Internet Draft Simon Leinen Document: draft-leinen-ipfix-eval-contrib-00.txt SWITCH Expires: April 2003 October 2002 Individual Evaluation Of IPFIX Protocol Candidates Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of [RFC 2026]. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Distribution of this document is unlimited. Copyright Notice Copyright (C) The Internet Society (2002). All Rights Reserved. Abstract This document contains one individual evaluation team member's contribution to the selection process for an IP Flow Information Export (IPFIX) protocol. The five candidate protocols are outlined and grouped in broad categories, and evaluated against specific requirements. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 1] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 Table of Contents 1 Introduction ................................................. 3 2 Protocol Summaries ........................................... 3 2.1 CRANE ...................................................... 3 2.1.1 CRANE Protocol Operation ................................. 4 2.1.2 CRANE Data Encoding ...................................... 4 2.2 Diameter ................................................... 4 2.2.1 Diameter Protocol Operation .............................. 5 2.2.2 Diameter Data Encoding ................................... 5 2.3 LFAP ....................................................... 5 2.3.1 LFAP Protocol Operation .................................. 5 2.3.2 LFAP Data Encoding ....................................... 6 2.4 NetFlow v9 ................................................. 6 2.4.1 NetFlow Protocol Operation ............................... 6 2.4.2 NetFlow Data Encoding .................................... 6 2.5 Streaming IPDR ............................................. 6 2.5.1 Streaming IPDR Protocol Operation ........................ 7 2.5.2 Streaming IPDR Data Encoding ............................. 7 3 Broad Classification of Candidate Protocols .................. 7 3.1 Design Goals ............................................... 7 3.1.1 High-Performance Flow Metering (NetFlow, LFAP) ........... 7 3.1.2 Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE) ..... 8 3.1.3 General-Purpose AAA (Diameter) ........................... 8 3.2 Data Representation ........................................ 8 3.2.1 Externally Described Encoding (CRANE, IPDR, NetFlow) ..... 8 3.2.2 Partly Self-describing Encoding (Diameter, LFAP) ......... 9 3.3 Protocol Flow .............................................. 9 3.3.1 Mainly Unidirectional Protocols (IPDR, NetFlow) .......... 9 3.3.2 Bidirectional Protocols (CRANE, LFAP) .................... 9 3.3.3 Unidirectional after Negotiation (Diameter) .............. 10 4 Item-Level Compliance Evaluation ............................. 10 4.1 Meter Reliability (5.1) .................................... 10 4.2 Sampling (5.2) ............................................. 11 4.3 Overload Behaviour (5.3) ................................... 11 4.4 Information Model (6.1) .................................... 12 4.5 Data Model (6.2) ........................................... 12 4.5.1 Data Model Extensibility ................................. 12 4.5.2 Flexible Flow Record Definition .......................... 13 4.6 Data Transfer (6.3) ........................................ 13 4.6.1 Congestion Awareness (6.3.1) ............................. 13 4.6.2 Reliability (6.3.2) ...................................... 13 4.6.3 Security (6.3.2) ......................................... 14 4.6.3.1 IPSEC and TLS .......................................... 14 4.6.3.2 Application-level Security ............................. 14 4.6.4 Push and Pull Mode Reporting (6.4) ....................... 15 4.6.5 Regular Reporting Interval (6.5) ......................... 15 4.6.6 Notification on Specific Events (6.6) .................... 15 4.6.7 Anonymization (6.7) ...................................... 16 4.6.8 Several Collecting Processes (8.3) ....................... 16 Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 2] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 5 Opinionated Conclusions ...................................... 16 6 Security Considerations ...................................... 18 7 References ................................................... 18 8 Author's Address ............................................. 19 9 Full Copyright Statement ..................................... 20 1. Introduction The IP Flow Information Export (IPFIX) Working Group has been chartered to select a protocol for the export of flow information from traffic-observing devices (such as routers or dedicated probes). To this end, an evaluation team was formed to evaluate submitted protocols. Each protocol is represented by an advocate, who submitted a specific evaluation draft for the respective protocol against the requirements document [IPFIX-REQ]. The specification of each protocol was itself available as one or several Internet-Drafts, sometimes referring normatively to documents from outside the IETF. This document contains the author's personal evaluation of the submitted protocols with respect to the requirements document, and on a more general level, to the working group charter. It is intended to serve as input for the deliberations of the evaluation team. The following IPFIX candidate protocol submissions were evaluated: - CRANE [CRANE], [CRANE-EVAL] - Diameter [DIAMETER], [DIAMETER-EVAL] - LFAP [LFAP], [LFAP-EVAL] - NetFlow v9 [NETFLOWV9], [NETFLOWV9-EVAL] - Streaming IPDR [IPDR], [IPDR-EVAL] This document uses terminology defined in [IPFIX-REQ] intermixed with that from submissions to explain the mapping between the two. 2. Protocol Summaries In the following, each candidate protocol is described briefly, highlighting its specific distinguishing features. 