Re: [ippm] Magnus Westerlund's Discuss on draft-ietf-ippm-stamp-07: (with DISCUSS and COMMENT)

Magnus Westerlund <magnus.westerlund@ericsson.com> Mon, 16 September 2019 15:29 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FADD12084C; Mon, 16 Sep 2019 08:29:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Le0UTy3NP9vg; Mon, 16 Sep 2019 08:29:41 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80049.outbound.protection.outlook.com [40.107.8.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D531512081D; Mon, 16 Sep 2019 08:29:40 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y8quJy86oyhYHxpzORhQDwU0vfSFMVaC5byMUPtrBM2x0md5GTvbPapr+G3sEUg1rH8Dc3BxZEERyrRs0CzJpfCDvOX9rhKaP0xiFlxEi2exMgHJLHAub3i6PFqr5Yxmj6xVPwGBnCk+HHaz5ZA/KESbgWdwKVvcxdABqsmvESnHAChOcMIbdbifoXd8bnPuOreWPAxYF16niozoBwvKG/PlJ7MTjnVlWpRNePuk+COiYMH9fTQ4vg8dnP9GNsMVe/Vb+IhebMyqIIy0b7oPTKO93p7FwjIxeBzD36DakVmw/yPArYTQ+JK0STTafSfMQUXcoR9NJ57mohPzCb6xXg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3BPLvZ9s72z3j47madU/8VAoszEhRdmB3WRxdqVDQJQ=; b=SInc9+eSMrWQ+8Ewyv+Ll+Fm23FStcksTmPvRbb3fB79FjIBmfAJDySULhXyD6RdE9a70ds89ZEcV/msxHmwNeb92UolszZfujIc9eLAtGemisyHVlkZaocPCTnmtZfmqpezEtZnWxm6kQuoF6sO5kHfhR6UZTN1pv1WiA3dM0uQbwhcYPF5OPncJ7vy3lloIOiyrU/1S07N13LwBhXE6ROCpp5gKGe8GID09KjhY7a/z1mQYc3FBxjwYq49RbhvxUdy0fuv/i++5C3e7oV8Oo2JYWOQ2rHHxJhx9GO4OaHkMTOGs9JAHnCaFOQIn4LEAwpmc/hikmpFIeh2TY92Uw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3BPLvZ9s72z3j47madU/8VAoszEhRdmB3WRxdqVDQJQ=; b=Ujz7UR1iYbnz3SxqpMRaujUBsIQKr2eo+ABJ0bUPgkxmH6/xvWLNLPPln2KL3+ERx5zoibYMDAH7HmQ446ljijNDHuVJcQ/OszMDNgf8JJE8a1f/CA7egnKzQZi/M/buwxs+7DVSwjMOncw8yO0jj3jYX7FyHSCgN6koJSZadWg=
Received: from DB7PR07MB5736.eurprd07.prod.outlook.com (20.177.194.155) by DB7PR07MB3931.eurprd07.prod.outlook.com (52.134.104.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2284.16; Mon, 16 Sep 2019 15:29:38 +0000
Received: from DB7PR07MB5736.eurprd07.prod.outlook.com ([fe80::e48c:a942:9682:2ce4]) by DB7PR07MB5736.eurprd07.prod.outlook.com ([fe80::e48c:a942:9682:2ce4%7]) with mapi id 15.20.2284.009; Mon, 16 Sep 2019 15:29:38 +0000
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
To: "gregimirsky@gmail.com" <gregimirsky@gmail.com>
CC: "draft-ietf-ippm-stamp@ietf.org" <draft-ietf-ippm-stamp@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "tal.mizrahi.phd@gmail.com" <tal.mizrahi.phd@gmail.com>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: Magnus Westerlund's Discuss on draft-ietf-ippm-stamp-07: (with DISCUSS and COMMENT)
Thread-Index: AQHVaBAbqbmUyWu4qEOdjey0JDZTiacmG9IAgACy4wCAB6hCAA==
Date: Mon, 16 Sep 2019 15:29:37 +0000
Message-ID: <ed5f1afb634e8c0d39cdb6c2a52ad9e2ab459285.camel@ericsson.com>
References: <156760524845.22816.16339950342338392164.idtracker@ietfa.amsl.com> <CA+RyBmUy-_ETfaPWoYivcWa0S3De4dcn9=Wb47M7x0vSfEsjYQ@mail.gmail.com> <06fcd3bea80067202534aa70857194b2e4335d3f.camel@ericsson.com> <CA+RyBmUowr39bRBDv1g35f-rJve-whkscd0ht17cjJA5-rWixQ@mail.gmail.com>
In-Reply-To: <CA+RyBmUowr39bRBDv1g35f-rJve-whkscd0ht17cjJA5-rWixQ@mail.gmail.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=magnus.westerlund@ericsson.com;
x-originating-ip: [192.176.1.84]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e89c6b6a-16c8-4639-84f9-08d73abaaf92
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600167)(711020)(4605104)(1401327)(2017052603328)(49563074)(7193020); SRVR:DB7PR07MB3931;
x-ms-traffictypediagnostic: DB7PR07MB3931:
x-microsoft-antispam-prvs: <DB7PR07MB3931D5F919E547E8781F91D4958C0@DB7PR07MB3931.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0162ACCC24
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(51914003)(51444003)(189003)(199004)(229853002)(2501003)(186003)(26005)(6916009)(118296001)(53946003)(76176011)(53546011)(5640700003)(53936002)(30864003)(6486002)(486006)(102836004)(6506007)(6512007)(3846002)(44832011)(6436002)(7736002)(305945005)(6116002)(8676002)(99936001)(2351001)(1730700003)(81166006)(81156014)(4326008)(2616005)(1361003)(476003)(25786009)(66066001)(446003)(11346002)(54906003)(6306002)(6246003)(36756003)(498600001)(966005)(86362001)(8936002)(71200400001)(14454004)(64756008)(66556008)(66476007)(66616009)(66446008)(71190400001)(91956017)(5660300002)(2906002)(14444005)(256004)(76116006)(99286004)(1411001)(66946007); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR07MB3931; H:DB7PR07MB5736.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: rNQTL+jFfHWc+EENBwQ3IaSl9mP04DNKVojpJ7/QhJnri6d23zUdpYs6IrtyAOIfxS26tpEIDbbYgpv+KFlCZU0zqZqwwnOIHRy8d0VCeXr/33mXBYUqpUxJ6PsxgRXq4HIZ2n3Q3mxadcdsTB9BfjA0QWi2oWEgrdPBSt2MBdYUkqrehwi+WpRDuiUrbHJfpiSE4VNc3wK3IsYA94fkUaednINbcu+/cu6CU250vag/GymuQg1i6qywF4FjR32d6PrOloR2MZk5TjdIoRE4w5/JjNS9/rM/CN2p7HU+sS+L1nti3bl2YbkUWs5DWpiqYRXHUYW/a/snLWouwhiXsZHGvwtCYSBMeb4I3H4h6u0k5hBmyNUNgoZoqC0DoXht05UcN0buLfK6XKUy1rhMPmN0VJdo1VOd4aj0eRZbPmg=
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-ln4CxXgh7n3O5E76ksr9"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e89c6b6a-16c8-4639-84f9-08d73abaaf92
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Sep 2019 15:29:37.9178 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: qnLGslN1cWO+T1wKm9RxKMjfZc634M8PzwTqG15joZ86xcGcQQ6b9cV6nJJVl0NR7ZQq/Eehg/9/KNxXs2b6/Q368L7ytvc/oHXNT2VYXc8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB3931
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/IukmN0FAve-Yf7mt3oQrnootmYk>
Subject: Re: [ippm] Magnus Westerlund's Discuss on draft-ietf-ippm-stamp-07: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Sep 2019 15:29:46 -0000

