draft-ietf-ippm-ioam-flags-00.txt | draft-ietf-ippm-ioam-flags-01.txt | |||
---|---|---|---|---|
IPPM T. Mizrahi | IPPM T. Mizrahi | |||
Internet-Draft Huawei Smart Platforms iLab | Internet-Draft Huawei Smart Platforms iLab | |||
Intended status: Standards Track F. Brockners | Intended status: Standards Track F. Brockners | |||
Expires: April 14, 2020 S. Bhandari | Expires: July 29, 2020 S. Bhandari | |||
R. Sivakolundu | R. Sivakolundu | |||
C. Pignataro | C. Pignataro | |||
Cisco | Cisco | |||
A. Kfir | A. Kfir | |||
B. Gafni | B. Gafni | |||
Mellanox Technologies, Inc. | Mellanox Technologies, Inc. | |||
M. Spiegel | M. Spiegel | |||
Barefoot Networks | Barefoot Networks | |||
J. Lemon | J. Lemon | |||
Broadcom | Broadcom | |||
October 12, 2019 | January 26, 2020 | |||
In-situ OAM Flags | In-situ OAM Flags | |||
draft-ietf-ippm-ioam-flags-00 | draft-ietf-ippm-ioam-flags-01 | |||
Abstract | Abstract | |||
In-situ Operations, Administration, and Maintenance (IOAM) records | In-situ Operations, Administration, and Maintenance (IOAM) records | |||
operational and telemetry information in the packet while the packet | operational and telemetry information in the packet while the packet | |||
traverses a path between two points in the network. This document | traverses a path between two points in the network. This document | |||
presents new flags in the IOAM Trace Option headers. Specifically, | presents new flags in the IOAM Trace Option headers. Specifically, | |||
the document defines the Loopback and Active flags. | the document defines the Loopback and Active flags. | |||
Status of This Memo | Status of This Memo | |||
skipping to change at page 1, line 45 ¶ | skipping to change at page 1, line 45 ¶ | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on April 14, 2020. | This Internet-Draft will expire on July 29, 2020. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2019 IETF Trust and the persons identified as the | Copyright (c) 2020 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(https://trustee.ietf.org/license-info) in effect on the date of | (https://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
skipping to change at page 2, line 29 ¶ | skipping to change at page 2, line 29 ¶ | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
2.1. Requirement Language . . . . . . . . . . . . . . . . . . 3 | 2.1. Requirement Language . . . . . . . . . . . . . . . . . . 3 | |||
2.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
3. New IOAM Trace Option Flags . . . . . . . . . . . . . . . . . 3 | 3. New IOAM Trace Option Flags . . . . . . . . . . . . . . . . . 3 | |||
4. Loopback in IOAM . . . . . . . . . . . . . . . . . . . . . . 3 | 4. Loopback in IOAM . . . . . . . . . . . . . . . . . . . . . . 3 | |||
5. Active Measurement with IOAM . . . . . . . . . . . . . . . . 4 | 5. Active Measurement with IOAM . . . . . . . . . . . . . . . . 4 | |||
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5 | 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 | |||
7. Performance Considerations . . . . . . . . . . . . . . . . . 6 | 7. Performance Considerations . . . . . . . . . . . . . . . . . 6 | |||
8. Security Considerations . . . . . . . . . . . . . . . . . . . 6 | 8. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | |||
9. References . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 9. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
9.1. Normative References . . . . . . . . . . . . . . . . . . 7 | 9.1. Normative References . . . . . . . . . . . . . . . . . . 8 | |||
9.2. Informative References . . . . . . . . . . . . . . . . . 7 | 9.2. Informative References . . . . . . . . . . . . . . . . . 8 | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 | |||
1. Introduction | 1. Introduction | |||
IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the | IOAM [I-D.ietf-ippm-ioam-data] is used for monitoring traffic in the | |||
network by incorporating IOAM data fields into in-flight data | network by incorporating IOAM data fields into in-flight data | |||
packets. | packets. | |||
IOAM data may be represented in one of four possible IOAM options: | IOAM data may be represented in one of four possible IOAM options: | |||
Pre-allocated Trace Option, Incremental Trace Option, Proof of | Pre-allocated Trace Option, Incremental Trace Option, Proof of | |||
Transit (POT) Option, and Edge-to-Edge Option. This document defines | Transit (POT) Option, and Edge-to-Edge Option. This document defines | |||
skipping to change at page 3, line 37 ¶ | skipping to change at page 3, line 37 ¶ | |||