2.1. CRANE XACCT's Common Reliable Accounting for Network Element Protocol Version 1.0 [CRANE] [CRANE-EVAL] is described as a protocol for the transmission of accounting information from "Network Elements" to "mediation" and "business support systems". Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 3] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 2.1.1. CRANE Protocol Operation The exporting side is the CRANE client, the collecting side the CRANE server. Note that it is the server that is responsible for initiating the connection to the client. A client can have multiple simultaneous connections to different servers for robustness. Each server has an associated priority. A client only exports to the server with the highest priority that is perceived operational. Clients and servers exchange messages over a reliable protocol such as TCP [TCP] or (preferably) SCTP [SCTP]. The protocol uses application-layer acknowledgements as an indication of successful processing by the server. Strong authentication or data confidentiality aren't support by the protocol, but can be supported by lower-layer mechanisms such as IPSEC [IPSEC] or TLS [TLS]. The protocol is bidirectional over the entire duration of a session. There are 20 different message types. The protocol supports template negotiation, not only at startup but also later on in a session, as well as general status inquiries. There is a separate version negotiation protocol defined over UDP. 2.1.2. CRANE Data Encoding Data encoding is based on templates. Templates contain "keys" representing items in data records. Clients (exporters) publish templates to servers (collectors). Servers can then select the subset of fields in a template that they are interested in. The client will suppress keys that haven't been selected by the server. Data records contain references to template and configuration instances. They also carry sequence numbers (DSNs for Data Sequence Numbers). These sequence numbers can be used to de-duplicate data records that have been delivered multiple times during failover/fail- back in redundant configurations. A "duplicate" bit is set in these situations as a hint for the de-duplication process. The encoding of (flow information) data records themselves is very compact. The client (exporter) can choose to send data in big-endian (network byte order) or little-endian format. There are eighteen fixed-size key types, as well as five variable-length string and binary data (BLOB) types. 2.2. Diameter Diameter [DIAMETER] [DIAMETER-EVAL] is an evolution of the Remote Authentication Dial In User Service (RADIUS) protocol [RADIUS]. RADIUS is widely used to outsource authentication and authorization in dialup access environments. Diameter is a generalized and extensible protocol intended to support Authentication, Authorization Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 4] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 and Accounting (AAA) requirements of different applications. Dialup and Mobile IPv4 are examples of such applications defined in the IETF. 2.2.1. Diameter Protocol Operation Diameter is a peer-to-peer protocol. The base protocol defines fourteen command codes, organized as seven request/response command pairs. Presumably, only a subset of these would be used in a pure IPFIX application. Diameter includes capability negotiation and error notifications. Diameter operates over TCP or (preferred) SCTP. There is a framework for end-to-end security, the mechanisms for which are defined in a separate document. IPSEC or TLS can be used to provide authentication or encryption at the underlying layers. 2.2.2. Diameter Data Encoding Diameter conveys data in the form of attribute/value pairs (AVPs). An AVP consists of eight bytes of header plus the space to store the data, which depends on the data format. There are numerous predefined AVP data formats, including signed and unsigned integer types, each in 32 and 64 bit variants, IPv4 and IPv6 addresses, as well as others. The advocacy draft [DIAMETER-EVAL] suggests that the predefined data formats IPFilterRule and/or QoSFilterRule could be extended to represent IP Flow Information. Such rules are represented as readable UTF-8 strings. Alternatively, new AVPs could be defined to represent flow information. 