<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="std" consensus="true" docName="draft-ietf-ippm-stamp-10" indexInclude="true" ipr="trust200902" number="8762" prepTime="2020-03-19T14:41:31" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-ietf-ippm-stamp-10" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8762" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="STAMP">Simple Two-Way Active Measurement Protocol</title>
    <seriesInfo name="RFC" value="8762" stream="IETF"/>
    <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
      <organization showOnFrontPage="true">ZTE Corp.</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <code/>
          <country/>
        </postal>
        <email>gregimirsky@gmail.com</email>
      </address>
    </author>
    <author fullname="Guo Jun" initials="G." surname="Jun">
      <organization showOnFrontPage="true">ZTE Corp.</organization>
      <address>
        <postal>
          <street>68# Zijinghua Road</street>
          <city>Nanjing</city>
          <region>Jiangsu</region>
          <code>210012</code>
          <country>China</country>
        </postal>
        <phone>+86 18105183663</phone>
        <email>guo.jun2@zte.com.cn</email>
      </address>
    </author>
    <author fullname="Henrik Nydell" initials="H." surname="Nydell">
      <organization showOnFrontPage="true">Accedian Networks</organization>
      <address>
        <postal>
          <street/>
          <city/>
          <code/>
          <country/>
        </postal>
        <email>hnydell@accedian.com</email>
      </address>
    </author>
    <author initials="R." surname="Foote" fullname="Richard Foote">
      <organization showOnFrontPage="true">Nokia</organization>
      <address>
        <email>footer.foote@nokia.com</email>
      </address>
    </author>
    <date month="03" year="2020"/>
    <area>Transport</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>IPPM</keyword>
    <keyword>Performance Measurement</keyword>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">
	This document describes the Simple Two-way Active Measurement
	Protocol (STAMP), which enables the measurement of both one-way and round-trip
	performance metrics, like delay, delay variation, and packet loss. 
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This is an Internet Standards Track document.
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Engineering Task Force
            (IETF).  It represents the consensus of the IETF community.  It has
            received public review and has been approved for publication by
            the Internet Engineering Steering Group (IESG).  Further
            information on Internet Standards is available in Section 2 of 
            RFC 7841.
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8762" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document. Code Components extracted from this
            document must include Simplified BSD License text as described in
            Section 4.e of the Trust Legal Provisions and are provided without
            warranty as described in the Simplified BSD License.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-conventions-used-in-this-do">Conventions Used in This Document</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.2.2">
              <li pn="section-toc.1-1.2.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.2.2.1.1"><xref derivedContent="2.1" format="counter" sectionFormat="of" target="section-2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.2.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.2.2.2.1"><xref derivedContent="2.2" format="counter" sectionFormat="of" target="section-2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.3">
            <t keepWithNext="true" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operation-and-management-of">Operation and Management of Performance Measurement Based on STAMP</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t keepWithNext="true" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-theory-of-operation">Theory of Operation</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-udp-port-numbers-in-stamp-t">UDP Port Numbers in STAMP Testing</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender-behavior-and">Session-Sender Behavior and Packet Format</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.2.2">
                  <li pn="section-toc.1-1.4.2.2.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.2.2.1.1"><xref derivedContent="4.2.1" format="counter" sectionFormat="of" target="section-4.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender-packet-forma">Session-Sender Packet Format in Unauthenticated Mode</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.2.2.2">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.2.2.2.1"><xref derivedContent="4.2.2" format="counter" sectionFormat="of" target="section-4.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-sender-packet-format">Session-Sender Packet Format in Authenticated Mode</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector-behavior-">Session-Reflector Behavior and Packet Format</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.3.2">
                  <li pn="section-toc.1-1.4.2.3.2.1">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.3.2.1.1"><xref derivedContent="4.3.1" format="counter" sectionFormat="of" target="section-4.3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector-packet-fo">Session-Reflector Packet Format in Unauthenticated Mode</xref></t>
                  </li>
                  <li pn="section-toc.1-1.4.2.3.2.2">
                    <t keepWithNext="true" pn="section-toc.1-1.4.2.3.2.2.1"><xref derivedContent="4.3.2" format="counter" sectionFormat="of" target="section-4.3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-session-reflector-packet-for">Session-Reflector Packet Format in Authenticated Mode</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-integrity-protection-in-sta">Integrity Protection in STAMP</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-confidentiality-protection-">Confidentiality Protection in STAMP</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t keepWithNext="true" pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interoperability-with-twamp">Interoperability with TWAMP Light</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t keepWithNext="true" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operational-considerations">Operational Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t keepWithNext="true" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t keepWithNext="true" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t keepWithNext="true" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t keepWithNext="true" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t keepWithNext="true" pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.10">
            <t keepWithNext="true" pn="section-toc.1-1.10.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">
Development and deployment of the Two-Way Active Measurement Protocol (TWAMP)
<xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357"/> and its extensions (e.g.,  
<xref target="RFC6038" format="default" sectionFormat="of" derivedContent="RFC6038"/>, which defines Symmetrical Size for TWAMP)
provided invaluable experience. Several independent implementations of both
TWAMP and TWAMP Light exist, have been deployed, and provide 
important operational performance measurements.
</t>
      <t pn="section-1-2">
At the same time, there has been noticeable interest in using a more straightforward
mechanism for active performance monitoring that can provide deterministic
behavior and inherent separation of control 
(vendor-specific configuration or orchestration) and test functions. 
Recent work on "Performance Measurement from IP Edge to Customer Equipment using TWAMP Light"
<xref target="BBF.TR-390" format="default" sectionFormat="of" derivedContent="BBF.TR-390"/> by the
Broadband Forum demonstrates that interoperability among
implementations of TWAMP Light is difficult because the composition
and operation of TWAMP Light were not sufficiently specified in <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357"/>. 
According to <xref target="RFC8545" format="default" sectionFormat="of" derivedContent="RFC8545"/>, TWAMP Light includes a subset of TWAMP-Test
functions. Thus, to have a comprehensive tool to measure packet loss and delay requires
support by other applications that provide, for example, control and security.
</t>
      <t pn="section-1-3">
This document defines an active performance measurement test protocol, Simple
Two-way Active Measurement Protocol (STAMP), 
that enables measurement of both one-way and round-trip performance metrics,
like delay, delay variation, and packet loss. Support of some  
optional TWAMP extensions, e.g., <xref target="RFC7750" format="default" sectionFormat="of" derivedContent="RFC7750"/>, is discussed in <xref target="I-D.ietf-ippm-stamp-option-tlv" format="default" sectionFormat="of" derivedContent="STAMP-OPTION"/>.
