1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658 2659 2660 2661 2662 2663 2664 2665 2666 2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825 2826 2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875 2876 2877 2878 2879 2880 2881 2882 2883 2884 2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909 2910 2911 2912 2913 2914 2915 2916 2917 2918 2919 2920 2921 2922 2923 2924 2925 2926 2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954 2955 2956 2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970 2971 2972 2973 2974 2975 2976 2977 2978 2979 2980 2981 2982 2983 2984 2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133
|
<pre>Network Working Group S. Shalunov
Request for Comments: 4656 B. Teitelbaum
Category: Standards Track A. Karp
J. Boote
M. Zekauskas
Internet2
September 2006
<span class="h1">A One-way Active Measurement Protocol (OWAMP)</span>
Status of This Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
The One-Way Active Measurement Protocol (OWAMP) measures
unidirectional characteristics such as one-way delay and one-way
loss. High-precision measurement of these one-way IP performance
metrics became possible with wider availability of good time sources
(such as GPS and CDMA). OWAMP enables the interoperability of these
measurements.
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-2">2</a>
<a href="#section-1.1">1.1</a>. Relationship of Test and Control Protocols .................<a href="#page-3">3</a>
<a href="#section-1.2">1.2</a>. Logical Model ..............................................<a href="#page-4">4</a>
<a href="#section-2">2</a>. Protocol Overview ...............................................<a href="#page-5">5</a>
<a href="#section-3">3</a>. OWAMP-Control ...................................................<a href="#page-6">6</a>
<a href="#section-3.1">3.1</a>. Connection Setup ...........................................<a href="#page-6">6</a>
<a href="#section-3.2">3.2</a>. Integrity Protection (HMAC) ...............................<a href="#page-11">11</a>
<a href="#section-3.3">3.3</a>. Values of the Accept Field ................................<a href="#page-11">11</a>
<a href="#section-3.4">3.4</a>. OWAMP-Control Commands ....................................<a href="#page-12">12</a>
<a href="#section-3.5">3.5</a>. Creating Test Sessions ....................................<a href="#page-13">13</a>
<a href="#section-3.6">3.6</a>. Send Schedules ............................................<a href="#page-18">18</a>
<a href="#section-3.7">3.7</a>. Starting Test Sessions ....................................<a href="#page-19">19</a>
<a href="#section-3.8">3.8</a>. Stop-Sessions .............................................<a href="#page-20">20</a>
<a href="#section-3.9">3.9</a>. Fetch-Session .............................................<a href="#page-24">24</a>
<span class="grey">Shalunov, et al. Standards Track [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<a href="#section-4">4</a>. OWAMP-Test .....................................................<a href="#page-27">27</a>
<a href="#section-4.1">4.1</a>. Sender Behavior ...........................................<a href="#page-28">28</a>
<a href="#section-4.1.1">4.1.1</a>. Packet Timings .....................................<a href="#page-28">28</a>
<a href="#section-4.1.2">4.1.2</a>. OWAMP-Test Packet Format and Content ...............<a href="#page-29">29</a>
<a href="#section-4.2">4.2</a>. Receiver Behavior .........................................<a href="#page-33">33</a>
<a href="#section-5">5</a>. Computing Exponentially Distributed Pseudo-Random Numbers ......<a href="#page-35">35</a>
<a href="#section-5.1">5.1</a>. High-Level Description of the Algorithm ...................<a href="#page-35">35</a>
<a href="#section-5.2">5.2</a>. Data Types, Representation, and Arithmetic ................<a href="#page-36">36</a>
<a href="#section-5.3">5.3</a>. Uniform Random Quantities .................................<a href="#page-37">37</a>
<a href="#section-6">6</a>. Security Considerations ........................................<a href="#page-38">38</a>
<a href="#section-6.1">6.1</a>. Introduction ..............................................<a href="#page-38">38</a>
<a href="#section-6.2">6.2</a>. Preventing Third-Party Denial of Service ..................<a href="#page-38">38</a>
<a href="#section-6.3">6.3</a>. Covert Information Channels ...............................<a href="#page-39">39</a>
<a href="#section-6.4">6.4</a>. Requirement to Include AES in Implementations .............<a href="#page-39">39</a>
<a href="#section-6.5">6.5</a>. Resource Use Limitations ..................................<a href="#page-39">39</a>
<a href="#section-6.6">6.6</a>. Use of Cryptographic Primitives in OWAMP ..................<a href="#page-40">40</a>
<a href="#section-6.7">6.7</a>. Cryptographic Primitive Replacement .......................<a href="#page-42">42</a>
<a href="#section-6.8">6.8</a>. Long-term Manually Managed Keys ...........................<a href="#page-43">43</a>
<a href="#section-6.9">6.9</a>. (Not) Using Time as Salt ..................................<a href="#page-44">44</a>
<a href="#section-6.10">6.10</a>. The Use of AES-CBC and HMAC ..............................<a href="#page-44">44</a>
<a href="#section-7">7</a>. Acknowledgements ...............................................<a href="#page-45">45</a>
<a href="#section-8">8</a>. IANA Considerations ............................................<a href="#page-45">45</a>
<a href="#section-9">9</a>. Internationalization Considerations ............................<a href="#page-46">46</a>
<a href="#section-10">10</a>. References ....................................................<a href="#page-46">46</a>
<a href="#section-10.1">10.1</a>. Normative References .....................................<a href="#page-46">46</a>
<a href="#section-10.2">10.2</a>. Informative References ...................................<a href="#page-47">47</a>
<a href="#appendix-A">Appendix A</a>: Sample C Code for Exponential Deviates ................<a href="#page-49">49</a>
<a href="#appendix-B">Appendix B</a>: Test Vectors for Exponential Deviates .................<a href="#page-54">54</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
The IETF IP Performance Metrics (IPPM) working group has defined
metrics for one-way packet delay [<a href="./rfc2679" title=""A One- way Delay Metric for IPPM"">RFC2679</a>] and loss [<a href="./rfc2680" title=""A One- way Packet Loss Metric for IPPM"">RFC2680</a>] across
Internet paths. Although there are now several measurement platforms
that implement collection of these metrics [<a href="#ref-SURVEYOR">SURVEYOR</a>] [<a href="#ref-SURVEYOR-INET" title=""Surveyor: An Infrastructure for Network Performance Measurements"">SURVEYOR-INET</a>]
[<a href="#ref-RIPE">RIPE</a>] [<a href="#ref-BRIX">BRIX</a>], there is not currently a standard that would permit
initiation of test streams or exchange of packets to collect
singleton metrics in an interoperable manner.
With the increasingly wide availability of affordable global
positioning systems (GPS) and CDMA-based time sources, hosts
increasingly have available to them very accurate time sources,
either directly or through their proximity to Network Time Protocol
(NTP) primary (stratum 1) time servers. By standardizing a technique
for collecting IPPM one-way active measurements, we hope to create an
environment where IPPM metrics may be collected across a far broader
mesh of Internet paths than is currently possible. One particularly
compelling vision is of widespread deployment of open OWAMP servers
<span class="grey">Shalunov, et al. Standards Track [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
that would make measurement of one-way delay as commonplace as
measurement of round-trip time using an ICMP-based tool like ping.
Additional design goals of OWAMP include: being hard to detect and
manipulate, security, logical separation of control and test
functionality, and support for small test packets. (Being hard to
detect makes interference with measurements more difficult for
intermediaries in the middle of the network.)
OWAMP test traffic is hard to detect because it is simply a stream of
UDP packets from and to negotiated port numbers, with potentially
nothing static in the packets (size is negotiated, as well). OWAMP
also supports an encrypted mode that further obscures the traffic and
makes it impossible to alter timestamps undetectably.
Security features include optional authentication and/or encryption
of control and test messages. These features may be useful to
prevent unauthorized access to results or man-in-the-middle attacks
that attempt to provide special treatment to OWAMP test streams or
that attempt to modify sender-generated timestamps to falsify test
results.
In this document, the key words "MUST", "REQUIRED", "SHOULD",
"RECOMMENDED", and "MAY" are to be interpreted as described in
[<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>. Relationship of Test and Control Protocols</span>
OWAMP actually consists of two inter-related protocols: OWAMP-Control
and OWAMP-Test. OWAMP-Control is used to initiate, start, and stop
test sessions and to fetch their results, whereas OWAMP-Test is used
to exchange test packets between two measurement nodes.
Although OWAMP-Test may be used in conjunction with a control
protocol other than OWAMP-Control, the authors have deliberately
chosen to include both protocols in the same RFC to encourage the
implementation and deployment of OWAMP-Control as a common
denominator control protocol for one-way active measurements. Having
a complete and open one-way active measurement solution that is
simple to implement and deploy is crucial to ensuring a future in
which inter-domain one-way active measurement could become as
commonplace as ping. We neither anticipate nor recommend that
OWAMP-Control form the foundation of a general-purpose extensible
measurement and monitoring control protocol.
OWAMP-Control is designed to support the negotiation of one-way
active measurement sessions and results retrieval in a
straightforward manner. At session initiation, there is a
<span class="grey">Shalunov, et al. Standards Track [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
negotiation of sender and receiver addresses and port numbers,
session start time, session length, test packet size, the mean
Poisson sampling interval for the test stream, and some attributes of
the very general [<a href="./rfc2330">RFC 2330</a>] notion of packet type, including packet
size and per-hop behavior (PHB) [<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>], which could be used to
support the measurement of one-way network characteristics across
differentiated services networks. Additionally, OWAMP-Control
supports per-session encryption and authentication for both test and
control traffic, measurement servers that can act as proxies for test
stream endpoints, and the exchange of a seed value for the pseudo-
random Poisson process that describes the test stream generated by
the sender.
We believe that OWAMP-Control can effectively support one-way active
measurement in a variety of environments, from publicly accessible
measurement beacons running on arbitrary hosts to network monitoring
deployments within private corporate networks. If integration with
Simple Network Management Protocol (SNMP) or proprietary network
management protocols is required, gateways may be created.
<span class="h3"><a class="selflink" id="section-1.2" href="#section-1.2">1.2</a>. Logical Model</span>
Several roles are logically separated to allow for broad flexibility
in use. Specifically, we define the following:
Session-Sender The sending endpoint of an OWAMP-Test session;
Session-Receiver The receiving endpoint of an OWAMP-Test session;
Server An end system that manages one or more OWAMP-Test
sessions, is capable of configuring per-session
state in session endpoints, and is capable of
returning the results of a test session;
Control-Client An end system that initiates requests for
OWAMP-Test sessions, triggers the start of a set
of sessions, and may trigger their termination;
and
Fetch-Client An end system that initiates requests to fetch
the results of completed OWAMP-Test sessions.
<span class="grey">Shalunov, et al. Standards Track [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
One possible scenario of relationships between these roles is shown
below.
+----------------+ +------------------+
| Session-Sender |--OWAMP-Test-->| Session-Receiver |
+----------------+ +------------------+
^ ^
| |
| |
| |
| +----------------+<----------------+
| | Server |<-------+
| +----------------+ |
| ^ |
| | |
| OWAMP-Control OWAMP-Control
| | |
v v v
+----------------+ +-----------------+
| Control-Client | | Fetch-Client |
+----------------+ +-----------------+
(Unlabeled links in the figure are unspecified by this document and
may be proprietary protocols.)
Different logical roles can be played by the same host. For example,
in the figure above, there could actually be only two hosts: one
playing the roles of Control-Client, Fetch-Client, and Session-
Sender, and the other playing the roles of Server and Session-
Receiver. This is shown below.
+-----------------+ +------------------+
| Control-Client |<--OWAMP-Control-->| Server |
| Fetch-Client | | |
| Session-Sender |---OWAMP-Test----->| Session-Receiver |
+-----------------+ +------------------+
Finally, because many Internet paths include segments that transport
IP over ATM, delay and loss measurements can include the effects of
ATM segmentation and reassembly (SAR). Consequently, OWAMP has been
designed to allow for small test packets that would fit inside the
payload of a single ATM cell (this is only achieved in
unauthenticated mode).
