draft-ietf-ippm-twamp-yang-12.txt   draft-ietf-ippm-twamp-yang-13.txt 
IPPM WG R. Civil IPPM WG R. Civil
Internet-Draft Ciena Corporation Internet-Draft Ciena Corporation
Intended status: Standards Track A. Morton Intended status: Standards Track A. Morton
Expires: December 28, 2018 AT&T Labs Expires: January 3, 2019 AT&T Labs
R. Rahman R. Rahman
Cisco Systems Cisco Systems
M. Jethanandani M. Jethanandani
Xoriant Corporation Xoriant Corporation
K. Pentikousis, Ed. K. Pentikousis, Ed.
Travelping Travelping
June 26, 2018 July 2, 2018
Two-Way Active Measurement Protocol (TWAMP) Data Model Two-Way Active Measurement Protocol (TWAMP) Data Model
draft-ietf-ippm-twamp-yang-12 draft-ietf-ippm-twamp-yang-13
Abstract Abstract
This document specifies a data model for client and server This document specifies a data model for client and server
implementations of the Two-Way Active Measurement Protocol (TWAMP). implementations of the Two-Way Active Measurement Protocol (TWAMP).
The document defines the TWAMP data model through Unified Modeling The document defines the TWAMP data model through Unified Modeling
Language (UML) class diagrams and formally specifies it using a NDMA- Language (UML) class diagrams and formally specifies it using a NDMA-
compliant YANG model. compliant YANG model.
Status of This Memo Status of This Memo
skipping to change at page 1, line 41 skipping to change at page 1, line 41
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on December 28, 2018. This Internet-Draft will expire on January 3, 2019.
Copyright Notice Copyright Notice
Copyright (c) 2018 IETF Trust and the persons identified as the Copyright (c) 2018 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 39 skipping to change at page 2, line 39
5. Data Model . . . . . . . . . . . . . . . . . . . . . . . . . 16 5. Data Model . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.1. YANG Tree Diagram . . . . . . . . . . . . . . . . . . . . 16 5.1. YANG Tree Diagram . . . . . . . . . . . . . . . . . . . . 16
5.2. YANG Module . . . . . . . . . . . . . . . . . . . . . . . 19 5.2. YANG Module . . . . . . . . . . . . . . . . . . . . . . . 19
6. Data Model Examples . . . . . . . . . . . . . . . . . . . . . 48 6. Data Model Examples . . . . . . . . . . . . . . . . . . . . . 48
6.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 48 6.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 48
6.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 50 6.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 50
6.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 51 6.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 51
6.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 52 6.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 52
7. Security Considerations . . . . . . . . . . . . . . . . . . . 55 7. Security Considerations . . . . . . . . . . . . . . . . . . . 55
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 56 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 56
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 56 9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 57
10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 57 10. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 57
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 57 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 57
11.1. Normative References . . . . . . . . . . . . . . . . . . 57 11.1. Normative References . . . . . . . . . . . . . . . . . . 57
11.2. Informative References . . . . . . . . . . . . . . . . . 59 11.2. Informative References . . . . . . . . . . . . . . . . . 59
Appendix A. Detailed Data Model Examples . . . . . . . . . . . . 60 Appendix A. Detailed Data Model Examples . . . . . . . . . . . . 60
A.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 60 A.1. Control-Client . . . . . . . . . . . . . . . . . . . . . 60
A.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 62 A.2. Server . . . . . . . . . . . . . . . . . . . . . . . . . 62
A.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 64 A.3. Session-Sender . . . . . . . . . . . . . . . . . . . . . 64
A.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 64 A.4. Session-Reflector . . . . . . . . . . . . . . . . . . . . 65
Appendix B. TWAMP Operational Commands . . . . . . . . . . . . . 67 Appendix B. TWAMP Operational Commands . . . . . . . . . . . . . 67
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 67 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 67
1. Introduction 1. Introduction
The Two-Way Active Measurement Protocol (TWAMP) [RFC5357] is used to The Two-Way Active Measurement Protocol (TWAMP) [RFC5357] is used to
measure network performance parameters such as latency, bandwidth, measure network performance parameters such as latency, bandwidth,
and packet loss by sending probe packets and measuring their and packet loss by sending probe packets and measuring their
experience in the network. To date, TWAMP implementations do not experience in the network. To date, TWAMP implementations do not
come with a standard management framework, and, as such, implementers come with a standard management framework, and, as such, implementers
skipping to change at page 3, line 43 skipping to change at page 3, line 43
defined and virtualized nature of network infrastructures, based on defined and virtualized nature of network infrastructures, based on
dynamic service chains [NSC] and programmable control and management dynamic service chains [NSC] and programmable control and management
planes Software-Defined Networking (SDN): Layers and Architecture planes Software-Defined Networking (SDN): Layers and Architecture
Terminology [RFC7426] requires a well-defined data model for TWAMP Terminology [RFC7426] requires a well-defined data model for TWAMP
implementations. This document defines such a TWAMP data model and implementations. This document defines such a TWAMP data model and
specifies it formally using the YANG 1.1 [RFC7950] data modeling specifies it formally using the YANG 1.1 [RFC7950] data modeling
language. language.
