Re: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01

Ruediger.Geib@telekom.de Thu, 21 October 2021 09:54 UTC

Return-Path: <Ruediger.Geib@telekom.de>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C5F23A1496 for <ippm@ietfa.amsl.com>; Thu, 21 Oct 2021 02:54:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.55
X-Spam-Level:
X-Spam-Status: No, score=-2.55 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JpY9URPcLMEe for <ippm@ietfa.amsl.com>; Thu, 21 Oct 2021 02:54:08 -0700 (PDT)
Received: from mailout41.telekom.de (mailout41.telekom.de [194.25.225.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C73F93A1491 for <ippm@ietf.org>; Thu, 21 Oct 2021 02:54:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1634810048; x=1666346048; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=IF+FTS5wICmhSrh3buB8v6xsqK3ZrqAZyz64fE9tqK8=; b=cb6DgO/jrvjuDRPF3HREFLirAR1eUsaA29nt+SK6Pa7XJw3MV5J71uPo 26MC0L632bPZMaEIuQ7fW9+470r4YvZAxiGtnEUMNYvp/AMV6ngjitcoH 9TZP4GP9b5WBj2ISiruPVw+2QtGLF2RjylMWwhX+guD6ofahruvOmmv0a NBVuWqyhkKHEGXIw0mIe1aEPeBpazwCV8kZ4ZktK6VH0kDE7H3I+/IndG fZO6ocz4exuUQRvqujoRZqXdmuH9K4Ypnj4udGYoQ47VOZmSnj5X3vQQQ zG5oWm5ynNuRVoSe68/grqRZyV0C/3zmosVLlQ8EWJlJV7oKglTiPy9/l w==;
IronPort-SDR: KjGwU1kyt7uyucPG5Be2xagrjc5hYFCH0/ba02UI4Fdg0hPxoFERRHQ8WxOmL1rsbAxacHhxAk ldskk6N+QlCA==
IronPort-Data: A9a23:GHuiq65kRR/ayUH1AGYzHwxRtB3FchMFZxGqfqrLsTDasY5as4F+vmcaX2yBbq3eNmOhf490Pom/9B8OuMCDy99mGgRkqC1mQiMRo6IpJzg5wmQcns+qw0WqoHtPt63yUfGdapBrJpPgjk31aOG49SMljfjgqofUU4YoBAggHGeIdw9x0XqPq8Zh6mJZqYDR7zGl4LsekOWDULOR4AOYB0pPg061RLODi9yp0N8QlgRWifmmJzYynVFNZH4UDfnZw3cV3uBp8uCGq+brlNlV/0vg0zp8OuLjnru9bggLRKLfJw6HjjxdXK3Kbhpq/3R0i/licqBBNQEM0V1lnPgooDlJnaatRAsoMaDW3ssQUhNwDyx6MK5B/fnLLBBTtOTCkBGbKyW3qxlpJARsVWECwc52GXlL3f0VND5LaQqM799aaprTpvJEn8gufdn6eo8S/G0lzDfFAOwgSJSFSKLPjeK0FQwY3qhmdcsyreJDAda3UCn9Xg==
IronPort-HdrOrdr: A9a23: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
Received: from qde9xy.de.t-internal.com ([10.171.254.32]) by mailout41.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 21 Oct 2021 11:54:03 +0200
IronPort-SDR: xwll5v6YOKdeVc6DqvbYJtylsH+ysp7wjZYhOlIFeZFGScdksw8jLozl5NldtwKe6pMRZvFCRF e1kGgEpv6q17cvDz9Krckg4Mk+Y1gaTq0=
X-IronPort-AV: E=Sophos;i="5.87,169,1631570400"; d="scan'208";a="396622858"
X-MGA-submission: MDHKBGpRue5zpZ1GE5yr9ZOVucdU3SyaNJAm+WqDvwLiaJksY4HqZXr6kp4yKlJj95m9SmmWqqjFMkYhg5pKghX1QmSPomP41RQmbPQoVjx4zu35tOUGbLdyKiHloNr+n8L2pnFpZfZ8CY2dFWOpfu4MXnxQE1keBWVCwFccds9f7Q==
Received: from he199745.emea1.cds.t-internal.com ([10.169.119.53]) by QDE9Y1.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-SHA256; 21 Oct 2021 11:54:03 +0200