<span class="grey">Shalunov, et al. Standards Track [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Protocol Overview</span>
As described above, OWAMP consists of two inter-related protocols:
OWAMP-Control and OWAMP-Test. The former is layered over TCP and is
used to initiate and control measurement sessions and to fetch their
results. The latter protocol is layered over UDP and is used to send
singleton measurement packets along the Internet path under test.
The initiator of the measurement session establishes a TCP connection
to a well-known port, 861, on the target point and this connection
remains open for the duration of the OWAMP-Test sessions. An OWAMP
server SHOULD listen to this well-known port.
OWAMP-Control messages are transmitted only before OWAMP-Test
sessions are actually started and after they are completed (with the
possible exception of an early Stop-Sessions message).
The OWAMP-Control and OWAMP-Test protocols support three modes of
operation: unauthenticated, authenticated, and encrypted. The
authenticated or encrypted modes require that endpoints possess a
shared secret.
All multi-octet quantities defined in this document are represented
as unsigned integers in network byte order unless specified
otherwise.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. OWAMP-Control</span>
The type of each OWAMP-Control message can be found after reading the
first 16 octets. The length of each OWAMP-Control message can be
computed upon reading its fixed-size part. No message is shorter
than 16 octets.
An implementation SHOULD expunge unused state to prevent denial-of-
service attacks, or unbounded memory usage, on the server. For
example, if the full control message is not received within some
number of minutes after it is expected, the TCP connection associated
with the OWAMP-Control session SHOULD be dropped. In absence of
other considerations, 30 minutes seems like a reasonable upper bound.
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Connection Setup</span>
Before either a Control-Client or a Fetch-Client can issue commands
to a Server, it has to establish a connection to the server.
First, a client opens a TCP connection to the server on a well-known
port 861. The server responds with a server greeting:
<span class="grey">Shalunov, et al. Standards Track [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Unused (12 octets) |
| |
|+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Modes |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Challenge (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Salt (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Count (4 octets) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| MBZ (12 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The following Mode values are meaningful: 1 for unauthenticated, 2
for authenticated, and 4 for encrypted. The value of the Modes field
sent by the server is the bit-wise OR of the mode values that it is
willing to support during this session. Thus, the last three bits of
the Modes 32-bit value are used. The first 29 bits MUST be zero. A
client MUST ignore the values in the first 29 bits of the Modes
value. (This way, the bits are available for future protocol
extensions. This is the only intended extension mechanism.)
Challenge is a random sequence of octets generated by the server; it
is used subsequently by the client to prove possession of a shared
secret in a manner prescribed below.
Salt and Count are parameters used in deriving a key from a shared
secret as described below.
Salt MUST be generated pseudo-randomly (independently of anything
else in this document).
Count MUST be a power of 2. Count MUST be at least 1024. Count
SHOULD be increased as more computing power becomes common.
<span class="grey">Shalunov, et al. Standards Track [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
If the Modes value is zero, the server does not wish to communicate
with the client and MAY close the connection immediately. The client
SHOULD close the connection if it receives a greeting with Modes
equal to zero. The client MAY close the connection if the client's
desired mode is unavailable.
Otherwise, the client MUST respond with the following Set-Up-Response
message:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Mode |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. KeyID (80 octets) .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Token (64 octets) .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Client-IV (16 octets) .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Here Mode is the mode that the client chooses to use during this
OWAMP-Control session. It will also be used for all OWAMP-Test
sessions started under control of this OWAMP-Control session. In
Mode, one or zero bits MUST be set within last three bits. If it is
one bit that is set within the last three bits, this bit MUST
indicate a mode that the server agreed to use (i.e., the same bit
MUST have been set by the server in the server greeting). The first
29 bits of Mode MUST be zero. A server MUST ignore the values of the
first 29 bits. If zero Mode bits are set by the client, the client
indicates that it will not continue with the session; in this case,
the client and the server SHOULD close the TCP connection associated
with the OWAMP-Control session.
<span class="grey">Shalunov, et al. Standards Track [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
In unauthenticated mode, KeyID, Token, and Client-IV are unused.
Otherwise, KeyID is a UTF-8 string, up to 80 octets in length (if the
string is shorter, it is padded with zero octets), that tells the
server which shared secret the client wishes to use to authenticate
or encrypt, while Token is the concatenation of a 16-octet challenge,
a 16-octet AES Session-key used for encryption, and a 32-octet HMAC-
SHA1 Session-key used for authentication. The token itself is
encrypted using the AES (Advanced Encryption Standard) [<a href="#ref-AES">AES</a>] in
Cipher Block Chaining (CBC). Encryption MUST be performed using an
Initialization Vector (IV) of zero and a key derived from the shared
secret associated with KeyID. (Both the server and the client use
the same mappings from KeyIDs to shared secrets. The server, being
prepared to conduct sessions with more than one client, uses KeyIDs
to choose the appropriate secret key; a client would typically have
different secret keys for different servers. The situation is
analogous to that with passwords.)
The shared secret is a passphrase; it MUST not contain newlines. The
secret key is derived from the passphrase using a password-based key
derivation function PBKDF2 (PKCS #5) [<a href="./rfc2898" title=""PKCS #5: Password-Based Cryptography Specification Version 2.0"">RFC2898</a>]. The PBKDF2 function
requires several parameters: the PRF is HMAC-SHA1 [<a href="./rfc2104" title=""HMAC: Keyed-Hashing for Message Authentication"">RFC2104</a>]; the salt
and count are as transmitted by the server.
AES Session-key, HMAC Session-key and Client-IV are generated
randomly by the client. AES Session-key and HMAC Session-key MUST be
generated with sufficient entropy not to reduce the security of the
underlying cipher [<a href="./rfc4086" title=""Randomness Requirements for Security"">RFC4086</a>]. Client-IV merely needs to be unique
(i.e., it MUST never be repeated for different sessions using the
same secret key; a simple way to achieve that without the use of
cumbersome state is to generate the Client-IV values using a
cryptographically secure pseudo-random number source: if this is
done, the first repetition is unlikely to occur before 2^64 sessions
with the same secret key are conducted).
<span class="grey">Shalunov, et al. Standards Track [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
The server MUST respond with the following Server-Start message:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| MBZ (15 octets) |
| |
| +-+-+-+-+-+-+-+-+
| | Accept |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Server-IV (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Start-Time (Timestamp) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (8 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The MBZ parts MUST be zero. The client MUST ignore their value. MBZ
(MUST be zero) fields here and after have the same semantics: the
party that sends the message MUST set the field so that all bits are
equal to zero; the party that interprets the message MUST ignore the
value. (This way, the field could be used for future extensions.)
Server-IV is generated randomly by the server. In unauthenticated
mode, Server-IV is unused.
The Accept field indicates the server's willingness to continue
communication. A zero value in the Accept field means that the
server accepts the authentication and is willing to conduct further
transactions. Non-zero values indicate that the server does not
accept the authentication or, for some other reason, is not willing
to conduct further transactions in this OWAMP-Control session. The
full list of available Accept values is described in <a href="#section-3.3">Section 3.3</a>,
"Values of the Accept Field".
If a negative (non-zero) response is sent, the server MAY (and the
client SHOULD) close the connection after this message.
Start-Time is a timestamp representing the time when the current
instantiation of the server started operating. (For example, in a
multi-user general purpose operating system, it could be the time
when the server process was started.) If Accept is non-zero, Start-
<span class="grey">Shalunov, et al. Standards Track [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Time SHOULD be set so that all of its bits are zeros. In
authenticated and encrypted modes, Start-Time is encrypted as
described in <a href="#section-3.4">Section 3.4</a>, "OWAMP-Control Commands", unless Accept is
non-zero. (Authenticated and encrypted mode cannot be entered unless
the control connection can be initialized.)
Timestamp format is described in <a href="#section-4.1.2">Section 4.1.2</a>. The same
instantiation of the server SHOULD report the same exact Start-Time
value to each client in each session.
The previous transactions constitute connection setup.
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. Integrity Protection (HMAC)</span>
Authentication of each message (also referred to as a command in this
document) in OWAMP-Control is accomplished by adding an HMAC to it.
The HMAC that OWAMP uses is HMAC-SHA1 truncated to 128 bits. Thus,
all HMAC fields are 16 octets. An HMAC needs a key. The HMAC
Session-key is communicated along with the AES Session-key during
OWAMP-Control connection setup. The HMAC Session-key SHOULD be
derived independently of the AES Session-key (an implementation, of
course, MAY use the same mechanism to generate the random bits for
both keys). Each HMAC sent covers everything sent in a given
direction between the previous HMAC (but not including it) and up to
the beginning of the new HMAC. This way, once encryption is set up,
each bit of the OWAMP-Control connection is authenticated by an HMAC
exactly once.
When encrypting, authentication happens before encryption, so HMAC
blocks are encrypted along with the rest of the stream. When
decrypting, the order, of course, is reversed: first one decrypts,
then one checks the HMAC, then one proceeds to use the data.
The HMAC MUST be checked as early as possible to avoid using and
propagating corrupt data.
In open mode, the HMAC fields are unused and have the same semantics
as MBZ fields.
<span class="h3"><a class="selflink" id="section-3.3" href="#section-3.3">3.3</a>. Values of the Accept Field</span>
Accept values are used throughout the OWAMP-Control protocol to
communicate the server response to client requests. The full set of
valid Accept field values are as follows:
0 OK.
1 Failure, reason unspecified (catch-all).
<span class="grey">Shalunov, et al. Standards Track [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
2 Internal error.
3 Some aspect of request is not supported.
4 Cannot perform request due to permanent resource limitations.
5 Cannot perform request due to temporary resource limitations.
All other values are reserved. The sender of the message MAY use the
value of 1 for all non-zero Accept values. A message sender SHOULD
use the correct Accept value if it is going to use other values. The
message receiver MUST interpret all values of Accept other than these
reserved values as 1. This way, other values are available for
future extensions.
<span class="h3"><a class="selflink" id="section-3.4" href="#section-3.4">3.4</a>. OWAMP-Control Commands</span>
In authenticated or encrypted mode (which are identical as far as
OWAMP-Control is concerned, and only differ in OWAMP-Test), all
further communications are encrypted with the AES Session-key (using
CBC mode) and authenticated with HMAC Session-key. The client
encrypts everything it sends through the just-established OWAMP-
Control connection using stream encryption with Client-IV as the IV.
Correspondingly, the server encrypts its side of the connection using
Server-IV as the IV.
The IVs themselves are transmitted in cleartext. Encryption starts
with the block immediately following the block containing the IV.
The two streams (one going from the client to the server and one
going back) are encrypted independently, each with its own IV, but
using the same key (the AES Session-key).
The following commands are available for the client: Request-Session,
Start-Sessions, Stop-Sessions, and Fetch-Session. The command Stop-
Sessions is available to both the client and the server. (The server
can also send other messages in response to commands it receives.)
After the client sends the Start-Sessions command and until it both
sends and receives (in an unspecified order) the Stop-Sessions
command, it is said to be conducting active measurements. Similarly,
the server is said to be conducting active measurements after it
receives the Start-Sessions command and until it both sends and
receives (in an unspecified order) the Stop-Sessions command.
While conducting active measurements, the only command available is
Stop-Sessions.
These commands are described in detail below.
<span class="grey">Shalunov, et al. Standards Track [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h3"><a class="selflink" id="section-3.5" href="#section-3.5">3.5</a>. Creating Test Sessions</span>
Individual one-way active measurement sessions are established using
a simple request/response protocol. An OWAMP client MAY issue zero
or more Request-Session messages to an OWAMP server, which MUST
respond to each with an Accept-Session message. An Accept-Session
message MAY refuse a request.
