Re: [ippm] draft-morton-ippm-capacity-metric-protocol

"MORTON JR., AL" <acmorton@att.com> Thu, 10 February 2022 17:40 UTC

Return-Path: <acmorton@att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 022EB3A0E42 for <ippm@ietfa.amsl.com>; Thu, 10 Feb 2022 09:40:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.299
X-Spam-Level:
X-Spam-Status: No, score=-1.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, PDS_BTC_ID=0.5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=att.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 40dhdPfLUiVU for <ippm@ietfa.amsl.com>; Thu, 10 Feb 2022 09:40:03 -0800 (PST)
Received: from mx0b-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1AC43A0E4F for <ippm@ietf.org>; Thu, 10 Feb 2022 09:40:02 -0800 (PST)
Received: from pps.filterd (m0288867.ppops.net [127.0.0.1]) by m0288867.ppops.net-00191d01. (8.16.1.2/8.16.1.2) with SMTP id 21AHXrH0002968; Thu, 10 Feb 2022 12:40:02 -0500
Received: from alpi154.enaf.aldc.att.com (sbcsmtp6.sbc.com [144.160.229.23]) by m0288867.ppops.net-00191d01. with ESMTP id 3e54x9pe2j-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 10 Feb 2022 12:40:01 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 21AHe0M7012932; Thu, 10 Feb 2022 12:40:00 -0500
Received: from zlp30486.vci.att.com (zlp30486.vci.att.com [135.47.91.177]) by alpi154.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 21AHdwFY012893 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 10 Feb 2022 12:39:58 -0500
Received: from zlp30486.vci.att.com (zlp30486.vci.att.com [127.0.0.1]) by zlp30486.vci.att.com (Service) with ESMTP id 30FB64005951; Thu, 10 Feb 2022 17:39:58 +0000 (GMT)
Received: from GAALPA1MSGEX1AD.ITServices.sbc.com (unknown [135.50.89.99]) by zlp30486.vci.att.com (Service) with ESMTP id AEC584005950; Thu, 10 Feb 2022 17:39:57 +0000 (GMT)
Received: from GAALPA1MSGEX1CD.ITServices.sbc.com (135.50.89.111) by GAALPA1MSGEX1AD.ITServices.sbc.com (135.50.89.99) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.18; Thu, 10 Feb 2022 12:39:57 -0500
Received: from GAALPA1MSGETA03.tmg.ad.att.com (144.160.249.125) by GAALPA1MSGEX1CD.ITServices.sbc.com (135.50.89.111) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.18 via Frontend Transport; Thu, 10 Feb 2022 12:39:57 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.171) by edgeal3.exch.att.com (144.160.249.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.18; Thu, 10 Feb 2022 12:39:48 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IpbQU+PIrxRCqexNzTAVMY34BLQNlkKzYXuTs1fFcCFWXEw3Cz5XrjJGBxhR7GdI1cxe0PavbxQ4wTRiSQIPKbb7T209QDupFMZIPyTDfwP70HyB7R4SvMVtkJjWMTjKV8besVwTHwP6oJlzJxYnig0p04S4d6ifJsk/dGb1piHcduhm8jTnfD6rbOZGBF8sn6ScID3jqA6mIxybNhtPrcxFOXmFJvmfwd2DXhZAtQbh1hkyEmK0+KWLXwaVcNKQEibvf4LiG7A8B8veiMSUQKgHoAAxLdstHwU8bBZGqOxBisK+NRW6V0B4IZXyKPH1RpLnhgYJr0sstBIY8Ko+kQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3eCtH3vgbSFoVL7zxSY6gcYBHcotqd1Df8SO7WBp1zg=; b=bax3Xvv8L9djP9Yf9CqC17ztbpTpHAHzyaPL9DpotZGB1P/uCjcVxOkiu3DnsMunpdJnNb+YjWqugBS2LLipw6gQ0W5zc2ruX2usFCuFQe8UWPY1/GmvcFU06HK5xHTxznRgQOd99unFZxk2V0PlMeaIiN0VcC90q6ZVTDYIF1k2wThD9T46Mt+4wotHi4iGhcQXcpCO1si57FEhyXLNRqTC+fF+05VDQkHprfnCJZo+VM/gw3m218Nzq1gadxM1v2GT0RsvQmqsQRetFxCN18N90LC7JexyzqcM5iIx7KqCPXDiVdRcqA1mFHEl7fqsoOUQ7Qzznm3BmTrTF5WU6g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=att.onmicrosoft.com; s=selector2-att-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3eCtH3vgbSFoVL7zxSY6gcYBHcotqd1Df8SO7WBp1zg=; b=tlflNMxKnjTM+0hxy9GsqPrtb7J/CKrKJdLy0+QJpm5YYmg2HqhogOy13vjN7sDxfIwJNtl81W7ihNEpHNu94VRx2aeEGeQtiyJHSNxPpbJhI7cw2wYJrQBI9uuik/vNgL81wCjUIeHl7YV2m0iQYD3SvwB4RU0EqJZpHrzFIgE=
Received: from CH0PR02MB7980.namprd02.prod.outlook.com (2603:10b6:610:105::17) by PH0PR02MB7847.namprd02.prod.outlook.com (2603:10b6:510:57::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.18; Thu, 10 Feb 2022 17:39:45 +0000