Received: from HE199743.EMEA1.cds.t-internal.com (10.169.119.51) by HE199745.emea1.cds.t-internal.com (10.169.119.53) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Thu, 21 Oct 2021 11:54:02 +0200
Received: from HE104163.emea1.cds.t-internal.com (10.171.40.38) by HE199743.EMEA1.cds.t-internal.com (10.169.119.51) with Microsoft SMTP Server (TLS) id 15.0.1497.23 via Frontend Transport; Thu, 21 Oct 2021 11:54:01 +0200
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.175) by O365mail05.telekom.de (172.30.0.230) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Thu, 21 Oct 2021 11:54:01 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RMtKwOucB824m+usWDeIYs1+FOrE++j1wqkCzuT38U85YZ8s9+ZBCAEavt/I6N9P50wHMctzxoTn3hkYh95BxOLlmn7u9BBzBSehvTrwjiJW1gHmmGt6npSxzSSwvbfofJqDl+fYndttjdmxUDxLfBbzn7ZPY1+RcU8BF1meuUkabKjndNOC/AXgWofuRDEO8FJpdihYWvi6KQFAAfmE+sq4eqVnLTIQebvfkr2V0iDNM4me5cXs4OmCtCHLP6wdqsvA6ZYv8Iu8cOzL3jcsAmN4TRnd5aP9phVOXHqOrZuT4h3bTqrnMLgoIuPo6tLXuoRv9n1wHowCqm3Lh9xY5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IF+FTS5wICmhSrh3buB8v6xsqK3ZrqAZyz64fE9tqK8=; b=iXPLIKKQOu5RER0p51HoDugmYIxDq9ZDWVfgRHk7fYC+BoXrlnatfyu/hS7I4wePpc6TNaOHRjbYRJ8CpPJGqdcHypnLE684l+uTTCupbiTZh1CG5ZXxCClbb3Z28RVMG2U04yD3ZROhxRclCSgUFYD0dASnKxEbuXd5e00hFSE85AhQx5FNz4zR5eP2zcK6BcTL5JyxPRjrjLBmcNybDGCJn5GL4Imd+e3jUkiilOT6+a067Sh6PQMwnvOZJe6yxCNzL7duoRJT2G4uF6GRoFYnTuVw0k6Nj5RkVSn7uNkznZo4z8Eom9gKnkD5q/9QkDKZ8XNNJRY6d/jns/k1Ow==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:2c::12) by FR2P281MB0218.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:10::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.10; Thu, 21 Oct 2021 09:54:01 +0000
Received: from FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM ([fe80::b875:2268:60fe:d12a]) by FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM ([fe80::b875:2268:60fe:d12a%9]) with mapi id 15.20.4628.018; Thu, 21 Oct 2021 09:54:01 +0000
From: Ruediger.Geib@telekom.de
To: acmorton@att.com
CC: ippm@ietf.org
Thread-Topic: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01
Thread-Index: AdfFK9goV64vTz3BSZKe4qsMDY7MVgBLmSNg
Date: Thu, 21 Oct 2021 09:54:01 +0000
Message-ID: <FR2P281MB0611C30363D437000594B59E9CBF9@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
References: <SJ0PR02MB78533269DB297F70106A8FE1D3BD9@SJ0PR02MB7853.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB78533269DB297F70106A8FE1D3BD9@SJ0PR02MB7853.namprd02.prod.outlook.com>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: att.com; dkim=none (message not signed) header.d=none;att.com; dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b48a9fc0-66c7-4842-1f89-08d99478b5ab