2.3. LFAP LFAP [LFAP] [LFAP-DATA] [LFAP-EVAL] started out as the "Lightweight Flow Admission Protocol" and was used to outsource shortcut creation decisions on flow-based routers, as well as to provide per-flow statistics. Later versions removed the admission function and changed the name to "Lightweight Flow Accounting Protocol" 2.3.1. LFAP Protocol Operation The exporter in LFAP is called the Connection Control Entity (CCE), and the collector is the Flow Accounting Server (FAS). These entities communicate with each other over a TCP connection. LFAP knows thirteen message types, including operations for connection management, version negotiation, flow information messages and administrative requests. Authentication and encryption can be provided by IPSEC or TLS at lower layers. Additionally, the LFAP protocol itself supports four levels of security using HMAC-MD5 authentication and DES-CBC encryption. A distinguishing feature is that LFAP has two different message types for flow information: A Flow Accounting Request (FAR) message is sent Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 5] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 when a new flow is identified at the CCE (meter/exporter). Accounting information is sent later in one or multiple Flow Update Notification (FUN) messages. A collector must match each FUN to a Flow ID previously sent in a FAR. The LFAP document also defines a set of useful statistics about the accounting process. A separate MIB document [LFAP-MIB] is provided for management of LFAP entities using SNMP. 2.3.2. LFAP Data Encoding LFAP encodes data in a Type/Length/Value format with four bytes of overhead per data item (two bytes for the type and two bytes for the length field). 2.4. NetFlow v9 NetFlow v9 [NETFLOWV9] [NETFLOWV9-EVAL] is a generalized version of Cisco's NetFlow protocol. Previous versions of NetFlow, in particular version 5, have been widely implemented and used for the exporting and collecting of IP flow information. 2.4.1. NetFlow Protocol Operation NetFlow uses a very simple protocol, with the exporter sending template, options, and data "FlowSets" to the collector. FlowSets are sequences of data records of similar format. NetFlow is the only one of the candidate protocols that has always worked over UDP [UDP]. Because of the simple unidirectional nature of the protocol, it should be relatively straightforward to add mappings to other transport protocols such as SCTP or TCP. The current NetFlow v9 draft fails to specify such a mapping, but the advocacy draft suggests an SCTP transport to make NetFlow congestion-friendly. 2.4.2. NetFlow Data Encoding NetFlow v9 uses a template facility to describe exported data. The data itself is represented in a compact way using network byte order. 2.5. Streaming IPDR Streaming IPDR [IPDR] [IPDR-EVAL] is an application of the Network Data Management-Usage (NDM-U) For IP Services specification version 3.1 [NDM-U-3.1]. It has been developed by the Internet Protocol Detail Record Organization (IPDR, Inc. or ipdr.org). The terminology used is similar to CRANE's, talking about Service Elements (SEs), mediation systems and Business Support Systems (BSS). Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 6] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 2.5.1. Streaming IPDR Protocol Operation Streaming IPDR operates over TCP. There is a "Trivial TCP Delivery" mode as well as an "Acknowledged TCP Delivery" or "Reliable Streaming" mode. The latter uses application-layer acknowledgements for increased reliability. The protocol is basically unidirectional. The exporter opens a connection towards the collector, then sends a header followed by a set of record descriptors. Then it can send "Usage Event" records corresponding to these descriptors until the connection is terminated. New record descriptors can be sent at any time. Messages carry sequence numbers that are used for de-duplication during failover. They are also referenced by application-level acknowledgements when Reliable Streaming is used. 2.5.2. Streaming IPDR Data Encoding IPDR uses an information modeling technique based on the XML-Schema language [XML]. Data can be represented in XML or in a streamlined encoding based on the External Data Representation [XDR]. XDR forms the basis of Sun's Remote Procedure Call and Network File System protocols, and has proven to be both space- and processing-efficient. 3. Broad Classification of Candidate Protocols In order to evaluate the candidate protocols against the higher-level requirements laid out in the IPFIX Working Group charter, it is useful to group them into broader categories. 3.1. Design Goals One way to look at the candidate protocols is to study the goals that have directed their respective design. Note that the intention is not to exclude protocols that have been designed with a different class of applications in mind, but simply to better understand the different tradeoffs that distinguish the protocols. 3.1.1. High-Performance Flow Metering (NetFlow, LFAP) Of the candidate protocols, Cisco's NetFlow is the purest example of a highly specialized protocol that has been designed with the sole objective of conveying accounting data from flow-aware routers at high rates. Starting from a fixed set of accounting fields, it has been extended a few times over the years to support additional fields and various types of aggregation in the metering/exporting process. Riverstone's LFAP is similarily focused, except that it originated in a protocol to outsource the decision whether to create shortcuts in flow-based routers. This is still manifest in an increased emphasis Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 7] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 on reliable operation, and in the split reporting of flow information using Flow Accounting Request (FAR) and Flow Update Notification (FUN) messages. It has been pointed out that split reporting as done by LFAP can reduce memory requirements at the exporter. This concerns a subset of attributes that are neither "key" attributes which define flows, nor attributes such as packet or byte counters that must be updated for each packet anyway. On the other hand, when there are many short-lived flows, the number of flow export messages will be significantly higher than with "unitary" flow export models, and the collector will have to keep state about active flows until they are terminated. 