On Wed, 2019-09-11 at 11:33 -0700, Greg Mirsky wrote:
> Hi Magnus,
> thank you for clarifications and further detailing your comments,
> questions. Please find my answers and notes below in-lined under the
> GIM2>> tag.
> 
> Regards,
> Greg
> 
> On Wed, Sep 11, 2019 at 12:53 AM Magnus Westerlund <
> magnus.westerlund@ericsson.com> wrote:
> > Hi Greg,
> > 
> > Thanks for the reply. See inline for my comments and response. 
> > 
> > 
> > On Tue, 2019-09-10 at 12:43 -0700, Greg Mirsky wrote:
> > > Hi Magnus,
> > > thank you for the review and thoughtful, pointed questions.
> > Please
> > > find my answers in-line under GIM>> tag.
> > > 
> > > Regards,
> > > Greg
> > > 
> > > On Wed, Sep 4, 2019 at 3:54 PM Magnus Westerlund via Datatracker
> > <
> > > noreply@ietf.org> wrote:
> > > > Magnus Westerlund has entered the following ballot position for
> > > > draft-ietf-ippm-stamp-07: Discuss
> > > > 
> > > > When responding, please keep the subject line intact and reply
> > to
> > > > all
> > > > email addresses included in the To and CC lines. (Feel free to
> > cut
> > > > this
> > > > introductory paragraph, however.)
> > > > 
> > > > 
> > > > Please refer to 
> > > > https://www.ietf.org/iesg/statement/discuss-criteria.html
> > > > for more information about IESG DISCUSS and COMMENT positions.
> > > > 
> > > > 
> > > > The document, along with other ballot positions, can be found
> > here:
> > > > https://datatracker.ietf.org/doc/draft-ietf-ippm-stamp/
> > > > 
> > > > 
> > > > 
> > > > -------------------------------------------------------------
> > ----
> > > > -----
> > > > DISCUSS:
> > > > -------------------------------------------------------------
> > ----
> > > > -----
> > > > 
> > > > Two very much discussing discusses. However, I would really
> > like to
> > > > hear the
> > > > answer to these concerns before clearing.
> > > > 
> > > > 1. Section 4.3: Is the HMAC field size of 16 bytes hard coded?
> > If
> > > > there ever
> > > > would exist a need to deploy another integrity solution, even
> > if
> > > > the actual
> > > > algorithm used to construct the tag can be agreed by the
> > > > management, there
> > > > appear to exist a hard look in to use 16-byte tags. Have this
> > issue
> > > > been
> > > > considered?
> > > 
> > > GIM>> Indeed, this specification defines the use of only one
> > > algorithm and only 16 bytes-long HMAC field. Your question
> > prompted
> > > the discussion among authors and we believe that in a future
> > > specification it would be feasible to extend supporting a number
> > of
> > > algorithms and different lengths of HMAC field both being defined
> > > through extension to STAMP YANG data model.
> > 
> > So if I understand this (taking a discussion with Mirja about
> > keeping
> > things as simple as possible) the solution is to basically is when
> > need
> > arises define a new STAMP version, and then use YANG to coordinate
> > which version is used for the measurement. If that is a correct re-
> > interpretation of your response then I am fine with it. 
> 
> GIM2>> The direction from the WG was to keep the base specification
> as simple  as possible (and that was the reason to split TLV
> extensions into a separate document). 