<span class="grey">Shalunov, et al. Standards Track [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
The format of Request-Session message is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 1 | MBZ | IPVN | Conf-Sender | Conf-Receiver |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Schedule Slots |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Packets |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Port | Receiver Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sender Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Sender Address (cont.) or MBZ (12 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Receiver Address |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Receiver Address (cont.) or MBZ (12 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| SID (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Padding Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Start Time |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Timeout, (8 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type-P Descriptor |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (8 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<span class="grey">Shalunov, et al. Standards Track [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
This is immediately followed by one or more schedule slot
descriptions (the number of schedule slots is specified in the
"Number of Schedule Slots" field above):
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Slot Type | |
+-+-+-+-+-+-+-+-+ MBZ (7 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Slot Parameter (Timestamp) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
These are immediately followed by HMAC:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
All these messages constitute one logical message: the Request-
Session command.
Above, the first octet (1) indicates that this is the Request-Session
command.
IPVN is the IP version numbers for Sender and Receiver. When the IP
version number is 4, 12 octets follow the 4-octet IPv4 address stored
in Sender Address and Receiver Address. These octets MUST be set to
zero by the client and MUST be ignored by the server. Currently
meaningful IPVN values are 4 and 6.
Conf-Sender and Conf-Receiver MUST be set to 0 or 1 by the client.
The server MUST interpret any non-zero value as 1. If the value is
1, the server is being asked to configure the corresponding agent
(sender or receiver). In this case, the corresponding Port value
SHOULD be disregarded by the server. At least one of Conf-Sender and
Conf-Receiver MUST be 1. (Both can be set, in which case the server
is being asked to perform a session between two hosts it can
configure.)
<span class="grey">Shalunov, et al. Standards Track [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Number of Schedule Slots, as mentioned before, specifies the number
of slot records that go between the two blocks of HMAC. It is used
by the sender to determine when to send test packets (see next
section).
Number of Packets is the number of active measurement packets to be
sent during this OWAMP-Test session (note that either the server or
the client can abort the session early).
If Conf-Sender is not set, Sender Port is the UDP port from which
OWAMP-Test packets will be sent. If Conf-Receiver is not set,
Receiver Port is the UDP port OWAMP-Test to which packets are
requested to be sent.
The Sender Address and Receiver Address fields contain, respectively,
the sender and receiver addresses of the end points of the Internet
path over which an OWAMP test session is requested.
SID is the session identifier. It can be used in later sessions as
an argument for the Fetch-Session command. It is meaningful only if
Conf-Receiver is 0. This way, the SID is always generated by the
receiving side. See the end of the section for information on how
the SID is generated.
Padding length is the number of octets to be appended to the normal
OWAMP-Test packet (see more on padding in discussion of OWAMP-Test).
Start Time is the time when the session is to be started (but not
before Start-Sessions command is issued). This timestamp is in the
same format as OWAMP-Test timestamps.
Timeout (or a loss threshold) is an interval of time (expressed as a
timestamp). A packet belonging to the test session that is being set
up by the current Request-Session command will be considered lost if
it is not received during Timeout seconds after it is sent.
Type-P Descriptor covers only a subset of (very large) Type-P space.
If the first two bits of the Type-P Descriptor are 00, then the
subsequent six bits specify the requested Differentiated Services
Codepoint (DSCP) value of sent OWAMP-Test packets, as defined in
[<a href="./rfc2474" title=""Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers"">RFC2474</a>]. If the first two bits of Type-P descriptor are 01, then
the subsequent 16 bits specify the requested PHB Identification Code
(PHB ID), as defined in [<a href="./rfc2836" title=""Per Hop Behavior Identification Codes"">RFC2836</a>].
Therefore, the value of all zeros specifies the default best-effort
service.
<span class="grey">Shalunov, et al. Standards Track [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
If Conf-Sender is set, the Type-P Descriptor is to be used to
configure the sender to send packets according to its value. If
Conf-Sender is not set, the Type-P Descriptor is a declaration of how
the sender will be configured.
If Conf-Sender is set and the server does not recognize the Type-P
Descriptor, or it cannot or does not wish to set the corresponding
attributes on OWAMP-Test packets, it SHOULD reject the session
request. If Conf-Sender is not set, the server SHOULD accept or
reject the session, paying no attention to the value of the Type-P
Descriptor.
To each Request-Session message, an OWAMP server MUST respond with an
Accept-Session message:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Accept | MBZ | Port |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
| |
| SID (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| MBZ (12 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
In this message, zero in the Accept field means that the server is
willing to conduct the session. A non-zero value indicates rejection
of the request. The full list of available Accept values is
described in <a href="#section-3.3">Section 3.3</a>, "Values of the Accept Field".
If the server rejects a Request-Session message, it SHOULD not close
the TCP connection. The client MAY close it if it receives a
negative response to the Request-Session message.
The meaning of Port in the response depends on the values of Conf-
Sender and Conf-Receiver in the query that solicited the response.
If both were set, the Port field is unused. If only Conf-Sender was
set, Port is the port from which to expect OWAMP-Test packets. If
<span class="grey">Shalunov, et al. Standards Track [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
only Conf-Receiver was set, Port is the port to which OWAMP-Test
packets are sent.
If only Conf-Sender was set, the SID field in the response is unused.
Otherwise, SID is a unique server-generated session identifier. It
can be used later as handle to fetch the results of a session.
SIDs SHOULD be constructed by concatenation of the 4-octet IPv4 IP
number belonging to the generating machine, an 8-octet timestamp, and
a 4-octet random value. To reduce the probability of collisions, if
the generating machine has any IPv4 addresses (with the exception of
loopback), one of them SHOULD be used for SID generation, even if all
communication is IPv6-based. If it has no IPv4 addresses at all, the
last four octets of an IPv6 address MAY be used instead. Note that
SID is always chosen by the receiver. If truly random values are not
available, it is important that the SID be made unpredictable, as
knowledge of the SID might be used for access control.
<span class="h3"><a class="selflink" id="section-3.6" href="#section-3.6">3.6</a>. Send Schedules</span>
The sender and the receiver both need to know the same send schedule.
This way, when packets are lost, the receiver knows when they were
supposed to be sent. It is desirable to compress common schedules
and still to be able to use an arbitrary one for the test sessions.
In many cases, the schedule will consist of repeated sequences of
packets: this way, the sequence performs some test, and the test is
repeated a number of times to gather statistics.
To implement this, we have a schedule with a given number of slots.
Each slot has a type and a parameter. Two types are supported:
exponentially distributed pseudo-random quantity (denoted by a code
of 0) and a fixed quantity (denoted by a code of 1). The parameter
is expressed as a timestamp and specifies a time interval. For a
type 0 slot (exponentially distributed pseudo-random quantity), this
interval is the mean value (or 1/lambda if the distribution density
function is expressed as lambda*exp(-lambda*x) for positive values of
x). For a type 1 (fixed quantity) slot, the parameter is the delay
itself. The sender starts with the beginning of the schedule and
executes the instructions in the slots: for a slot of type 0, wait an
exponentially distributed time with a mean of the specified parameter
and then send a test packet (and proceed to the next slot); for a
slot of type 1, wait the specified time and send a test packet (and
proceed to the next slot). The schedule is circular: when there are
no more slots, the sender returns to the first slot.
The sender and the receiver need to be able to reproducibly execute
the entire schedule (so, if a packet is lost, the receiver can still
attach a send timestamp to it). Slots of type 1 are trivial to
<span class="grey">Shalunov, et al. Standards Track [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
reproducibly execute. To reproducibly execute slots of type 0, we
need to be able to generate pseudo-random exponentially distributed
quantities in a reproducible manner. The way this is accomplished is
discussed later in <a href="#section-5">Section 5</a>, "Computing Exponentially Distributed
Pseudo-Random Numbers".
Using this mechanism, one can easily specify common testing
scenarios. The following are some examples:
+ Poisson stream: a single slot of type 0.
+ Periodic stream: a single slot of type 1.
+ Poisson stream of back-to-back packet pairs: two slots, type 0
with a non-zero parameter and type 1 with a zero parameter.
Further, a completely arbitrary schedule can be specified (albeit
inefficiently) by making the number of test packets equal to the
number of schedule slots. In this case, the complete schedule is
transmitted in advance of an OWAMP-Test session.
<span class="h3"><a class="selflink" id="section-3.7" href="#section-3.7">3.7</a>. Starting Test Sessions</span>
Having requested one or more test sessions and received affirmative
Accept-Session responses, an OWAMP client MAY start the execution of
the requested test sessions by sending a Start-Sessions message to
the server.
The format of this message is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 2 | |
+-+-+-+-+-+-+-+-+ |
| MBZ (15 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The server MUST respond with an Start-Ack message (which SHOULD be
sent as quickly as possible). Start-Ack messages have the following
format:
<span class="grey">Shalunov, et al. Standards Track [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Accept | |
+-+-+-+-+-+-+-+-+ |
| MBZ (15 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
If Accept is non-zero, the Start-Sessions request was rejected; zero
means that the command was accepted. The full list of available
Accept values is described in <a href="#section-3.3">Section 3.3</a>, "Values of the Accept
Field". The server MAY, and the client SHOULD, close the connection
in the case of a rejection.
The server SHOULD start all OWAMP-Test streams immediately after it
sends the response or immediately after their specified start times,
whichever is later. If the client represents a Sender, the client
SHOULD start its OWAMP-Test streams immediately after it sees the
Start-Ack response from the Server (if the Start-Sessions command was
accepted) or immediately after their specified start times, whichever
is later. See more on OWAMP-Test sender behavior in a separate
section below.
<span class="h3"><a class="selflink" id="section-3.8" href="#section-3.8">3.8</a>. Stop-Sessions</span>
The Stop-Sessions message may be issued by either the Control-Client
or the Server. The format of this command is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 3 | Accept | MBZ |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Sessions |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| MBZ (8 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
This is immediately followed by zero or more session description
records (the number of session description records is specified in
<span class="grey">Shalunov, et al. Standards Track [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
the "Number of Sessions" field above). The session description
record is used to indicate which packets were actually sent by the
sender process (rather than skipped). The header of the session
description record is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
| |
| SID (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Seqno |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Skip Ranges |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
This is immediately followed by zero or more Skip Range descriptions
as specified by the "Number of Skip Ranges" field above. Skip Ranges
are simply two sequence numbers that, together, indicate a range of
packets that were not sent:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
| First Seqno Skipped |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Last Seqno Skipped |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Skip Ranges MUST be in order. The last (possibly full, possibly
incomplete) block (16 octets) of data MUST be padded with zeros, if
necessary. This ensures that the next session description record
starts on a block boundary.
Finally, a single block (16 octets) of HMAC is concatenated on the
end to complete the Stop-Sessions message.
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
All these records comprise one logical message: the Stop-Sessions
command.
<span class="grey">Shalunov, et al. Standards Track [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Above, the first octet (3) indicates that this is the Stop-Sessions
command.
Non-zero Accept values indicate a failure of some sort. Zero values
indicate normal (but possibly premature) completion. The full list
of available Accept values is described in <a href="#section-3.3">Section 3.3</a>, "Values of
the Accept Field".
If Accept had a non-zero value (from either party), results of all
OWAMP-Test sessions spawned by this OWAMP-Control session SHOULD be
considered invalid, even if a Fetch-Session with SID from this
session works for a different OWAMP-Control session. If Accept was
not transmitted at all (for whatever reason, including the TCP
connection used for OWAMP-Control breaking), the results of all
OWAMP-Test sessions spawned by this OWAMP-control session MAY be
considered invalid.
Number of Sessions indicates the number of session description
records that immediately follow the Stop-Sessions header.
