRllPcDRwVGZrQ0dLQit4VkNWR29D?= =?utf-8?B?c2YvMm9PYjVReUpPNE5IM2RFY2tDb0tKME43OWJob0w4V1h1SXJRS0xjUlVX?= =?utf-8?B?ejQxRmlaeTk4cFZkbEt4KzFMR1pBdU5YTlN2NTVmOXNPcERYVWFVMHlxc0hI?= =?utf-8?B?TWx4ZlFsLzlqVU1xNmlsV0ZvZ2dRTTZRK0hsU2dnTGt3SVlwMjhqMUZxOGxs?= =?utf-8?B?Uk5DSDlmM1k3RkZiQzVmWENTUE5vR08vc1VPS1F4UEpzMURhT2JnTDhkbDJr?= =?utf-8?B?MS9pUjhWY0JQcEZPSlE4RDl0QXA1VGZncVdZVmF3Z1ZJUXN3bHhaR3hmeUJE?= =?utf-8?B?SjNTRWZ3eWJrdWxPQ2FmemVSUll5VE9rV1VreTh1ekhialRaRER4Rmh5M2ZT?= =?utf-8?B?OHZrQmhxVHNmQW0xZlp6SEdNM2NkR0wrVmpVbUEwcVFkM0YrWFE1VlM0aXN2?= =?utf-8?B?SndVUGJnQXd1UERYWmlPcWEzYjMyb3Q0MlZTYzZJbnFKNnU3WUZObk00MHpQ?= =?utf-8?B?TXlGaFgrbjVPN3VzV3g0RTNpR0NtNXZ6Q0p2anlOUU01aEVRQnBvNldacXo2?= =?utf-8?B?VWRveUtESEcwZU5ZV0VRWFh0V0Jxc3pObklGQlh0SThjdjRuMnVMN2RZa0sw?= =?utf-8?B?VmhaTEZyVWI5QkYxcklFNkUrZzlmZVJJSEFpcFVSdmgzV2F6dlFyb0kyZm5R?= =?utf-8?B?L0Q0OE9HVk9ibUdKYXQzVWV0ZDBtNjQrRitUU1Bpa0lLQThGRXAyVDFEZHB0?= =?utf-8?B?dm5kdXpDQm13VjNLMzFYVUtnakk0eFNBTTNqdW4rMXJ3TVFLb2RzbUlBMDNr?= =?utf-8?Q?wguOB+bpYtSDqT6MfxRsC8Ek2a8m0oTeie9ZgM8?=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: bcbsm.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR14MB3178.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 26042c17-ed5a-462f-cbc9-08d93dc4dd56
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jul 2021 01:49:58.5343 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 6f56d3fa-5682-4261-b169-bc0d615da17c
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: uFOO9+ltzlz8BaI1f/GjA5LNt5W/S40FmV7aXWke6KsFJVpSXvNS74eGBEmk3D6z5S0Xd4tzzK0pIwA49adnzQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR14MB2315
X-TM-AS-GCONF: 00
X-VPM-HOST: vmvpm02.z120.zixworks.com
X-VPM-GROUP-ID: 31481753-2aea-40e2-8449-627aa4802015
X-VPM-MSG-ID: 532c8b10-fa00-430d-bf40-5f862c66e733
X-VPM-ENC-REGIME: TLS,Plaintext
X-VPM-IS-HYBRID: 0
X-VPM: TLS Sent
X-VPM-TLS-SENDER: vmvpm02.z120.zixworks.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/IezvQPMHsh2YE3ZiyM798Xspmio>
Subject: Re: [ippm] Fw: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Jul 2021 01:50:10 -0000

Just a quick word of thanks to Rob. 
For verbalizing the value that PDM and Extension Headers in general will have, for EE and many other Mainframe Apps at hundreds or even thousands of Enterprises.    And similar benefits will be extended to many other platforms as well.    
These organizations are not directly represented or involved at IETF,  but will definitely be beneficiaries of developments such as PDM.  

Thanks again!

Mike


-----Original Message-----
From: Hamilton, Robert <RHamilton@cas.org> 
Sent: Friday, July 2, 2021 3:13 PM
To: IETF IPPM WG <ippm@ietf.org>
Cc: draft-elkins-ippm-encrypted-pdmv2@ietf.org; nalini.elkins@insidethestack.com
Subject: RE: [ippm] Fw: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt

[External email]


Paolo:

I'm particularly interested in PDM for helping with Enterprise Extender connections. Since we  are using the internet for these connections we are subject to the vagaries of ISP traffic management and outages on multiple continents. It's not just multinational companies that could make good use of this protocol, but any companies with business partners with whom they require reliable internet connectivity. In those cases I expect the end-node encryption is a relatively smaller portion of the total packet transmission time.

I don't want to slow down the PDM implementation, and in general I think the encryption is a good idea. Encryption is fast on this platform, but to my knowledge it doesn't do HPKE. I've just looked through the RFE site and haven't seen any asking for HPKE support.

Getting good value from PDM requires that destination headers be passed reliably from end to end. We probably have to lobby for that first, good extension header handling network-wide. I'll be happy when I see PDM headers show up in my Policy Agent logs.

R;


Rob Hamilton
Infrastructure Engineer
Chemical Abstracts Service

-----Original Message-----
From: ippm <ippm-bounces@ietf.org> On Behalf Of Paolo Volpato
Sent: Friday, July 2, 2021 10:26 AM
To: nalini.elkins@insidethestack.com
Cc: draft-elkins-ippm-encrypted-pdmv2@ietf.org; IETF IPPM WG <ippm@ietf.org>
Subject: [EXT] Re: [ippm] Fw: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt

[Actual Sender is ippm-bounces@ietf.org]

Hi Nalini,

Thanks for advising.