Yes, understood. 

> > > >         2. Section 6:
> > > >         The possible impact of the
> > > >    STAMP test packets on the network MUST be thoroughly
> > analyzed,
> > > > and
> > > >    the use of STAMP for each case MUST be agreed by all users
> > on
> > > > the
> > > >    network before starting the STAMP test session.
> > > > 
> > > >         I assume some potential issues are know, shouldn't they
> > > > really be
> > > >         listed here in the security consideration to further
> > > > motivate why the
> > > >         analysis needs to happen.
> > > 
> > > GIM>> This is in reference to using numbers from the User range
> > as
> > > the destination port number. Would adding the reference to the
> > case
> > > of using the port numbers from the User range address your
> > concern?
> > > Or rather refer to Section 4, as it includes more discussion
> > (see 
> > > below)? 
> > 
> > Okay, I don't really care where the discussion happens. But I don't
> > find any real discussion and listing of the concerns with using
> > user or
> > dynamic ports for STAMP Sessions? With the formulation you use, I
> > would
> > expect at least some list of potential concerns that needs to be
> > evaluated in the context of the particular usage of STAMP. 
> 
> GIM2>> Per Berry's suggestion, I'm adding a new section, Operational
> Considerations, to list possible scenarios and possible issues with
> using destination ports from the User range and from the Dynamic
> range. I hope to finish it in a couple days. Will share on this
> discussion thread promptly. 

Great!

Looking forward to review it when written. 