Note to RFC Editor: Note to RFC Editor:
Please replace the date 2018-06-26 in Section 5.2 of the draft with Please replace the date 2018-07-02 in Section 5.2 of the draft with
the date of publication of this draft as a RFC. Also, replace the date of publication of this draft as a RFC. Also, replace
reference to RFC XXXX, and draft-ietf-ippm-port-twamp-test with the reference to RFC XXXX, and draft-ietf-ippm-port-twamp-test with the
RFC numbers assigned to the drafts. RFC numbers assigned to the drafts.
1.2. Terminology 1.2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in BCP "OPTIONAL" in this document are to be interpreted as described in BCP
14 [RFC2119] [RFC8174] when, and only when, they appear in all 14 [RFC2119] [RFC8174] when, and only when, they appear in all
skipping to change at page 19, line 19 skipping to change at page 19, line 19
YANG Data Types [RFC6991], and references NTPv4 Specification YANG Data Types [RFC6991], and references NTPv4 Specification
[RFC5905], Framework for IP Performance Metrics [RFC2330], Randomness [RFC5905], Framework for IP Performance Metrics [RFC2330], Randomness
Requirements for Security [RFC4086], OWAMP [RFC4656], TWAMP Requirements for Security [RFC4086], OWAMP [RFC4656], TWAMP
[RFC5357], More Features for TWAMP [RFC5618], Individual Session [RFC5357], More Features for TWAMP [RFC5618], Individual Session
Control Feature [RFC5938], TWAMP Reflect Octets and Symmetrical Size Control Feature [RFC5938], TWAMP Reflect Octets and Symmetrical Size
Features [RFC6038], Advances Stream and Sampling Framework [RFC7312], Features [RFC6038], Advances Stream and Sampling Framework [RFC7312],
IKEv2-Derived Shared Secret Key for OWAMP and TWAMP [RFC7717], and IKEv2-Derived Shared Secret Key for OWAMP and TWAMP [RFC7717], and
OWAMP and TWAMP Well-Known Port Assignments OWAMP and TWAMP Well-Known Port Assignments
[I-D.ietf-ippm-port-twamp-test]. [I-D.ietf-ippm-port-twamp-test].
<CODE BEGINS> file "ietf-twamp@2018-06-26.yang" <CODE BEGINS> file "ietf-twamp@2018-07-02.yang"
module ietf-twamp { module ietf-twamp {
yang-version 1.1; yang-version 1.1;
namespace urn:ietf:params:xml:ns:yang:ietf-twamp; namespace urn:ietf:params:xml:ns:yang:ietf-twamp;
prefix ietf-twamp; prefix ietf-twamp;
import ietf-inet-types { import ietf-inet-types {
prefix inet; prefix inet;
reference reference
"RFC 6991: Common YANG Types."; "RFC 6991: Common YANG Types.";
skipping to change at page 20, line 26 skipping to change at page 20, line 26
Redistribution and use in source and binary forms, with or Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject without modification, is permitted pursuant to, and subject
to the license terms contained in, the Simplified BSD to the license terms contained in, the Simplified BSD
License set forth in Section 4.c of the IETF Trust's Legal License set forth in Section 4.c of the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info). (http://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX; see This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices."; the RFC itself for full legal notices.";
revision 2018-06-26 { revision 2018-07-02 {
description description
"Initial Revision. "Initial Revision.