</t>
    </section>
    <section numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-conventions-used-in-this-do">Conventions Used in This Document</name>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.1">
        <name slugifiedName="name-terminology">Terminology</name>
        <dl newline="false" spacing="normal" indent="12" pn="section-2.1-1">
          <dt pn="section-2.1-1.1">STAMP:</dt>
          <dd pn="section-2.1-1.2">Simple Two-way Active Measurement Protocol</dd>
          <dt pn="section-2.1-1.3">NTP:</dt>
          <dd pn="section-2.1-1.4">Network Time Protocol</dd>
          <dt pn="section-2.1-1.5">PTP:</dt>
          <dd pn="section-2.1-1.6">Precision Time Protocol</dd>
          <dt pn="section-2.1-1.7">HMAC:</dt>
          <dd pn="section-2.1-1.8">Hashed Message Authentication Code</dd>
          <dt pn="section-2.1-1.9">OWAMP:</dt>
          <dd pn="section-2.1-1.10">One-Way Active Measurement Protocol</dd>
          <dt pn="section-2.1-1.11">TWAMP:</dt>
          <dd pn="section-2.1-1.12">Two-Way Active Measurement Protocol</dd>
          <dt pn="section-2.1-1.13">MBZ:</dt>
          <dd pn="section-2.1-1.14">Must be Zero</dd>
          <dt pn="section-2.1-1.15">PDU:</dt>
          <dd pn="section-2.1-1.16">Protocol Data Unit</dd>
        </dl>
      </section>
      <section numbered="true" toc="include" removeInRFC="false" pn="section-2.2">
        <name slugifiedName="name-requirements-language">Requirements Language</name>
        <t pn="section-2.2-1">
    The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>",
    "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>",
    "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>", 
    "<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
    described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> 
    when, and only when, they appear in all capitals, as shown here.
        </t>
      </section>
    </section>
    <section anchor="simple-pm-section" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-operation-and-management-of">Operation and Management of Performance Measurement Based on STAMP</name>
      <t pn="section-3-1">
<xref target="STAMP-ref-model" format="default" sectionFormat="of" derivedContent="Figure 1"/> presents the Simple Two-way
Active Measurement Protocol (STAMP) 
Session-Sender and Session-Reflector with a measurement session. In this
document, a measurement session, 
also referred to as a "STAMP session", is the bidirectional
packet flow between one specific Session-Sender and one particular
Session-Reflector for a time duration.
The configuration and management of the STAMP Session-Sender,
Session-Reflector, and sessions are outside the scope of this
document and can be achieved through various means. 
A few examples are Command Line Interface, telecommunication
services' Operational Support System (OSS) / Business Support System (BSS),
SNMP, and NETCONF/YANG-based Software-Defined Networking (SDN) controllers. 
      
</t>
      <figure anchor="STAMP-ref-model" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-stamp-reference-model">STAMP Reference Model</name>
        <artwork name="" type="" align="left" alt="" pn="section-3-2.1">
      o----------------------------------------------------------o
      |                      Configuration and                   |
      |                         Management                       |
      o----------------------------------------------------------o
             ||                                          ||
             ||                                          ||
             ||                                          ||
  +----------------------+                +-------------------------+
  | STAMP Session-Sender | &lt;--- STAMP---&gt; | STAMP Session-Reflector |
  +----------------------+                +-------------------------+
</artwork>
      </figure>
    </section>
    <section anchor="stamp-section" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-theory-of-operation">Theory of Operation</name>
      <t pn="section-4-1">
The STAMP Session-Sender transmits test packets over UDP transport
toward the STAMP Session-Reflector. The STAMP Session-Reflector
receives the Session-Sender's packet and acts according to the configuration.

             Two modes of the STAMP Session-Reflector characterize the expected
	     behavior and, consequently, performance metrics that can be
	     measured: 
      </t>
      <dl newline="true" spacing="normal" pn="section-4-2">
        <dt pn="section-4-2.1">Stateless:</dt>
        <dd pn="section-4-2.2">The STAMP Session-Reflector does not maintain test
             state and will use the value in the Sequence Number field in
             the received packet as the value for the Sequence Number field
             in the reflected packet.
             As a result, values in the Sequence Number and Session-Sender
	     Sequence Number fields 
             are the same, and only round-trip packet loss can be calculated
	     while the reflector is operating in stateless mode.
             </dd>
        <dt pn="section-4-2.3">Stateful:</dt>
        <dd pn="section-4-2.4">          STAMP Session-Reflector maintains the test state, thus
      allowing the Session-Sender to determine directionality of loss using
      the combination of gaps recognized in the Session Sender Sequence
      Number and Sequence Number fields, respectively. 
As a result, both near-end (forward) and far-end (backward) packet loss can be
computed. 
      That implies that the STAMP Session-Reflector <bcp14>MUST</bcp14> maintain a state
      for each configured STAMP-Test session, thereby uniquely associating
      STAMP-Test packets with one such session instance and, thus, enabling
      the addition of a sequence number in the test reply that is individually
      incremented by one on a per-session basis.

             </dd>
      </dl>
      <t pn="section-4-3">
   STAMP supports two authentication modes:
   unauthenticated and authenticated. Unauthenticated STAMP-Test packets,
   defined in Sections <xref target="session-sender-packet-unauthenticated-section" format="counter" sectionFormat="of" derivedContent="4.2.1"/> and 
   <xref target="session-reflector-packet-unauthenticated-section" format="counter" sectionFormat="of" derivedContent="4.3.1"/>, ensure interworking 
   between STAMP and TWAMP Light, as described in <xref target="interoperation-twamp" format="default" sectionFormat="of" derivedContent="Section 4.6"/> regarding
   packet formats.
</t>
      <t pn="section-4-4">
By default, STAMP uses symmetrical packets, i.e., the size of the packet
transmitted by the Session-Reflector equals the size of 
the packet received by the Session-Reflector.
</t>
      <section anchor="stamp-port-sec" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-udp-port-numbers-in-stamp-t">UDP Port Numbers in STAMP Testing</name>
        <t pn="section-4.1-1">
A STAMP Session-Sender <bcp14>MUST</bcp14> use
UDP port 862 (TWAMP-Test Receiver Port) as the default destination UDP port
number. A STAMP implementation of the Session-Sender <bcp14>MUST</bcp14>
be able to be used as the destination UDP port numbers from the User Ports
(aka Registered Ports) and Dynamic Ports (aka Private or Ephemeral Ports)
ranges defined in <xref target="RFC6335" format="default" sectionFormat="of" derivedContent="RFC6335"/>. Before using
numbers from the User Ports range, the possible impact on the network
<bcp14>MUST</bcp14> be carefully studied and agreed on by all users of the
network domain where the test has been planned. 
</t>
        <t pn="section-4.1-2">
 By default, an implementation of the STAMP Session-Reflector
 <bcp14>MUST</bcp14> receive STAMP-Test packets on UDP port 862.


 An
implementation of the Session-Reflector 
that supports this specification <bcp14>MUST</bcp14> be able to define the
port number to receive STAMP-Test packets 
from User Ports and Dynamic Ports ranges, which are defined in <xref target="RFC6335" format="default" sectionFormat="of" derivedContent="RFC6335"/>. 
STAMP defines two different test packet formats: one for
   packets transmitted by the STAMP Session-Sender and one for packets
   transmitted by the STAMP Session-Reflector.
        </t>
      </section>
      <section anchor="stamp-session-sender" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-session-sender-behavior-and">Session-Sender Behavior and Packet Format</name>
        <t pn="section-4.2-1">
             A STAMP Session-Reflector supports the symmetrical size of test packets,
             as defined in <xref target="RFC6038" sectionFormat="of" section="3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc6038#section-3" derivedContent="RFC6038"/>, as the default behavior.
             A reflected base test packet includes information from
   the Session-Reflector and, thus, is larger.
   To maintain the symmetry between base STAMP packets,
   the base STAMP Session-Sender packet includes the Must-Be-Zero (MBZ) field to
   match to the size of a base reflected STAMP test packet.
             Hence, the base STAMP Session-Sender packet has a minimum 
             size of 44 octets in unauthenticated mode (see <xref target="session-sender-unauthenticated-format" format="default" sectionFormat="of" derivedContent="Figure 2"/>) 
             and 112 octets in the authenticated mode (see <xref target="session-sender-authenticated-format" format="default" sectionFormat="of" derivedContent="Figure 4"/>). 
             Generating variable length of a test packet in STAMP is defined in <xref target="I-D.ietf-ippm-stamp-option-tlv" format="default" sectionFormat="of" derivedContent="STAMP-OPTION"/>.
        </t>
        <section anchor="session-sender-packet-unauthenticated-section" numbered="true" toc="include" removeInRFC="false" pn="section-4.2.1">
          <name slugifiedName="name-session-sender-packet-forma">Session-Sender Packet Format in Unauthenticated Mode</name>
          <figure anchor="session-sender-unauthenticated-format" align="left" suppress-title="false" pn="figure-2">
            <name slugifiedName="name-stamp-session-sender-test-p">STAMP Session-Sender Test Packet Format in Unauthenticated Mode</name>
            <artwork name="" type="" align="left" alt="" pn="section-4.2.1-1.1">    
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        Sequence Number                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          Timestamp                            |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |         Error Estimate        |                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
   |                                                               |
   |                                                               |
   |                        MBZ  (30 octets)                       |
   |                                                               |
   |                                                               |
   |                                                               |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t pn="section-4.2.1-2">
        The fields are defined as following:
          </t>
          <ul spacing="normal" bare="false" empty="false" pn="section-4.2.1-3">
            <li pn="section-4.2.1-3.1">
        The Sequence Number field is four octets long. For each new session,
      its value starts at zero and is incremented by one with each transmitted
      packet.
        </li>
            <li pn="section-4.2.1-3.2">
        The Timestamp field is eight octets long. The STAMP node
	<bcp14>MUST</bcp14> support the Network
        Time Protocol (NTP) version 4 64-bit timestamp format <xref target="RFC5905" format="default" sectionFormat="of" derivedContent="RFC5905"/>, 
        the format used in <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357"/>. The STAMP
	node <bcp14>MAY</bcp14> support the 
        IEEE 1588v2 Precision Time Protocol (PTP) truncated 64-bit timestamp
        format <xref target="IEEE.1588.2008" format="default" sectionFormat="of" derivedContent="IEEE.1588.2008"/>, the format
	used in <xref target="RFC8186" format="default" sectionFormat="of" derivedContent="RFC8186"/>. 
        The use of the specific format, NTP or PTP, is part of configuration
	of the Session-Sender or the particular test session.
        </li>
            <li pn="section-4.2.1-3.3">
              <t pn="section-4.2.1-3.3.1">
        The Error Estimate field is two octets long with the format displayed in <xref target="error-estimate-format" format="default" sectionFormat="of" derivedContent="Figure 3"/>: 
              </t>
              <figure anchor="error-estimate-format" align="left" suppress-title="false" pn="figure-3">
                <name slugifiedName="name-error-estimate-format">Error Estimate Format</name>
                <artwork name="" type="" align="left" alt="" pn="section-4.2.1-3.3.2.1">
         0                   1
         0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
        |S|Z|   Scale   |   Multiplier  |
        +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
              </figure>
              <t pn="section-4.2.1-3.3.3">
        The S, Scale, and Multiplier fields are interpreted as they are
	defined in <xref target="RFC4656" sectionFormat="of" section="4.1.2" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4656#section-4.1.2" derivedContent="RFC4656"/>. The Z field is interpreted as it is defined in
	<xref target="RFC8186" sectionFormat="of" section="2.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8186#section-2.3" derivedContent="RFC8186"/>: 
              </t>
              <dl spacing="normal" newline="false" pn="section-4.2.1-3.3.4">
                <dt pn="section-4.2.1-3.3.4.1">0:</dt>
                <dd pn="section-4.2.1-3.3.4.2">NTP 64-bit format of a timestamp</dd>
                <dt pn="section-4.2.1-3.3.4.3">1:</dt>
                <dd pn="section-4.2.1-3.3.4.4">PTPv2 truncated format of a timestamp</dd>
              </dl>
              <t pn="section-4.2.1-3.3.5">
The default behavior of the STAMP Session-Sender and
Session-Reflector is to use the NTP 64-bit timestamp format
(Z field value of 0). An operator using configuration/management function
<bcp14>MAY</bcp14> configure the STAMP Session-Sender and Session-Reflector
to use the PTPv2 truncated format of a timestamp (Z field value of 1).
Note that an implementation of a Session-Sender that supports this specification
<bcp14>MAY</bcp14> be configured to use the PTPv2 format of a timestamp even
though the Session-Reflector is 
configured to use NTP format.
              </t>
            </li>
            <li pn="section-4.2.1-3.4">
        The MBZ field in the Session-Sender unauthenticated packet is 30
	octets long. It <bcp14>MUST</bcp14> be all zeroed on the transmission
	and <bcp14>MUST</bcp14> be ignored on receipt. 
        </li>
          </ul>
        </section>
        <section anchor="session-sender-packet-authenticated-section" numbered="true" toc="include" removeInRFC="false" pn="section-4.2.2">
          <name slugifiedName="name-session-sender-packet-format">Session-Sender Packet Format in Authenticated Mode</name>
          <figure anchor="session-sender-authenticated-format" align="left" suppress-title="false" pn="figure-4">
            <name slugifiedName="name-stamp-session-sender-test-pa">STAMP Session-Sender Test Packet Format in Authenticated Mode</name>
            <artwork name="" type="" align="left" alt="" pn="section-4.2.2-1.1">    
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                      Sequence Number                          |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 |                      MBZ (12 octets)                          |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                        Timestamp                              |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |        Error Estimate         |                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
 ~                                                               ~
 |                         MBZ (70 octets)                       |
 ~                                                               ~
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                                                               |
 |                       HMAC (16 octets)                        |
 |                                                               |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t pn="section-4.2.2-2">
  The field definitions are the same as the unauthenticated mode, listed in
  <xref target="session-sender-packet-unauthenticated-section" format="default" sectionFormat="of" derivedContent="Section 4.2.1"/>. Also, MBZ fields are used to make
  the packet length a multiple of 16 octets. The value of the field
  <bcp14>MUST</bcp14> be zeroed on transmission and <bcp14>MUST</bcp14> be
  ignored on receipt.  
  Note, that both MBZ fields are used to calculate a key hashed message
  authentication code (HMAC) <xref target="RFC2104" format="default" sectionFormat="of" derivedContent="RFC2104"/> hash.
 Also, the packet includes an HMAC hash at the end of the PDU. The detailed
 use of the HMAC field is described in <xref target="integrity-section" format="default" sectionFormat="of" derivedContent="Section 4.4"/>.  
          </t>
        </section>
      </section>
      <section anchor="stamp-session-reflector" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-session-reflector-behavior-">Session-Reflector Behavior and Packet Format</name>
        <t pn="section-4.3-1">
             The Session-Reflector receives the STAMP-Test packet and verifies
	     it. If the base STAMP-Test packet is validated, 
              the Session-Reflector that supports this specification
	      prepares and transmits the reflected test packet symmetric 
              to the packet received from the Session-Sender copying the
	      content beyond the size of the base STAMP packet 
              (see <xref target="stamp-session-sender" format="default" sectionFormat="of" derivedContent="Section 4.2"/>).
        </t>
        <section anchor="session-reflector-packet-unauthenticated-section" numbered="true" toc="include" removeInRFC="false" pn="section-4.3.1">
          <name slugifiedName="name-session-reflector-packet-fo">Session-Reflector Packet Format in Unauthenticated Mode</name>
          <t pn="section-4.3.1-1">
          </t>
          <figure anchor="session-reflector-unauthenticated-format" align="left" suppress-title="false" pn="figure-5">
            <name slugifiedName="name-stamp-session-reflector-tes">STAMP Session-Reflector Test Packet Format in
	    Unauthenticated Mode</name>
            <artwork name="" type="" align="left" alt="" pn="section-4.3.1-2.1">    
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                        Sequence Number                        |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                          Timestamp                            |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |         Error Estimate        |            MBZ                |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                          Receive Timestamp                    |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                 Session-Sender Sequence Number                |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                  Session-Sender Timestamp                     |
 |                                                               |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | Session-Sender Error Estimate |            MBZ                |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |Ses-Sender TTL |                      MBZ                      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t pn="section-4.3.1-3">
      Fields are defined as the following:
          </t>
          <ul spacing="normal" bare="false" empty="false" pn="section-4.3.1-4">
            <li pn="section-4.3.1-4.1">
              <t pn="section-4.3.1-4.1.1">
        The Sequence Number field is four octets long. The value of the Sequence
	Number field is set according to the mode of the STAMP
	Session-Reflector: 
              </t>
              <ul spacing="normal" bare="false" empty="false" pn="section-4.3.1-4.1.2">
                <li pn="section-4.3.1-4.1.2.1">
        In the stateless mode, the Session-Reflector copies the value from the
	received STAMP-Test packet's Sequence Number field.
        </li>
                <li pn="section-4.3.1-4.1.2.2">
        In the stateful mode, the Session-Reflector counts the transmitted
	STAMP-Test packets. 
        It starts with zero and is incremented by one
   for each subsequent packet for each test session.
   The Session-Reflector uses that counter to set the value of the Sequence Number field.
        </li>
              </ul>
            </li>
            <li pn="section-4.3.1-4.2">
        The Timestamp and Receive Timestamp fields are each eight octets long. The
	format of these fields, NTP or PTPv2, is
        indicated by the Z field of the Error Estimate field, as described in
	<xref target="session-sender-packet-unauthenticated-section" format="default" sectionFormat="of" derivedContent="Section 4.2.1"/>. 
        Receive Timestamp is the time the test packet was received by the
	Session-Reflector. Timestamp is
        the time taken by the Session-Reflector at the start of transmitting
	the test packet. 
        </li>
            <li pn="section-4.3.1-4.3">
        The Error Estimate field has the same size and interpretation as
	described in <xref target="session-sender-packet-unauthenticated-section" format="default" sectionFormat="of" derivedContent="Section 4.2.1"/>. 
        It is applicable to both Timestamp and Receive Timestamp.
        </li>
            <li pn="section-4.3.1-4.4">
        The Session-Sender Sequence Number, Session-Sender Timestamp, and
	Session-Sender Error Estimate fields 
        are copies of the corresponding fields in the STAMP-Test packet sent
	by the Session-Sender. 
        </li>
            <li pn="section-4.3.1-4.5">
        The Session-Sender TTL field is one octet long, and its value is the copy of the
        TTL field in IPv4 (or Hop Limit in IPv6) from the received STAMP-Test packet.
        </li>
            <li pn="section-4.3.1-4.6">
        The MBZ fields are used to achieve alignment of fields within the packet
	on a four-octet boundary.  
        The value of each MBZ field <bcp14>MUST</bcp14> be zeroed on transmission
	and <bcp14>MUST</bcp14> be ignored on receipt. 
        </li>
          </ul>
        </section>
        <section anchor="session-reflector-packet-authenticated-section" numbered="true" toc="include" removeInRFC="false" pn="section-4.3.2">
          <name slugifiedName="name-session-reflector-packet-for">Session-Reflector Packet Format in Authenticated Mode</name>
          <figure anchor="session-reflector-authenticated-format" align="left" suppress-title="false" pn="figure-6">
            <name slugifiedName="name-stamp-session-reflector-test">STAMP Session-Reflector Test Packet Format in Authenticated Mode</name>
            <artwork name="" type="" align="left" alt="" pn="section-4.3.2-1.1">    
   0                   1                   2                   3
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        Sequence Number                        |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        MBZ (12 octets)                        |
   |                                                               |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                          Timestamp                            |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |         Error Estimate        |                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
   |                        MBZ (6 octets)                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        Receive Timestamp                      |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        MBZ (8 octets)                         |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                 Session-Sender Sequence Number                |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        MBZ (12 octets)                        |
   |                                                               |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                 Session-Sender Timestamp                      |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   | Session-Sender Error Estimate |                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+                               +
   |                        MBZ (6 octets)                         |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |Ses-Sender TTL |                                               |
   +-+-+-+-+-+-+-+-+                                               +
   |                                                               |
   |                        MBZ (15 octets)                        |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                        HMAC (16 octets)                       |
   |                                                               |
   |                                                               |
   |                                                               |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
</artwork>
          </figure>
          <t pn="section-4.3.2-2">
  The field definitions are the same as the unauthenticated mode, listed in
  <xref target="session-reflector-packet-unauthenticated-section" format="default" sectionFormat="of" derivedContent="Section 4.3.1"/>. 
  Additionally, the MBZ field is used to make the packet length a multiple of 16 octets.
  The value of the field <bcp14>MUST</bcp14> be zeroed on transmission and
  <bcp14>MUST</bcp14> be ignored on receipt. 
  Note that the MBZ field is used to calculate the HMAC hash value.
 Also, the STAMP Session-Reflector test packet format in authenticated mode
 includes the HMAC <xref target="RFC2104" format="default" sectionFormat="of" derivedContent="RFC2104"/> hash at the end of the PDU.
  The detailed use of the HMAC field is in <xref target="integrity-section" format="default" sectionFormat="of" derivedContent="Section 4.4"/>. 
          </t>
        </section>
      </section>
      <section anchor="integrity-section" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-integrity-protection-in-sta">Integrity Protection in STAMP</name>
        <t pn="section-4.4-1">
                Authenticated mode provides integrity protection to each STAMP
		message by adding  
                Hashed Message Authentication Code (HMAC). STAMP 
                uses HMAC-SHA-256 truncated to 128 bits (similarly to the use
		of it in IPsec defined in <xref target="RFC4868" format="default" sectionFormat="of" derivedContent="RFC4868"/>); hence, 
                the length of the HMAC field is 16 octets. In the authenticated mode,
                HMAC covers the first six blocks (96 octets). HMAC uses its
		own key, which may be unique for each STAMP-Test session; 
                key management and the mechanisms to distribute the HMAC key
		are outside the scope of this specification. One example is to 
                use an orchestrator to configure the HMAC key based on the STAMP YANG
		data model <xref target="I-D.ietf-ippm-stamp-yang" format="default" sectionFormat="of" derivedContent="STAMP-YANG"/>. 
                HMAC <bcp14>MUST</bcp14> be verified as early as possible to
		avoid using or propagating corrupted data. 
        </t>
        <t pn="section-4.4-2">
                Future specifications may define the use of other, more
		advanced cryptographic algorithms, 
                possibly providing an update to the STAMP YANG data model
		<xref target="I-D.ietf-ippm-stamp-yang" format="default" sectionFormat="of" derivedContent="STAMP-YANG"/>. 
        </t>
      </section>
      <section anchor="vonfidentiality-section" numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-confidentiality-protection-">Confidentiality Protection in STAMP</name>
        <t pn="section-4.5-1">
                If confidentiality protection for STAMP is required, a
		STAMP-Test session <bcp14>MUST</bcp14> use a secured
		transport. For example, 
                STAMP packets could be transmitted in the dedicated IPsec
		tunnel or share the IPsec tunnel with the 
                monitored flow. Also, the Datagram Transport Layer Security protocol
                would provide the desired confidentiality protection.
        </t>
      </section>
      <section anchor="interoperation-twamp" numbered="true" toc="include" removeInRFC="false" pn="section-4.6">
        <name slugifiedName="name-interoperability-with-twamp">Interoperability with TWAMP Light</name>
        <t pn="section-4.6-1">
One of the essential requirements to STAMP is the ability to interwork with a
TWAMP Light device. Because STAMP and TWAMP use different algorithms in
authenticated mode (HMAC-SHA-256 versus HMAC-SHA-1), interoperability is only
considered for unauthenticated mode. There are two possible combinations for
such a use case: 
</t>
        <ul spacing="normal" bare="false" empty="false" pn="section-4.6-2">
          <li pn="section-4.6-2.1">STAMP Session-Sender with TWAMP Light Session-Reflector</li>
          <li pn="section-4.6-2.2">TWAMP Light Session-Sender with STAMP Session-Reflector</li>
        </ul>
        <t pn="section-4.6-3">
   In the former case, the Session-Sender might not be aware that its Session-Reflector
   does not support STAMP. For example, a TWAMP Light Session-Reflector may not
   support the use of UDP port 862, as specified in <xref target="RFC8545" format="default" sectionFormat="of" derivedContent="RFC8545"/>. 
    Thus, <xref target="stamp-section" format="default" sectionFormat="of" derivedContent="Section 4"/> permits a STAMP
    Session-Sender to use alternative ports. If any of STAMP extensions are
    used, the TWAMP Light Session-Reflector will view them as the Packet
    Padding field. 
        </t>
        <t pn="section-4.6-4">
   In the latter scenario, if a TWAMP Light Session-Sender does not support
   the use of UDP port 862, the test management system <bcp14>MUST</bcp14> set
   the STAMP Session-Reflector to use UDP port number, as permitted by <xref target="stamp-section" format="default" sectionFormat="of" derivedContent="Section 4"/>. The Session-Reflector
   <bcp14>MUST</bcp14> be set to use the default format for its timestamps,
   NTP.
        </t>
        <t pn="section-4.6-5">
A STAMP Session-Reflector that supports this specification will transmit the base packet
(<xref target="session-reflector-unauthenticated-format" format="default" sectionFormat="of" derivedContent="Figure 5"/>)
if it receives a packet smaller than 
the STAMP base packet. If the packet received from the TWAMP Session-Sender is
larger than the STAMP base packet, 
the STAMP Session-Reflector that supports this specification will copy the
content of the remainder of the received packet to transmit a reflected packet
of symmetrical size. 
</t>
      </section>
    </section>
    <section anchor="operation-sec" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-operational-considerations">Operational Considerations</name>
      <t pn="section-5-1">
STAMP is intended to be used on production networks to enable
the operator to assess service level agreements based on packet delay,
delay variation, and loss. When using STAMP over the Internet, especially
when  STAMP-Test packets are transmitted with the destination UDP port number from
     the User Ports range, the possible impact of the STAMP-Test packets
     <bcp14>MUST</bcp14> be thoroughly analyzed. 
     The use of STAMP for each case <bcp14>MUST</bcp14> be agreed by users of
     nodes hosting the Session-Sender and Session-Reflector before starting
     the STAMP-Test session. 
      </t>
      <t pn="section-5-2">
  Also, the use of the well-known port number as
  the destination UDP port number in STAMP-Test packets transmitted
  by a Session-Sender would not impede
  the ability to measure performance in an Equal-Cost Multipath environment,
  and analysis in <xref target="RFC8545" sectionFormat="of" section="5.3" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8545#section-5.3" derivedContent="RFC8545"/>
  fully applies to STAMP. 
      </t>
    </section>
    <section anchor="iana-consider" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-6-1">
This document has no IANA actions.
      </t>
    </section>
    <section anchor="security" numbered="true" toc="include" removeInRFC="false" pn="section-7">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-7-1">
     <xref target="RFC5357" format="default" sectionFormat="of" derivedContent="RFC5357"/> does not identify security
     considerations specific to TWAMP-Test but refers to
     security considerations identified for OWAMP in <xref target="RFC4656" format="default" sectionFormat="of" derivedContent="RFC4656"/>. Since both OWAMP and TWAMP include control-plane and
     data-plane components,
     only security considerations related to OWAMP-Test discussed in Sections
     <xref target="RFC4656" section="6.2" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4656#section-6.2" derivedContent="RFC4656"/> and
     <xref target="RFC4656" section="6.3" sectionFormat="bare" format="default" derivedLink="https://rfc-editor.org/rfc/rfc4656#section-6.3" derivedContent="RFC4656"/> of <xref target="RFC4656" format="default" sectionFormat="of" derivedContent="RFC4656"/> apply to STAMP. 
      </t>
      <t pn="section-7-2">
     STAMP uses the well-known UDP port number allocated for the
     OWAMP-Test/TWAMP-Test Receiver Port. Thus, the security considerations and
     measures to mitigate the risk of the attack using the registered port
     number documented in <xref target="RFC8545" sectionFormat="of" section="6" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8545#section-6" derivedContent="RFC8545"/> equally apply to STAMP. Because of the control and
     management of a STAMP-Test being outside the scope of this specification,
     only the more general requirement is set: 
      </t>
      <ul empty="true" spacing="normal" bare="false" pn="section-7-3">
        <li pn="section-7-3.1">
     To mitigate the possible attack vector, the control and management of a
     STAMP-Test session <bcp14>MUST</bcp14> use the secured transport. 
     </li>
        <li pn="section-7-3.2">
     The load of the STAMP-Test packets offered to a network
     <bcp14>MUST</bcp14> be carefully estimated, 
     and the possible impact on the existing services <bcp14>MUST</bcp14> be
     thoroughly analyzed before launching the test session.
     <xref target="RFC8085" sectionFormat="of" section="3.1.5" format="default" derivedLink="https://rfc-editor.org/rfc/rfc8085#section-3.1.5" derivedContent="RFC8085"/> provides
     guidance on handling network load for UDP-based protocol. While the
     characteristic of test traffic depends on the test objective, it is
     highly recommended to stay in the limits, as provided in <xref target="RFC8085" format="default" sectionFormat="of" derivedContent="RFC8085"/>.  
     </li>
      </ul>
      <t pn="section-7-4">
Use of HMAC-SHA-256 in the authenticated mode protects the data integrity
of the STAMP-Test packets.
      </t>
    </section>
  </middle>
  <back>
    <displayreference target="I-D.ietf-ippm-stamp-yang" to="STAMP-YANG"/>
    <displayreference target="I-D.ietf-ippm-stamp-option-tlv" to="STAMP-OPTION"/>
    <references pn="section-8">
      <name slugifiedName="name-references">References</name>
      <references pn="section-8.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="IEEE.1588.2008" quoteTitle="true" derivedAnchor="IEEE.1588.2008">
          <front>
            <title>IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems</title>
            <author>
              <organization showOnFrontPage="true">IEEE</organization>
            </author>
            <date month="July" year="2008"/>
          </front>
          <seriesInfo name="IEEE" value="Standard 1588"/>
        </reference>
        <reference anchor="RFC2104" target="https://www.rfc-editor.org/info/rfc2104" quoteTitle="true" derivedAnchor="RFC2104">
          <front>
            <title>HMAC: Keyed-Hashing for Message Authentication</title>
            <author initials="H." surname="Krawczyk" fullname="H. Krawczyk">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Bellare" fullname="M. Bellare">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Canetti" fullname="R. Canetti">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="February"/>
            <abstract>
              <t>This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.  The cryptographic strength of HMAC depends on the properties of the underlying hash function.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2104"/>
          <seriesInfo name="DOI" value="10.17487/RFC2104"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" quoteTitle="true" derivedAnchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC4656" target="https://www.rfc-editor.org/info/rfc4656" quoteTitle="true" derivedAnchor="RFC4656">
          <front>
            <title>A One-way Active Measurement Protocol (OWAMP)</title>
            <author initials="S." surname="Shalunov" fullname="S. Shalunov">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="B." surname="Teitelbaum" fullname="B. Teitelbaum">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Karp" fullname="A. Karp">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Boote" fullname="J. Boote">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Zekauskas" fullname="M. Zekauskas">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2006" month="September"/>
            <abstract>
              <t>The One-Way Active Measurement Protocol (OWAMP) measures unidirectional characteristics such as one-way delay and one-way loss.  High-precision measurement of these one-way IP performance metrics became possible with wider availability of good time sources (such as GPS and CDMA).  OWAMP enables the interoperability of these measurements.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4656"/>
          <seriesInfo name="DOI" value="10.17487/RFC4656"/>
        </reference>
        <reference anchor="RFC5357" target="https://www.rfc-editor.org/info/rfc5357" quoteTitle="true" derivedAnchor="RFC5357">
          <front>
            <title>A Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="K." surname="Hedayat" fullname="K. Hedayat">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Krzanowski" fullname="R. Krzanowski">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Yum" fullname="K. Yum">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Babiarz" fullname="J. Babiarz">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2008" month="October"/>
            <abstract>
              <t>The One-way Active Measurement Protocol (OWAMP), specified in RFC 4656, provides a common protocol for measuring one-way metrics between network devices.  OWAMP can be used bi-directionally to measure one-way metrics in both directions between two network elements.  However, it does not accommodate round-trip or two-way measurements.  This memo specifies a Two-Way Active Measurement Protocol (TWAMP), based on the OWAMP, that adds two-way or round-trip measurement capabilities.  The TWAMP measurement architecture is usually comprised of two hosts with specific roles, and this allows for some protocol simplifications, making it an attractive alternative in some circumstances.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5357"/>
          <seriesInfo name="DOI" value="10.17487/RFC5357"/>
        </reference>
        <reference anchor="RFC5905" target="https://www.rfc-editor.org/info/rfc5905" quoteTitle="true" derivedAnchor="RFC5905">
          <front>
            <title>Network Time Protocol Version 4: Protocol and Algorithms Specification</title>
            <author initials="D." surname="Mills" fullname="D. Mills">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Martin" fullname="J. Martin" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Burbank" fullname="J. Burbank">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W." surname="Kasch" fullname="W. Kasch">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="June"/>
            <abstract>
              <t>The Network Time Protocol (NTP) is widely used to synchronize computer clocks in the Internet.  This document describes NTP version 4 (NTPv4), which is backwards compatible with NTP version 3 (NTPv3), described in RFC 1305, as well as previous versions of the protocol. NTPv4 includes a modified protocol header to accommodate the Internet Protocol version 6 address family.  NTPv4 includes fundamental improvements in the mitigation and discipline algorithms that extend the potential accuracy to the tens of microseconds with modern workstations and fast LANs.  It includes a dynamic server discovery scheme, so that in many cases, specific server configuration is not required.  It corrects certain errors in the NTPv3 design and implementation and includes an optional extension mechanism.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5905"/>
          <seriesInfo name="DOI" value="10.17487/RFC5905"/>
        </reference>
        <reference anchor="RFC6038" target="https://www.rfc-editor.org/info/rfc6038" quoteTitle="true" derivedAnchor="RFC6038">
          <front>
            <title>Two-Way Active Measurement Protocol (TWAMP) Reflect Octets and Symmetrical Size Features</title>
            <author initials="A." surname="Morton" fullname="A. Morton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Ciavattone" fullname="L. Ciavattone">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2010" month="October"/>
            <abstract>
              <t>This memo describes two closely related features for the core specification of the Two-Way Active Measurement Protocol (TWAMP): an optional capability where the responding host returns some of the command octets or padding octets to the sender, and an optional sender packet format that ensures equal test packet sizes are used in both directions.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6038"/>
          <seriesInfo name="DOI" value="10.17487/RFC6038"/>
        </reference>
        <reference anchor="RFC6335" target="https://www.rfc-editor.org/info/rfc6335" quoteTitle="true" derivedAnchor="RFC6335">
          <front>
            <title>Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry</title>
            <author initials="M." surname="Cotton" fullname="M. Cotton">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Eggert" fullname="L. Eggert">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="J." surname="Touch" fullname="J. Touch">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M." surname="Westerlund" fullname="M. Westerlund">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Cheshire" fullname="S. Cheshire">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="August"/>
            <abstract>
              <t>This document defines the procedures that the Internet Assigned Numbers Authority (IANA) uses when handling assignment and other requests related to the Service Name and Transport Protocol Port Number registry.  It also discusses the rationale and principles behind these procedures and how they facilitate the long-term sustainability of the registry.</t>
              <t>This document updates IANA's procedures by obsoleting the previous UDP and TCP port assignment procedures defined in Sections 8 and 9.1 of the IANA Allocation Guidelines, and it updates the IANA service name and port assignment procedures for UDP-Lite, the Datagram Congestion Control Protocol (DCCP), and the Stream Control Transmission Protocol (SCTP).  It also updates the DNS SRV specification to clarify what a service name is and how it is registered.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="165"/>
          <seriesInfo name="RFC" value="6335"/>
          <seriesInfo name="DOI" value="10.17487/RFC6335"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" quoteTitle="true" derivedAnchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8186" target="https://www.rfc-editor.org/info/rfc8186" quoteTitle="true" derivedAnchor="RFC8186">
          <front>
            <title>Support of the IEEE 1588 Timestamp Format in a Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="G." surname="Mirsky" fullname="G. Mirsky">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Meilik" fullname="I. Meilik">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="June"/>
            <abstract>
              <t>This document describes an OPTIONAL feature for active performance measurement protocols that allows use of the Precision Time Protocol timestamp format defined in IEEE 1588v2, as an alternative to the Network Time Protocol that is currently used.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8186"/>
          <seriesInfo name="DOI" value="10.17487/RFC8186"/>
        </reference>
        <reference anchor="RFC8545" target="https://www.rfc-editor.org/info/rfc8545" quoteTitle="true" derivedAnchor="RFC8545">
          <front>
            <title>Well-Known Port Assignments for the One-Way Active Measurement Protocol (OWAMP) and the Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="A." surname="Morton" fullname="A. Morton" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Mirsky" fullname="G. Mirsky" role="editor">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t>This memo explains the motivation and describes the reassignment of well-known ports for the One-Way Active Measurement Protocol (OWAMP) and the Two-Way Active Measurement Protocol (TWAMP) for control and measurement.  It also clarifies the meaning and composition of these Standards Track protocol names for the industry.</t>
              <t>This memo updates RFCs 4656 and 5357, in terms of the UDP well-known port assignments, and it clarifies the complete OWAMP and TWAMP protocol composition for the industry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8545"/>
          <seriesInfo name="DOI" value="10.17487/RFC8545"/>
        </reference>
      </references>
      <references pn="section-8.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="BBF.TR-390" quoteTitle="true" derivedAnchor="BBF.TR-390">
          <front>
            <title>Performance Measurement from IP Edge to Customer Equipment using TWAMP Light</title>
            <seriesInfo name="TR-390" value="Issue 1"/>
            <author>
              <organization showOnFrontPage="true">Broadband Forum</organization>
            </author>
            <date month="May" year="2017"/>
          </front>
        </reference>
        <reference anchor="RFC4868" target="https://www.rfc-editor.org/info/rfc4868" quoteTitle="true" derivedAnchor="RFC4868">
          <front>
            <title>Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec</title>
            <author initials="S." surname="Kelly" fullname="S. Kelly">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Frankel" fullname="S. Frankel">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="May"/>
            <abstract>
              <t>This specification describes the use of Hashed Message Authentication Mode (HMAC) in conjunction with the SHA-256, SHA-384, and SHA-512 algorithms in IPsec.  These algorithms may be used as the basis for data origin authentication and integrity verification mechanisms for the Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange Protocol (IKE), and IKEv2 protocols, and also as Pseudo-Random Functions (PRFs) for IKE and IKEv2.  Truncated output lengths are specified for the authentication-related variants, with the corresponding algorithms designated as HMAC-SHA-256-128, HMAC-SHA-384-192, and HMAC-SHA-512-256.  The PRF variants are not truncated, and are called PRF-HMAC-SHA-256, PRF-HMAC-SHA-384, and PRF-HMAC-SHA-512.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4868"/>
          <seriesInfo name="DOI" value="10.17487/RFC4868"/>
        </reference>
        <reference anchor="RFC7750" target="https://www.rfc-editor.org/info/rfc7750" quoteTitle="true" derivedAnchor="RFC7750">
          <front>
            <title>Differentiated Service Code Point and Explicit Congestion Notification Monitoring in the Two-Way Active Measurement Protocol (TWAMP)</title>
            <author initials="J." surname="Hedin" fullname="J. Hedin">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Mirsky" fullname="G. Mirsky">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Baillargeon" fullname="S. Baillargeon">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2016" month="February"/>
            <abstract>
              <t>This document describes an optional extension for Two-Way Active Measurement Protocol (TWAMP) allowing the monitoring of the Differentiated Service Code Point and Explicit Congestion Notification fields with the TWAMP-Test protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7750"/>
          <seriesInfo name="DOI" value="10.17487/RFC7750"/>
        </reference>
        <reference anchor="RFC8085" target="https://www.rfc-editor.org/info/rfc8085" quoteTitle="true" derivedAnchor="RFC8085">
          <front>
            <title>UDP Usage Guidelines</title>
            <author initials="L." surname="Eggert" fullname="L. Eggert">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Fairhurst" fullname="G. Fairhurst">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="G." surname="Shepherd" fullname="G. Shepherd">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2017" month="March"/>
            <abstract>
              <t>The User Datagram Protocol (UDP) provides a minimal message-passing transport that has no inherent congestion control mechanisms.  This document provides guidelines on the use of UDP for the designers of applications, tunnels, and other protocols that use UDP.  Congestion control guidelines are a primary focus, but the document also provides guidance on other topics, including message sizes, reliability, checksums, middlebox traversal, the use of Explicit Congestion Notification (ECN), Differentiated Services Code Points (DSCPs), and ports.</t>
              <t>Because congestion control is critical to the stable operation of the Internet, applications and other protocols that choose to use UDP as an Internet transport must employ mechanisms to prevent congestion collapse and to establish some degree of fairness with concurrent traffic.  They may also need to implement additional mechanisms, depending on how they use UDP.</t>
              <t>Some guidance is also applicable to the design of other protocols (e.g., protocols layered directly on IP or via IP-based tunnels), especially when these protocols do not themselves provide congestion control.</t>
              <t>This document obsoletes RFC 5405 and adds guidelines for multicast UDP usage.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="145"/>
          <seriesInfo name="RFC" value="8085"/>
          <seriesInfo name="DOI" value="10.17487/RFC8085"/>
        </reference>
        <reference anchor="I-D.ietf-ippm-stamp-option-tlv" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-ippm-stamp-option-tlv-03" derivedAnchor="STAMP-OPTION">
          <front>
            <title>Simple Two-way Active Measurement Protocol Optional Extensions</title>
            <author initials="G" surname="Mirsky" fullname="Gregory Mirsky">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M" surname="Xiao" fullname="Min Xiao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H" surname="Nydell" fullname="Henrik Nydell">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R" surname="Foote" fullname="Richard Foote">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A" surname="Masputra" fullname="Adi Masputra">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="E" surname="Ruffini" fullname="Ernesto Ruffini">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="February" day="21" year="2020"/>
            <abstract>
              <t>This document describes optional extensions to Simple Two-way Active Measurement Protocol (STAMP) which enable measurement performance metrics in addition to ones supported by the STAMP base specification.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ippm-stamp-option-tlv-03"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-ippm-stamp-option-tlv-03.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
        <reference anchor="I-D.ietf-ippm-stamp-yang" quoteTitle="true" target="https://tools.ietf.org/html/draft-ietf-ippm-stamp-yang-05" derivedAnchor="STAMP-YANG">
          <front>
            <title>Simple Two-way Active Measurement Protocol (STAMP) Data Model</title>
            <author initials="G" surname="Mirsky" fullname="Gregory Mirsky">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="M" surname="Xiao" fullname="Min Xiao">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="W" surname="Luo" fullname="Wei Luo">
              <organization showOnFrontPage="true"/>
            </author>
            <date month="October" day="25" year="2019"/>
            <abstract>
              <t>This document specifies the data model for implementations of Session-Sender and Session-Reflector for Simple Two-way Active Measurement Protocol (STAMP) mode using YANG.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ippm-stamp-yang-05"/>
          <format type="TXT" target="http://www.ietf.org/internet-drafts/draft-ietf-ippm-stamp-yang-05.txt"/>
          <refcontent>Work in Progress</refcontent>
        </reference>
      </references>
    </references>
    <section numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t pn="section-appendix.a-1">The authors express their appreciation to <contact fullname="Jose Ignacio Alvarez-Hamelin"/> and
<contact fullname="Brian Weis"/> for their great insights into the
security and identity protection as well as the most helpful and practical suggestions. Also, our sincere thanks to
<contact fullname="David Ball"/>, <contact fullname="Rakesh Gandhi"/>, and <contact fullname="Xiao Min"/> for
their thorough reviews and helpful comments. 
      </t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Greg Mirsky" initials="G." surname="Mirsky">
        <organization showOnFrontPage="true">ZTE Corp.</organization>
        <address>
          <postal>
            <street/>
            <city/>
            <code/>
            <country/>
          </postal>
          <email>gregimirsky@gmail.com</email>
        </address>
      </author>
      <author fullname="Guo Jun" initials="G." surname="Jun">
        <organization showOnFrontPage="true">ZTE Corp.</organization>
        <address>
          <postal>
            <street>68# Zijinghua Road</street>
            <city>Nanjing</city>
            <region>Jiangsu</region>
            <code>210012</code>
            <country>China</country>
          </postal>
          <phone>+86 18105183663</phone>
          <email>guo.jun2@zte.com.cn</email>
        </address>
      </author>
      <author fullname="Henrik Nydell" initials="H." surname="Nydell">
        <organization showOnFrontPage="true">Accedian Networks</organization>
        <address>
          <postal>
            <street/>
            <city/>
            <code/>
            <country/>
          </postal>
          <email>hnydell@accedian.com</email>
        </address>
      </author>
      <author initials="R." surname="Foote" fullname="Richard Foote">
        <organization showOnFrontPage="true">Nokia</organization>
        <address>
          <email>footer.foote@nokia.com</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