3.1.2. Carrier-Grade Multi-Purpose Accounting (IPDR, CRANE) Streaming IPDR and CRANE describe themselves as protocols to facilitate the reliable transfer of accounting information between Network Elements (or more generally "Service Elements" in the case of IPDR) and Mediation Systems or Business Support Systems (BSS). They reflect a view of the accounting problem and of network system architectures that originates in traditional "vertically integrated" telecommunications. Both protocols also emphasize extensibility with the goal of applicability to a wide range of accounting tasks. IPDR is based on NDM-U, which uses the XML-Schema language for machine-readable specification of accounting data structures, while using the efficient XDR encoding for the actual data transfer. CRANE uses templates to describe exported data. These templates are negotiated between collector and exporter and can change during a session. 3.1.3. General-Purpose AAA (Diameter) Diameter is another example of a broader-purpose protocol, in that it covers aspects of authentication and authorization as well as accounting. This explains its strong emphasis on security and reliability. The design also takes into account various types of intermediate agents. 3.2. Data Representation IPFIX is intended to be deployed, among others, in high-speed routers and to be used for exporting detailed flow data at high flow rates. Therefore it is useful to look at the tradeoffs between the efficiency of data representation and the extensibility of data models. The two main efficiency goals should be (1) to minimize the Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 8] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 export data rate and (2) to minimize data encoding overhead in the exporter. The overhead of decoding flow data at the collector is deemed less critical, and is partly covered by efficiency target (2), since an encoding that is easy on the encoder is often also easy on the decoder. 3.2.1. Externally Described Encoding (CRANE, IPDR, NetFlow) The protcols in this group use an external mechanism to fully describe the format in which flow data is encoded. The mechanisms are "templates" in the case of CRANE and NetFlow, and a subset of the XML-Schema language, or alternatively XDR IDL, for IPDR. A fully external data format description allows for very compact encoding, with data components such as 32-bit integers taking up only four octets. The XDR representation used in IPDR additionally ensures that larger fields are always aligned on 32-bit boundaries, which can reduce processing requirements at both the exporter and the collector, at a slight cost of space (thus bandwidth) due to padding. Most protocols specify "network byte order" or "big-endian" format in the export data format. CRANE is the only protocol where the exporter may choose the byte ordering. The principal benefit is that this lowers the processing demand on exporters based on little-endian architectures. 3.2.2. Partly Self-describing Encoding (Diameter, LFAP) Diameter and LFAP represent flow data using Type/Length/Value encodings. While this makes it possible to partly decode flow data without full context information - possibly useful for debugging - it does increase the encoding size and thus the bandwidth requirements both on the wire and in the exporter and collector. LFAP has a "multi-record" encoding which claims to provide similar wire efficiency as the externally described encodings while still supporting diagnostic tools. 3.3. Protocol Flow Another criterion for classification is the flow of protocol messages between exporter and collector. 3.3.1. Mainly Unidirectional Protocols (IPDR, NetFlow) In IPDR and NetFlow, the data flow is essentially from exporter to collector, with the collector only sending acknowledgements. The protocols send data descriptions (templates) on session establishment, and then start sending flow export data based on these templates. "Meta-information" about the operational status of the Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 9] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 metering and exporting processes (for example about the sampling parameters in force at a given moment) is conveyed using a special type of "Option" template in NetFlow v9. IPDR currently doesn't have definitions for such "meta-data" types, but they could easily be defined outside the protocol proper. 3.3.2. Bidirectional Protocols (CRANE, LFAP) CRANE allows for negotiation of the templates used for data export at the start of a session, and also allows negotiated template updates later on. CRANE sessions include an exporter and potentially several collectors, so these negotiations can involve more than two parties. LFAP has an initial phase of version negotiation, followed by a phase of "data negotiation". After these startup phases, the exporter sends FAR and FUN messages to the collector. However, either party may also send Administrative Request (AR) messages to the other, and will normally receive Administrative Request Answers (ARA) in response. Administrative Requests can be used for status inquiries, including information about a specific active flow, or for negotiation of the "Information Elements" that the collector wants the exporter to export. 