Number of Sessions MUST contain the number of send sessions started
by the local side of the control connection that have not been
previously terminated by a Stop-Sessions command (i.e., the Control-
Client MUST account for each accepted Request-Session where Conf-
Receiver was set; the Control-Server MUST account for each accepted
Request-Session where Conf-Sender was set). If the Stop-Sessions
message does not account for exactly the send sessions controlled by
that side, then it is to be considered invalid and the connection
SHOULD be closed and any results obtained considered invalid.
Each session description record represents one OWAMP-Test session.
SID is the session identifier (SID) used to indicate which send
session is being described.
Next Seqno indicates the next sequence number that would have been
sent from this send session. For completed sessions, this will equal
NumPackets from the Request-Session.
Number of Skip Ranges indicates the number of holes that actually
occurred in the sending process. This is a range of packets that
were never actually sent by the sending process. For example, if a
send session is started too late for the first 10 packets to be sent
and this is the only hole in the schedule, then "Number of Skip
Ranges" would be 1. The single Skip Range description will have
First Seqno Skipped equal to 0 and Last Seqno Skipped equal to 9.
This is described further in the "Sender Behavior" section.
<span class="grey">Shalunov, et al. Standards Track [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
If the OWAMP-Control connection breaks when the Stop-Sessions command
is sent, the receiver MAY not completely invalidate the session
results. It MUST discard all record of packets that follow (in other
words, that have greater sequence number than) the last packet that
was actually received before any lost packet records. This will help
differentiate between packet losses that occurred in the network and
packets the sending process may have never sent.
If a receiver of an OWAMP-Test session learns, through an OWAMP-
Control Stop-Sessions message, that the OWAMP-Test sender's last
sequence number is lower than any sequence number actually received,
the results of the complete OWAMP-Test session MUST be invalidated.
A receiver of an OWAMP-Test session, upon receipt of an OWAMP-Control
Stop-Sessions command, MUST discard any packet records -- including
lost packet records -- with a (computed) send time that falls between
the current time minus Timeout and the current time. This ensures
statistical consistency for the measurement of loss and duplicates in
the event that the Timeout is greater than the time it takes for the
Stop-Sessions command to take place.
To effect complete sessions, each side of the control connection
SHOULD wait until all sessions are complete before sending the Stop-
Sessions message. The completed time of each session is determined
as Timeout after the scheduled time for the last sequence number.
Endpoints MAY add a small increment to the computed completed time
for send endpoints to ensure that the Stop-Sessions message reaches
the receiver endpoint after Timeout.
To effect a premature stop of sessions, the party that initiates this
command MUST stop its OWAMP-Test send streams to send the Session
Packets Sent values before sending this command. That party SHOULD
wait until receiving the response Stop-Sessions message before
stopping the receiver streams so that it can use the values from the
received Stop-Sessions message to validate the data.
<span class="grey">Shalunov, et al. Standards Track [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h3"><a class="selflink" id="section-3.9" href="#section-3.9">3.9</a>. Fetch-Session</span>
The format of this client command is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| 4 | |
+-+-+-+-+-+-+-+-+ |
| MBZ (7 octets) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Begin Seq |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| End Seq |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| SID (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Begin Seq is the sequence number of the first requested packet. End
Seq is the sequence number of the last requested packet. If Begin
Seq is all zeros and End Seq is all ones, complete session is said to
be requested.
If a complete session is requested and the session is still in
progress or has terminated in any way other than normally, the
request to fetch session results MUST be denied. If an incomplete
session is requested, all packets received so far that fall into the
requested range SHOULD be returned. Note that, since no commands can
be issued between Start-Sessions and Stop-Sessions, incomplete
requests can only happen on a different OWAMP-Control connection
(from the same or different host as Control-Client).
<span class="grey">Shalunov, et al. Standards Track [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
The server MUST respond with a Fetch-Ack message. The format of this
server response is as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Accept | Finished | MBZ (2 octets) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Next Seqno |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Skip Ranges |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Number of Records |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Again, non-zero in the Accept field means a rejection of command.
The server MUST specify zero for all remaining fields if Accept is
non-zero. The client MUST ignore all remaining fields (except for
the HMAC) if Accept is non-zero. The full list of available Accept
values is described in <a href="#section-3.3">Section 3.3</a>, "Values of the Accept Field".
Finished is non-zero if the OWAMP-Test session has terminated.
Next Seqno indicates the next sequence number that would have been
sent from this send session. For completed sessions, this will equal
NumPackets from the Request-Session. This information is only
available if the session has terminated. If Finished is zero, then
Next Seqno MUST be set to zero by the server.
Number of Skip Ranges indicates the number of holes that actually
occurred in the sending process. This information is only available
if the session has terminated. If Finished is zero, then Skip Ranges
MUST be set to zero by the server.
Number of Records is the number of packet records that fall within
the requested range. This number might be less than the Number of
Packets in the reproduction of the Request-Session command because of
a session that ended prematurely, or it might be greater because of
duplicates.
If Accept was non-zero, this concludes the response to the Fetch-
Session message. If Accept was 0, the server then MUST immediately
send the OWAMP-Test session data in question.
<span class="grey">Shalunov, et al. Standards Track [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
The OWAMP-Test session data consists of the following (concatenated):
+ A reproduction of the Request-Session command that was used to
start the session; it is modified so that actual sender and
receiver port numbers that were used by the OWAMP-Test session
always appear in the reproduction.
+ Zero or more (as specified) Skip Range descriptions. The last
(possibly full, possibly incomplete) block (16 octets) of Skip
Range descriptions is padded with zeros, if necessary.
+ 16 octets of HMAC.
+ Zero or more (as specified) packet records. The last (possibly
full, possibly incomplete) block (16 octets) of data is padded
with zeros, if necessary.
+ 16 octets of HMAC.
Skip Range descriptions are simply two sequence numbers that,
together, indicate a range of packets that were not sent:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-|
| First Seqno Skipped |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Last Seqno Skipped |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Skip Range descriptions should be sent out in order, as sorted by
First Seqno. If any Skip Ranges overlap or are out of order, the
session data is to be considered invalid and the connection SHOULD be
closed and any results obtained considered invalid.
Each packet record is 25 octets and includes 4 octets of sequence
number, 8 octets of send timestamp, 2 octets of send timestamp error
estimate, 8 octets of receive timestamp, 2 octets of receive
timestamp error estimate, and 1 octet of Time To Live (TTL), or Hop
Limit in IPv6:
<span class="grey">Shalunov, et al. Standards Track [Page 26]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-27" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
00| Seq Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
04| Send Error Estimate | Receive Error Estimate |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
08| Send Timestamp |
12| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
16| Receive Timestamp |
20| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
24| TTL |
+-+-+-+-+-+-+-+-+
Packet records are sent out in the same order the actual packets were
received. Therefore, the data is in arrival order.
Note that lost packets (if any losses were detected during the
OWAMP-Test session) MUST appear in the sequence of packets. They can
appear either at the point when the loss was detected or at any later
point. Lost packet records are distinguished as follows:
+ A send timestamp filled with the presumed send time (as computed
by the send schedule).
+ A send error estimate filled with Multiplier=1, Scale=64, and S=0
(see the OWAMP-Test description for definition of these quantities
and explanation of timestamp format and error estimate format).
+ A normal receive error estimate as determined by the error of the
clock being used to declare the packet lost. (It is declared lost
if it is not received by the Timeout after the presumed send time,
as determined by the receiver's clock.)
+ A receive timestamp consisting of all zero bits.
+ A TTL value of 255.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. OWAMP-Test</span>
This section describes OWAMP-Test protocol. It runs over UDP, using
sender and receiver IP and port numbers negotiated during the
Request-Session exchange.
<span class="grey">Shalunov, et al. Standards Track [Page 27]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-28" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
As with OWAMP-Control, OWAMP-Test has three modes: unauthenticated,
authenticated, and encrypted. All OWAMP-Test sessions that are
spawned by an OWAMP-Control session inherit its mode.
OWAMP-Control client, OWAMP-Control server, OWAMP-Test sender, and
OWAMP-Test receiver can potentially all be different machines. (In a
typical case, we expect that there will be only two machines.)
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. Sender Behavior</span>
<span class="h4"><a class="selflink" id="section-4.1.1" href="#section-4.1.1">4.1.1</a>. Packet Timings</span>
Send schedules based on slots, described previously, in conjunction
with scheduled session start time, enable the sender and the receiver
to compute the same exact packet sending schedule independently of
each other. These sending schedules are independent for different
OWAMP-Test sessions, even if they are governed by the same OWAMP-
Control session.
Consider any OWAMP-Test session. Once Start-Sessions exchange is
complete, the sender is ready to start sending packets. Under normal
OWAMP use circumstances, the time to send the first packet is in the
near future (perhaps a fraction of a second away). The sender SHOULD
send packets as close as possible to their scheduled time, with the
following exception: if the scheduled time to send is in the past,
and is separated from the present by more than Timeout time, the
sender MUST NOT send the packet. (Indeed, such a packet would be
considered lost by the receiver anyway.) The sender MUST keep track
of which packets it does not send. It will use this to tell the
receiver what packets were not sent by setting Skip Ranges in the
Stop-Sessions message from the sender to the receiver upon completion
of the test. The Skip Ranges are also sent to a Fetch-Client as part
of the session data results. These holes in the sending schedule can
happen if a time in the past was specified in the Request-Session
command, or if the Start-Sessions exchange took unexpectedly long, or
if the sender could not start serving the OWAMP-Test session on time
due to internal scheduling problems of the OS. Packets that are in
the past but are separated from the present by less than Timeout
value SHOULD be sent as quickly as possible. With normal test rates
and timeout values, the number of packets in such a burst is limited.
Nevertheless, hosts SHOULD NOT intentionally schedule sessions so
that such bursts of packets occur.
Regardless of any scheduling delays, each packet that is actually
sent MUST have the best possible approximation of its real time of
departure as its timestamp (in the packet).
<span class="grey">Shalunov, et al. Standards Track [Page 28]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-29" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h4"><a class="selflink" id="section-4.1.2" href="#section-4.1.2">4.1.2</a>. OWAMP-Test Packet Format and Content</span>
The sender sends the receiver a stream of packets with the schedule
specified in the Request-Session command. The sender SHOULD set the
TTL in IPv4 (or Hop Limit in IPv6) in the UDP packet to 255. The
format of the body of a UDP packet in the stream depends on the mode
being used.
For unauthenticated mode:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Error Estimate | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| |
. .
. Packet Padding .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<span class="grey">Shalunov, et al. Standards Track [Page 29]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-30" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
For authenticated and encrypted modes:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Sequence Number |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| MBZ (12 octets) |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Timestamp |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Error Estimate | |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| MBZ (6 octets) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| HMAC (16 octets) |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
. .
. Packet Padding .
. .
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The format of the timestamp is the same as in [<a href="./rfc1305" title=""Network Time Protocol (Version 3) Specification, Implementation and Analysis"">RFC1305</a>] and is as
follows: the first 32 bits represent the unsigned integer number of
seconds elapsed since 0h on 1 January 1900; the next 32 bits
represent the fractional part of a second that has elapsed since
then.
So, Timestamp is represented as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Integer part of seconds |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Fractional part of seconds |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
<span class="grey">Shalunov, et al. Standards Track [Page 30]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-31" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
The Error Estimate specifies the estimate of the error and
synchronization. It has the following format:
0 1
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|S|Z| Scale | Multiplier |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
The first bit, S, SHOULD be set if the party generating the timestamp
has a clock that is synchronized to UTC using an external source
(e.g., the bit should be set if GPS hardware is used and it indicates
that it has acquired current position and time or if NTP is used and
it indicates that it has synchronized to an external source, which
includes stratum 0 source, etc.). If there is no notion of external
synchronization for the time source, the bit SHOULD NOT be set. The
next bit has the same semantics as MBZ fields elsewhere: it MUST be
set to zero by the sender and ignored by everyone else. The next six
bits, Scale, form an unsigned integer; Multiplier is an unsigned
integer as well. They are interpreted as follows: the error estimate
is equal to Multiplier*2^(-32)*2^Scale (in seconds). (Notation
clarification: 2^Scale is two to the power of Scale.) Multiplier
MUST NOT be set to zero. If Multiplier is zero, the packet SHOULD be
considered corrupt and discarded.
