Skip to main content

A Two-Way Active Measurement Protocol (TWAMP)
draft-ietf-ippm-twamp-09

Revision differences

Document history

Date Rev. By Action
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Chris Newman
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
09 (System) post-migration administrative database adjustment to the Yes position for Lars Eggert
2008-08-14
09 (System) IANA Action state changed to RFC-Ed-Ack from In Progress
2008-08-14
09 (System) IANA Action state changed to In Progress from Waiting on Authors
2008-08-14
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2008-08-13
09 (System) IANA Action state changed to In Progress
2008-08-13
09 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2008-08-13
09 Amy Vezza IESG state changed to Approved-announcement sent
2008-08-13
09 Amy Vezza IESG has approved the document
2008-08-13
09 Amy Vezza Closed "Approve" ballot
2008-08-12
09 Lars Eggert Removed from agenda for telechat - 2008-08-14 by Lars Eggert
2008-08-12
09 Lars Eggert No need for this to return to the telechat.
2008-08-12
09 Lars Eggert State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Lars Eggert
2008-08-12
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2008-08-12
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2008-08-05
09 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman
2008-08-04
09 (System) New version available: draft-ietf-ippm-twamp-09.txt
2008-07-23
09 Pasi Eronen [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen
2008-07-21
09 Amy Vezza Placed on agenda for telechat - 2008-08-14 by Amy Vezza
2008-07-18
09 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2008-07-17
09 Cindy Morgan State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan
2008-07-17
09 Chris Newman
[Ballot discuss]
This document mentions 'UTF-8' without a reference.  Please add a
reference to STD 63 (RFC3629).

RFC 4656 uses a shared secret …
[Ballot discuss]
This document mentions 'UTF-8' without a reference.  Please add a
reference to STD 63 (RFC3629).

RFC 4656 uses a shared secret in the form of a passphrase with no
mention of what charset is used to encode that passphrase.  That's
likely to cause interoperability problems for non-US-ASCII passphrases
and this specification inherits that problem.  Some resolutions that
would address the interoperability problem:
1. the passphrase must be US-ASCII.
2. the passphrase is UTF-8 as described in RFC 5198
3. the passphrase is UTF-8 with SASLprep (RFC 4013)
2008-07-17
09 Chris Newman
[Ballot comment]
The use of UTF-8 for KeyID is sufficiently narrow that it's unlikely to
create interoperability issues, but a reference to RFC 5198 would …
[Ballot comment]
The use of UTF-8 for KeyID is sufficiently narrow that it's unlikely to
create interoperability issues, but a reference to RFC 5198 would reduce
the chances of problem.  Without some canoncialization, it's possible to
have a KeyID most people can't type but it's unlikely people will actually
do that in practice.
2008-07-17
09 Chris Newman [Ballot discuss]
This document mentions 'UTF-8' without a reference.  Please add a
reference to STD 63 (RFC3629).
2008-07-17
09 Chris Newman [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman
2008-07-17
09 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2008-07-17
09 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2008-07-17
09 Amy Vezza State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza
2008-07-17
09 Mark Townsley State Changes to IESG Evaluation - Defer from IESG Evaluation by Mark Townsley
2008-07-16
09 Tim Polk
[Ballot comment]
Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that
in OWAMP.    Doesn't the Session-Sender need to be the entity …
[Ballot comment]
Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that
in OWAMP.    Doesn't the Session-Sender need to be the entity that "is capable of returning
the results of a test session" since the Server no longer fills that role?  If that is true, I believe
Session-Sender should be added to the list with its expanded role.

It strikes me as a little odd that the first block of a message is encrypted in "authenticated only
mode".  It would be helpful if the security considerations shed some light on this architectural
decision.  (I realize that this is a carryover from 4656, but I didn't find a rationale there either.)

Upon review, the use of CBC with an IV of zero seems to be secure in the context of this
protocol.  However, generation of an IV in addition to the key material doesn't seem to be
an insurmountable problem.  I am curious why the designers of OWAMP chose this path...
2008-07-16
09 Tim Polk
[Ballot discuss]
The protocol relies on PKCS #5 to generate keys from shared secrets (passwords).  The document
recommends using 1024 as the iteration counter but …
[Ballot discuss]
The protocol relies on PKCS #5 to generate keys from shared secrets (passwords).  The document
recommends using 1024 as the iteration counter but provides a 32-bit field to convey the
iteration counter.  At the extreme, this provides an opportunity for a a DOS attack; generating
a key using 2**32 iterations could stall a system for a significant amount of time.  The
security considerations should strongly recommend configuration controls to permit rejecting
requests that specify overly large iteration counters.

TWAMP Light has SHOULDs for supporting authenticated and encrypted mode, but doesn't
include a TWAMP control session.  However, deriving the keys *requires* a TWAMP-Control
Session key.  How does the key derivation work in the absence of a TWAMP control session
key?  Further specification is needed here!
2008-07-16
09 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2008-07-16
09 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2008-07-16
09 Russ Housley
[Ballot comment]
I find the introduction to this document quite confusing.  I would
  me much happier with an introduction that tells the reader about …
[Ballot comment]
I find the introduction to this document quite confusing.  I would
  me much happier with an introduction that tells the reader about
  the shortcomings of the current ICMP Echo-based solution and how
  the addition of a timestamp by the reflector is an improvement.