packet back towards the source, as further described in Section 4. | packet back towards the source, as further described in Section 4. | |||
Bit 2 "Active" (A-bit). When set, this indicates that this is an | Bit 2 "Active" (A-bit). When set, this indicates that this is an | |||
active IOAM packet, where "active" is used in the sense defined in | active IOAM packet, where "active" is used in the sense defined in | |||
[RFC7799], rather than a data packet. The packet may be an IOAM | [RFC7799], rather than a data packet. The packet may be an IOAM | |||
probe packet, or a replicated data packet (the second and third | probe packet, or a replicated data packet (the second and third | |||
use cases of Section 5). | use cases of Section 5). | |||
4. Loopback in IOAM | 4. Loopback in IOAM | |||
Loopback is used for trigerring each transit device along the path to | Loopback is used for triggering each transit device along the path to | |||
loop back a copy of the data packet. Loopback mode assumes that a | loop back a copy of the data packet. Loopback allows an IOAM | |||
return path from transit nodes and destination nodes towards the | encapsulating node to trace the path to a given destination, and to | |||
source exists. Loopback allows an IOAM encapsulating node to trace | receive per-hop data about both the forward and the return path. | |||
the path to a given destination, and to receive per-hop data about | Loopback is intended to provide an accelerated alternative to | |||
both the forward and the return path. | Traceroute, that allows the encapsulating node to receive responses | |||
from multiple transit nodes along the path in less then one round- | ||||
trip-time. | ||||
The encapsulating node decides (e.g., using a filter) which packets | Loopback mode assumes that a return path from transit nodes and | |||
loopback mode is enabled for by setting the loopback bit. The | destination nodes towards the source (encapsulating node) exists. | |||
encapsulating node also needs to ensure that sufficient space is | Specifically, loopback is only applicable in encapsulations in which | |||
the identity of the encapsulating node is available in the | ||||
encapsulation header. If an encapsulating node receives a looped | ||||
back packet that was not originated from the current encapsulating | ||||
node, the packet is dropped. | ||||
The encapsulating node generates synthetic packets with an IOAM trace | ||||
option that has the loopback flag set. These packets are generated | ||||
either proactively or on-demand, i.e., when a failure is detected. | ||||
The encapsulating node also needs to ensure that sufficient space is | ||||
available in the IOAM header for loopback operation, which includes | available in the IOAM header for loopback operation, which includes | |||
transit nodes adding trace data on the original path and then again | transit nodes adding trace data on the original path and then again | |||
on the return path. | on the return path. An IOAM trace option that has the loopback bit | |||
set MUST have the value '1' in the most significant bit of IOAM- | ||||
Trace-Type, and '0' in the rest of the bits of IOAM-Trace-Type. | ||||
Thus, every transit node that processes this trace option only adds a | ||||
single data field, which is the Hop_Lim and node_id data field. The | ||||
reason for allowing a single data field per hop is to minimize the | ||||
impact of amplification attacks. | ||||
A loopback bit that is set indicates to the transit nodes processing | A loopback bit that is set indicates to the transit nodes processing | |||
this option that they are to create a copy of the received packet and | this option that they are to create a copy of the received packet and | |||
send the copy back to the source of the packet. The copy has its | send the copy back to the source of the packet. The copy has its | |||
data fields added after being copied in order to allow any egress- | data fields added after being copied in order to allow any egress- | |||
dependent information to be set based on the egress of the copy | dependent information to be set based on the egress of the copy | |||
rather than the original. The original packet continues towards its | rather than the original. The copy is also truncated, i.e., any | |||
destination. The source address of the original packet is used as | payload that resides after the IOAM option(s) is removed before | |||
the destination address in the copied packet. The address of the | transmitting the looped back packet back towards the encapsulating | |||