Received: from CH0PR02MB7980.namprd02.prod.outlook.com ([fe80::cd34:2582:613:215b]) by CH0PR02MB7980.namprd02.prod.outlook.com ([fe80::cd34:2582:613:215b%4]) with mapi id 15.20.4951.019; Thu, 10 Feb 2022 17:39:45 +0000
From: "MORTON JR., AL" <acmorton@att.com>
To: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>
CC: "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: [ippm] draft-morton-ippm-capacity-metric-protocol
Thread-Index: AdgUHhuHrIQIhUOsSdWaY99B1Bg0dwKhl42w
Date: Thu, 10 Feb 2022 17:39:45 +0000
Message-ID: <CH0PR02MB798042A14DCE74456A8B783AD32F9@CH0PR02MB7980.namprd02.prod.outlook.com>
References: <FR2P281MB06118B01D6536BEE41D7A6749C229@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
In-Reply-To: <FR2P281MB06118B01D6536BEE41D7A6749C229@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6ad9e781-77b7-4d19-41b0-08d9ecbc5421
x-ms-traffictypediagnostic: PH0PR02MB7847:EE_
x-microsoft-antispam-prvs: <PH0PR02MB7847E17DE4BE0FA3DD79C594D32F9@PH0PR02MB7847.namprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:4941;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: B6H6fcqIyA3VE9ERfSIC7fxPJaVZm5IRUXLY42xASs5IaSobCbsH7rxUTfnY2aWUFFOM4Puvy0Dnpqz/MFmDgVQQ/OPcXN/0Kvlm5K4Ao8dp+B8mVdc1RZ+4iyRr9WGuhSu8fiOnwakGG/QQ8bKEZGuhcBbHURDTjNrsmUuu+zHqjtyGzkQ1XjwSZIL75s6UVbuLhdGc3D4tPobLBF9P1Qyd/J7yEXCnS/2/HQJq2u+6+vQzCOM6ajvb+zVteDupJDrwADQvHcCaRZunEn9E74l2T5dIdf/RXloW7+/J3MSvnHD7FKOGBrt8KYe87i2NARdoz5HLblPLX2sUFWqCDyaxycrE13eErwaNBf/Ixm3GRPGM0YvqXsrN2GVfwh6Xs6Oy4P4274+KZei43dwlmjfh1SJAWKdxjy68wUCgwthaspmClmxA/yIflJsrrlxwjFFZHHni4kr++nC2gg31IczFw5VoFVuWHHtGTvIz0AAfthlGbqiw5jm53jB3QJzENQ2bLAsoiy0PFIy6ZP2uJ54gm8VZ6IOta/MNt7iXq2BZVpUWEQfX4+/05hMnyYQGBn5tK7YeK74KBGAJIh911ucBvAGuqOpk2zobSpxowYWnw/6pRA+I0xyKAMqhKyoP1GmOvIJkGJQW2YsN8UW6cNNgUKKJTbqdF7SwkxHs5wBLGokzw7E8/lRxNLdAVAXorHE0COgUpw6Sq9e/HLiGuwNnQCxfdFERN0NEW/7Mc0AUiV5PbplDUSHNnf7Yxebaat0l/WfWtUuQ+mkpiYE8v5NxQUV7P/d9zsWyxUr28vgzGCWbUN6fiyJNJsOtNSNke9BKkuQhVs1UGuo1ZdUywQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR02MB7980.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(55016003)(33656002)(2906002)(82202003)(30864003)(186003)(26005)(82960400001)(166002)(66574015)(122000001)(5660300002)(9686003)(38100700002)(83380400001)(71200400001)(6916009)(966005)(64756008)(66476007)(8676002)(4326008)(66946007)(8936002)(508600001)(86362001)(76116006)(66446008)(66556008)(53546011)(6506007)(38070700005)(316002)(7696005)(52536014)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH0PR02MB798042A14DCE74456A8B783AD32F9CH0PR02MB7980namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR02MB7980.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ad9e781-77b7-4d19-41b0-08d9ecbc5421
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2022 17:39:45.8014 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e741d71c-c6b6-47b0-803c-0f3b32b07556
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yU9Q8yZpgLX+KobrG1cO6TBFe/DArtL/bkR2kSzPaR4nHpdYyMIbSsNxRiEAC0WX
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR02MB7847
X-OriginatorOrg: att.com
X-TM-SNTS-SMTP: 1E07ADB4EEB033F42116F4B703C9969AD52EA4A049FF725C2989A71311BDE7252
X-Proofpoint-GUID: P-n06PySUyqMvuKnoC-VtselFZWSliAO
X-Proofpoint-ORIG-GUID: P-n06PySUyqMvuKnoC-VtselFZWSliAO
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-10_08,2022-02-09_01,2021-12-02_01
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 clxscore=1015 impostorscore=0 adultscore=0 spamscore=0 mlxlogscore=999 mlxscore=0 priorityscore=1501 malwarescore=0 lowpriorityscore=0 bulkscore=0 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202100093
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/J5XbcXtuJN0o4Pr8aZMZUBV57hw>
Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Feb 2022 17:40:08 -0000