  Please define "MBZ".  Suresh Krishnan suggested the following:
  >
  > The bits marked MBZ MUST be set to zero by senders and MUST be
  > ignored by receivers.

  Suresh Krishnan suggested that Section 3.8 set the number of
  sessions field to 0 since there are no session description records
  that follow.
2008-07-16
09 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2008-07-16
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2008-07-15
09 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2008-07-15
09 Magnus Westerlund
[Ballot comment]
Section 4.2.1:

(with the implication that the later two modes will
  not fit in a single ATM cell)

Is this comment at …
[Ballot comment]
Section 4.2.1:

(with the implication that the later two modes will
  not fit in a single ATM cell)

Is this comment at all relevant as there will be an IP and UDP header on the packet also, making the smallest packet size become 28+41?

Or is the intention to allow the format to be used with other encapsulations then IP/UDP? Then I would expect a clearer description of this fact and recommendation on what is necessary for that usage.
2008-07-15
09 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Yes from Discuss by Lars Eggert
2008-07-15
09 (System) State Changes to IESG Evaluation from IESG Evaluation - Defer by system
2008-07-09
09 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Sam Hartman.
2008-07-03
09 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2008-07-02
09 Tim Polk State Changes to IESG Evaluation - Defer from IESG Evaluation by Tim Polk
2008-07-02
09 Tim Polk
[Ballot comment]
Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that
in OWAMP.    Doesn't the Session-Sender need to be the entity …
[Ballot comment]
Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that
in OWAMP.    Doesn't the Session-Sender need to be the entity that "is capable of returning
the results of a test session" since the Server no longer fills that role?  If that is true, I believe
Session-Sender should be added to the list with its expanded role.
2008-07-02
09 Tim Polk
[Ballot comment]
Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that
in OWAMP.    Doesn't the Session-Sender need to be the entity …
[Ballot comment]
Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that
in OWAMP.    Doesn't the Session-Sender need to be the entity that "is capable of returning
the results of a test session" since the Server no longer fills that role?  If that is true, I believe
Session-Sender should be added to teh list with its expanded role.
2008-07-01
09 Lars Eggert [Ballot discuss]
Sam Hartman's sec-dir review requires a response.
2008-07-01
09 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to Discuss from Yes by Lars Eggert
2008-06-30
09 Lars Eggert [Ballot Position Update] New position, Yes, has been recorded for Lars Eggert
2008-06-30
09 Lars Eggert Ballot has been issued by Lars Eggert
2008-06-30
09 Lars Eggert Created "Approve" ballot
2008-06-27
09 Lars Eggert State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Lars Eggert
2008-06-27
09 Lars Eggert Placed on agenda for telechat - 2008-07-03 by Lars Eggert
2008-06-26
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-06-13
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Sam Hartman
2008-06-13
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Sam Hartman
2008-06-12
09 Amanda Baber
IANA Last Call comments:

Action #1:
Upon approval of this document, the IANA will make the following
assignments in the "port numbers" registry at
http://www.iana.org/assignments/port-numbers …
IANA Last Call comments:

Action #1:
Upon approval of this document, the IANA will make the following
assignments in the "port numbers" registry at
http://www.iana.org/assignments/port-numbers

twamp-control TBD/tcp TWAMP-Control
twamp-control TBD/udp TWAMP-Control
# [RFC-ippm-twamp-08]

Note: if it is still possible to do so when the document is approved,
IANA will assign port number 862.

Action #2:
Upon approval of this document, the IANA will create the following
registry at http://www.iana.org/assignments/TBD

Registry Name: Two Way Active Measurement Protocol (TWAMP)
Control Number
Reference: [RFC-ietf-ippm-twamp-08.txt]
Registration Procedure: IETF Consensus

Registry:
Value Description Semantics Definition Reference
0 Reserved [RFC-ietf-ippm-twamp-08.txt]
1 Forbidden [RFC-ietf-ippm-twamp-08.txt]
2 Start-Sessions RFC4656, Section 3.7 [RFC4656]
3 Stop-Sessions RFC4656, Section 3.8 [RFC4656]
4 Reserved [RFC-ietf-ippm-twamp-08.txt]
5 Request-TW-Session this document, Section 3.5  [RFC-ietf-ippm-twamp-08.txt]
6 Experimentation undefined, see Section 8.3. [RFC-ietf-ippm-twamp-08.txt]
7-15 Unassigned