Sequence numbers start with zero and are incremented by one for each
subsequent packet.
The minimum data segment length is, therefore, 14 octets in
unauthenticated mode, and 48 octets in both authenticated mode and
encrypted modes.
The OWAMP-Test packet layout is the same in authenticated and
encrypted modes. The encryption and authentication operations are,
however, different. The difference is that in encrypted mode both
the sequence number and the timestamp are protected to provide
maximum data confidentiality and integrity protection, whereas in
authenticated mode the sequence number is protected while the
timestamp is sent in clear text. Sending the timestamp in clear text
in authenticated mode allows one to reduce the time between when a
timestamp is obtained by a sender and when the packet is shipped out.
In encrypted mode, the sender has to fetch the timestamp, encrypt it,
and send it; in authenticated mode, the middle step is removed,
potentially improving accuracy (the sequence number can be encrypted
and authenticated before the timestamp is fetched).
In authenticated mode, the first block (16 octets) of each packet is
encrypted using AES Electronic Cookbook (ECB) mode.
<span class="grey">Shalunov, et al. Standards Track [Page 31]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-32" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Similarly to each OWAMP-Control session, each OWAMP-Test session has
two keys: an AES Session-key and an HMAC Session-key. However, there
is a difference in how the keys are obtained: in the case of OWAMP-
Control, the keys are generated by the client and communicated (as
part of the Token) during connection setup as part of Set-Up-Response
message; in the case of OWAMP-Test, described here, the keys are
derived from the OWAMP-Control keys and the SID.
The OWAMP-Test AES Session-key is obtained as follows: the OWAMP-
Control AES Session-key (the same AES Session-key as is used for the
corresponding OWAMP-Control session, where it is used in a different
chaining mode) is encrypted, using AES, with the 16-octet session
identifier (SID) as the key; this is a single-block ECB encryption;
its result is the OWAMP-Test AES Session-key to use in encrypting
(and decrypting) the packets of the particular OWAMP-Test session.
Note that all of OWAMP-Test AES Session-key, OWAMP-Control AES
Session-key, and the SID are comprised of 16 octets.
The OWAMP-Test HMAC Session-key is obtained as follows: the OWAMP-
Control HMAC Session-key (the same HMAC Session-key as is used for
the corresponding OWAMP-Control session) is encrypted, using AES,
with the 16-octet session identifier (SID) as the key; this is a
two-block CBC encryption, always performed with IV=0; its result is
the OWAMP-Test HMAC Session-key to use in authenticating the packets
of the particular OWAMP-Test session. Note that all of OWAMP-Test
HMAC Session-key and OWAMP-Control HMAC Session-key are comprised of
32 octets, while the SID is 16 octets.
ECB mode used for encrypting the first block of OWAMP-Test packets in
authenticated mode does not involve any actual chaining; this way,
lost, duplicated, or reordered packets do not cause problems with
deciphering any packet in an OWAMP-Test session.
In encrypted mode, the first two blocks (32 octets) are encrypted
using AES CBC mode. The AES Session-key to use is obtained in the
same way as the key for authenticated mode. Each OWAMP-Test packet
is encrypted as a separate stream, with just one chaining operation;
chaining does not span multiple packets so that lost, duplicated, or
reordered packets do not cause problems. The initialization vector
for the CBC encryption is a value with all bits equal to zero.
Implementation note: Naturally, the key schedule for each OWAMP-Test
session MAY be set up only once per session, not once per packet.
<span class="grey">Shalunov, et al. Standards Track [Page 32]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-33" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
HMAC in OWAMP-Test only covers the part of the packet that is also
encrypted. So, in authenticated mode, HMAC covers the first block
(16 octets); in encrypted mode, HMAC covers two first blocks (32
octets). In OWAMP-Test HMAC is not encrypted (note that this is
different from OWAMP-Control, where encryption in stream mode is
used, so everything including the HMAC blocks ends up being
encrypted).
In unauthenticated mode, no encryption or authentication is applied.
Packet Padding in OWAMP-Test SHOULD be pseudo-random (it MUST be
generated independently of any other pseudo-random numbers mentioned
in this document). However, implementations MUST provide a
configuration parameter, an option, or a different means of making
Packet Padding consist of all zeros.
The time elapsed between packets is computed according to the slot
schedule as mentioned in Request-Session command description. At
that point, we skipped over the issue of computing exponentially
distributed pseudo-random numbers in a reproducible fashion. It is
discussed later in a separate section.
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. Receiver Behavior</span>
The receiver knows when the sender will send packets. The following
parameter is defined: Timeout (from Request-Session). Packets that
are delayed by more than Timeout are considered lost (or "as good as
lost"). Note that there is never an actual assurance of loss by the
network: a "lost" packet might still be delivered at any time. The
original specification for IPv4 required that packets be delivered
within TTL seconds or never (with TTL having a maximum value of 255).
To the best of the authors' knowledge, this requirement was never
actually implemented (and, of course, only a complete and universal
implementation would ensure that packets do not travel for longer
than TTL seconds). In fact, in IPv6, the name of this field has
actually been changed to Hop Limit. Further, IPv4 specification
makes no claims about the time it takes the packet to traverse the
last link of the path.
The choice of a reasonable value of Timeout is a problem faced by a
user of OWAMP protocol, not by an implementor. A value such as two
minutes is very safe. Note that certain applications (such as
interactive "one-way ping" might wish to obtain the data faster than
that.
As packets are received,
+ timestamp the received packet;
<span class="grey">Shalunov, et al. Standards Track [Page 33]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-34" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
+ in authenticated or encrypted mode, decrypt and authenticate as
necessary (packets for which authentication fails MUST be
discarded); and
+ store the packet sequence number, send time, receive time, and the
TTL for IPv4 (or Hop Limit for IPv6) from the packet IP header for
the results to be transferred.
Packets not received within the Timeout are considered lost. They
are recorded with their true sequence number, presumed send time,
receive time value with all bits being zero, and a TTL (or Hop Limit)
of 255.
Implementations SHOULD fetch the TTL/Hop Limit value from the IP
header of the packet. If an implementation does not fetch the actual
TTL value (the only good reason not to do so is an inability to
access the TTL field of arriving packets), it MUST record the TTL
value as 255.
Packets that are actually received are recorded in the order of
arrival. Lost packet records serve as indications of the send times
of lost packets. They SHOULD be placed either at the point where the
receiver learns about the loss or at any later point; in particular,
one MAY place all the records that correspond to lost packets at the
very end.
Packets that have send time in the future MUST be recorded normally,
without changing their send timestamp, unless they have to be
discarded. (Send timestamps in the future would normally indicate
clocks that differ by more than the delay. Some data -- such as
jitter -- can be extracted even without knowledge of time difference.
For other kinds of data, the adjustment is best handled by the data
consumer on the basis of the complete information in a measurement
session, as well as, possibly, external data.)
Packets with a sequence number that was already observed (duplicate
packets) MUST be recorded normally. (Duplicate packets are sometimes
introduced by IP networks. The protocol has to be able to measure
duplication.)
If any of the following is true, the packet MUST be discarded:
+ Send timestamp is more than Timeout in the past or in the future.
+ Send timestamp differs by more than Timeout from the time when the
packet should have been sent according to its sequence number.
+ In authenticated or encrypted mode, HMAC verification fails.
<span class="grey">Shalunov, et al. Standards Track [Page 34]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-35" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Computing Exponentially Distributed Pseudo-Random Numbers</span>
Here we describe the way exponential random quantities used in the
protocol are generated. While there is a fair number of algorithms
for generating exponential random variables, most of them rely on
having logarithmic function as a primitive, resulting in potentially
different values, depending on the particular implementation of the
math library. We use algorithm 3.4.1.S from [<a href="#ref-KNUTH" title="vol.2">KNUTH</a>], which is free
of the above-mentioned problem, and which guarantees the same output
on any implementation. The algorithm belongs to the ziggurat family
developed in the 1970s by G. Marsaglia, M. Sibuya, and J. H. Ahrens
[<a href="#ref-ZIGG" title=""Computer methods for sampling from the exponential and normal distributions"">ZIGG</a>]. It replaces the use of logarithmic function by clever bit
manipulation, still producing the exponential variates on output.
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. High-Level Description of the Algorithm</span>
For ease of exposition, the algorithm is first described with all
arithmetic operations being interpreted in their natural sense.
Later, exact details on data types, arithmetic, and generation of the
uniform random variates used by the algorithm are given. It is an
almost verbatim quotation from [<a href="#ref-KNUTH" title="vol.2">KNUTH</a>], p.133.
Algorithm S: Given a real positive number "mu", produce an
exponential random variate with mean "mu".
First, the constants
Q[k] = (ln2)/(1!) + (ln2)^2/(2!) + ... + (ln2)^k/(k!), 1 <= k <= 11
are computed in advance. The exact values which MUST be used by all
implementations are given in the next section. This is necessary to
ensure that exactly the same pseudo-random sequences are produced by
all implementations.
S1. [Get U and shift.] Generate a 32-bit uniform random binary
fraction
U = (.b0 b1 b2 ... b31) [note the binary point]
Locate the first zero bit b_j and shift off the leading (j+1) bits,
setting U <- (.b_{j+1} ... b31)
Note: In the rare case that the zero has not been found, it is
prescribed that the algorithm return (mu*32*ln2).
S2. [Immediate acceptance?] If U < ln2, set X <- mu*(j*ln2 + U) and
terminate the algorithm. (Note that Q[1] = ln2.)
<span class="grey">Shalunov, et al. Standards Track [Page 35]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-36" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
S3. [Minimize.] Find the least k >= 2 such that U < Q[k]. Generate k
new uniform random binary fractions U1,...,Uk and set V <-
min(U1,...,Uk).
S4. [Deliver the answer.] Set X <- mu*(j + V)*ln2.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Data Types, Representation, and Arithmetic</span>
The high-level algorithm operates on real numbers, typically
represented as floating point numbers. This specification prescribes
that unsigned 64-bit integers be used instead.
u_int64_t integers are interpreted as real numbers by placing the
decimal point after the first 32 bits. In other words, conceptually,
the interpretation is given by the following map:
u_int64_t u;
u |--> (double)u / (2**32)
The algorithm produces a sequence of such u_int64_t integers that,
for any given value of SID, is guaranteed to be the same on any
implementation.
We specify that the u_int64_t representations of the first 11 values
of the Q array in the high-level algorithm MUST be as follows:
#1 0xB17217F8,
#2 0xEEF193F7,
#3 0xFD271862,
#4 0xFF9D6DD0,
#5 0xFFF4CFD0,
#6 0xFFFEE819,
#7 0xFFFFE7FF,
#8 0xFFFFFE2B,
#9 0xFFFFFFE0,
#10 0xFFFFFFFE,
#11 0xFFFFFFFF
For example, Q[1] = ln2 is indeed approximated by 0xB17217F8/(2**32)
= 0.693147180601954; for j > 11, Q[j] is 0xFFFFFFFF.
Small integer j in the high-level algorithm is represented as
u_int64_t value j * (2**32).
Operation of addition is done as usual on u_int64_t numbers; however,
the operation of multiplication in the high-level algorithm should be
replaced by
<span class="grey">Shalunov, et al. Standards Track [Page 36]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-37" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
(u, v) |---> (u * v) >> 32.
Implementations MUST compute the product (u * v) exactly. For
example, a fragment of unsigned 128-bit arithmetic can be implemented
for this purpose (see the sample implementation in <a href="#appendix-A">Appendix A</a>).