> > > > 
> > > > -------------------------------------------------------------
> > ----
> > > > -----
> > > > COMMENT:
> > > > -------------------------------------------------------------
> > ----
> > > > -----
> > > > 
> > > >         1. Section 4:
> > > >         Before using numbers from the User Ports range, the
> > > > possible impact
> > > >    on the network MUST be carefully studied and agreed by all
> > users
> > > > of
> > > >    the network.
> > > > 
> > > >         Is the above sentence missing to list an important
> > > > assumption? Is the
> > > >         assumption that by using the registred destination port
> > an
> > > > operator
> > > >         that sees to much STAMP traffic can simply filter it
> > out
> > > > and that way
> > > >         deal with the traffic, something which is not possible
> > when
> > > > using an
> > > >         locally decided port? If that is the case, this
> > assumption
> > > > should
> > > >         probably be noted.
> > > 
> > > GIM>> That is a very good point but our primary motivation for
> > this
> > > cautionary note (or strong warning) was that by allowing STAMP to
> > use
> > > port numbers from the User range, ports that may be already
> > assigned
> > > to protocols, creates a DDOS attack vector. As for the filtering
> > > STAMP traffic out, I think that even if the destination port is
> > one
> > > from the Dynamic range, for a relatively long test session it can
> > be
> > > filtered out.
> > 
> > So if that is the only? concern then write it out. I would expect
> > that
> > the higher layer management protocol that creates a measurement
> > session
> > to actually ensure that the STAMP endpoint actually have the port
> > numbers they attempt to use. Isn't that a reasonable requirement to
> > put
> > on the solution? 
> 
> GIM2>> Agree with your suggestion. Will put in the new section. If
> STAMP is managed by a centralized system, whether it is proprietary
> OSS/BSS or an orchestrator that uses YANG data models, the system
> will be able to coordinate selection of port numbers on the Session-
> Sender and Session-Reflector. But some systems may use EMS or CLI and
> that is where human coordination may be required. 


Good, then likely this is resolved when your text is ready. 

> > My thinking with the filtering out concern was that in cases where
> > one
> > runs STAMP measurement sessions, if the measurement interfer with
> > critical traffic an action for an on-path node that can actually
> > identify the STAMP traffic was to filer it out. And that may be
> > considered trivial when the well known port is used, but if a user
> > or
> > dynamic port is used, then that requries a managment system to
> > provide
> > the on-path node with the necessary information, i.e. 3/5 tuple for
> > the
> > STAMP flows. 
> 
> GIM2>> I think that a transit node can identify a flow as the STAMP
> flow only if the destination port is the STAMP default UDP
> destination port number, 862. In case a STAMP session has the
> destination port number as one of port numbers from the User range,
> IP/UDP encapsulation of STAMP packets would be indistinguishable from
> packets originated by the application that is assigned that port
> number. Thus, filtering out on only destination port number may
> negatively affect service, legitimate service. Because of that, I
> think that filtering will have to use more information. On the other
> hand, if the test flow does not exceed agreed rate, then any
> filtering test packets out, in my opinion, is counter-productive, as
> it hides some issues in the networks rather than letting the OAM
> tools to expose them, localize, and characterize.

Ok. This was primarily to understand if this was in scope or not. But
it sounds like this is not really in scope for how to manage it. 

> > 
> > > >         2. Section 3 and 4, and 4.1.1: What is a STAMP Session?
> > Is
> > > > that a
> > > >         measurment session between one specific and sender and
> > a
> > > > specific
> > > >         reflector for a time duration?  The defenition of the
> > > > session do matter
> > > >         if one intended to enable a single sender to use
> > multiple
> > > > reflectors,
> > > >         and if that can be a single session or always multiple
> > > > indepdendent
> > > >         ones. Would appreciate a definition what a session is.
> > If
> > > > it is
> > > >         possible to send STAMP traffic using a multicast or
> > > > broadcast address
> > > >         should be made explicit.
> > > 
> > > GIM>> Your interpretation is correct, STAMP session is implicitly
> > > defined as p2p. And that is what reflected in the STAMP YANG
> > model.
> > > Would the following text make it clearer:
> > > NEW TEXT:
> > >    In this document, a measurement session also referred to as
> > >    STAMP session, is the session between one specific Session-
> > Sender
> > > and
> > >    one particular Session-Reflector for a time duration.
> > 
> > Yes, please include that definition. Question would it be clearer
> > to
> > replace ".. is the session betweeen .." with ".. is the bi-
> > directional
> > packet flows between .."? 
> 
> GIM2>> I agree, defining a session as a session makes is somewhat
> repetitive. Thank you. 
> Below is the updated text:
>    In this document, a measurement session also referred to as
>    STAMP session, is the bi-directional packet flow between one
> specific
>    Session-Sender and one particular Session-Reflector for a time
>    duration.

Looks good to me. 