3.3.3. Unidirectional after Negotiation (Diameter) Diameter has a general capabilities negotiation mechanism. The use of Diameter for IPFIX hasn't been described in sufficient detail to determine how capabilities negotiation would be used. After negotiation, the protocol would operate in essentially unidirectional mode, with Accounting-Request (ACR) messages flowing from the exporter to the collector, and Accounting-Answer (ACA) messages flowing back. 4. Item-Level Compliance Evaluation The template for protocol advocates noted that not all requirements in [IPFIX-REQ] apply directly to the flow export protocol. In particular, sections 4 (Distinguishing Flows) and 5 (Metering Process) mainly specify requirements on the metering mechanism that "feeds" the exporter. However, in some cases they require information about the metering process to be reported to collectors, so the flow export protocol must support conveying this information. 4.1. Meter Reliability (5.1) CRANE, Diameter, IPDR consider requirement 5.1 (reliability of the metering process or indication of "missing reliability" out of scope for the IPFIX protocol, which presumably means that they assume the metering process to be reliable. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 10] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 The NetFlow v9 advocacy draft takes a similar stance when it claims "Total Compliance. The metering process is reliable." (although this has been documented not to be true for all current Cisco implementations of NetFlow v5). LFAP is the only protocol that explicitly addresses the possibility that data might be lost in the metering process, and provides useful statistics the collectors to estimate not just the amount of flow data that was lost, but also the amount of data not unaccounted for. Note that in the general case, it can be considered unrealistic to assume total reliability of a flow-based metering process in all situations, unless sampling or coarse flow definitions are used. With the fine-grained flow classification mechanisms mandated by IPFIX, it is easy to imagine traffic where each - possibly very small - packet would create a new flow. This kind of traffic is in fact encountered in practice during aggressive port scans, and will eventually lead to table overflows or exceeding of memory bandwidth at the meter. While some of these situations can be handled by dropping data later on in the exporter, data transfer, or collector, or by transitioning the meter to sampling mode (or increasing the sampling interval), it will sometimes be considered the lesser evil to simply report on the data that couldn't be accounted for. Currently LFAP is the only protocol that supports this. 4.2. Sampling (5.2) CRANE and IPDR don't mention the possibility of sampling. This is natural because they are targeted towards telco-grade accounting, where sampling would be considered inadmissible. Since support for sampling is a "MAY" requirement, its lack could be tolerated, but severely restricts the applicability of these protocols in places of high aggregation, where absolute precision is not necessary. This includes applications such as traffic profiling, traffic engineering, and large-scale attack/intrusion detection, but also usage-based accounting applications where charging based on sampling is agreed upon. The Diameter advocate acknowledges the existence of sampling and suggests to define new (grouped) AVPs to carry information about the sampling parameters in use. LFAP does not currently support sampling, although its advocate contends that adding support for this would be relatively straightforward, without going into too much detail. NetFlow v9 does support sampling (and many implementations and deployments of sampled NetFlow exist for previous NetFlow versions). Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 11] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 Option Data is supposed to convey sampling configuration, although no sampling-related field types have yet been defined in the draft. 4.3. Overload Behaviour (5.3) The requirements document suggests that meters adapt to overload situations, for example by changing to sampling (or reducing the sampling rate if sampling is already in effect), by changing the flow definition to coarser flow categories (thinning), by stopping to meter, or by reducing packet processing. In these situations, the requirements document mandates that flow information from before the modification of metering behavior can be cleanly distinguished from flow information from after the modification. For the suggested mitigation methods of sampling or thinning, this essentially means that all existing flows have to be expired, and an entirely new set of flows must be started. This is undesirable because it causes a peak of resource usage in an already overloaded situation. LFAP and NetFlow claim to handle this requirement, both by supporting only the simple overload mitigation methods that don't require the entire set of existing flows to be expired. The NetFlow advocate claims that the reporting requirement could be easily met by expiring existing flows with the old template, while sending a new template for new flows. While it is true that NetFlow handles this requirement in a very graceful manner, the general performance issue remains. CRANE, Diameter, and IPDR consider the requirement out of scope for the protocol, although Diameter summarily acknowledges the possible need for new AVP definitions related to mitigation methods. 