node performing the copy operation is used as the source address. | node. The original packet continues towards its destination. The | |||
The L-bit MUST be cleared in the copy of the packet that a node sends | source address of the original packet is used as the destination | |||
back towards the source. On its way back towards the source, the | address in the copied packet. The address of the node performing the | |||
copied packet is processed like any other packet with IOAM | copy operation is used as the source address. The L-bit MUST be | |||
information, including adding any requested data at each transit node | cleared in the copy of the packet that a node sends back towards the | |||
(assuming there is sufficient space). | source. On its way back towards the source, the copied packet is | |||
processed like any other packet with IOAM information, including | ||||
adding any requested data at each transit node (assuming there is | ||||
sufficient space). | ||||
Once the return packet reaches the IOAM domain boundary, IOAM | Once the return packet reaches the IOAM domain boundary, IOAM | |||
decapsulation occurs as with any other packet containing IOAM | decapsulation occurs as with any other packet containing IOAM | |||
information. Because any intermediate node receiving such a packet | information. Because any intermediate node receiving such a packet | |||
would not know how to process the original packet, and because there | would not know how to process the original packet, and because there | |||
would be a risk of the original packet leaking past the initiator of | would be a risk of the original packet leaking past the initiator of | |||
the IOAM loopback, the initiator of an IOAM loopback MUST be the | the IOAM loopback, the initiator of an IOAM loopback MUST be the | |||
initiator of the packet. Once a loopback packet is received back at | initiator of the packet. Once a loopback packet is received back at | |||
the initiator, it is a local matter how it is recognized as a | the initiator, it is a local matter how it is recognized as a | |||
loopback packet. | loopback packet. | |||
skipping to change at page 4, line 37 ¶ | skipping to change at page 5, line 8 ¶ | |||
5. Active Measurement with IOAM | 5. Active Measurement with IOAM | |||
Active measurement methods [RFC7799] make use of synthetically | Active measurement methods [RFC7799] make use of synthetically | |||
generated packets in order to facilitate the measurement. This | generated packets in order to facilitate the measurement. This | |||
section presents use cases of active measurement using the IOAM | section presents use cases of active measurement using the IOAM | |||
Active flag. | Active flag. | |||
The active flag indicates that a packet is used for active | The active flag indicates that a packet is used for active | |||
measurement. An IOAM decapsulating node that receives a packet with | measurement. An IOAM decapsulating node that receives a packet with | |||
the Active flag set in one of its Trace options must terminate the | the Active flag set in one of its Trace options must terminate the | |||
packet. | packet. The active flag is intended to simplify the implementation | |||
of decapsulating nodes by indicating that the packet should not be | ||||
forwarded further. It is not intended as a replacement for existing | ||||
active OAM protocols, which may run in higher layers and make use of | ||||
the active flag. | ||||
An example of an IOAM deployment scenario is illustrated in Figure 1. | An example of an IOAM deployment scenario is illustrated in Figure 1. | |||
The figure depicts two endpoints, a source and a destination. The | The figure depicts two endpoints, a source and a destination. The | |||
data traffic from the source to the destination is forwarded through | data traffic from the source to the destination is forwarded through | |||
a set of network devices, including an IOAM encapsulating node, which | a set of network devices, including an IOAM encapsulating node, which | |||
incorporates one or more IOAM option, a decapsulating node, which | incorporates one or more IOAM options, a decapsulating node, which | |||
removes the IOAM options, optionally one or more transit nodes. The | removes the IOAM options, optionally one or more transit nodes. The | |||
IOAM options are encapsulated in one of the IOAM encapsulation types, | IOAM options are encapsulated in one of the IOAM encapsulation types, | |||
e.g., [I-D.ietf-sfc-ioam-nsh], or | e.g., [I-D.ietf-sfc-ioam-nsh], or | |||