> > 
> > > >         3.  Section 4.1.1.:
> > > >         Timestamp is eight octets long field.  STAMP node MUST
> > > > support
> > > >       Network Time Protocol (NTP) version 4 64-bit timestamp
> > format
> > > >       [RFC5905], the format used in [RFC5357].  STAMP node MAY
> > > > support
> > > >       IEEE 1588v2 Precision Time Protocol truncated 64-bit
> > > > timestamp
> > > >       format [IEEE.1588.2008], the format used in [RFC8186].
> > > > 
> > > >         Is the clock source here something that may be relevant
> > or
> > > > simply
> > > >         information the management functions should capture. I
> > > > think there is a
> > > >         similar issue to that of RTP faced when it comes to
> > > > understand what the
> > > >         timestamp actually represent and thus be used
> > correctly.
> > > > RTP clock
> > > >         source specification is RFC 7273
> > > >         (https://datatracker.ietf.org/doc/rfc7273/)
> > > 
> > > GIM>> NTP and PTP encodings have a different interpretation of
> > the
> > > Fraction field of the Timestamp field. In my experience, PTP
> > format
> > > is native for the data plane, while NTP is more used at the
> > control
> > > plane. Original extension to TWAMP has been described in RFC
> > 8186.
> > 
> > I think you missunderstood. When I talk about clock source, I am
> > actually referring to identifying the particular clock that the
> > node
> > use to derive the included timestamp from. 
> > 
> > And likely this is a moot point in this document where the clock
> > source
> > information belongs in the management layer, e.g. in the YANG data
> > model. 
> 
> GIM2>> Timestamp Information TLV (draft-ietf-ippm-stamp-option-tlv)
> provides information about the clock synchronization protocol and the
> method by wich the timestamp has been acquired at a Session-
> Reflector. We may extend it to list the name/locatior of the master
> clock.

Ok. sounds reasonable. 

> > 
> > > >         4. Section 4.1:
> > > >            Because STAMP supports symmetrical test packets,
> > STAMP
> > > > Session-Sender
> > > >    packet has a minimum size of 44 octets in unauthenticated
> > mode,
> > > > see
> > > >    Figure 2, and 112 octets in the authenticated mode, see
> > Figure
> > > > 4.
> > > > 
> > > >         The above text implies some potential for UDP payload
> > size
> > > > variability
> > > >         for the STAMP packets. However, the actual definition
> > > > appear to have
> > > >         fixed sizes. Can you please clarify if I have missed
> > > > something that
> > > >         enables the STAMP packet to have variable size?
> > > 
> > > GIM>> I think that the text can be improved by characterizing the
> > > listed sizes as "base". The variable length of a test packet in
> > STAMP
> > > is supported by using Extra Padding TLV defined in draft-ietf-
> > ippm-
> > > stamp-option-tlv. Below is the proposed update:
> > > OLD TEXT:
> > >    Because STAMP supports symmetrical test packets, STAMP
> > Session-
> > > Sender
> > >    packet has a minimum size of 44 octets in unauthenticated
> > mode,
> > > see
> > >    Figure 2, and 112 octets in the authenticated mode, see Figure
> > 4.
> > > NEW TEXT:
> > >    STAMP supports symmetrical test packets.  The base STAMP
> > Session-
> > >    Sender packet has a minimum size of 44 octets in
> > unauthenticated
> > >    mode, see Figure 2, and 112 octets in the authenticated mode,
> > see
> > >    Figure 4.  The variable length of a test packet in STAMP is
> > > supported
> > >    by using Extra Padding TLV defined in
> > >    [I-D.ietf-ippm-stamp-option-tlv].
> > > 
> > > With the new reference, should I-D.ietf-ippm-stamp-option-tlv be
> > > moved to the Normative References list or may remain in the
> > > Informative list?
> > 
> > From my perspective, the fact that optional TLV may occur following
> > the
> > base headers appears quite important. Here comes a question of
> > intention form the WG. Is it intended that one can have STAMP
> > endpoints
> > that do not even support receiving packets larger than the base? 
> > In other words there will be two main versions already now, one
> > that
> > supports some TLV and can at least handle the TLV skip forward and
> > ignore the content and one that will throw a fit over the TLVs? If
> > that
> > is not the intention I think the fact that TLV's may occur should
> > be
> > moved into this specification and have it as a normative reference.
> 
> GIM2>> Will move the reference to the Normative section. With TLV
> being normative, I'd expect that the intelligent implementation of
> this draft, of the base STAMP specification, will accept any valid
> STAMP packet though not process extensions. But the base STAMP
> Session-Reflector will return the base reflected packet.  

I think that is very reasonable approach. Are you close to complete the
stamp-option-tlv document, or will the missref cause any issue? 

> > I guess the answer is that you have backwards comaptibility reasons
> > for
> > not allowing TLVs at all in some sessions, or? 
> 
> GIM2>> Yes, that and the principle "keep it simple". 

Thanks,

To me it looks like with some text changes all my issues are addressed.

Cheers

Magnus Westerlund 


----------------------------------------------------------------------
Network Architecture & Protocols, Ericsson Research
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Torshamnsgatan 23           | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------