4.4. Information Model (6.1) All candidate protocols have information models that can represent all required and all optional attributes. The Diameter contribution lacks some detail on how exactly the IPFIX-specific attributes should be mapped. 4.5. Data Model (6.2) 4.5.1. Data Model Extensibility Each candidate protocol defines a data model that allows for some degree of extensibility. CRANE uses Keys to specify fields in templates. A key "specification MUST consist of the description and the data type of the accounting item." Apparently extensibility is intended, but I'm not sure whether Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 12] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 adding a new Key really only involves writing a textual description and deciding upon a base type. Every Key also has a 32-bit Key ID, but from the current specification they don't seem to carry global semantics. Diameter's Attribute/Value Pairs (AVP) have a 32-bit identifier (AVP Code) administered by IANA. In addition, there is an optional 32-bit Vendor-ID that can contain an SMI Enterprise Number for vendor- defined attributes. If the Vendor-ID (and a corresponding flag in the attribute) is set, the AVP Code becomes local to that vendor. IPDR uses a subset of the XML-Schema language for extensibility, thus allowing for vendor- and application-specific extensions of the data model. In LFAP, flow attributes are defined as Information Elements. There is a 16-bit IE type code (which is carried in the export protocol for every IE). One type code is reserved for vendor-specific extensions. Arbitrary sub-types of the vendor-specific IE can be defined using ASN.1 Object IDs (OIDs). In NetFlow v9 as reviewed, data items are identified by a sixteen-bit field type. 26 field types are defined in the draft. The draft suggests to look check a Web page at Cisco Systems' site for the current list of field types. It would be preferable if the administration of the field type space would be delegated to IANA. 4.5.2. Flexible Flow Record Definition All protocols allow for flexible flow record definitions. CRANE and LFAP make the selection/negotiation of the attributes to be included in flow records a part of the protocol, the other protocols leave this to outside configuration mechanisms. 4.6. Data Transfer (6.3) 4.6.1. Congestion Awareness (6.3.1) All protocols except for NetFlow v9 operate over a single TCP or SCTP transport connection, and inherit the congestion-friendliness of these protcols. NetFlow v9 has been defined to operate over UDP, but claims to be transport-independent and could also be mapped on SCTP or TCP as a transport protocol. The details of such mappings haven't been specified, although doing so should have been straightforward given the unidirectional nature of this protocol. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 13] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 4.6.2. Reliability (6.3.2) As of the time of this writing, the reliability requirement hasn't yet been satisfactorily defined in the requirements draft. Here are a few observations regarding the candidate protocols' approaches to reliability. Note that the requirement for multiple collectors (8.3) also touches on the issue of reliability. CRANE, Diameter, and IPDR, as protocols that strive to be carrier- grade accounting protocols, understandably exhibit a strong emphasis on near-total reliability of the flow export process. All three protocols use application-level acknowledgements (in case of IPDR, optionally) to include the entire collection process in the feedback loop. Indications of "lack of reliability" (lost flow data) are somewhat unnatural to these protocols, because they take every effort to never lose anything. These protocols seem suitable in situations where one would rather drop a packet than forward it unaccounted for. LFAP has application-level acknowledgements, and it also reports detailed statistics about lost flows and the amount of data that couldn't be accounted for. It represents a middle ground in that it acknowledges that accounting reliability will sometimes be sacrificed for the benefit of other tasks, such as switching packets, and provides the tools to gracefully deal with such situations. NetFlow v9 is the only protocol for which the use of a "reliable" transport protocol is optional, and the only protocol that doesn't support application-level acknowledgements. In all fairness, it should be noted that it is a very simple and efficient protocol, so in an actual deployment it might exhibit a higher level of reliability than some of the other protocols would given the same amount of resources. 