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a>. Uniform Random Quantities</span>
The procedure for obtaining a sequence of 32-bit random numbers (such
as U in algorithm S) relies on using AES encryption in counter mode.
To describe the exact working of the algorithm, we introduce two
primitives from Rijndael. Their prototypes and specification are
given below, and they are assumed to be provided by the supporting
Rijndael implementation, such as [<a href="#ref-RIJN">RIJN</a>].
+ A function that initializes a Rijndael key with bytes from seed
(the SID will be used as the seed):
void KeyInit(unsigned char seed[16]);
+ A function that encrypts the 16-octet block inblock with the
specified key, returning a 16-octet encrypted block. Here,
keyInstance is an opaque type used to represent Rijndael keys:
void BlockEncrypt(keyInstance key, unsigned char inblock[16]);
Algorithm Unif: given a 16-octet quantity seed, produce a sequence of
unsigned 32-bit pseudo-random uniformly distributed integers. In
OWAMP, the SID (session ID) from Control protocol plays the role of
seed.
U1. [Initialize Rijndael key] key <- KeyInit(seed) [Initialize an
unsigned 16-octet (network byte order) counter] c <- 0
U2. [Need more random bytes?] Set i <- c mod 4. If (i == 0) set s
<- BlockEncrypt(key, c)
U3. [Increment the counter as unsigned 16-octet quantity] c <- c + 1
U4. [Do output] Output the i_th quartet of octets from s starting
from high-order octets, converted to native byte order and
represented as OWPNum64 value (as in 3.b).
U5. [Loop] Go to step U2.
<span class="grey">Shalunov, et al. Standards Track [Page 37]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-38" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Security Considerations</span>
<span class="h3"><a class="selflink" id="section-6.1" href="#section-6.1">6.1</a>. Introduction</span>
The goal of authenticated mode is to let one passphrase-protect the
service provided by a particular OWAMP-Control server. One can
imagine a variety of circumstances where this could be useful.
Authenticated mode is designed to prohibit theft of service.
An additional design objective of the authenticated mode was to make
it impossible for an attacker who cannot read traffic between OWAMP-
Test sender and receiver to tamper with test results in a fashion
that affects the measurements, but not other traffic.
The goal of encrypted mode is quite different: to make it hard for a
party in the middle of the network to make results look "better" than
they should be. This is especially true if one of client and server
does not coincide with either sender or receiver.
Encryption of OWAMP-Control using AES CBC mode with blocks of HMAC
after each message aims to achieve two goals: (i) to provide secrecy
of exchange, and (ii) to provide authentication of each message.
<span class="h3"><a class="selflink" id="section-6.2" href="#section-6.2">6.2</a>. Preventing Third-Party Denial of Service</span>
OWAMP-Test sessions directed at an unsuspecting party could be used
for denial of service (DoS) attacks. In unauthenticated mode,
servers SHOULD limit receivers to hosts they control or to the OWAMP-
Control client.
Unless otherwise configured, the default behavior of servers MUST be
to decline requests where the Receiver Address field is not equal to
the address that the control connection was initiated from or an
address of the server (or an address of a host it controls). Given
the TCP handshake procedure and sequence numbers in the control
connection, this ensures that the hosts that make such requests are
actually those hosts themselves, or at least on the path towards
them. If either this test or the handshake procedure were omitted,
it would become possible for attackers anywhere in the Internet to
request that large amounts of test packets be directed against victim
nodes somewhere else.
In any case, OWAMP-Test packets with a given source address MUST only
be sent from the node that has been assigned that address (i.e.,
address spoofing is not permitted).
<span class="grey">Shalunov, et al. Standards Track [Page 38]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-39" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h3"><a class="selflink" id="section-6.3" href="#section-6.3">6.3</a>. Covert Information Channels</span>
OWAMP-Test sessions could be used as covert channels of information.
Environments that are worried about covert channels should take this
into consideration.
<span class="h3"><a class="selflink" id="section-6.4" href="#section-6.4">6.4</a>. Requirement to Include AES in Implementations</span>
Notice that AES, in counter mode, is used for pseudo-random number
generation, so implementation of AES MUST be included even in a
server that only supports unauthenticated mode.
<span class="h3"><a class="selflink" id="section-6.5" href="#section-6.5">6.5</a>. Resource Use Limitations</span>
An OWAMP server can consume resources of various kinds. The two most
important kinds of resources are network capacity and memory (primary
or secondary) for storing test results.
Any implementation of OWAMP server MUST include technical mechanisms
to limit the use of network capacity and memory. Mechanisms for
managing the resources consumed by unauthenticated users and users
authenticated with a KeyID and passphrase SHOULD be separate. The
default configuration of an implementation MUST enable these
mechanisms and set the resource use limits to conservatively low
values.
One way to design the resource limitation mechanisms is as follows:
assign each session to a user class. User classes are partially
ordered with "includes" relation, with one class ("all users") that
is always present and that includes any other class. The assignment
of a session to a user class can be based on the presence of
authentication of the session, the KeyID, IP address range, time of
day, and, perhaps, other factors. Each user class would have a limit
for usage of network capacity (specified in units of bit/second) and
memory for storing test results (specified in units of octets).
Along with the limits for resource use, current use would be tracked
by the server. When a session is requested by a user in a specific
user class, the resources needed for this session are computed: the
average network capacity use (based on the sending schedule) and the
maximum memory use (based on the number of packets and number of
octets each packet would need to be stored internally -- note that
outgoing sessions would not require any memory use). These resource
use numbers are added to the current resource use numbers for the
given user class; if such addition would take the resource use
outside of the limits for the given user class, the session is
rejected. When resources are reclaimed, corresponding measures are
subtracted from the current use. Network capacity is reclaimed as
soon as the session ends. Memory is reclaimed when the data is
<span class="grey">Shalunov, et al. Standards Track [Page 39]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-40" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
deleted. For unauthenticated sessions, memory consumed by an OWAMP-
Test session SHOULD be reclaimed after the OWAMP-Control connection
that initiated the session is closed (gracefully or otherwise). For
authenticated sessions, the administrator who configures the service
should be able to decide the exact policy, but useful policy
mechanisms that MAY be implemented are the ability to automatically
reclaim memory when the data is retrieved and the ability to reclaim
memory after a certain configurable (based on user class) period of
time passes after the OWAMP-Test session terminates.
<span class="h3"><a class="selflink" id="section-6.6" href="#section-6.6">6.6</a>. Use of Cryptographic Primitives in OWAMP</span>
At an early stage in designing the protocol, we considered using
Transport Layer Security (TLS) [RFC2246, <a href="./rfc3546">RFC3546</a>] and IPsec [<a href="./rfc2401" title=""Security Architecture for the Internet Protocol"">RFC2401</a>]
as cryptographic security mechanisms for OWAMP; later, we also
considered DTLS. The disadvantages of those are as follows (not an
exhaustive list):
Regarding TLS:
+ TLS could be used to secure TCP-based OWAMP-Control, but it would
be difficult to use it to secure UDP-based OWAMP-Test: OWAMP-Test
packets, if lost, are not resent, so packets have to be
(optionally) encrypted and authenticated while retaining
individual usability. Stream-based TLS cannot be easily used for
this.
+ Dealing with streams, TLS does not authenticate individual
messages (even in OWAMP-Control). The easiest way out would be to
add some known-format padding to each message and to verify that
the format of the padding is intact before using the message. The
solution would thus lose some of its appeal ("just use TLS"). It
would also be much more difficult to evaluate the security of this
scheme with the various modes and options of TLS; it would almost
certainly not be secure with all. The capacity of an attacker to
replace parts of messages (namely, the end) with random garbage
could have serious security implications and would need to be
analyzed carefully. Suppose, for example, that a parameter that
is used in some form to control the rate were replaced by random
garbage; chances are that the result (an unsigned integer) would
be quite large.
+ Dependent on the mode of use, one can end up with a requirement
for certificates for all users and a PKI. Even if one is to
accept that PKI is desirable, there just isn't a usable one today.
<span class="grey">Shalunov, et al. Standards Track [Page 40]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-41" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
+ TLS requires a fairly large implementation. OpenSSL, for example,
is larger than our implementation of OWAMP as a whole. This can
matter for embedded implementations.
Regarding DTLS:
+ Duplication and, similarly, reordering are network phenomena that
OWAMP needs to be able to measure; yet anti-replay measures and
reordering protection of DTLS would prevent the duplicated and
reordered packets from reaching the relevant part of the OWAMP
code. One could, of course, modify DTLS so that these protections
are weakened or even specify examining the messages in a carefully
crafted sequence somewhere in between DTLS checks; but then, of
course, the advantage of using an existing protocol would not be
realized.
+ In authenticated mode, the timestamp is in the clear and is not
protected cryptographically in any way, while the rest of the
message has the same protection as in encrypted mode. This mode
allows one to trade off cryptographic protection against accuracy
of timestamps. For example, the APAN hardware implementation of
OWAMP [<a href="#ref-APAN" title=""HOTS: An OWAMP-Compliant Hardware Packet Timestamper"">APAN</a>] is capable of supporting authenticated mode. The
accuracy of these measurements is in the sub-microsecond range.
The errors in OWAMP measurements of Abilene [<a href="#ref-Abilene">Abilene</a>] (done using
a software implementation, in its encrypted mode) exceed 10us.
Users in different environments have different concerns, and some
might very well care about every last microsecond of accuracy. At
the same time, users in these same environments might care about
access control to the service. Authenticated mode permits them to
control access to the server yet to use unprotected timestamps,
perhaps generated by a hardware device.
Regarding IPsec:
+ What we now call authenticated mode would not be possible (in
IPsec you can't authenticate part of a packet).
+ The deployment paths of IPsec and OWAMP could be separate if OWAMP
does not depend on IPsec. After nine years of IPsec, only 0.05%
of traffic on an advanced backbone network, such as Abilene, uses
IPsec (for comparison purposes with encryption above layer 4, SSH
use is at 2-4% and HTTPS use is at 0.2-0.6%). It is desirable to
be able to deploy OWAMP on as large a number of different
platforms as possible.
<span class="grey">Shalunov, et al. Standards Track [Page 41]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-42" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
+ The deployment problems of a protocol dependent on IPsec would be
especially acute in the case of lightweight embedded devices.
Ethernet switches, DSL "modems", and other such devices mostly do
not support IPsec.
+ The API for manipulating IPsec from an application is currently
poorly understood. Writing a program that needs to encrypt some
packets, to authenticate some packets, and to leave some open --
for the same destination -- would become more of an exercise in
IPsec than in IP measurement.
For the enumerated reasons, we decided to use a simple cryptographic
protocol (based on a block cipher in CBC mode) that is different from
TLS and IPsec.
<span class="h3"><a class="selflink" id="section-6.7" href="#section-6.7">6.7</a>. Cryptographic Primitive Replacement</span>
It might become necessary in the future to replace AES, or the way it
is used in OWAMP, with a new cryptographic primitive, or to make
other security-related changes to the protocol. OWAMP provides a
well-defined point of extensibility: the Modes word in the server
greeting and the Mode response in the Set-Up-Response message. For
example, if a simple replacement of AES with a different block cipher
with a 128-bit block is needed, this could be accomplished as
follows: take two bits from the reserved (MBZ) part of the Modes word
of the server greeting; use one of these bits to indicate encrypted
mode with the new cipher and another one to indicate authenticated
mode with the new cipher. (Bit consumption could, in fact, be
reduced from two to one, if the client is allowed to return a mode
selection with more than a single bit set: one could designate a
single bit to mean that the new cipher is supported (in the case of
the server) or selected (in the case of the client) and continue to
use already allocated bits for authenticated and encrypted modes;
this optimization is unimportant conceptually, but it could be useful
in practice to make the best use of bits.) Then, if the new cipher
is negotiated, all subsequent operations simply use it instead of
AES. Note that the normal transition sequence would be used in such
a case: implementations would probably first start supporting and
preferring the new cipher, and then drop support for the old cipher
(presumably no longer considered secure).