We understand the above to be the only IANA Actions for this
document.
2008-06-12
09 Amy Vezza Last call sent
2008-06-12
09 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2008-06-12
09 Lars Eggert State Changes to Last Call Requested from AD Evaluation by Lars Eggert
2008-06-12
09 Lars Eggert Last Call was requested by Lars Eggert
2008-06-12
09 (System) Ballot writeup text was added
2008-06-12
09 (System) Last call text was added
2008-06-12
09 (System) Ballot approval text was added
2008-06-12
09 Lars Eggert [Note]: 'Document Shepherd: Henk Uijterwaal (henk@ripe.net)' added by Lars Eggert
2008-06-12
09 Lars Eggert AD Review happened during WGLC.
2008-06-12
09 Lars Eggert State Changes to AD Evaluation from Publication Requested by Lars Eggert
2008-06-12
09 Lars Eggert State Change Notice email list have been change to ippm-chairs@tools.ietf.org, draft-ietf-ippm-twamp@tools.ietf.org from ippm-chairs@tools.ietf.org
2008-06-11
09 Cindy Morgan State Changes to Publication Requested from AD is watching by Cindy Morgan
2008-06-11
09 Cindy Morgan
(1.a) Who is the Document Shepherd for this document? Has the Document Shepherd
personally reviewed this version of the document and, in particular, does he …
(1.a) Who is the Document Shepherd for this document? Has the Document Shepherd
personally reviewed this version of the document and, in particular, does he or
she believe this version is ready for forwarding to the IESG for publication?

Henk Uijterwaal, henk@ripe.net. Yes, I have personally reviewed this document
throughout its life and believe that it is now ready for publication.

(1.b) Has the document had adequate review both from key WG members and from key
non-WG members? Does the Document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

The document has been reviewed by at least 8 WG members (the ones mentioned
section 7), but there have been more comments from folks on the list about
this document. The reviews appear to be thorough, as they touched on many
details in the document.


(1.c) Does the Document Shepherd have concerns that the document needs more
review from a particular or broader perspective, e.g., security, operational
complexity, someone familiar with AAA, internationalization or XML?

No. This document is closely related to the OWAMP protocol (RFC 4656).
Operational and security issues are similar and were discussed extensively
during the development of that document. No new issues came up during
the development of TWAMP.

(1.d) Does the Document Shepherd have any specific concerns or issues with
this document that the Responsible Area Director and/or the IESG should be aware of?

No

(1.e) How solid is the WG consensus behind this document? Does it represent
the strong concurrence of a few individuals, with others being silent, or
does the WG as a whole understand and agree with it?

A large fraction of the WG understands the document and agrees with it.

(1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent?

No

(1.g) Has the Document Shepherd personally verified that the document
satisfies all ID nits?

The id-nits tool notices a few things but a review by a carbon based
processor showed that these are bugs in the tool, not the document.

(1.h) Has the document split its references into normative and informative?

Yes

Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear state?

No


(1.i) Has the Document Shepherd verified that the
document IANA consideration section exists and is consistent with the body of
the document?

Yes

If the document specifies protocol extensions, are reservations
requested in appropriate IANA registries? Are the IANA registries clearly
identified? If the document creates a new registry, does it define the proposed
initial contents of the registry and an allocation procedure for future
registrations? Does it suggest a reasonable name for the new registry? See
[RFC2434]. If the document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG can appoint the
needed Expert during the IESG Evaluation?

This is the case.


(1.j)

N/A.

(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document Announcement Write-Up?



Technical Summary

The One-way Active Measurement Protocol [RFC4656] (OWAMP) provides
a common protocol for measuring one-way metrics between network
devices. OWAMP can be used bi-directionally to measure one-way
metrics in both directions between two network elements. However,
it does not accommodate round-trip or two-way measurements. This
memo specifies a Two-way Active Measurement Protocol (TWAMP), based
on the OWAMP, that adds two-way or round-trip measurement
capabilities. The TWAMP measurement architecture is usually
comprised of two hosts with specific roles, and this allows for
some protocol simplifications, making it an attractive alternative
in some circumstances.

Working Group Summary

The working group has supported the document through the last
few revisions, and it has been uncontroversial.

Document Quality
The document has been given thorough review by the group over its
revisions, the key reviewers are listed in the acknowledgements section.

Personnel
Document Shepherd: Henk Uijterwaal
Responsible Area Director: Lars Eggert
2008-06-09
08 (System) New version available: draft-ietf-ippm-twamp-08.txt
2008-05-22
07 (System) New version available: draft-ietf-ippm-twamp-07.txt
2007-12-18
06 (System) New version available: draft-ietf-ippm-twamp-06.txt
2007-11-13
05 (System) New version available: draft-ietf-ippm-twamp-05.txt
2007-05-31
04 (System) New version available: draft-ietf-ippm-twamp-04.txt
2007-03-02
03 (System) New version available: draft-ietf-ippm-twamp-03.txt
2006-11-30
02 (System) New version available: draft-ietf-ippm-twamp-02.txt
2006-10-17
09 Lars Eggert Intended Status has been changed to Proposed Standard from None
2006-08-22
09 Lars Eggert Draft Added by Lars Eggert in state AD is watching
2006-06-29
01 (System) New version available: draft-ietf-ippm-twamp-01.txt
2005-11-11
00 (System) New version available: draft-ietf-ippm-twamp-00.txt