4.6.3. Security (6.3.2) 4.6.3.1. IPSEC and TLS All protocols can use, and their descriptions in fact recommend to use, lower-layer security mechanisms such as IPSEC and, with the exception of NetFlow v9 over UDP, TLS. It can be argued that in all envisioned usage scenarios for IPFIX, both IPSEC and TLS provide sufficient protection against the main identified threats of flow data disclosure and forgery. The Diameter draft is the only protocol definition that goes into sufficent level of detail with respect to the application of these mechanisms, in particular the negotiation of certificates and ciphers in TLS, and the use of IKE [IKE] for IPSEC. Diameter also mandates that either IPSEC or TLS be used. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 14] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 4.6.3.2. Application-level Security Diameter suggests an additional end-to-end security framework for dealing with untrusted third-party agents. I am not entirely convinced that this additional evel of security justifies the additional complexity in the context of IPFIX. LFAP [LFAP] is the only other protocol that includes some higher- level security mechanisms, providing four levels of security including no security, authenticated peers, flow data authentication, and flow data encryption using HMAC-MD5-96 and DES-CBC. As far as I can judge - not being a security expert -, LFAP's built- in support for authentication and encryption doesn't provide significant additional security compared with the use of TLS or IPSEC. It is potentially useful in situations where TLS or IPSEC are unavailable for some reason, although in the context of IPFIX scenarios it should be possible to assume support for these lower- layer mechanisms if the participating devices are capable of the necessary cryptographic methods at all. 4.6.4. Push and Pull Mode Reporting (6.4) All protocols support the mandatory "push" mode. The optional "pull" mode could be supported relatively easily in Diameter, and is foreseen in NDM-U, the basis of the Streaming IPDR proposal. CRANE, LFAP and NetFlow don't have a "pull" mode. For CRANE and LFAP, adding one would not violate the spirit of the protocols because they are already two-way, and in fact LFAP already foresees inquiries about specific active flows using Administrative Request (AR) messages with a RETURN_INDICATED_FLOWS Command Code IE. 4.6.5. Regular Reporting Interval (6.5) It is not clear whether this ("SHOULD") requirement applies to the protocol or merely to the configurability of reporting/timeout parameters in the export process. 4.6.6. Notification on Specific Events (6.6) The specific events listed in the requirements documents as examples for "specific events" are "the arrival of the first packet of a new flow and the termination of a flow after flow timeout". For the former, only LFAP explicitly generates messages upon creation of a new flow. NetFlow always exported flow information on expiry of flows, either due to timeout or due to an indication of flow termination. The other protocols are unspecific about when flow information is exported. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 15] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 On "specific events" in general, all protocols have some mechanism that could be used for notification of asynchronous events. An example for such an event would be that the sampling rate of the meter was changed in response to a change in the load on the exporting process. CRANE has Status Request/Status Response messages, but as defined, Status Requests can only be issued by the server (collector), so they cannot be used by the server to signal asynchronous events. As in IPDR, this could be circumvented by defining templates for meta- information. Diameter could use special Accounting-Request messages for event notification. IPDR would presumably define pseudo-"Usage Events" using an XML Schema so that events can be reported along with usage data. LFAP has Administrative Requests (AR) that can be initiated from either side. The currently defined ARs are all information inquiries or reconfiguration requests, but new ARs could be defined to provide unsolicited information about specific asynchronous events. The LFAP MIB also defines some traps/notifications. SNMP notifications are useful to signal events to a network management system, but they are less attractive as a mechanism to signal events that should be somehow handled by a collector. In NetFlow v9, Option Data FlowSets are defined to convey information about the metering and export processes. The current draft specifies that Option Data should be exported periodically, although this requirement will be relaxed for asynchronous events. It should be noted that periodical export of option flowsets (and also of templates) may have been considered necessary because NetFlow can run over an unreliable transport; it seems less natural when TCP or SCTP is used. 4.6.7. Anonymization (6.7) None of the protocols include explicit support for anonymization. All protocols could be extended to convey when and how anonymization is being performed by an exporter, using mechanisms similar to those that would be used to report on sampling. However it can be argued that anonymization it more "static" in the sense that it will be either configured at the exporter or not, and that the collector can be made aware of this by means outside the IPFIX protocol. 