x-ms-traffictypediagnostic: FR2P281MB0218:
x-microsoft-antispam-prvs: <FR2P281MB0218748C24F18383AB7867519CBF9@FR2P281MB0218.DEUP281.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(8936002)(38070700005)(8676002)(66574015)(6916009)(4326008)(66946007)(5660300002)(2906002)(33656002)(966005)(83380400001)(71200400001)(52536014)(38100700002)(7696005)(86362001)(76116006)(498600001)(55016002)(186003)(66556008)(64756008)(66476007)(122000001)(6506007)(9686003)(66446008)(82960400001)(26005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 6+pih5I52Dwisc4BOABPwNTB1B2hcdK1TNwTPRl5OcDzjEYyAecaDCQabCxVnI0QVtMLAvZ+hncg2FTW7pgMb6WksJ0DkgQ8lCB8qZBoLsl8nD7tTLYBffCnWUk3BJPDG947AEOWz+0yv0GeVJai6VS1xrq2S0kcacAM+/WqmEglocgQ1iJKlDSZAA7DiEoWLcRftJSsJLgqD6Dg02K3wvU2C0/Ww4qOgA7LyegN8Wz3LdKI64P48f3FG1n300l58UPGXv7J5FUDha19RTIs0AQz4R0jIU/FgW6fFHRCcCq6syvY+cYpRb6eyIwdHGtXVFG8omHITtrxAzI12kjgNoXny4/zZAHMUJHkZ2xvgSRnwOlG/CgJU+kvDIfrjlgxdjizVy+CAV3rnxJr0F8XEo4jOYw+ZOgmzcwa8pRtSnIGTDfTy2MGFulw83sLac7HIbSWFyQ5DfzbxFQ9s28qwF+KvuxlP4YcB87pzEA9cemD/dMpB0mB6sH/nzD7eDMlaaS83wJGHusnP2gHkQaGnKQKejAQvNBIHQGtcq0LzSfmay89UIQ1ZS+zIJ3RZdOFTci5Q2qI3rUqiF+s5m3eVtFDRKtQ5al2W6Aw7D0HE832+wqGikoFsLw1bPjuWtHhCt0T35AoAPUfJa28u909en1vKeqlD+fLbmU/p0/pGEF6DuNfYKhbYhrICvF2tmcEsqlPLxyZVbT7w/C3xWLMeoO5F2tUO/fUIYzj3rfNozWHhnFHe8jkOUqUIMv5xt2DE7ycEm5hwDreygfxCg7NK3bGnI4d1Z0SAdzJxSAi2aGi7/9eoUH5yJejLbSM5XRlsyxh1cfyYIml2Js9IUJsFx6MOEkIBaKz+yS5ym+NLIkqAbSAkk6mFTssgD+pFW60gD2ZU5C8FfEoRfQh4UBogt+9orHNmAwIeFI1w0gPHbW6VRey1o4f5zGworYBCLuqn4i2jiMe+isUNv9QBLZXr6pqUbdGgrkspm9sTqpXUI2iIOfB+zuWLEbsI2+NYvYdnh6wh5ZdxnS0ptXwmQ/uKN79uakuaB1ZLH1MaIRW5bMp9owZxi6XRh60VQyk3kuEr9XA6TxFpHCCOpkiDS35K+WIcMBG3x/z5fpYyqda8Fre8zC0iHUp9fkxkEcj0DQ62aqjivfDiETI6+P6CEzBM+VpMcR/PgwZukTQGk60jatMvO9Tcmr+9l5PkFmBOu5vEnYiUAmoA9Xmv3nqYtH4d5vwegbOv7+JDns1dAeyb919salVKzZ5QNLG82yDxQMEow+1EhW9KQWidR7lqPcVmHMBiDT1vhAEJCt0udS/uxRG+yoCNBwV+HPwjRSE3n2xP2Bhh5RU8e68dyq0dQqpnPSD+BJlBg/WSvbtMDDPCMeiNvpNpXA9Fm3bXFk0yIq7BEq8J+BeqDFHL0DUl+DimF0ZC462jbx6nyKGVCmoi3g=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: b48a9fc0-66c7-4842-1f89-08d99478b5ab
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Oct 2021 09:54:01.3796 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ruediger.Geib@telekom.de
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR2P281MB0218
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/Lw7CdmQhDx_gzUsA298AsVuU3gk>
Subject: Re: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Oct 2021 09:54:17 -0000

