Re: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01

"MORTON JR., AL" <acmorton@att.com> Fri, 22 October 2021 23:23 UTC

Return-Path: <acmorton@att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72E033A08DC for <ippm@ietfa.amsl.com>; Fri, 22 Oct 2021 16:23:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=att.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i40mTBG5HohQ for <ippm@ietfa.amsl.com>; Fri, 22 Oct 2021 16:23:27 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 875ED3A0912 for <ippm@ietf.org>; Fri, 22 Oct 2021 16:23:27 -0700 (PDT)
Received: from pps.filterd (m0053301.ppops.net [127.0.0.1]) by mx0a-00191d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 19MMVFjt035755; Fri, 22 Oct 2021 19:23:26 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by mx0a-00191d01.pphosted.com with ESMTP id 3bv65n1ask-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 22 Oct 2021 19:23:26 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 19MNNPck005360; Fri, 22 Oct 2021 19:23:25 -0400
Received: from zlp27126.vci.att.com (zlp27126.vci.att.com [135.66.87.47]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id 19MNNMVG005328 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 22 Oct 2021 19:23:22 -0400
Received: from zlp27126.vci.att.com (zlp27126.vci.att.com [127.0.0.1]) by zlp27126.vci.att.com (Service) with ESMTP id EE5FC4013F90; Fri, 22 Oct 2021 23:23:21 +0000 (GMT)
Received: from MISOUT7MSGEX2DD.ITServices.sbc.com (unknown [135.66.184.207]) by zlp27126.vci.att.com (Service) with ESMTP id CE3164013F81; Fri, 22 Oct 2021 23:23:21 +0000 (GMT)
Received: from MISOUT7MSGED1AA.ITServices.sbc.com (135.66.184.195) by MISOUT7MSGEX2DD.ITServices.sbc.com (135.66.184.207) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14; Fri, 22 Oct 2021 19:23:21 -0400
Received: from MISOUT7MSGETA02.tmg.ad.att.com (144.160.12.220) by MISOUT7MSGED1AA.ITServices.sbc.com (135.66.184.195) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14 via Frontend Transport; Fri, 22 Oct 2021 19:23:21 -0400
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.45) by edgeso2.exch.att.com (144.160.12.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.14; Fri, 22 Oct 2021 19:23:21 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iC5+LAiB5HYYyOAXs1ZLU32qktJzH3SRPd2zJFV5P2I0aXgEAL3hEio/tiQusXU1/+7EGcgltCbTzcxPpvJAvcJyuA6v7vB3f9xCeYC4cHWAg8I3JbFybU52S2/9NVPX3OxKNrs3uhzS1OpVXeNdqz2zJSzyJJLtYXAxdtnKbZ/RXSKhvDqS6a6ayWAXhfJd3J2okH2lsChgq8Eehmr2IMkQBT4Iyw9stjPm0kytUbuvFqAFQ834MDJ2ltdKAMnX5Mm27YuyINbNpUaAiA9QsFbybbA3SXy/eWDsfMDYlED/m435lKK0PHQKxr9ROBDS03LoJiRjnphvxLhSJy+vnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tk3RRP2CLaZ+eq1GeO2N1ds+X5v7IxjZFos7MCHWwU0=; b=KgXtacoRG60X0+BFoPZbv4aqPxoyiYzY/I8eahXUOMVu3BudUOL8w1t27c8qLPPaXr5Bg0Sr/8foM64hc/x7YJtxHMOfryYnS09ppbJ3dajP7imKvdlTrhiopdXkIXvydGLE+4mAVaeQNGmIl+AJ7eXJVbaQbKQa6o6cj7j6QQp23wsVdkdumGuffWIhjuxhrQwG6Pfu6r+FjY3xZC+ccsevW5KniFWrYAwhS5GsKRvXt97vARcQfdRyMtp4b1Xyhfz56sjFPuS3ceIIDj13cxTsfkpli/gTSbNnxS3K380uCsv9re1yIrQ6SoziNti7iiw+wGdtzRaZIwORvD4G6w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=att.com; dmarc=pass action=none header.from=att.com; dkim=pass header.d=att.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=att.onmicrosoft.com; s=selector2-att-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tk3RRP2CLaZ+eq1GeO2N1ds+X5v7IxjZFos7MCHWwU0=; b=RNBktZynKmtI2eaty9RAG4eEwIvPmL1FZpN40eOokrDlBqTe4RFUN9SBByINnH18kaZNjGeJKI/Ad/P8G0BVMWJ7/Y38w7HQaTvCa8F6szPztB+EWwgZN/Vg8hKcgKGp9rniYpKovjUVC0XbxXr/3D7GnXpp4q/1GMYiybLjsuQ=