Hi Rüdiger,

[acm]
Thanks for these!  I've finished with your comments and submitted the 00-wg version for chair approval...


6.2.  Test Activation Request - server response

{acm] now it's 6.2 Test Activation Response


...   When the server sends the Test Activation response back, it SHALL set
   the cmd Response field to:
[acm] s/response/Response/

RG: Server Test Activation Reply (or Response - please apply stringently through the text)
When the server responds by a Test Activation Reply, it...
[acm]
1,$ s/Test Activation Reply/Test Activation Request/g
----

   The server SHALL include all the test parameters again to make the
   client aware of any changes.


RG: The server SHALL repeat all test parameters to indicate changes to the client.

[acm] good, thanks.

----

8.  Stopping the Test

   When the test duration timer on the server expires, it SHALL set the
   connection test action to STOP and also starts marking all outgoing
   load or status PDUs with a test action of STOP1.


RG: ...and mark all outgoing load...

[acm] good change, much tighter.
----

10.  Security Considerations

A. Unathenticated mode (for all phases)

Unauthenticated
    ^^^^
thx again,
Al




From: Ruediger.Geib@telekom.de <Ruediger.Geib@telekom.de>
Sent: Friday, January 28, 2022 3:51 AM
To: MORTON JR., AL <acmorton@att.com>
Cc: ippm@ietf.org
Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol


Hi Al,



Thanks for clarifications, I agree to your proposals.