Covers RFC 5357, RFC 5618, RFC 5938, RFC 6038, RFC 7717, and Covers RFC 5357, RFC 5618, RFC 5938, RFC 6038, RFC 7717, and
draft-ietf-ippm-metric-registry"; draft-ietf-ippm-metric-registry";
reference reference
"RFC XXXX: TWAMP YANG Data Model."; "RFC XXXX: TWAMP YANG Data Model.";
} }
skipping to change at page 55, line 48 skipping to change at page 55, line 48
to restrict access for particular NETCONF or RESTCONF users to a to restrict access for particular NETCONF or RESTCONF users to a
preconfigured subset of all available NETCONF or RESTCONF protocol preconfigured subset of all available NETCONF or RESTCONF protocol
operations and content. operations and content.
There are a number of nodes defined in this YANG module which are There are a number of nodes defined in this YANG module which are
writeable. These data nodes may be considered sensitive and writeable. These data nodes may be considered sensitive and
vulnerable to attacks in some network environments. Ability to write vulnerable to attacks in some network environments. Ability to write
into these nodes without proper protection can have a negative effect into these nodes without proper protection can have a negative effect
on the devices that support this feature. on the devices that support this feature.
Nodes such as 'admin-state' that cause test sessions to be created, If written, the 'admin-state' node can cause unintended test sessions
or 'number-of-packets' that dictate how many packets are sent in any to be created. If the node 'number-of-packets' that dictates how
particular test session are obvious. Examples of nodes that are many packets are sent in any particular test session is written with
particularly vulnerable include several timeout values put in the a large value, it can cause a test session to run longer than
protocol to protect against sessions that are not active but are expected. Nodes that are particularly vulnerable include several
consuming resources. Examples include the REFWAIT timeout parameter timeout values put in the protocol to protect against sessions that
which determine whether to discontinue the session if no packets are are not active but are consuming resources. These are the REFWAIT
received. Nodes like 'count' and 'max-count-exponent' can cause a timeout parameter which determine whether to discontinue the session
long time to be spent on PBKDF2 iterations. In addition, nodes such if no packets are received, and nodes 'count' and 'max-count-
as 'dscp' marked with different DSCP markings, can cause the test exponent' which can cause a long time to be spent on PBKDF2
traffic on the network to be skewed, and the result manipulated. iterations. In addition, 'dscp' node marked with different DSCP
Finally, nodes within 'mode-preference-chain' which specify the markings, can cause the test traffic on the network to be skewed, and
'mode' and 'priority' values and indicate the preferred order of use the result manipulated. Finally, nodes within 'mode-preference-
by an operator, can for example, be manipulated to send chain' which specify the 'mode' and 'priority' values and indicate
the preferred order of use by an operator, can be manipulated to send
unauthenticated or non-encrypted traffic, enabling a MITM attack. unauthenticated or non-encrypted traffic, enabling a MITM attack.
Limiting access to these nodes will limit the ability to launch an Limiting access to these nodes will limit the ability to launch an
attack in network environments. attack in network environments.
The 'token' node defined in the model, containing a concatenation of
a Challenge, AES Session-key used for encryption, and HMAC-SHA1
Session-key used for authentication, is sensitive from a privacy
perspective, and can be used to disrupt a test session. The ability
to read the field should be limited to the administrator of the test
network.
8. IANA Considerations 8. IANA Considerations
This document registers a URI in the IETF XML registry [RFC3688]. This document registers a URI in the IETF XML registry [RFC3688].
Following the format in IETF XML Registry [RFC3688], the following Following the format in IETF XML Registry [RFC3688], the following
registration is requested to be made. registration is requested to be made.
URI: urn:ietf:params:xml:ns:yang:ietf-twamp URI: urn:ietf:params:xml:ns:yang:ietf-twamp
Registrant Contact: The IESG. Registrant Contact: The IESG.
 End of changes. 11 change blocks. 
23 lines changed or deleted 31 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/