[I-D.ioametal-ippm-6man-ioam-ipv6-options]. | [I-D.ioametal-ippm-6man-ioam-ipv6-options]. | |||
+--------+ +--------+ +--------+ +--------+ +--------+ | +--------+ +--------+ +--------+ +--------+ +--------+ | |||
| | | IOAM |.....| IOAM |.....| IOAM | | | | | | | IOAM |.....| IOAM |.....| IOAM | | | | |||
+--------+ +--------+ +--------+ +--------+ +--------+ | +--------+ +--------+ +--------+ +--------+ +--------+ | |||
| L2/L3 |<===>| L2/L3 |<===>| L2/L3 |<===>| L2/L3 |<===>| L2/L3 | | | L2/L3 |<===>| L2/L3 |<===>| L2/L3 |<===>| L2/L3 |<===>| L2/L3 | | |||
+--------+ +--------+ +--------+ +--------+ +--------+ | +--------+ +--------+ +--------+ +--------+ +--------+ | |||
Source Encapsulating Transit Decapsulating Destination | Source Encapsulating Transit Decapsulating Destination | |||
Node Node Node | Node Node Node | |||
<------------ IOAM domain -----------> | ||||
Figure 1: Network using IOAM. | Figure 1: Network using IOAM. | |||
This draft focuses on three possible use cases of active measurement | This draft focuses on three possible use cases of active measurement | |||
using IOAM. These use cases are described using the example of | using IOAM. These use cases are described using the example of | |||
Figure 1. | Figure 1. | |||
o Endpoint active measurement: synthetic probe packets are sent | o Endpoint active measurement: synthetic probe packets are sent | |||
between the source and destination, traversing the IOAM domain. | between the source and destination, traversing the IOAM domain. | |||
Since the probe packets are sent between the endpoints, these | Since the probe packets are sent between the endpoints, these | |||
packets are treated as data packets by the IOAM domain, and do not | packets are treated as data packets by the IOAM domain, and do not | |||
require special treatment at the IOAM layer. | require special treatment at the IOAM layer. Specifically, the | |||
active flag is not used in this case, and the IOAM layer needs not | ||||
be aware that an active measurement mechanism is used at a higher | ||||
layer. | ||||
o IOAM active measurement using probe packets: probe packets are | o IOAM active measurement using probe packets within the IOAM | |||
generated and transmitted by the IOAM encapsulating node, and are | domain: probe packets are generated and transmitted by the IOAM | |||
expected to be terminated by the decapsulating node. IOAM data | encapsulating node, and are expected to be terminated by the | |||
related to probe packets may be exported by one or more nodes | decapsulating node. IOAM data related to probe packets may be | |||
along its path, by an exporting protocol that is outside the scope | exported by one or more nodes along its path, by an exporting | |||
of this document (e.g., [I-D.spiegel-ippm-ioam-rawexport]). Probe | protocol that is outside the scope of this document (e.g., | |||
packets include a Trace Option which has its Active flag set, | [I-D.spiegel-ippm-ioam-rawexport]). Probe packets include a Trace | |||
indicating that the decapsulating node must terminate them. | Option which has its Active flag set, indicating that the | |||
decapsulating node must terminate them. | ||||
o IOAM active measurement using replicated data packets: probe | o IOAM active measurement using replicated data packets: probe | |||
packets are created by the encapsulating node by selecting some or | packets are created by the encapsulating node by selecting some or | |||
all of the en route data packets and replicating them. A selected | all of the en route data packets and replicating them. A selected | |||
data packet that is replicated, and its (possibly truncated) copy | data packet that is replicated, and its (possibly truncated) copy | |||
is forwarded with one or more IOAM option, while the original | is forwarded with one or more IOAM option, while the original | |||
packet is forwarded normally, without IOAM options. To the extent | packet is forwarded normally, without IOAM options. To the extent | |||
possible, the original data packet and its replica are forwarded | possible, the original data packet and its replica are forwarded | |||
through the same path. The replica includes a Trace Option that | through the same path. The replica includes a Trace Option that | |||
has its Active flag set, indicating that the decapsulating node | has its Active flag set, indicating that the decapsulating node | |||
should terminate it. | should terminate it. It should be noted that the current document | |||
defines the role of the active flag in allowing the decapsulating | ||||