Yes, if a test running for 10 sec at line-speed can reliably only be invoked willingly by the party having to cope with the congested link, then an emergency-stop likely isn't required.



Regards,



Ruediger









##################



Hi Rüdiger, Thanks again for your comments!



We discussed some of them at our coding project meeting today.

Please see [acm] for replies.



All proposals below are implemented in the working text.



Al



############



Some comments:



Section  3.  Protocol Overview



   The client requires configuration of a test direction parameter

   (upstream or downstream test) as well as the hostname or IP address

   of the server in order to begin the setup and configuration exchanges

   with the server.



RG: The draft also mentions a sender and a receiver. Both, client and server

may act as sender and receiver. This depends on the test direction,

upstream or downstream.



Words to that appear in "9.  Method of Measurement", at the end of the doc.



[acm]

OK. Let's try this for the paragraph above:



The client requires configuration of a test direction parameter

(upstream or downstream test, where the client performs the role of

                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

sender or receiver, respectively) as well as the hostname or IP address

^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

of the server in order to begin the setup and configuration exchanges

with the server.





4.  Stopping the Test: The server initiates the phase to stop the

       test by setting the STOP1 indication in load PDUs or sstatus

       feedback messages.                                  ( ^^^^)



RG: Would it be worth a thought to enable the client to terminate a test?



[acm]

This sentence in section 3 might benefit from some clarification. I added:



4. Stopping the Test: When the specified test duration has been reached, the server

                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

   initiates the phase to stop the test by setting the STOP1 indication in load

   PDUs or status feedback messages. The client acknowledges by setting the STOP2

   in load PDUs or status feedback messages. ...



IOW, neither the server nor the client can stop a test prematurely in normal

operation. Note that the protocol overlays the STOP indication on existing

measurement and feedback traffic. It's very simple to implement.



Alternatively, a client (or server) can stop sending traffic

(load PDUs or status feedback messages, depending on its role).

An activity timer will expire at the opposite end, and both

client and server will close the connection. The timer value

can be set to expire as quickly as needed (some may be sensitive

to the amount of load PDUs sent after a test appears to fail).





##########





5.  Setup Request and Response Exchange





The message format isn't "TLV". Is the protocol extensible (e.g. could security be adapted to future needs)?



[acm]

All the message formats/PDUs are extensible. A specific set of formats match a

protocol version number (currently 8 in the draft you reviewed).

Our goal is to make version 9 and higher backward-compatible.

We should be able to add fields to the PDUs and leave earlier parts

untouched...





##########



6.2.  Test Activation Request - server response



.....The remaining 28 octets of the Test Activation Request (normally read



RG: A bit worrying, seems to be set by the sender in the reply to a request only. See editorials...



[acm]

Here's the full context:

   If the client has requested an upstream test, the server SHALL include

   the transmission parameters from the first row of the sending rate table.



   The remaining 28 octets of the Test Activation Request (normally read

   from the first row of the sending rate table) are called the

   Sending Rate Structure, and SHALL be organized as follows:

...



So, the Test Activation Response (the new name for section 6.2)

uses the Sending Rate Structure to communicate a starting send rate

for the test, IF the client is the sender, as in an upstream test.



Perhaps we can clarify:

   If the client has requested an upstream test, the server SHALL include

   the transmission parameters from the first row of the sending rate table

   in the Sending Rate Structure (defined below).





##########





7.1.  Test Packet PDU and Roles



.... On the other hand, the test configuration MAY use a fixed sending

   rate requested by the client,



RG: contains descriptive text about the method (e.g. decision on the

sending rate). The text there certainly is correct. I wonder, whether

a reference replacing the text would be sufficient?



[acm]

Actually, I don't see anything except protocol details near the OTOH

sentence above.



