Internet-Draft | STAMP ECN | December 2024 |
White | Expires 13 June 2025 | [Page] |
The Simple Two-Way Active Measurement Protocol (STAMP) enables one-way and round-trip measurement of network metrics between IP hosts, and has a facility for defining optional extensions. This document defines a STAMP extension to enable the measurement of manipulation of the value of the explicit congestion notification (ECN) field of the IP header by middleboxes between two STAMP hosts, and to enable discovery and measurement of paths that provide differential treatment of packets depending on the value of their ECN field.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 13 June 2025.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Section 4.4 of [RFC8972] defines a "Class of Service TLV" extension for the STAMP protocol [RFC8762] which enables bi-directional measurement of manipulation of the differentiated services code point (DSCP) field of the IP header by middleboxes [RFC2474] but only allows one-way measurement of manipulation of the ECN field of the IP header by [RFC3168][RFC8311][RFC9331] middleboxes. Since the ECN field of the IP header is separately meaningful in each direction, it is valuable to have the capability to perform bi-directional measurements of ECN traversal and to have the abilty to measure path characteristics that depend on the value of the ECN codepoint. In addition, bi-directional measurements are important to isolate traversal issues so that remediation actions can be taken appropriately.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The STAMP session-sender MAY include a DSCP and ECN TLV in the STAMP test packet. The format of the TLV is presented in Figure 1.¶
The fields are defined as follows.¶
A session-reflector that receives a test packet with the DSCP and ECN Traversal TLV MUST include the DSCP and ECN Traversal TLV in the reflected test packet.¶
The session-reflector MUST copy the value of the DSCP and ECN fields of the IP header of the received STAMP test packet into the DSCP2 field and EC2 field in the reflected test packet.¶
The session-reflector MUST set the value of the ECN field in the IP header of the reflected test packet equal to the value in the EC1 field of the received test packet.¶
Finally, the session-reflector MUST use the local policy to verify whether the CoS corresponding to the value of the DSCP1 field is permitted in the domain. If the corresponding CoS is permitted in the domain, the session-reflector MUST set the DSCP field's value in the IP header of the reflected test packet equal to the value of the DSCP1 field of the received test packet. If the corresponding CoS is not permitted in the domain, the session-reflector MUST use the DSCP value of the received STAMP packet and set the value of the RP field to 1. Upon receiving the reflected packet, if the value of the RP field is 0, the session-sender will save the DSCP and ECN values for analysis of the CoS in the reverse direction. If the value of the RP field in the received reflected packet is 1, only CoS in the forward direction can be analyzed.¶
The author is aware of two independent implementations of this STAMP Extension TLV, one of which is publicly available here.¶
Add this extension to the IANA STAMP TLV Types Registry.¶
This document should not affect the security of the Internet.¶
Karthik Sundaresan, William Hawkins III¶