I have a couple of general questions.

At a first glance, it seems to me that PDMv2 is expected to be used mainly in the enterprise domain. Is it so?
Do you have any thoughts on what may happen if e.g. a multinational company runs the protocol over multiple external backbones where the IPv6 extension headers (in general, not necessarily just the destination options header) may not be handled? Does this represent a serious issue?

Also,  I assume that PDMv2 is mainly used by end stations (e.g. hosts instead of routers). If this is the case, then I don’t expect that the performance degradation due to encryption is a serious issue. Do you see other different cases where instead degradation may be a concern?

Regards
Paolo

-----Original Message-----
From: ippm [mailto:ippm-bounces@ietf.org] On Behalf Of nalini.elkins@insidethestack.com
Sent: Thursday, July 1, 2021 7:45 PM
To: IETF IPPM WG <ippm@ietf.org>
Cc: draft-elkins-ippm-encrypted-pdmv2@ietf.org
Subject: Re: [ippm] Fw: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt

IPPM,

Please do take a look at this draft.

I think that iOAM will need encryption as well.   We have spent quite a bit of time thinking over these issues.  We even have 2 cryptographers from Italy involved as co-authors.   I want to do a side meeting where we can have quite a bit more time to discuss this but would love to have comments from the group on the list.

I am very reluctant to push PDM out to the wider world without encryption.  I feel that we will become the attacker's best friend.
We have modified the Linux kernel to include PDM but as I say, without encryption, we do not wish to release.


Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.
https://smex12-5-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=www.insidethestack.com&umid=ae63ba6f-614c-40c5-9a6d-dbc4bc0fbb82&auth=3c97381e9a30865a1a3f3ad58750d85b2b059558-117b9ada8970552b00544efe952da754c5c92078
(831) 659-8360






On Tuesday, June 1, 2021, 09:06:39 AM PDT, nalini.elkins@insidethestack.com <nalini.elkins@insidethestack.com> wrote:





Hello IPPMers!

We have just posted a new draft to encrypt PDM data.   We feel that this is an important feature to add before promoting widespread adoption of PDM.

We would appreciate any thoughts or comments from the group.

Thanks,

Nalini Elkins
CEO and Founder
Inside Products, Inc.
https://smex12-5-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=www.insidethestack.com&umid=ae63ba6f-614c-40c5-9a6d-dbc4bc0fbb82&auth=3c97381e9a30865a1a3f3ad58750d85b2b059558-117b9ada8970552b00544efe952da754c5c92078
(831) 659-8360






----- Forwarded Message -----

From: "internet-drafts@ietf.org" <internet-drafts@ietf.org>
To: mackermann@bcbsm.com <mackermann@bcbsm.com>om>; Adnan Rashid <adnan.rashid@unifi.it>it>; Ameya Deshpande <ameyanrd@gmail.com>om>; Michael Ackermann <mackermann@bcbsm.com>om>; Nalini Elkins <nalini.elkins@insidethestack.com>om>; Tommaso Pecorella <tommaso.pecorella@unifi.it>
Sent: Tuesday, June 1, 2021, 12:01:47 PM EDT
Subject: New Version Notification for draft-elkins-ippm-encrypted-pdmv2-00.txt



A new version of I-D, draft-elkins-ippm-encrypted-pdmv2-00.txt
has been successfully submitted by Nalini Elkins and posted to the IETF repository.

Name:        draft-elkins-ippm-encrypted-pdmv2
Revision:    00
Title:        Encrypted IPv6 Performance and Diagnostic Metrics Version 2 (EPDMv2) Destination Option Document date:    2021-06-01
Group:        Individual Submission
Pages:        16
URL:            https://www.ietf.org/archive/id/draft-elkins-ippm-encrypted-pdmv2-00.txt
Status:        https://datatracker.ietf.org/doc/draft-elkins-ippm-encrypted-pdmv2/
Htmlized:      https://datatracker.ietf.org/doc/html/draft-elkins-ippm-encrypted-pdmv2


Abstract:
  RFC8250 describes an optional Destination Option (DO) header embedded
  in each packet to provide sequence numbers and timing information as
  a basis for measurements.  As this data is sent in clear- text, this
  may create an opportunity for malicious actors to get information for
  subsequent attacks.  This document defines PDMv2 which has a
  lightweight handshake (registration procedure) and encryption to
  secure this data.  Additional performance metrics which may be of use
  are also defined.




The IETF Secretariat




_______________________________________________
ippm mailing list
ippm@ietf.org
https://www.ietf.org/mailman/listinfo/ippm

_______________________________________________
ippm mailing list
ippm@ietf.org
https://www.ietf.org/mailman/listinfo/ippm
_______________________________________________
ippm mailing list
ippm@ietf.org
https://www.ietf.org/mailman/listinfo/ippm
Confidentiality Notice: This electronic message transmission, including any attachment(s), may contain confidential, proprietary, or privileged information from CAS, a division of the American Chemical Society ("ACS"). If you have received this transmission in error, be advised that any disclosure, copying, distribution, or use of the contents of this information is strictly prohibited. Please destroy all copies of the message and contact the sender immediately by either replying to this message or calling 614-447-3600.


The information contained in this communication is highly confidential and is intended solely for the use of the individual(s) to whom this communication is directed. If you are not the intended recipient, you are hereby notified that any viewing, copying, disclosure or distribution of this information is prohibited. Please notify the sender, by electronic mail or telephone, of any unintended receipt and delete the original message without making any copies.
 
 Blue Cross Blue Shield of Michigan and Blue Care Network of Michigan are nonprofit corporations and independent licensees of the Blue Cross and Blue Shield Association.


This message was secured by Zix(R).