We can add a second clarifying sentence in the paragraph below:

   The client MAY communicate the desired fixed rate in its activation

   request. The reasons to conduct a fixed-rate test include stable measurement

   at the maximum determined by the load adjustment (search) algorithm,

   or the desire to test at a known subscribed rate without searching.





RG:  Does the MAY here introduce a new method? If it does, would that require

to update the RFC specifying the method?



[acm]

I don't think an update is necessary. We mentioned this possibility

immediately, in RFC 9097 Section 2:



   *  If a network operator is certain of the IP-Layer Capacity to be

      validated, then testing MAY start with a fixed-rate test at the

      IP-Layer Capacity and avoid activating the load adjustment

      algorithm.



###########



10.  Security Considerations





RG: would a receiver (client and host) require an "Emergency Stop" message?



[acm]

When would the client or server send this message?



As mentioned above, either end can initiate a premature stop, and timer

expiration takes care of the test termination at the opposite end.



RG: If yes, should it require authentication in order to avoid an attacker

from unwanted test termination?



[acm]

No "Emergency Stop" message, no attack.



#########





RG: Would a three-way-handshake make sense to activate testing?

(noting that the sender in that case also must be protected against

opening of unbounded numbers of tests). A three way handshake protects

against forged test set up messages.



[acm]

The combination of Test Setup and Test Activation define a 4-way handshake.





RG: What else could be forged?

[acm] everything in the current version, except the Authentication string.





RG: Do these require authentication or at least a discussion?



    Response message feedback (indicating ramp-up/no drop where there's congestion or the other way around, congestion where there is none).

    Stop messages (unwanted termination)

    Could a host or a client be tricked into persistently acting as a sender?



[acm]

Yes, of course! We want to supply sufficient AUTH and integrity options when

needed.  That's partly why we petitioned for WG Adoption, to get an early SEC-DIR

review or two.



However:



I have begin to think that we only need 4 security modes of operation:

1. Unauthenticated (in the protocol now)

2. Password-protected test setup (in the protocol now)

3. Encrypted Test Setup exchanges

4. Run the protocol inside an encrypted tunnel



#4 will have performance implications for high capacity measurements

on small hosts (in residences, GWs, WLAN devices, etc.)



FYI -  a client cannot be tricked into persistently acting as a sender.

The command that starts the client process determines this role.





########





Editorials



[acm]

Thanks for these!  I'll get to them in a second pass...



From: ippm <ippm-bounces@ietf.org><mailto:&lt;ippm-bounces@ietf.org&gt;> On Behalf Of Ruediger.Geib@telekom.de<mailto:Ruediger.Geib@telekom.de>

Sent: Tuesday, December 7, 2021 3:01 AM

To: marcus.ihlar=40ericsson.com@dmarc.ietf.org<mailto:marcus.ihlar=40ericsson.com@dmarc.ietf.org>

Cc: ippm@ietf.org<mailto:ippm@ietf.org>

Subject: Re: [ippm] draft-morton-ippm-capacity-metric-protocol



Hi Marcus,



I support adoption.



Regards, Ruediger





Some comments:



Section  3.  Protocol Overview



   The client requires configuration of a test direction parameter

   (upstream or downstream test) as well as the hostname or IP address

   of the server in order to begin the setup and configuration exchanges

   with the server.



RG: The draft also mentions a sender and a receiver. Both, client and server

may act as sender and receiver. This depends on the test direction,

upstream or downstream.

Words to that appear in "9.  Method of Measurement", at the end of the doc.





4.  Stopping the Test: The server initiates the phase to stop the

       test by setting the STOP1 indication in load PDUs or sstatus

       feedback messages.                                                      ( ^^^^)



RG: Would it be worth a thought to enable the client to terminate a test?



##########



5.  Setup Request and Response Exchange



The message format isn't "TLV". Is the protocol extensible (e.g. could security be adapted to future needs)?