Hi Al,

A standardized protocol to request a standardized access bandwidth measurement is a generic requirement and I appreciate your initiative. As a person not personally implementing software, some high level comments on the doc only:

2.  Scope, Goals, and Applicability, last sentence: 

   "The primary application of the protocol described here is the same as
   in Section 2 of [RFC7479] where:"

That's a mis-quote, isn't it? You target another RFC, don't you?
>From numbers I guessed:	
https://www.rfc-editor.org/rfc/rfc7497.html#section-2

I started with a minor issue, as it points to RFC7497. The latter RFC contains the following statement:
https://www.rfc-editor.org/rfc/rfc7497.html#section-7
"Current IETF standardized test protocols (... [RFC5357 - TWAMP]..) do not possess the asymmetric size generation capability with two-way testing."

Adding a brief section to draft-morton-ippm-capacity-metric-protocol discussing why e.g. TWAMP (or a simplified version) isn't applied or rather enhanced for the measurement protocol may be useful. If existing IETF IPPM measurement control protocols don't offer any benefits justifying their adaption for a capacity-metric-protocol, the section will be brief. If there's pro and con, what's worth adding functionality to TWAMP and what's the "cost" (in terms of work and changes) may be worth some words. Should inclusion of a capacity-metric-protocol to TWAMP be worth a thought, a few words on required features and changes (a sketch on what to add) may be useful. I'm not a TWAMP expert, I excuse if my comment doesn't apply.

Regards,

Ruediger

-----Ursprüngliche Nachricht-----
Von: ippm <ippm-bounces@ietf.org> Im Auftrag von MORTON JR., AL
Gesendet: Mittwoch, 20. Oktober 2021 00:32
An: IETF IPPM WG <ippm@ietf.org>
Betreff: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01

Hi IPPM,

Len Ciavattone and I am looking for some feedback on our protocol [0] designed to help measure the Maximum IP-Layer Capacity Metric (which will be published as an RFC shortly).

We are asking folks to take a look at the draft, because we are fairly sure you will have some questions!

One area where we know more development is required is the Modes of operation, which essentially describes how the different aspects/exchanges of the protocol will be made secure. This is pretty-much a green-field in our specification, so suggestions are very welcome.  Section 10 currently describes the different modes that we imagined to be useful (A through F below), but practical aspects of any proposed solution might indicate modes that should be combined, split-up, or new modes.

So, please give the draft and/or the list below a look, and let us know what you think.

thanks!
Al 


[0] https://datatracker.ietf.org/doc/html/draft-morton-ippm-capacity-metric-protocol-01.txt

   3.  Client-server authentication and integrity protection for
       feedback messages conveying measurements is RECOMMENDED.  To
       accomodate different host limitations and testing circumstances,
       different modes of operation are recommended:

 A. Un-authenticated mode (for all phases) AND  B. OPTIONAL Authenticated set-up only
SHA-256 HMAC time-window verification (5 min time stamp verification) (could add silent failure option)

     -=-=-=-=-=-=-=-=-=-

 C. Encrypted setup and test-activation
(currently using OpenSSL Library, so KISS, but may be too slow for test packets)

     -=-=-=-=--=- Old/low-power host performance impacts -=-=-=-=-=-=-

 D. Encrypted feedback messages

 E. Integrity protection for test packets SHA-256 HMAC

 F. Encrypted test packets (maybe also valuable to defeat compression on links)

_______________________________________________
ippm mailing list
ippm@ietf.org
https://www.ietf.org/mailman/listinfo/ippm