Received: from SJ0PR02MB7853.namprd02.prod.outlook.com (2603:10b6:a03:32e::8) by BYAPR02MB5719.namprd02.prod.outlook.com (2603:10b6:a03:11e::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4608.17; Fri, 22 Oct 2021 23:23:14 +0000
Received: from SJ0PR02MB7853.namprd02.prod.outlook.com ([fe80::49a5:79a:dfde:9b56]) by SJ0PR02MB7853.namprd02.prod.outlook.com ([fe80::49a5:79a:dfde:9b56%5]) with mapi id 15.20.4628.018; Fri, 22 Oct 2021 23:23:14 +0000
From: "MORTON JR., AL" <acmorton@att.com>
To: "Ruediger.Geib@telekom.de" <Ruediger.Geib@telekom.de>
CC: "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01
Thread-Index: AQHXxmGb2Bs+Ikc7FEOtU5OB8puCNqvfqAVQ
Date: Fri, 22 Oct 2021 23:23:14 +0000
Message-ID: <SJ0PR02MB7853C4DE7EB6FE962424BEC8D3809@SJ0PR02MB7853.namprd02.prod.outlook.com>
References: <SJ0PR02MB78533269DB297F70106A8FE1D3BD9@SJ0PR02MB7853.namprd02.prod.outlook.com> <FR2P281MB0611C30363D437000594B59E9CBF9@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
In-Reply-To: <FR2P281MB0611C30363D437000594B59E9CBF9@FR2P281MB0611.DEUP281.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: telekom.de; dkim=none (message not signed) header.d=none;telekom.de; dmarc=none action=none header.from=att.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4ab85a5a-5f97-4ce6-a601-08d995b2ebf2
x-ms-traffictypediagnostic: BYAPR02MB5719:
x-microsoft-antispam-prvs: <BYAPR02MB571927F3D1D38282140DCB2FD3809@BYAPR02MB5719.namprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR02MB7853.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(5660300002)(82960400001)(6506007)(52536014)(8676002)(2906002)(66476007)(66574015)(8936002)(82202003)(9686003)(33656002)(4326008)(122000001)(66946007)(38070700005)(66446008)(38100700002)(508600001)(26005)(83380400001)(76116006)(66556008)(966005)(316002)(71200400001)(64756008)(55016002)(186003)(6916009)(53546011)(86362001)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR02MB7853.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4ab85a5a-5f97-4ce6-a601-08d995b2ebf2
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Oct 2021 23:23:14.3686 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e741d71c-c6b6-47b0-803c-0f3b32b07556
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: am2935@att.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR02MB5719
X-OriginatorOrg: att.com
X-TM-SNTS-SMTP: 1E6672A254B0EEE845F4D729E3CDF4A8E87282D2C0EFD20BA30777B256FDE6352
X-Proofpoint-GUID: z74KdC3aG1SYdp49hV33bGhK5dAhpsPV
X-Proofpoint-ORIG-GUID: z74KdC3aG1SYdp49hV33bGhK5dAhpsPV
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.182.1,Aquarius:18.0.790,Hydra:6.0.425,FMLib:17.0.607.475 definitions=2021-10-22_05,2021-10-22_01,2020-04-07_01
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 impostorscore=0 clxscore=1015 adultscore=0 mlxlogscore=878 phishscore=0 suspectscore=0 lowpriorityscore=0 mlxscore=0 spamscore=0 bulkscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2109230001 definitions=main-2110220132
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/kf_Rusys48xBprHVC5705VEHQ_Q>
Subject: Re: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Oct 2021 23:23:35 -0000