<span class="grey">Shalunov, et al. Standards Track [Page 42]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-43" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
If the need arises to make more extensive changes (perhaps to replace
AES with a 256-bit-block cipher), this would be more difficult and
would require changing the layout of the messages. However, the
change can still be conducted within the framework of OWAMP
extensibility using the Modes/Mode words. The semantics of the new
bits (or single bit, if the optimization described above is used)
would include the change to message layout as well as the change in
the cryptographic primitive.
Each of the bits in the Modes word can be used for an independent
extension. The extensions signaled by various bits are orthogonal;
for example, one bit might be allocated to change from AES-128 to
some other cipher, another bit might be allocated to add a protocol
feature (such as, e.g., support for measuring over multicast), yet
another might be allocated to change a key derivation function, etc.
The progression of versions is not a linear order, but rather a
partial order. An implementation can implement any subset of these
features (of course, features can be made mandatory to implement,
e.g., new more secure ciphers if they are needed).
Should a cipher with a different key size (say, a 256-bit key) become
needed, a new key derivation function for OWAMP-Test keys would also
be needed. The semantics of change in the cipher SHOULD then in the
future be tied to the semantics of change in the key derivation
function (KDF). One KDF that might be considered for the purpose
might be a pseudo-random function (PRF) with appropriately sized
output, such as 256 bits (perhaps HMAC-SHA256, if it is then still
considered a secure PRF), which could then be used to derive the
OWAMP-Test session keys from the OWAMP-Control session key by using
the OWAMP-Control session key as the HMAC key and the SID as HMAC
message.
Note that the replacement scheme outlined above is trivially
susceptible to downgrade attacks: a malicious party in the middle can
flip modes bits as the mode is negotiated so that the oldest and
weakest mode supported by the two parties is used. If this is deemed
problematic at the time of cryptographic primitive replacement, the
scheme might be augmented with a measure to prevent such an attack
(by perhaps exchanging the modes again once a secure communications
channel is established, comparing the two sets of mode words, and
dropping the connection should they not match).
<span class="h3"><a class="selflink" id="section-6.8" href="#section-6.8">6.8</a>. Long-term Manually Managed Keys</span>
OWAMP-Control uses long-term keys with manual management. These keys
are used to automatically negotiate session keys for each OWAMP-
Control session running in authenticated or encrypted mode. The
number of these keys managed by a server scales linearly with (and,
<span class="grey">Shalunov, et al. Standards Track [Page 43]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-44" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
in fact, is equal to) the number of administratively different users
(perhaps particular humans, roles, or robots representing sites) that
need to connect to this server. Similarly, the number of different
manual keys managed by each client is the number of different servers
that the client needs to connect to. This use of manual long-term
keys is compliant with [<a href="#ref-BCP107" title=""Guidelines for Cryptographic Key Management"">BCP107</a>].
<span class="h3"><a class="selflink" id="section-6.9" href="#section-6.9">6.9</a>. (Not) Using Time as Salt</span>
A natural idea is to use the current time as salt when deriving
session keys. Unfortunately, this appears to be too limiting.
Although OWAMP is often run on hosts with well-synchronized clocks,
it is also possible to run it on hosts with clocks completely
untrained. The delays obtained thus are, of course, not directly
usable; however, some metrics, such as unidirectional loss,
reordering, measures of congestion such as the median delay minus
minimum, and many others are usable directly and immediately (and
improve upon the information that would have been provided by a
round-trip measurement). Further, even delay information can be
useful with appropriate post-processing. Indeed, one can even argue
that running the clocks free and post-processing the results of a
mesh of measurements will result in better accuracy, as more
information is available a posteriori and correlation of data from
different hosts is possible in post-processing, but not with online
clock training.
Given this, time is not used as salt in key derivation.
<span class="h3"><a class="selflink" id="section-6.10" href="#section-6.10">6.10</a>. The Use of AES-CBC and HMAC</span>
OWAMP relies on AES-CBC for confidentiality and on HMAC-SHA1
truncated to 128 bits for message authentication. Random IV choice
is important for prevention of a codebook attack on the first block
(it should also be noted that, with its 128-bit block size, AES is
more resistant to codebook attacks than are ciphers with shorter
blocks; we use random IV anyway).
HMAC MUST verify. It is crucial to check for this before using the
message; otherwise, existential forgery becomes possible. The
complete message for which HMAC verification fails MUST be discarded
(both for short messages consisting of a few blocks and potentially
for long messages, such as a response to the Fetch-Session command).
If such a message is part of OWAMP-Control, the connection MUST be
dropped.
Since OWAMP messages can have different numbers of blocks, the
existential forgery attack described in example 9.62 of [<a href="#ref-MENEZES" title="P. C. van Oorschot">MENEZES</a>]
<span class="grey">Shalunov, et al. Standards Track [Page 44]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-45" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
becomes a concern. To prevent it (and to simplify implementation),
the length of any message becomes known after decrypting its first
block.
A special case is the first (fixed-length) message sent by the
client. There, the token is a concatenation of the 128-bit challenge
(transmitted by the server in the clear), a 128-bit AES Session-key
(generated randomly by the client, encrypted with AES-CBC with IV=0),
and a 256-bit HMAC-SHA1 Session-key used for authentication. Since
IV=0, the challenge (a single cipher block) is simply encrypted with
the secret key. Therefore, we rely on resistance of AES to chosen
plaintext attacks (as the challenge could be substituted by an
attacker). It should be noted that the number of blocks of chosen
plaintext an attacker can have encrypted with the secret key is
limited by the number of sessions the client wants to initiate. An
attacker who knows the encryption of a server's challenge can produce
an existential forgery of the session key and thus disrupt the
session; however, any attacker can disrupt a session by corrupting
the protocol messages in an arbitrary fashion. Therefore, no new
threat is created here; nevertheless, we require that the server
never issues the same challenge twice. (If challenges are generated
randomly, a repetition would occur, on average, after 2^64 sessions;
we deem this satisfactory as this is enough even for an implausibly
busy server that participates in 1,000,000 sessions per second to go
without repetitions for more than 500 centuries.) With respect to
the second part of the token, an attacker can produce an existential
forgery of the session key by modifying the second half of the
client's token while leaving the first part intact. This forgery,
however, would be immediately discovered by the client when the HMAC
on the server's next message (acceptance or rejection of the
connection) does not verify.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Acknowledgements</span>
We would like to thank Guy Almes, Mark Allman, Jari Arkko, Hamid
Asgari, Steven Van den Berghe, Eric Boyd, Robert Cole, Joan
Cucchiara, Stephen Donnelly, Susan Evett, Sam Hartman, Kaynam
Hedayat, Petri Helenius, Scott Hollenbeck, Russ Housley, Kitamura
Yasuichi, Daniel H. T. R. Lawson, Will E. Leland, Bruce A. Mah,
Allison Mankin, Al Morton, Attila Pasztor, Randy Presuhn, Matthew
Roughan, Andy Scherrer, Henk Uijterwaal, and Sam Weiler for their
comments, suggestions, reviews, helpful discussion and proof-reading.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. IANA Considerations</span>
IANA has allocated a well-known TCP port number (861) for the OWAMP-
Control part of the OWAMP protocol.
<span class="grey">Shalunov, et al. Standards Track [Page 45]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-46" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h2"><a class="selflink" id="section-9" href="#section-9">9</a>. Internationalization Considerations</span>
The protocol does not carry any information in a natural language,
with the possible exception of the KeyID in OWAMP-Control, which is
encoded in UTF-8.
<span class="h2"><a class="selflink" id="section-10" href="#section-10">10</a>. References</span>
<span class="h3"><a class="selflink" id="section-10.1" href="#section-10.1">10.1</a>. Normative References</span>
[<a id="ref-AES">AES</a>] Advanced Encryption Standard (AES),
<a href="http://csrc.nist.gov/encryption/aes/">http://csrc.nist.gov/encryption/aes/</a>
[<a id="ref-BCP107">BCP107</a>] Bellovin, S. and R. Housley, "Guidelines for
Cryptographic Key Management", <a href="https://www.rfc-editor.org/bcp/bcp107">BCP 107</a>, <a href="./rfc4107">RFC 4107</a>,
June 2005.
[<a id="ref-RFC2104">RFC2104</a>] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC:
Keyed-Hashing for Message Authentication", <a href="./rfc2104">RFC 2104</a>,
February 1997.
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC2330">RFC2330</a>] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis,
"Framework for IP Performance Metrics", <a href="./rfc2330">RFC 2330</a>, May
1998.
[<a id="ref-RFC2474">RFC2474</a>] Nichols, K., Blake, S., Baker, F., and D. Black,
"Definition of the Differentiated Services Field (DS
Field) in the IPv4 and IPv6 Headers", <a href="./rfc2474">RFC 2474</a>,
December 1998.
[<a id="ref-RFC2679">RFC2679</a>] Almes, G., Kalidindi, S., and M. Zekauskas, "A One-
way Delay Metric for IPPM", <a href="./rfc2679">RFC 2679</a>, September 1999.
[<a id="ref-RFC2680">RFC2680</a>] Almes, G., Kalidindi, S., and M. Zekauskas, "A One-
way Packet Loss Metric for IPPM", <a href="./rfc2680">RFC 2680</a>, September
1999.
[<a id="ref-RFC2836">RFC2836</a>] Brim, S., Carpenter, B., and F. Le Faucheur, "Per Hop
Behavior Identification Codes", <a href="./rfc2836">RFC 2836</a>, May 2000.
[<a id="ref-RFC2898">RFC2898</a>] Kaliski, B., "PKCS #5: Password-Based Cryptography
Specification Version 2.0", <a href="./rfc2898">RFC 2898</a>, September 2000.
<span class="grey">Shalunov, et al. Standards Track [Page 46]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-47" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
<span class="h3"><a class="selflink" id="section-10.2" href="#section-10.2">10.2</a>. Informative References</span>
[<a id="ref-APAN">APAN</a>] Z. Shu and K. Kobayashi, "HOTS: An OWAMP-Compliant
Hardware Packet Timestamper", In Proceedings of PAM
2005, <a href="http://www.springerlink.com/index/W4GBD39YWC11GQTN.pdf">http://www.springerlink.com/index/</a>
<a href="http://www.springerlink.com/index/W4GBD39YWC11GQTN.pdf">W4GBD39YWC11GQTN.pdf</a>
[<a id="ref-BRIX">BRIX</a>] Brix Networks, <a href="http://www.brixnet.com/">http://www.brixnet.com/</a>
[<a id="ref-ZIGG">ZIGG</a>] J. H. Ahrens, U. Dieter, "Computer methods for
sampling from the exponential and normal
distributions", Communications of ACM, volume 15,
issue 10, 873-882, 1972.
<a href="http://doi.acm.org/10.1145/355604.361593">http://doi.acm.org/10.1145/355604.361593</a>
[<a id="ref-MENEZES">MENEZES</a>] A. J. Menezes, P. C. van Oorschot, and S. A.
Vanstone, Handbook of Applied Cryptography, CRC
Press, revised reprint with updates, 1997.
[<a id="ref-KNUTH">KNUTH</a>] D. Knuth, The Art of Computer Programming, vol.2, 3rd
edition, 1998.
[<a id="ref-Abilene">Abilene</a>] One-way Latency Measurement (OWAMP),
<a href="http://e2epi.internet2.edu/owamp/">http://e2epi.internet2.edu/owamp/</a>
[<a id="ref-RIJN">RIJN</a>] Reference ANSI C Implementation of Rijndael,
<a href="http://www.esat.kuleuven.ac.be/~rijmen/rijndael/rijndaelref.zip">http://www.esat.kuleuven.ac.be/~rijmen/</a>
<a href="http://www.esat.kuleuven.ac.be/~rijmen/rijndael/rijndaelref.zip">rijndael/rijndaelref.zip</a>
[<a id="ref-RIPE">RIPE</a>] RIPE NCC Test-Traffic Measurements home,
<a href="http://www.ripe.net/test-traffic/">http://www.ripe.net/test-traffic/</a>.