4.6.8. Several Collecting Processes (8.3) CRANE, Diameter, and IPDR all support multiple collectors in a backup configuration. The failover case is analyzed in some detail, with Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 16] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 support for data buffering and de-duplication in failover situations. NetFlow takes a more simple-minded approach in that it allows multiple (currently: two) collectors to be configured in an exporter. Both collectors will generally receive all data and could use sequence numbers and inter-collector communication to de-duplicate them. This is a simple way to improve availability but may also be considered to be wasteful, both in terms of bandwidth and in terms of other exporter resources. With the current UDP mapping it is easy enough to send multiple copies of datagrams to different collectors, but when SCTP or TCP is used, sending all data over multiple connections will exacerbate performance issues. I don't entirely understand how failover is handled in LFAP, where flow information is separated into FAR and FUN messages. In particular, when the primary FAS A fails and the CCE starts sending to secondary FAS B, will it send B FUNs that refer to Flow IDs whose FARs had only been sent to A? 5. Security Considerations The security mechanisms of the candidate protocols were discussed in the section about the Security requirement (6.3.2). 6. Acknowledgements A draft of this document had been circulated on the ipfix-eval mailing list, and several participants provided valuable feedback, including Vamsidhar Valluri, Paul Calato, Tal Givoly, Jeff Meyer, Robert Lowe, Benoit Claise, and Carter Bullard. Many of these issues have been discussed with the other members of the IPFIX evaluation team: Juergen Quittek, Reinaldo Penno, Ram Gopal, and Mark Fullmer. However, this draft doesn't claim to represent team consensus, just the views of its author. 7. References [IPFIX-REQ] J. Quittek et al., "Requirements for IP Flow Information Export", draft-ietf-ipfix-reqs-06.txt, work in progress, September 2002. [CRANE] K. Zhang, E. Elkin, "XACCT's Common Reliable Accounting for Network Element (CRANE) Protocol Specification Version 1.0", draft-kzhang-crane-protocol-05.txt, work in progress, August 2002. [CRANE-EVAL] K. Zhang, E. Elkin, P. Ludemann, "Evaluation of the CRANE Protocol Against IPFIX Requirements", draft-kzhang-ipfix- eval-CRANE-00.txt, work in progress, September 2002. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 17] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 [DIAMETER] P. Calhoun, J. Loughney, E. Guttman, G. Zorn, J. Arkko, "Diameter Base Protocol", draft-ietf-aaa-diameter-12.txt, work in progress, July 2002. [DIAMETER-EVAL] S. Zander, "Evaluation of the Diameter Protocol Against IPFIX Requirements", draft-zander-ipfix-eval- diameter-00.txt, work in progress, September 2002. [LFAP] P. Calato, M. MacFaden, "Light-weight Flow Accounting Protocol Specification Version 5.0", draft-riverstone- lfap-01.txt, work in progress, June 2002. [LFAP-DATA] P. Calato, M. MacFaden, "Light-weight Flow Accounting Protocol Data Definition Specification Version 5.0", draft- riverstone-lfap-data-01.txt, work in progress, June 2002. [LFAP-EVAL] P. Calato, "Evaluation of Protocol LFAP Against IPFIX Requirements", draft-calato-ipfix-lfap-eval-05.txt, work in progress, August 2002. [LFAP-MIB] P. Calato, M. MacFaden, "Light-weight Flow Accounting Protocol MIB", draft-calato-lfap-mib-00.txt, work in progress, September 2002. [NETFLOWV9] B. Claise, "Cisco Systems NetFlow services Export Version 9", draft-bclaise-netflow-9-01.txt, work in progress, October 2002. [NETFLOWV9-EVAL] B. Claise, "Evaluation Of NetFlow Version 9 Against IPFIX Requirements", draft-claise-ipfix-eval-netflow-02.txt, work in progress, October 2002. [IPDR] J. Meyer, "Reliable Streaming Internet Protocol Detail Records", draft-meyer-ipdr-streaming-00.txt, work in progress, August 2002. [IPDR-EVAL] J. Meyer, "Evaluation Of Streaming IPDR Against IPFIX Requirements", draft-meyer-ipfix-IPDR-eval-00.txt, work in progress, September 2002. [NDM-U-3.1] Internet Protocol Detail Record Organization, "Network Data Management - Usage (NDM-U) For IP-Based Services Version 3.1", April 2002. [IPSEC] S. Kent, et al. "Security Architecture for the Internet Protocol", RFC 2401, November 1998. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 18] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 [IKE] D. Harkins, D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998. [TLS] T. Dierks, et al. "The TLS Protocol, Version 1.0", RFC 2246, January 1999. [RADIUS] C. Rigney, A. Rubens, W. Simpson, S. Willens, "Remote Authentication Dial In User Service (RADIUS)", RFC 2865, June 2000. [TCP] J. Postel, "Transmission Control Protocol", RFC 793, January 1981. [UDP] J. Postel, "User Datagram Protocol" RFC 768, August 1980. [SCTP] R. Stewart et al., "Stream Control Transmission Protocol", RFC 2960. October 2000. [XML] World Wide Web Consortium, "Extensible Markup Language (XML) 1.0", W3C XML, February 1998. [XDR] R. Srinivasan, "XDR: External Data Representation Standard", RFC 1832, August 1995. 8. Author's Address Simon Leinen SWITCH Limmatquai 138 P.O. Box 8021 Zurich Switzerland phone: +41 1 268 1530 9. Full Copyright Statement Copyright (C) The Internet Society (2002). All Rights Reserved. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 19] Internet-Draft Individual IPFIX Protocol Evaluation October 2002 followed, or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Simon Leinen draft-leinen-ipfix-eval-contrib-00.txt [Page 20] Internet-Draft Individual IPFIX Protocol Evaluation October 2002