Hi Rüdiger, 

Many thanks for your review and comments!
Please see replies below, [acm]

Al

> -----Original Message-----
> From: Ruediger.Geib@telekom.de <Ruediger.Geib@telekom.de>
> Sent: Thursday, October 21, 2021 5:54 AM
> To: MORTON JR., AL <acmorton@att.com>
> Cc: ippm@ietf.org
> Subject: AW: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01
> 
> Hi Al,
> 
> A standardized protocol to request a standardized access bandwidth measurement
> is a generic requirement and I appreciate your initiative. As a person not
> personally implementing software, some high level comments on the doc only:
> 
> 2.  Scope, Goals, and Applicability, last sentence:
> 
>    "The primary application of the protocol described here is the same as
>    in Section 2 of [RFC7479] where:"
> 
> That's a mis-quote, isn't it? You target another RFC, don't you?
[acm] 
Yes, that's a typo it is 7497.

> From numbers I guessed:
> https://urldefense.com/v3/__https://www.rfc-
> editor.org/rfc/rfc7497.html*section-2__;Iw!!BhdT!y6i-
> TyjWraBDT2trFoyuIFq4w_HAiM69YBGudRqV6CYCfy0IwpDrcJsftMK9$
[acm] 
right!
> 
> I started with a minor issue, as it points to RFC7497. The latter RFC contains
> the following statement:
> https://urldefense.com/v3/__https://www.rfc-
> editor.org/rfc/rfc7497.html*section-7__;Iw!!BhdT!y6i-
> TyjWraBDT2trFoyuIFq4w_HAiM69YBGudRqV6CYCfy0IwpDrcJC4OWUG$
> "Current IETF standardized test protocols (... [RFC5357 - TWAMP]..) do not
> possess the asymmetric size generation capability with two-way testing."
[acm] 
Right, we have a different problem with TWAMP and others, described below.
> 
> Adding a brief section to draft-morton-ippm-capacity-metric-protocol
> discussing why e.g. TWAMP (or a simplified version) isn't applied or rather
> enhanced for the measurement protocol may be useful. If existing IETF IPPM
> measurement control protocols don't offer any benefits justifying their
> adaption for a capacity-metric-protocol, the section will be brief. If there's
> pro and con, what's worth adding functionality to TWAMP and what's the "cost"
> (in terms of work and changes) may be worth some words. Should inclusion of a
> capacity-metric-protocol to TWAMP be worth a thought, a few words on required
> features and changes (a sketch on what to add) may be useful. I'm not a TWAMP
> expert, I excuse if my comment doesn't apply.
[acm] 
No problem, I thought about this before writing this draft. It comes down to these four points (which I will add in the Intro):

   Although there are several test protocol already available for
   support and manage active measurements, this protocol is a major
   departure from their operation:

   1.  UDP transport is used for all setup, test activation, and control
       messages, and for results feedback (not TCP), simplifying
       operations.

   2.  TWAMP and STAMP use the philosophy that one host is a Session-
       Reflector, sending test packets every time they receive a test
       packet.  This protocol supports a one-way test with periodic
       status messages returned to the sender.

   3.  OWAMP supports one-way testing with results Fetch at the end of
       the test session.  This protocol supports a one-way test and requires
       periodic status messages returned to the sender to support the
       load adjustment search algorithm.

   4.  The security features of OWAMP and TWAMP have been described as
       "unusual", to the point that IESG approved their use while also
       asking that these methods not be used again.  Further, the *WAMP
       approach to security is over 15 years old at this time.

I concluded that any attempt to enhance OWAMP or others would be time wasted. We have a unique use-case here.

thanks,
Al

> 
> Regards,
> 
> Ruediger
> 
> -----Ursprüngliche Nachricht-----
> Von: ippm <ippm-bounces@ietf.org> Im Auftrag von MORTON JR., AL
> Gesendet: Mittwoch, 20. Oktober 2021 00:32
> An: IETF IPPM WG <ippm@ietf.org>
> Betreff: [ippm] Questions on draft-morton-ippm-capacity-metric-protocol-01
> 
> Hi IPPM,
> 
> Len Ciavattone and I am looking for some feedback on our protocol [0] designed
> to help measure the Maximum IP-Layer Capacity Metric (which will be published
> as an RFC shortly).
> 
> We are asking folks to take a look at the draft, because we are fairly sure
> you will have some questions!
> 
> One area where we know more development is required is the Modes of operation,
> which essentially describes how the different aspects/exchanges of the
> protocol will be made secure. This is pretty-much a green-field in our
> specification, so suggestions are very welcome.  Section 10 currently
> describes the different modes that we imagined to be useful (A through F
> below), but practical aspects of any proposed solution might indicate modes
> that should be combined, split-up, or new modes.
> 
> So, please give the draft and/or the list below a look, and let us know what
> you think.
> 
> thanks!
> Al
> 
> 
> [0] https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-
> morton-ippm-capacity-metric-protocol-01.txt__;!!BhdT!y6i-
> TyjWraBDT2trFoyuIFq4w_HAiM69YBGudRqV6CYCfy0IwpDrcGmC1X4M$
> 
>    3.  Client-server authentication and integrity protection for
>        feedback messages conveying measurements is RECOMMENDED.  To
>        accomodate different host limitations and testing circumstances,
>        different modes of operation are recommended:
> 
>  A. Un-authenticated mode (for all phases) AND  B. OPTIONAL Authenticated set-
> up only
> SHA-256 HMAC time-window verification (5 min time stamp verification) (could
> add silent failure option)
> 
>      -=-=-=-=-=-=-=-=-=-
> 
>  C. Encrypted setup and test-activation
> (currently using OpenSSL Library, so KISS, but may be too slow for test
> packets)
> 
>      -=-=-=-=--=- Old/low-power host performance impacts -=-=-=-=-=-=-
> 
>  D. Encrypted feedback messages
> 
>  E. Integrity protection for test packets SHA-256 HMAC
> 
>  F. Encrypted test packets (maybe also valuable to defeat compression on
> links)
> 
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ippm__;!!Bhd
> T!y6i-TyjWraBDT2trFoyuIFq4w_HAiM69YBGudRqV6CYCfy0IwpDrcPzob7Gi$