##########



6.2.  Test Activation Request - server response



.....The remaining 28 octets of the Test Activation Request (normally read



RG: A bit worrying, seems to be set by the sender in the reply to a request only. See editorials...



##########



7.1.  Test Packet PDU and Roles



.... On the other hand, the test configuration MAY use a fixed sending

   rate requested by the client,



RG: contains descriptive text about the method (e.g. decision on the sending rate). The text

there certainly is correct. I wonder, whether a reference replacing the text would be sufficient?



RG:  Does the MAY here introduce a new method? If it does, would that require to update the

RFC specifying the method?



###########



10.  Security Considerations



RG: would a receiver (client and host) require an "Emergency Stop" message? If yes, should it require authentication in order to avoid an attacker from unwanted test termination?



Would a three-way-handshake make sense to activate testing? (noting that the sender in that case also must be protected against opening of unbounded numbers of tests). A three way handshake protects against forged test set up messages.



What else could be forged? Do these require authentication or at least a discussion?



  *   Response message feedback (indicating ramp-up/no drop where there's congestion or the other way around, congestion where there is none).

  *   Stop messages (unwanted termination)

  *   Could a host or a client be tricked into persistently acting as a sender?

########





Editorials



6.2.  Test Activation Request - server response



...   When the server sends the Test Activation response back, it SHALL set

   the cmd Response field to:



RG: Server Test Activation Reply (or Response - please apply stringently through the text)

When the server responds by a Test Activation Reply, it...



----



   The server SHALL include all the test parameters again to make the

   client aware of any changes.



RG: The server SHALL repeat all test parameters to indicate changes to the client.



----



8.  Stopping the Test



   When the test duration timer on the server expires, it SHALL set the

   connection test action to STOP and also starts marking all outgoing

   load or status PDUs with a test action of STOP1.



RG: ...and mark all outgoing load...



----



10.  Security Considerations



A. Unathenticated mode (for all phases)



Unauthenticated

    ^^^^



Von: ippm ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org%3cmailto:ippm-bounces@ietf.org>> Im Auftrag von Marcus Ihlar

Gesendet: Montag, 6. Dezember 2021 16:53

An: ippm@ietf.org<mailto:ippm@ietf.org<mailto:ippm@ietf.org%3cmailto:ippm@ietf.org>>

Betreff: [ippm] draft-morton-ippm-capacity-metric-protocol



Hi IPPM,



This email starts an adoption call for draft-morton-ippm-capacity-metric-protocol, " Test Protocol for One-way IP Capacity Measurement".  This document is intended for Standards Track and defines a protocol for measuring Network Capacity metrics defined in RFC 9097 (https://datatracker.ietf.org/doc/rfc9097/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc9097/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGox6tI3-r$><https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc9097/*3Chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/rfc9097/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGox6tI3-r$*3E__;JSU!!BhdT!1qVUfqn2jow5EAH196PRM4gYdPZVXHWD-KBkL09K7O2c_0-Afw-glLh3PZlo$>)$>).



https://datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGoww_Z_IZ$><https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/*3Chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-morton-ippm-capacity-metric-protocol/__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGoww_Z_IZ$*3E__;JSU!!BhdT!1qVUfqn2jow5EAH196PRM4gYdPZVXHWD-KBkL09K7O2c_0-Afw-glAiaJmFG$>

https://datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02<https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGo-rAHSKU$><https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02*3Chttps:/urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-02__;!!BhdT!0XFagPVddMPqLtUl1ej6zNK69Ogn2sgujZ23jLU92MHMnHJnppFGo-rAHSKU$*3E__;JSU!!BhdT!1qVUfqn2jow5EAH196PRM4gYdPZVXHWD-KBkL09K7O2c_0-Afw-glLGZul8p$>



This adoption call will last until Monday, December 20. Please review the document, and reply to this email thread to indicate if you think IPPM should adopt this document.



BR,

Marcus