Re: [ippm] Shepherd Review of draft-ietf-ippm-stamp-05

Greg Mirsky <gregimirsky@gmail.com> Wed, 17 April 2019 01:32 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8514D12009A; Tue, 16 Apr 2019 18:32:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q9Ud6olNlAez; Tue, 16 Apr 2019 18:32:24 -0700 (PDT)
Received: from mail-lj1-x22b.google.com (mail-lj1-x22b.google.com [IPv6:2a00:1450:4864:20::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EC0F6120088; Tue, 16 Apr 2019 18:32:23 -0700 (PDT)
Received: by mail-lj1-x22b.google.com with SMTP id v13so20875112ljk.4; Tue, 16 Apr 2019 18:32:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zpvOGvcZnJR1Z6gNWw+kEmQsCioBNjxMrsmQ3K3pxb0=; b=EN8Ezp37UwpTGUdzbejDwhLxMNsl2zREDzDpdc+QWbeToui8ZZZQ86OS+N3E3Ao2dq 7YJVr/onf9rzbKqsB+3O7b6895ktvhIXP7VujIePzfttYlku9TSqR7TWFp9bQ0Jff8z4 zpn6wsOq8hxcBKoqCo3hLzc460UwfgoAbVzWdDKZw0ok0PABMlw6E7btqUyRzEVl2p+f yP5uXww1JS1/eyuh53mfr3Rcru1wsS89HSlamwWAnoXZgRGE5BPZGLi0j1fCWLnoiGvZ BfHB78BGtqoMBMqjwFJ5LMhmyAX1NSpcdbASOzkAd9/5x8Xk9hPLOcyiEv2Qz+bbxT1H g9Eg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zpvOGvcZnJR1Z6gNWw+kEmQsCioBNjxMrsmQ3K3pxb0=; b=LYW1SaL/w0UlruCopUriEHB+mv9hhlzi0q5FaZdwjdTdGDzRtjslH4xgIE7aaQxjZ5 O+0/8bdoQuZ3jEWn4PoVgmehA0xERpbCXtinpKpN18H+FarfCqATaqIB/ubwM2smC+kl R947kNBainaFfWu1zd3urlU/V+tJ5Egj2VCy+NwzzoByvPQYew3iesYeWEoOtYQ5sYxA N/b67Xl9POJShBVin0tInM5BVnFt5kRVmzHIdugGz84BjPVHk/tEtDQ9Rx4O0jiIJV2u d75N/eIr5hy2NQR0JyPpDA77pMAF4wsTNEt8kmEastdt7q9zVaG5Jn7YcvnkedadNaPE hK1w==
X-Gm-Message-State: APjAAAXEjGkPYlEsrw1rIqZkPGa7vYMuQSBEnh8Qdfcb2Ymf8YeaekoK H2guYUPqSMnxosexFcddNws33ihK8PAftYIGoeo=
X-Google-Smtp-Source: APXvYqykUWWngBvOTssVhup2bSJKd/2IyEhRvTK0GaLY+6DQgDbsCv0j9DEoiYuRXyI6Yjy+Oy5NgUaSRKPC8UW2xIA=
X-Received: by 2002:a2e:810d:: with SMTP id d13mr32530047ljg.93.1555464742123; Tue, 16 Apr 2019 18:32:22 -0700 (PDT)
MIME-Version: 1.0
References: <CABUE3XmYJM_GC-ntFnt3Gk0376CGjz6HtXxcyKaZ=D=xnWeGMw@mail.gmail.com>
In-Reply-To: <CABUE3XmYJM_GC-ntFnt3Gk0376CGjz6HtXxcyKaZ=D=xnWeGMw@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 16 Apr 2019 18:32:12 -0700
Message-ID: <CA+RyBmX4SmgU=x67GxQf6RY2jr1FmMGcUtL_k1u=e6sk5xaRhg@mail.gmail.com>
To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Cc: "Foote, Footer (Nokia - CA)" <footer.foote@nokia.com>, guo.jun2@zte.com.cn, Henrik Nydell <hnydell@accedian.com>, IETF IPPM WG <ippm@ietf.org>, IPPM Chairs <ippm-chairs@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006a3d270586afdb30"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/PL35g1mE_HbWwdBt6Oe9BcVJlt0>
Subject: Re: [ippm] Shepherd Review of draft-ietf-ippm-stamp-05
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2019 01:32:27 -0000

Dear Tal,
thank you for your thorough review and clear, to the point comments. I'll
be working on updating the draft to address your comments and will share
the proposed changes before uploading the new version of the draft.

Regards,
Greg

On Sun, Apr 14, 2019 at 10:54 PM Tal Mizrahi <tal.mizrahi.phd@gmail.com>
wrote:

> Dear Authors,
>
> Having reviewed the document, I found that it is clear and
> straightforward, and that it is almost ready to be submitted to the IESG,
> with a few minor comments below.
>
> I will highly appreciate if you can post an updated draft, and afterwards
> we will proceed with the publication process.
>
> Thanks,
> Tal.
>
>
> Comments:
>
> - Section 1: I would suggest to mention that TWAMP Light is a lightweight
> architecture of a TWAMP deployment that is presented in RFC 5357.
> - Section 2:
> - The term OSS/BSS should be defined.
> - The acronym SDN should be spelled out in its first appearance.
> - Section 4:
> - "Unauthenticated STAMP test packets are compatible on the wire with
> unauthenticated TWAMP-Test [RFC5357] packet formats."
>   Please explain what "compatible" means. The format defined in STAMP is
> identical to RFC 5357? Can be configured to a specific mode in which it is
> identical to RFC 5357? An RFC 5357 TWAMP node can interoperate with a STAMP
> node? You may want to add a reference here to section 4.4.
> - Section 4.1.1.:
> - Please clarify that the timestamp field is as specified in RFC 5357 and
> RFC 8186.
> - "The Reflect Octets capability defined in [RFC6038]." ==> "This field is
> used for the Reflect Octets capability defined in [RFC6038]."
> - Section 4.1.2. + 4.2.2. + 4.3:
> - Please clarify that the HMAC field is as defined in RFC 5357, and covers
> the same fields as defined in RFC 5357.
> - Section 4.2.1.:
> - "the TTL field" ==> "the TTL field in IPv4 (or Hop Limit in IPv6)"
> - Section 4.3:
> - "If confidentiality protection for STAMP is required, encryption at the
> higher level MUST be used."
>   Please elaborate, preferably with an example. IPsec is at a lower layer
> than STAMP, so not sure "higher level" is clear to the reader.
> - Section 5:
> - This section should be more detailed. You may want to say that the
> general security considerations of TWAMP are discussed in RFC 5357. You may
> also want to explain that the main difference between STAMP and TWAMP is
> the control plane, and you may want to make note that STAMP configuration
> procedures should be secured in order to mitigate attacks at the control
> plane.
> - References:
> - I suggest to move "[BBF.TR-390]" to the informative references.
> - draft-ietf-ippm-port-twamp-test ==> RFC 8545.
> - Minor nit:
> - "less the length" ==> "minus the length"
>
>