node to terminate the packet, but the replication functionality in | ||||
this context is outside the scope of this document. | ||||
6. IANA Considerations | 6. IANA Considerations | |||
IANA is requested to allocate the following bits in the "IOAM Trace | IANA is requested to allocate the following bits in the "IOAM Trace | |||
Flags Registry" as follows: | Flags Registry" as follows: | |||
Bit 1 "Loopback" (L-bit) | Bit 1 "Loopback" (L-bit) | |||
Bit 2 "Active" (A-bit) | Bit 2 "Active" (A-bit) | |||
Note that bit 0 is the most significant bit in the Flags Registry. | Note that bit 0 is the most significant bit in the Flags Registry. | |||
7. Performance Considerations | 7. Performance Considerations | |||
Each of the flags that are defined in this document may have | Each of the flags that are defined in this document may have | |||
performance implications. When using the loopback mechanism a copy | performance implications. When using the loopback mechanism a copy | |||
of the data packet is sent back to the sender, thus generating more | of the data packet is sent back to the sender, thus generating more | |||
traffic than originally sent by the endpoints. Using active | traffic than originally sent by the endpoints. Using active | |||
skipping to change at page 6, line 23 ¶ | skipping to change at page 7, line 4 ¶ | |||
traffic than originally sent by the endpoints. Using active | traffic than originally sent by the endpoints. Using active | |||
measurement with the active flag requires the use of synthetic | measurement with the active flag requires the use of synthetic | |||
(overhead) traffic. | (overhead) traffic. | |||
Each of the mechanisms that use the flags above has a cost in terms | Each of the mechanisms that use the flags above has a cost in terms | |||
of the network bandwidth, and may potentially load the node that | of the network bandwidth, and may potentially load the node that | |||
analyzes the data. Therefore, it MUST be possible to use each of the | analyzes the data. Therefore, it MUST be possible to use each of the | |||
mechanisms on a subset of the data traffic; an encapsulating node | mechanisms on a subset of the data traffic; an encapsulating node | |||
needs to be able to set the Loopback and Active flag selectively, in | needs to be able to set the Loopback and Active flag selectively, in | |||
a way that considers the effect on the network performance. | a way that considers the effect on the network performance. | |||
Similarly, transit and decapsulating nodes need to be able to | Similarly, transit and decapsulating nodes need to be able to | |||
selectively loop back packets with the Loopback flag, and to | selectively loop back packets with the Loopback flag, and to | |||
selectively export packets to the collector. Specifically, rate | selectively export packets. Specifically, rate limiting may be | |||
limiting may be enabled so as to ensure that the mechanisms are used | enabled so as to ensure that the mechanisms are used at a rate that | |||
at a rate that does not significantly affect the network bandwidth, | does not significantly affect the network bandwidth, and does not | |||
and does not overload the collector (or the source node in the case | overload the receiving entity (or the source node in the case of | |||
of loopback). | loopback). | |||
8. Security Considerations | 8. Security Considerations | |||
The security considerations of IOAM in general are discussed in | The security considerations of IOAM in general are discussed in | |||
[I-D.ietf-ippm-ioam-data]. Specifically, an attacker may try to use | [I-D.ietf-ippm-ioam-data]. Specifically, an attacker may try to use | |||
the functionality that is defined in this document to attack the | the functionality that is defined in this document to attack the | |||
network. | network. | |||
An attacker may attempt to overload network devices by injecting | An attacker may attempt to overload network devices by injecting | |||
synthetic packets that include an IOAM Trace Option with one or more | synthetic packets that include an IOAM Trace Option with one or more | |||
skipping to change at page 7, line 16 ¶ | skipping to change at page 7, line 45 ¶ | |||
is no worse than synthetic data packets in which the Active flag | is no worse than synthetic data packets in which the Active flag | |||
is not set. By setting the active flag in en route packets an | is not set. By setting the active flag in en route packets an | |||
attacker can prevent these packets from reaching their | attacker can prevent these packets from reaching their | |||