[<a id="ref-SURVEYOR">SURVEYOR</a>] Surveyor Home Page,
<a href="http://www.advanced.org/surveyor/">http://www.advanced.org/surveyor/</a>.
[<a id="ref-SURVEYOR-INET">SURVEYOR-INET</a>] S. Kalidindi and M. Zekauskas, "Surveyor: An
Infrastructure for Network Performance Measurements",
Proceedings of INET'99, June 1999.
<a href="http://www.isoc.org/inet99/proceedings/4h/4h_2.htm">http://www.isoc.org/inet99/proceedings/4h/4h_2.htm</a>
[<a id="ref-RFC1305">RFC1305</a>] Mills, D., "Network Time Protocol (Version 3)
Specification, Implementation and Analysis", <a href="./rfc1305">RFC</a>
<a href="./rfc1305">1305</a>, March 1992.
[<a id="ref-RFC2246">RFC2246</a>] Dierks, T. and C. Allen, "The TLS Protocol Version
1.0", <a href="./rfc2246">RFC 2246</a>, January 1999.
<span class="grey">Shalunov, et al. Standards Track [Page 47]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-48" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
[<a id="ref-RFC2401">RFC2401</a>] Kent, S. and R. Atkinson, "Security Architecture for
the Internet Protocol", <a href="./rfc2401">RFC 2401</a>, November 1998.
[<a id="ref-RFC3546">RFC3546</a>] Blake-Wilson, S., Nystrom, M., Hopwood, D.,
Mikkelsen, J., and T. Wright, "Transport Layer
Security (TLS) Extensions", <a href="./rfc3546">RFC 3546</a>, June 2003.
[<a id="ref-RFC4086">RFC4086</a>] Eastlake, D., 3rd, Schiller, J., and S. Crocker,
"Randomness Requirements for Security", <a href="https://www.rfc-editor.org/bcp/bcp106">BCP 106</a>, <a href="./rfc4086">RFC</a>
<a href="./rfc4086">4086</a>, June 2005.
<span class="grey">Shalunov, et al. Standards Track [Page 48]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-49" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Appendix A: Sample C Code for Exponential Deviates
The values in array Q[] are the exact values that MUST be used by all
implementations (see Sections <a href="#section-5.1">5.1</a> and <a href="#section-5.2">5.2</a>). This appendix only
serves for illustrative purposes.
/*
** Example usage: generate a stream of exponential (mean 1)
** random quantities (ignoring error checking during initialization).
** If a variate with some mean mu other than 1 is desired, the output
** of this algorithm can be multiplied by mu according to the rules
** of arithmetic we described.
** Assume that a 16-octet 'seed' has been initialized
** (as the shared secret in OWAMP, for example)
** unsigned char seed[16];
** OWPrand_context next;
** (initialize state)
** OWPrand_context_init(&next, seed);
** (generate a sequence of exponential variates)
** while (1) {
** u_int64_t num = OWPexp_rand64(&next);
<do something with num here>
...
** }
*/
#include <stdlib.h>
typedef u_int64_t u_int64_t;
/* (K - 1) is the first k such that Q[k] > 1 - 1/(2^32). */
#define K 12
#define BIT31 0x80000000UL /* See if first bit in the lower
32 bits is zero. */
#define MASK32(n) ((n) & 0xFFFFFFFFUL)
#define EXP2POW32 0x100000000ULL
typedef struct OWPrand_context {
unsigned char counter[16];/* Counter (network byte order).*/
keyInstance key; /* Key to encrypt the counter.*/
unsigned char out[16]; /* The encrypted block.*/
<span class="grey">Shalunov, et al. Standards Track [Page 49]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-50" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
} OWPrand_context;
/*
** The array has been computed according to the formula:
**
** Q[k] = (ln2)/(1!) + (ln2)^2/(2!) + ... + (ln2)^k/(k!)
**
** as described in algorithm S. (The values below have been
** multiplied by 2^32 and rounded to the nearest integer.)
** These exact values MUST be used so that different implementation
** produce the same sequences.
*/
static u_int64_t Q[K] = {
0, /* Placeholder - so array indices start from 1. */
0xB17217F8,
0xEEF193F7,
0xFD271862,
0xFF9D6DD0,
0xFFF4CFD0,
0xFFFEE819,
0xFFFFE7FF,
0xFFFFFE2B,
0xFFFFFFE0,
0xFFFFFFFE,
0xFFFFFFFF
};
/* this element represents ln2 */
#define LN2 Q[1]
/*
** Convert an unsigned 32-bit integer into a u_int64_t number.
*/
u_int64_t
OWPulong2num64(u_int32_t a)
{
return ((u_int64_t)1 << 32) * a;
}
/*
** Arithmetic functions on u_int64_t numbers.
*/
/*
** Addition.
*/
u_int64_t
OWPnum64_add(u_int64_t x, u_int64_t y)
<span class="grey">Shalunov, et al. Standards Track [Page 50]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-51" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
{
return x + y;
}
/*
** Multiplication. Allows overflow. Straightforward implementation
** of Algorithm 4.3.1.M (p.268) from [<a href="#ref-KNUTH" title="vol.2">KNUTH</a>].
*/
u_int64_t
OWPnum64_mul(u_int64_t x, u_int64_t y)
{
unsigned long w[4];
u_int64_t xdec[2];
u_int64_t ydec[2];
int i, j;
u_int64_t k, t, ret;
xdec[0] = MASK32(x);
xdec[1] = MASK32(x>>32);
ydec[0] = MASK32(y);
ydec[1] = MASK32(y>>32);
for (j = 0; j < 4; j++)
w[j] = 0;
for (j = 0; j < 2; j++) {
k = 0;
for (i = 0; ; ) {
t = k + (xdec[i]*ydec[j]) + w[i + j];
w[i + j] = t%EXP2POW32;
k = t/EXP2POW32;
if (++i < 2)
continue;
else {
w[j + 2] = k;
break;
}
}
}
ret = w[2];
ret <<= 32;
return w[1] + ret;
}
/*
<span class="grey">Shalunov, et al. Standards Track [Page 51]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-52" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
** Seed the random number generator using a 16-byte quantity 'seed'
** (== the session ID in OWAMP). This function implements step U1
** of algorithm Unif.
*/
void
OWPrand_context_init(OWPrand_context *next, unsigned char *seed)
{
int i;
/* Initialize the key */
rijndaelKeyInit(next->key, seed);
/* Initialize the counter with zeros */
memset(next->out, 0, 16);
for (i = 0; i < 16; i++)
next->counter[i] = 0UL;
}
/*
** Random number generating functions.
*/
/*
** Generate and return a 32-bit uniform random value (saved in the
**less significant half of the u_int64_t). This function implements
**steps U2-U4 of the algorithm Unif.
*/
u_int64_t
OWPunif_rand64(OWPrand_context *next)
{
int j;
u_int8_t *buf;
u_int64_t ret = 0;
/* step U2 */
u_int8_t i = next->counter[15] & (u_int8_t)3;
if (!i)
rijndaelEncrypt(next->key, next->counter, next->out);
/* Step U3. Increment next.counter as a 16-octet single
quantity in network byte order for AES counter mode. */
for (j = 15; j >= 0; j--)
if (++next->counter[j])
break;
/* Step U4. Do output. The last 4 bytes of ret now contain
<span class="grey">Shalunov, et al. Standards Track [Page 52]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-53" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
the random integer in network byte order */
buf = &next->out[4*i];
for (j=0; j<4; j++) {
ret <<= 8;
ret += *buf++;
}
return ret;
}
/*
** Generate an exponential deviate with mean 1.
*/
u_int64_t
OWPexp_rand64(OWPrand_context *next)
{
unsigned long i, k;
u_int32_t j = 0;
u_int64_t U, V, J, tmp;
/* Step S1. Get U and shift */
U = OWPunif_rand64(next);
while ((U & BIT31) && (j < 32)) { /* Shift until first 0. */
U <<= 1;
j++;
}
/* Remove the 0 itself. */
U <<= 1;
U = MASK32(U); /* Keep only the fractional part. */
J = OWPulong2num64(j);
/* Step S2. Immediate acceptance? */
if (U < LN2) /* return (j*ln2 + U) */
return OWPnum64_add(OWPnum64_mul(J, LN2), U);
/* Step S3. Minimize. */
for (k = 2; k < K; k++)
if (U < Q[k])
break;
V = OWPunif_rand64(next);
for (i = 2; i <= k; i++) {
tmp = OWPunif_rand64(next);
if (tmp < V)
V = tmp;
}
/* Step S4. Return (j+V)*ln2 */
<span class="grey">Shalunov, et al. Standards Track [Page 53]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-54" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
return OWPnum64_mul(OWPnum64_add(J, V), LN2);
}
Appendix B: Test Vectors for Exponential Deviates
It is important that the test schedules generated by different
implementations from identical inputs be identical. The non-trivial
part is the generation of pseudo-random exponentially distributed
deviates. To aid implementors in verifying interoperability, several
test vectors are provided. For each of the four given 128-bit values
of SID represented as hexadecimal numbers, 1,000,000 exponentially
distributed 64-bit deviates are generated as described above. As
they are generated, they are all added to each other. The sum of all
1,000,000 deviates is given as a hexadecimal number for each SID. An
implementation MUST produce exactly these hexadecimal numbers. To
aid in the verification of the conversion of these numbers to values
of delay in seconds, approximate values are given (assuming
lambda=1). An implementation SHOULD produce delay values in seconds
that are close to the ones given below.
SID = 0x2872979303ab47eeac028dab3829dab2
SUM[1000000] = 0x000f4479bd317381 (1000569.739036 seconds)
SID = 0x0102030405060708090a0b0c0d0e0f00
SUM[1000000] = 0x000f433686466a62 (1000246.524512 seconds)
SID = 0xdeadbeefdeadbeefdeadbeefdeadbeef
SUM[1000000] = 0x000f416c8884d2d3 (999788.533277 seconds)
SID = 0xfeed0feed1feed2feed3feed4feed5ab
SUM[1000000] = 0x000f3f0b4b416ec8 (999179.293967 seconds)
<span class="grey">Shalunov, et al. Standards Track [Page 54]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-55" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Authors' Addresses
Stanislav Shalunov
Internet2
1000 Oakbrook Drive, Suite 300
Ann Arbor, MI 48104
EMail: shalunov@internet2.edu
WWW: <a href="http://www.internet2.edu/~shalunov/">http://www.internet2.edu/~shalunov/</a>
Benjamin Teitelbaum
Internet2
1000 Oakbrook Drive, Suite 300
Ann Arbor, MI 48104
EMail: ben@internet2.edu
WWW: <a href="http://people.internet2.edu/~ben/">http://people.internet2.edu/~ben/</a>
Anatoly Karp
Computer Sciences Department
University of Wisconsin-Madison
Madison, WI 53706
EMail: akarp@cs.wisc.edu
Jeff W. Boote
Internet2
1000 Oakbrook Drive, Suite 300
Ann Arbor, MI 48104
EMail: boote@internet2.edu
Matthew J. Zekauskas
Internet2
1000 Oakbrook Drive, Suite 300
Ann Arbor, MI 48104
EMail: matt@internet2.edu
<span class="grey">Shalunov, et al. Standards Track [Page 55]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-56" ></span>
<span class="grey"><a href="./rfc4656">RFC 4656</a> One-way Active Measurement Protocol September 2006</span>
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Shalunov, et al. Standards Track [Page 56]
</pre>
|