A Two-Way Active Measurement Protocol (TWAMP)
draft-ietf-ippm-twamp-09
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the Yes position for Lars Eggert |
2008-08-14
|
09 | (System) | IANA Action state changed to RFC-Ed-Ack from In Progress |
2008-08-14
|
09 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2008-08-14
|
09 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2008-08-13
|
09 | (System) | IANA Action state changed to In Progress |
2008-08-13
|
09 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2008-08-13
|
09 | Amy Vezza | IESG state changed to Approved-announcement sent |
2008-08-13
|
09 | Amy Vezza | IESG has approved the document |
2008-08-13
|
09 | Amy Vezza | Closed "Approve" ballot |
2008-08-12
|
09 | Lars Eggert | Removed from agenda for telechat - 2008-08-14 by Lars Eggert |
2008-08-12
|
09 | Lars Eggert | No need for this to return to the telechat. |
2008-08-12
|
09 | Lars Eggert | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Lars Eggert |
2008-08-12
|
09 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk |
2008-08-12
|
09 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk |
2008-08-05
|
09 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2008-08-04
|
09 | (System) | New version available: draft-ietf-ippm-twamp-09.txt |
2008-07-23
|
09 | Pasi Eronen | [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen |
2008-07-21
|
09 | Amy Vezza | Placed on agenda for telechat - 2008-08-14 by Amy Vezza |
2008-07-18
|
09 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2008-07-17
|
09 | Cindy Morgan | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Cindy Morgan |
2008-07-17
|
09 | Chris Newman | [Ballot discuss] This document mentions 'UTF-8' without a reference. Please add a reference to STD 63 (RFC3629). RFC 4656 uses a shared secret … [Ballot discuss] This document mentions 'UTF-8' without a reference. Please add a reference to STD 63 (RFC3629). RFC 4656 uses a shared secret in the form of a passphrase with no mention of what charset is used to encode that passphrase. That's likely to cause interoperability problems for non-US-ASCII passphrases and this specification inherits that problem. Some resolutions that would address the interoperability problem: 1. the passphrase must be US-ASCII. 2. the passphrase is UTF-8 as described in RFC 5198 3. the passphrase is UTF-8 with SASLprep (RFC 4013) |
2008-07-17
|
09 | Chris Newman | [Ballot comment] The use of UTF-8 for KeyID is sufficiently narrow that it's unlikely to create interoperability issues, but a reference to RFC 5198 would … [Ballot comment] The use of UTF-8 for KeyID is sufficiently narrow that it's unlikely to create interoperability issues, but a reference to RFC 5198 would reduce the chances of problem. Without some canoncialization, it's possible to have a KeyID most people can't type but it's unlikely people will actually do that in practice. |
2008-07-17
|
09 | Chris Newman | [Ballot discuss] This document mentions 'UTF-8' without a reference. Please add a reference to STD 63 (RFC3629). |
2008-07-17
|
09 | Chris Newman | [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman |
2008-07-17
|
09 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2008-07-17
|
09 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2008-07-17
|
09 | Amy Vezza | State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza |
2008-07-17
|
09 | Mark Townsley | State Changes to IESG Evaluation - Defer from IESG Evaluation by Mark Townsley |
2008-07-16
|
09 | Tim Polk | [Ballot comment] Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that in OWAMP. Doesn't the Session-Sender need to be the entity … [Ballot comment] Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that in OWAMP. Doesn't the Session-Sender need to be the entity that "is capable of returning the results of a test session" since the Server no longer fills that role? If that is true, I believe Session-Sender should be added to the list with its expanded role. It strikes me as a little odd that the first block of a message is encrypted in "authenticated only mode". It would be helpful if the security considerations shed some light on this architectural decision. (I realize that this is a carryover from 4656, but I didn't find a rationale there either.) Upon review, the use of CBC with an IV of zero seems to be secure in the context of this protocol. However, generation of an IV in addition to the key material doesn't seem to be an insurmountable problem. I am curious why the designers of OWAMP chose this path... |
2008-07-16
|
09 | Tim Polk | [Ballot discuss] The protocol relies on PKCS #5 to generate keys from shared secrets (passwords). The document recommends using 1024 as the iteration counter but … [Ballot discuss] The protocol relies on PKCS #5 to generate keys from shared secrets (passwords). The document recommends using 1024 as the iteration counter but provides a 32-bit field to convey the iteration counter. At the extreme, this provides an opportunity for a a DOS attack; generating a key using 2**32 iterations could stall a system for a significant amount of time. The security considerations should strongly recommend configuration controls to permit rejecting requests that specify overly large iteration counters. TWAMP Light has SHOULDs for supporting authenticated and encrypted mode, but doesn't include a TWAMP control session. However, deriving the keys *requires* a TWAMP-Control Session key. How does the key derivation work in the absence of a TWAMP control session key? Further specification is needed here! |