destination, since the packet is terminated by the decapsulating | destination, since the packet is terminated by the decapsulating | |||
device; however, note that an on-path attacker may achieve the | device; however, note that an on-path attacker may achieve the | |||
same goal by changing the destination address of a packet. | same goal by changing the destination address of a packet. | |||
Another potential threat is amplification; if an attacker causes | Another potential threat is amplification; if an attacker causes | |||
transit switches to replicate more packets than they are intended | transit switches to replicate more packets than they are intended | |||
to replicate, either by setting the Active flag or by sending | to replicate, either by setting the Active flag or by sending | |||
synthetic packets, then traffic is amplified, causing bandwidth | synthetic packets, then traffic is amplified, causing bandwidth | |||
degredation. | degredation. As mentioned in Section 5, the specification of the | |||
replication mechanism is not within the scope of this document. A | ||||
specification that defines the replication functionality should | ||||
also address the security aspects of this mechanism. | ||||
In order to mitigate the attacks described above, as described in | In order to mitigate the attacks described above, as described in | |||
Section 7 it should be possible for IOAM-enabled devices to | Section 7 it should be possible for IOAM-enabled devices to | |||
selectively apply the mechanisms that use the flags defined in this | selectively apply the mechanisms that use the flags defined in this | |||
document to a subset of the traffic, and to limit the performance of | document to a subset of the traffic, and to limit the performance of | |||
synthetically generated packets to a configurable rate; specifically, | synthetically generated packets to a configurable rate; specifically, | |||
network devices should be able to limit the rate of: (i) looped-back | network devices should be able to limit the rate of: (i) looped-back | |||
traffic, (ii) replicated active packets, and (iii) packets that are | traffic (at transit nodes), (ii) replicated active packets (at | |||
exported to a collector. | encapsulating nodes), (iii) packets that are exported to a collector | |||
(from either encapsulating nodes or transit nodes), and (iv) | ||||
synthetically generated packets (at encapsulating nodes). | ||||
Furthermore, as defined in Section 4, transit nodes that process a | ||||
packet with the Loopback flag only add a single data field, and | ||||
truncate any payload that follows the IOAM option(s), thus | ||||
significanly limiting the possible impact of an amplification attack. | ||||
IOAM is assumed to be deployed in a restricted administrative domain, | IOAM is assumed to be deployed in a restricted administrative domain, | |||
thus limiting the scope of the threats above and their affect. This | thus limiting the scope of the threats above and their affect. This | |||
is a fundamental assumtion with respect to the security aspects of | is a fundamental assumtion with respect to the security aspects of | |||
IOAM, as further discussed in [I-D.ietf-ippm-ioam-data]. | IOAM, as further discussed in [I-D.ietf-ippm-ioam-data]. | |||
9. References | 9. References | |||
9.1. Normative References | 9.1. Normative References | |||
[I-D.ietf-ippm-ioam-data] | [I-D.ietf-ippm-ioam-data] | |||
Brockners, F., Bhandari, S., Pignataro, C., Gredler, H., | Brockners, F., Bhandari, S., Pignataro, C., Gredler, H., | |||
Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, | Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, | |||
P., Chang, R., daniel.bernier@bell.ca, d., and J. Lemon, | P., remy@barefootnetworks.com, r., daniel.bernier@bell.ca, | |||
"Data Fields for In-situ OAM", draft-ietf-ippm-ioam- | d., and J. Lemon, "Data Fields for In-situ OAM", draft- | |||
data-07 (work in progress), September 2019. | ietf-ippm-ioam-data-08 (work in progress), October 2019. | |||
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
<https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
9.2. Informative References | 9.2. Informative References | |||
[I-D.ietf-sfc-ioam-nsh] | [I-D.ietf-sfc-ioam-nsh] | |||
Brockners, F. and S. Bhandari, "Network Service Header | Brockners, F. and S. Bhandari, "Network Service Header | |||
End of changes. 23 change blocks. | ||||
53 lines changed or deleted | 98 lines changed or added | |||
This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |