<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC0768 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.0768.xml">
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8762 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8762.xml">
<!ENTITY RFC8799 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8799.xml">
<!ENTITY RFC8972 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8972.xml">
<!ENTITY RFC2104 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2104.xml">
<!ENTITY RFC4385 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4385.xml">
<!ENTITY RFC4868 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4868.xml">
<!ENTITY RFC5586 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5586.xml">
<!ENTITY RFC5082 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5082.xml">
<!ENTITY RFC6335 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6335.xml">
<!ENTITY RFC6658 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6658.xml">
<!ENTITY RFC6790 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6790.xml">
<!ENTITY RFC8126 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
<!ENTITY RFC8186 SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8186.xml">
<!ENTITY I-D.ietf-ippm-stamp-yang SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ippm-stamp-yang.xml">
<!ENTITY I-D.schmutzer-bess-ple SYSTEM "https://xml2rfc.ietf.org/public/rfc/bibxml3/reference.I-D.schmutzer-bess-ple.xml">
]>
<rfc submissionType="IETF" docName="draft-gandhi-mpls-stamp-pw-01" category="std" ipr="trust200902">
    <!-- Generated by id2xml 1.5.0 on 2020-02-06T01:41:26Z -->
    <?rfc compact="yes"?>
    <?rfc text-list-symbols="oo*+-"?>
    <?rfc subcompact="no"?>
    <?rfc sortrefs="no"?>
    <?rfc symrefs="yes"?>
    <?rfc strict="yes"?>
    <?rfc toc="yes"?>
    <front>
    <title abbrev="Encapsulating STAMP for PWs in MPLS">Encapsulation of Simple TWAMP (STAMP) for Pseudowires in MPLS Networks</title>
    <author fullname="Rakesh Gandhi" initials="R."  surname="Gandhi">
    <organization>Cisco Systems, Inc.</organization>
    <address>
    <postal><street>Canada</street>
    </postal>
        <email>rgandhi@cisco.com</email>
    </address>
    </author>

    <author fullname="Patrice Brissette" initials="P." surname="Brissette">
    <organization>Cisco Systems, Inc.</organization>
        <address>
    <postal><street>Canada</street>
    </postal>
        <email>pbrisset@cisco.com</email>
    </address>
    </author>

    <author fullname="Edward Leyton" initials="E."
     surname="Leyton">
     <organization>Verizon Wireless</organization>
     <address>
     <email>edward.leyton@verizonwireless.com</email>
     </address>
    </author>

    
    <date day="14" month="January" year="2022"/>
    <workgroup>MPLS Working Group</workgroup>
    <abstract><t>
    Pseudowires (PWs) are used in MPLS networks for various services
    including carrying layer 2 and layer 3 data packets.
    This document describes the procedure for encapsulation of 
    the Simple Two-Way Active Measurement Protocol (STAMP) defined in RFC 8762 and its optional 
    extensions defined in RFC 8972 for PWs in MPLS networks.  
    The procedure uses PW Generic Associated Channel (G-ACh) to encapsulate the  
    STAMP test packets with or without an IP/UDP header.
   </t>
    </abstract>
    </front>

    <middle>
    <section title="Introduction" anchor="sect-1">
  
   <t>The Simple Two-way Active Measurement Protocol (STAMP) provides
   capabilities for the measurement of various metrics in IP networks
   <xref target="RFC8762"/> without the use of a control channel to 
   pre-signal session parameters.  <xref target="RFC8972"/> defines optional extensions for STAMP.
   </t>

   <t>Pseudowires (PWs) are used in MPLS networks for various services
   including carrying layer 2 and layer 3 data packets
   <xref target="RFC6658"/>.
   The PWs are bidirectional in nature. 
   The PWs can be point-to-point or point-to-multipoint. 
   A PW Generic Associated Channel (G-ACh) <xref target="RFC5586"/> provides a mechanism 
   to transport Operations, Administration, and Maintenance (OAM) and 
   other control messages over MPLS data plane. The G-ACh channel 
   types identify the various OAM messages being transported over the channel.
   </t> 

   <t>This document describes the procedure for encapsulation of the STAMP 
   defined in <xref target="RFC8762"/> and its optional extensions defined 
   in <xref target="RFC8972"/> for point-to-point PWs in MPLS networks.  
   The procedure uses PW Generic Associated Channel (G-ACh) to encapsulate the  
   STAMP test packets with or without an IP/UDP header.
   The procedure for point-to-multipoint PWs will be added in future.
   </t>

   <section title="Requirements" anchor="sect-1.1">

   <t>The STAMP test packets need to be transmitted with the same MPLS 
   label stack that is used by the PW traffic to ensure proper validation 
   of underlay path taken by the actual PW traffic. Also, the test packets need 
   to follow the same ECMP path taken by the PW traffic. 
   The STAMP test packets may be encapsulated over the PW associated 
   channel with or without an IP/UDP header.</t>

   <t>In case of MPLS Transport Profile (MPLS TP), the STAMP test packets need to be tranmitted
   on the Generic Associated Channel without using an IP header to have the same forwarding behavior as the data traffic.</t>
   
   <t>The requirements for the encapsulation of 
   the STAMP test packets for the PWs in MPLS networks can be summarized as follows:
   </t>

   <t>
   o    The PW associated channel MUST support STAMP test packets with IP/UDP header.
   </t>

   <t> 
   o    The PW associated channel MUST support STAMP test packets without IP/UDP header.
   </t>

   <t> 
   o    The Session-Sender test packets MUST follow the same underlay path taken by the traffic for the associated PW channel.
   </t>

   <t> 
   o    The Session-Sender test packets MUST follow the same ECMP underlay path taken by the traffic for the associated PW channel.
   </t>

   <t> 
   o    The Session-Reflector test packets MAY follow the same reverse underlay path taken by Session-Sender test packets.
   </t>

   <t> 
   o    The Session-Reflector test packets MAY follow the same reverse ECMP underlay path taken by Session-Sender test packets.
   </t>

   </section>
   </section>

   <section title="Conventions Used in This Document" anchor="sect-2">
       
   <section title="Requirements Language" anchor="sect-2.1"><t>
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in <xref target="RFC2119"/> <xref target="RFC8174"/>
   when, and only when, they appear in all capitals, as shown here.</t>

    </section>

   <section title="Abbreviations" anchor="sect-2.2"><t>
   ECMP: Equal Cost Multi-Path.</t>

    <t>
   G-ACh: Generic Associated Channel.</t>

    <t>
   GAL: G-ACh Label.</t>

    <t>
   HMAC: Hashed Message Authentication Code.</t>

    <t>
   MPLS: Multiprotocol Label Switching.</t>

    <t>
   OAM: Operations, Administration, and Maintenance.
    </t>

    <t>
   PLE: Private Line Emulation.</t>

    <t>
   PW: Pseudowires.</t>

    <t>
   SHA: Secure Hash Algorithm.</t>

    <t>
   STAMP: Simple Two-way Active Measurement Protocol.</t>

    <t>
   TC: Traffic Class.</t>

   </section>

   <section title="Reference Topology" anchor="sect-2.3"><t>
   In the Reference Topology shown in Figure 1, 
   there exists a packet pseudowire to transport data between LSRs S1 and R1.		   
   The STAMP Session-Sender on LSR S1 initiates a
   Session-Sender test packet and the STAMP Session-Reflector on LSR R1
   transmits a reply test packet.  The reply test packet is transmitted 
   to the STAMP Session-Sender on the same path (same set
   of links and nodes) in the reverse direction of 
   the path taken towards the Session-Reflector.</t>  

   <figure title="Reference Topology" anchor="ure-stamp-reference-top"><artwork><![CDATA[

                 |<-------- Pseudowire ------->|
                 |                             |
                 |     T1                T2    |
                 |    /                   \    |
             +-------+     Test Packet     +-------+
             |       | - - - - - - - - - ->|       |
             |   S1  |=====================|   R1  |
             |       |<- - - - - - - - - - |       |
             +-------+  Reply Test Packet  +-------+
                      \                   /
                       T4                T3

         STAMP Session-Sender        STAMP Session-Reflector

  T1, T2, T3, T4: Timestamps as described in [RFC8762]
]]></artwork>
    </figure>
    </section>

   </section>

   
    <section title="Overview" anchor="sect-3"><t>
    The STAMP Session-Sender and Session-Reflector test packets defined 
    in <xref target="RFC8972"/> are transmitted over the PWs in MPLS networks.  
    The base STAMP test packets can be encapsulated using IP/UDP 
    header and may use Destination UDP port 862 <xref target="RFC8762"/>.
    </t> 

    <t>The STAMP test packets are encapsulated with MPLS 
    header using the same label stack as the PW traffic and the PW G-ACh header. 
    The encapsulation allows the STAMP test packets to follow the 
    same path as the PW traffic, and provide the same ECMP path selection on the intermediate nodes.
    </t>

    <t>There are two ways in which STAMP test packets may be encapsulated over a PW
    associated channel, either using an IP/UDP header or without using an IP/UDP header.
    </t>

    <t>For encapsulating the STAMP test packets over a PW associated channel with an IP/UDP header, IPv4 and IPv6 
    G-ACh types <xref target="RFC4385"/> are used for both Session-Sender 
    and Session-Reflector test packets.  The destination UDP port numbers in the 
    Session-Sender and Session-Reflector test packets discriminate the test packets.
    The IP version (IPv4 or IPv6) MUST match the IP version used for
    signaling for dynamically established PWs or MUST be
    configured for statically provisioned PWs. 
    </t>

    <t>For encapsulating the STAMP test packets over a PW associated channel without an IP/UDP header,
    two new G-ACh types are defined in this document, one for the 
    Session-Sender test packets and one for the Session-Reflector 
    test packets.  The different G-ACh types are required for the 
    Session-Sender and Session-Reflector test packets as the STAMP test packet 
    formats do not have a way to discriminate them.
    </t>

    <t>The Time to Live (TTL)/Hop Limit (HL) and Generalized TTL Security Mechanism (GTSM)
    procedures from <xref target="RFC5082"/> apply to this
    encapsulation, and hence the TTL/HL is set to 255.
    </t>

    <t>The G-ACh label (GAL) <xref target="RFC5586"/> is not added in
    the MPLS label stack.
    </t>

    </section>

    <section title="Session-Sender Test Packet" anchor="sect-4">
 
    <section title="Session-Sender Test Packet with IP/UDP Header" anchor="sect-4.1"><t>
   The content of an example STAMP Session-Sender test packet encapsulated over a PW 
   associated channel using an IP/UDP header is shown in Figure 2. 
   The STAMP G-ACh header <xref target="RFC5586"/> 
   with G-ACh MUST immediately follow the bottom of the MPLS label stack.
   The payload contains the STAMP Session-Sender test 
   packet defined in <xref target="RFC8972"/>.</t>

    <figure title="Example Session-Sender Test Packet with IP/UDP Header" anchor="ure-stamp-sender-packet1"><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                Label(1)               | TC  |S|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 .                                                               .
 .                                                               .
 .                                                               .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                PW Label               | TC  |1|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |0 0 0 1|Version|    Reserved   | IPv4 (0x0021) or IPv6 (0x0057)| 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | IP Header                                                     |
 .  Source IP Address = Session-Sender IPv4 or IPv6 Address      .
 .  Destination IP Address=Session-Reflector IPv4 or IPv6 Address.
 .                                                               .
 +---------------------------------------------------------------+
 | UDP Header                                                    |
 .  Source Port = As chosen by Session-Sender                    .
 .  Destination Port = User-configured Destination Port | 862    .
 .                                                               .
 +---------------------------------------------------------------+
 | Payload = Test Packet as specified in Section 3 of RFC 8972   |
 .           in Figure 1 and Figure 3                            .
 .                                                               .
 +---------------------------------------------------------------+
 | Optional STAMP TLVs defined in RFC 8972                       |
 .                                                               .
 +---------------------------------------------------------------+
]]></artwork>
    </figure>

    
    <t>The STAMP Session-Sender test packet G-ACh header contains following fields:</t>

    <t><list style="hanging" hangIndent="2">

    <t hangText="Version:">
       The Version field is set to 0, as defined in <xref target="RFC4385"/>.
    </t>
  
    <t hangText="Reserved:">
       Reserved Bits MUST be set to zero upon transmission and ignored upon receipt.
    </t>

    <t hangText="Channel Type:">
       G-ACh channel type for IPv4 header (0x0021) or IPv6 header (0x0057) <xref target="RFC4385"/>. 
    </t>

    </list>
    </t>


    </section>

    <section title="Session-Sender Test Packet without IP/UDP Header" anchor="sect-4.2"><t>
   The content of an example STAMP Session-Sender test packet encapsulated over a PW 
   associated channel without using an IP/UDP header is shown in Figure 3. 
   The STAMP G-ACh header <xref target="RFC5586"/> 
   with new STAMP Session-Sender G-ACh type (value TBD1) MUST immediately follow the bottom of the MPLS label stack.
   The payload contains the STAMP 
   Session-Sender test packet defined in <xref target="RFC8972"/>.</t>


    <figure title="Example Session-Sender Test Packet without IP/UDP Header" anchor="ure-stamp-sender-packet2"><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                Label(1)               | TC  |S|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 .                                                               .
 .                                                               .
 .                                                               .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                PW Label               | TC  |1|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |0 0 0 1|Version|    Reserved   | STAMP Sender G-ACh (TBD1)     |
 +---------------------------------------------------------------+
 | Payload = Test Packet as specified in Section 3 of RFC 8972   |
 .           in Figure 1 and Figure 3                            .
 .                                                               .
 +---------------------------------------------------------------+
 | Optional STAMP TLVs defined in RFC 8972                       |
 .                                                               .
 +---------------------------------------------------------------+
]]></artwork>
    </figure>

    <t>The STAMP Session-Sender test packet G-ACh header contains following fields:</t>

    <t><list style="hanging" hangIndent="2">

    <t hangText="Version:">
       The Version field is set to 0, as defined in <xref target="RFC4385"/>.
    </t>
  
    <t hangText="Reserved:">
       Reserved Bits MUST be set to zero upon transmission and ignored upon receipt.
    </t>

    <t hangText="Channel Type:">
       G-ACh channel type for STAMP Session-Sender packet (TBD1). 
    </t>

    </list>
    </t>

    </section>

    </section>

   <section title="Session-Reflector Test Packet" anchor="sect-5"><t>
   The STAMP Session-Reflector reply test packet is sent on the same path 
   in the reverse direction of a bidirectional PW. The STAMP test packet can 
   be sent using an MPLS header with or without IP/UDP header.
   The Session-Reflector test packet is sent with an IP/UDP header 
   if the Session-Sender test packet is received with an IP/UDP 
   header, otherwise, it is sent without an IP/UDP header.
   </t>

   <section title="Session-Reflector Test Packet with IP/UDP Header" anchor="sect-5.1"><t>
   The content of an example STAMP Session-Reflector test packet encapsulated over a PW 
   associated channel using an IP/UDP header is shown in Figure 4. 
   The STAMP G-ACh header <xref target="RFC5586"/> 
   with G-ACh MUST immediately follow the bottom of the MPLS label stack.
   The payload contains the STAMP Session-Reflector test 
   packet defined in <xref target="RFC8972"/>.
   </t>

   <t>The STAMP Session-Reflector reply test packet MUST use the IP/UDP 
   information from the received test packet when an IP/UDP header 
   is present in the received test packet.
   </t>

   <figure title="Example Session-Reflector Test Packet with IP/UDP Header" anchor="ure-test-reply-packet1"><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                Label(1)               | TC  |S|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 .                                                               .
 .                                                               .
 .                                                               .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                PW Label               | TC  |1|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |0 0 0 1|Version|    Reserved   | IPv4 (0x0021) or IPv6 (0x0057)| 
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 | IP Header                                                     |
 .  Source IP Address = Session-Reflector IPv4 or IPv6 Address   .
 .  Destination IP Address                                       .
 .              = Source IP Address from Received Test Packet    .
 .                                                               .
 +---------------------------------------------------------------+
 | UDP Header                                                    |
 .  Source Port = As chosen by Session-Reflector                 .
 .  Destination Port = Source Port from Received Test Packet     .
 .                                                               .
 +---------------------------------------------------------------+
 | Payload = Test Packet as specified in Section 3 of RFC 8972   |
 .           in Figure 2 and Figure 4                            .
 .                                                               .
 +---------------------------------------------------------------+
 | Optional STAMP TLVs defined in RFC 8972                       |
 .                                                               .
 +---------------------------------------------------------------+
]]></artwork>
    </figure>

    <t>The STAMP Session-Reflector test packet G-ACh header contains following fields:</t>

    <t><list style="hanging" hangIndent="2">

    <t hangText="Version:">
       The Version field is set to 0, as defined in <xref target="RFC4385"/>.
    </t>
  
    <t hangText="Reserved:">
       Reserved Bits MUST be set to zero upon transmission and ignored upon receipt.
    </t>

    <t hangText="Channel Type:">
       G-ACh channel type for IPv4 header (0x0021) or IPv6 header (0x0057) <xref target="RFC4385"/>. 
    </t>

    </list>
    </t>


   </section>

   <section title="Session-Reflector Test Packet without IP/UDP Header" anchor="sect-5.2"><t>
   The content of an example STAMP Session-Reflector test packet encapsulated over a PW 
   associated channel without using an IP/UDP header is shown in Figure 5. 
   The STAMP G-ACh header <xref target="RFC5586"/> with new STAMP Session-Reflector  
   G-ACh type (value TBD2) MUST immediately follow the bottom of 
   the MPLS label stack.  The payload contains the STAMP 
   Session-Reflector test packet defined in <xref target="RFC8972"/>.
   </t>

   <t>The STAMP Session-Reflector reflects the test packet back to the 
   Session-Sender using the same channel of the reverse direction of the PW 
   on which it was received.  The Session-Reflector has enough information to 
   reflect the test packet received by it to the Session-Sender 
   using the PW context.
   </t>

   <figure title="Example Session-Reflector Test Packet without IP/UDP Header" anchor="ure-test-reply-packet2"><artwork><![CDATA[
  0                   1                   2                   3
  0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                Label(1)               | TC  |S|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 .                                                               .
 .                                                               .
 .                                                               .
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |                PW Label               | TC  |1|      TTL      |
 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 |0 0 0 1|Version|    Reserved   | STAMP Reflector G-ACh (TBD2)  |
 +---------------------------------------------------------------+
 | Payload = Test Packet as specified in Section 3 of RFC 8972   |
 .           in Figure 2 and Figure 4                            .
 .                                                               .
 +---------------------------------------------------------------+
]]></artwork>
    </figure>

    <t>The STAMP Session-Reflector test packet G-ACh header contains following fields:</t>

    <t><list style="hanging" hangIndent="2">

    <t hangText="Version:">
       The Version field is set to 0, as defined in <xref target="RFC4385"/>.
    </t>
  
    <t hangText="Reserved:">
       Reserved Bits MUST be set to zero upon transmission and ignored upon receipt.
    </t>

    <t hangText="Channel Type:">
       G-ACh channel type for STAMP Session-Reflector packet (TBD2). 
    </t>

    </list>
    </t>

    </section>

    </section>

 
   <section title="Security Considerations" anchor="sect-6"><t>
   The usage of STAMP protocol is intended for deployment in limited
   domains <xref target="RFC8799"/>. As such, it assumes that a node 
   involved in STAMP protocol operation has previously verified the integrity 
   of the path and the identity of the far-end STAMP Session-Reflector.</t>

   <t>If desired, attacks can be mitigated by performing basic validation
   and sanity checks, at the STAMP Session-Sender, of the counter or timestamp fields
   in received reply test packets.  The minimal state
   associated with these protocols also limits the extent of 
   disruption that can be caused by a corrupt or invalid packet to a
   single test cycle.</t>

   <t>Use of HMAC-SHA-256 in the authenticated mode protects the data
   integrity of the test packets. Cryptographic measures may be enhanced 
   by the correct configuration of access-control lists and firewalls.</t>

   <t>The security considerations specified in <xref target="RFC8762"/>
   and <xref target="RFC8972"/> also apply to the procedure
   described in this document. Specifically,
   the message integrity protection using HMAC, as defined in <xref target="RFC8762"/>
   Section 4.4, also apply to the procedure described in this document.
   </t> 

   <t>Routers that support G-ACh are subject to the same security
   considerations as defined in <xref target="RFC4385"/> and <xref target="RFC5586"/>.</t>

    </section>

    <section title="IANA Considerations" anchor="sect-7">
  
    <t>IANA maintains G-ACh Type Registry 
    (see <eref target="https://www.iana.org/assignments/g-ach-parameters/g-ach-parameters.xhtml"/>).  
    IANA is requested to allocate values for the STAMP G-ACh Types 
    from "MPLS Generalized Associated Channel (G-ACh) 
    Types (including Pseudowire Associated Channel Types)" registry.</t>

    <texttable anchor="iana-gach-tbl" title="STAMP G-ACh Type">

    <ttcol align="left">Value</ttcol>
    <ttcol align="left">Description</ttcol>
    <ttcol align="left">Reference</ttcol>
    <c>TBD1</c>
    <c>STAMP Session-Sender G-ACh Type</c>
    <c>This document</c>
    <c>TBD2</c>
    <c>STAMP Session-Reflector G-ACh Type</c>
    <c>This document</c>
    </texttable>

    </section>


    </middle>

    <back>
    <references title="Normative References">
    &RFC2119; 
    &RFC4385;
    &RFC5586;
    &RFC8174;
    &RFC8762;
    &RFC8972;
    </references>
    <references title="Informative References">
    &RFC5082;
    &RFC6658;
    &RFC8799;
    &I-D.schmutzer-bess-ple;

    </references>
    <section title="Acknowledgments" numbered="no" anchor="acknowledgments"><t>
    TBA.</t>

    </section>

    </back>

    </rfc>