2008-07-16
|
09 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2008-07-16
|
09 | Cullen Jennings | [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings |
2008-07-16
|
09 | Russ Housley | [Ballot comment] I find the introduction to this document quite confusing. I would me much happier with an introduction that tells the reader about … [Ballot comment] I find the introduction to this document quite confusing. I would me much happier with an introduction that tells the reader about the shortcomings of the current ICMP Echo-based solution and how the addition of a timestamp by the reflector is an improvement. Please define "MBZ". Suresh Krishnan suggested the following: > > The bits marked MBZ MUST be set to zero by senders and MUST be > ignored by receivers. Suresh Krishnan suggested that Section 3.8 set the number of sessions field to 0 since there are no session description records that follow. |
2008-07-16
|
09 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2008-07-16
|
09 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2008-07-15
|
09 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2008-07-15
|
09 | Magnus Westerlund | [Ballot comment] Section 4.2.1: (with the implication that the later two modes will not fit in a single ATM cell) Is this comment at … [Ballot comment] Section 4.2.1: (with the implication that the later two modes will not fit in a single ATM cell) Is this comment at all relevant as there will be an IP and UDP header on the packet also, making the smallest packet size become 28+41? Or is the intention to allow the format to be used with other encapsulations then IP/UDP? Then I would expect a clearer description of this fact and recommendation on what is necessary for that usage. |
2008-07-15
|
09 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to Yes from Discuss by Lars Eggert |
2008-07-15
|
09 | (System) | State Changes to IESG Evaluation from IESG Evaluation - Defer by system |
2008-07-09
|
09 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Sam Hartman. |
2008-07-03
|
09 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2008-07-02
|
09 | Tim Polk | State Changes to IESG Evaluation - Defer from IESG Evaluation by Tim Polk |
2008-07-02
|
09 | Tim Polk | [Ballot comment] Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that in OWAMP. Doesn't the Session-Sender need to be the entity … [Ballot comment] Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that in OWAMP. Doesn't the Session-Sender need to be the entity that "is capable of returning the results of a test session" since the Server no longer fills that role? If that is true, I believe Session-Sender should be added to the list with its expanded role. |
2008-07-02
|
09 | Tim Polk | [Ballot comment] Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that in OWAMP. Doesn't the Session-Sender need to be the entity … [Ballot comment] Section 1.2, Logical Model, implies that Session-Sender's definition is unchanged from that in OWAMP. Doesn't the Session-Sender need to be the entity that "is capable of returning the results of a test session" since the Server no longer fills that role? If that is true, I believe Session-Sender should be added to teh list with its expanded role. |
2008-07-01
|
09 | Lars Eggert | [Ballot discuss] Sam Hartman's sec-dir review requires a response. |
2008-07-01
|
09 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to Discuss from Yes by Lars Eggert |
2008-06-30
|
09 | Lars Eggert | [Ballot Position Update] New position, Yes, has been recorded for Lars Eggert |
2008-06-30
|
09 | Lars Eggert | Ballot has been issued by Lars Eggert |
2008-06-30
|
09 | Lars Eggert | Created "Approve" ballot |
2008-06-27
|
09 | Lars Eggert | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Lars Eggert |
2008-06-27
|
09 | Lars Eggert | Placed on agenda for telechat - 2008-07-03 by Lars Eggert |
2008-06-26
|
09 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-06-13
|
09 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sam Hartman |
2008-06-13
|
09 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Sam Hartman |
2008-06-12
|
09 | Amanda Baber | IANA Last Call comments: Action #1: Upon approval of this document, the IANA will make the following assignments in the "port numbers" registry at http://www.iana.org/assignments/port-numbers … IANA Last Call comments: Action #1: Upon approval of this document, the IANA will make the following assignments in the "port numbers" registry at http://www.iana.org/assignments/port-numbers twamp-control TBD/tcp TWAMP-Control twamp-control TBD/udp TWAMP-Control # [RFC-ippm-twamp-08] Note: if it is still possible to do so when the document is approved, IANA will assign port number 862. Action #2: Upon approval of this document, the IANA will create the following registry at http://www.iana.org/assignments/TBD Registry Name: Two Way Active Measurement Protocol (TWAMP) Control Number Reference: [RFC-ietf-ippm-twamp-08.txt] Registration Procedure: IETF Consensus Registry: Value Description Semantics Definition Reference 0 Reserved [RFC-ietf-ippm-twamp-08.txt] 1 Forbidden [RFC-ietf-ippm-twamp-08.txt] 2 Start-Sessions RFC4656, Section 3.7 [RFC4656] 3 Stop-Sessions RFC4656, Section 3.8 [RFC4656] 4 Reserved [RFC-ietf-ippm-twamp-08.txt] 5 Request-TW-Session this document, Section 3.5 [RFC-ietf-ippm-twamp-08.txt] 6 Experimentation undefined, see Section 8.3. [RFC-ietf-ippm-twamp-08.txt] 7-15 Unassigned We understand the above to be the only IANA Actions for this document. |
2008-06-12
|
09 | Amy Vezza | Last call sent |
2008-06-12
|
09 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2008-06-12
|
09 | Lars Eggert | State Changes to Last Call Requested from AD Evaluation by Lars Eggert |
2008-06-12
|
09 | Lars Eggert | Last Call was requested by Lars Eggert |
2008-06-12
|
09 | (System) | Ballot writeup text was added |
2008-06-12
|
09 | (System) | Last call text was added |
2008-06-12
|
09 | (System) | Ballot approval text was added |
2008-06-12
|
09 | Lars Eggert | [Note]: 'Document Shepherd: Henk Uijterwaal (henk@ripe.net)' added by Lars Eggert |
2008-06-12
|
09 | Lars Eggert | AD Review happened during WGLC. |
2008-06-12
|
09 | Lars Eggert | State Changes to AD Evaluation from Publication Requested by Lars Eggert |
2008-06-12
|
09 | Lars Eggert | State Change Notice email list have been change to ippm-chairs@tools.ietf.org, draft-ietf-ippm-twamp@tools.ietf.org from ippm-chairs@tools.ietf.org |
2008-06-11
|
09 | Cindy Morgan | State Changes to Publication Requested from AD is watching by Cindy Morgan |
2008-06-11
|
09 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Henk Uijterwaal, henk@ripe.net. Yes, I have personally reviewed this document throughout its life and believe that it is now ready for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has been reviewed by at least 8 WG members (the ones mentioned section 7), but there have been more comments from folks on the list about this document. The reviews appear to be thorough, as they touched on many details in the document. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. This document is closely related to the OWAMP protocol (RFC 4656). Operational and security issues are similar and were discussed extensively during the development of that document. No new issues came up during the development of TWAMP. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? No (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? A large fraction of the WG understands the document and agrees with it. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? No (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? The id-nits tool notices a few things but a review by a carbon based processor showed that these are bugs in the tool, not the document. (1.h) Has the document split its references into normative and informative? Yes Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? No (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? Yes If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? This is the case. (1.j) N/A. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Technical Summary The One-way Active Measurement Protocol [RFC4656] (OWAMP) provides a common protocol for measuring one-way metrics between network devices. OWAMP can be used bi-directionally to measure one-way metrics in both directions between two network elements. However, it does not accommodate round-trip or two-way measurements. This memo specifies a Two-way Active Measurement Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip measurement capabilities. The TWAMP measurement architecture is usually comprised of two hosts with specific roles, and this allows for some protocol simplifications, making it an attractive alternative in some circumstances. Working Group Summary The working group has supported the document through the last few revisions, and it has been uncontroversial. Document Quality The document has been given thorough review by the group over its revisions, the key reviewers are listed in the acknowledgements section. Personnel Document Shepherd: Henk Uijterwaal Responsible Area Director: Lars Eggert |
2008-06-09
|
08 | (System) | New version available: draft-ietf-ippm-twamp-08.txt |
2008-05-22
|
07 | (System) | New version available: draft-ietf-ippm-twamp-07.txt |
2007-12-18
|
06 | (System) | New version available: draft-ietf-ippm-twamp-06.txt |
2007-11-13
|
05 | (System) | New version available: draft-ietf-ippm-twamp-05.txt |
2007-05-31
|
04 | (System) | New version available: draft-ietf-ippm-twamp-04.txt |
2007-03-02
|
03 | (System) | New version available: draft-ietf-ippm-twamp-03.txt |
2006-11-30
|
02 | (System) | New version available: draft-ietf-ippm-twamp-02.txt |
2006-10-17
|
09 | Lars Eggert | Intended Status has been changed to Proposed Standard from None |
2006-08-22
|
09 | Lars Eggert | Draft Added by Lars Eggert in state AD is watching |
2006-06-29
|
01 | (System) | New version available: draft-ietf-ippm-twamp-01.txt |
2005-11-11
|
00 | (System) | New version available: draft-ietf-ippm-twamp-00.txt |