Re: [bess] Roman Danyliw's Discuss on draft-ietf-bess-bgp-sdwan-usage-15: (with DISCUSS and COMMENT)

Linda Dunbar <linda.dunbar@futurewei.com> Wed, 04 October 2023 17:40 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 560F7C151535; Wed, 4 Oct 2023 10:40:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XBahgo7cmPpi; Wed, 4 Oct 2023 10:40:44 -0700 (PDT)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2113.outbound.protection.outlook.com [40.107.243.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52D73C14F5E0; Wed, 4 Oct 2023 10:40:44 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gKEicl0VI3+FJ/e5qfJndCQJGn5yWD1g63lb9DiAObIcWujWouAd7B8BT4ajDBUP47tj3DsblF72cWMBiPBt/CjEzDRRfOElbTAOlCb6DVgpiUBoqTGAFKVkvO8bzBx3nuq2AVR5pcMuTI4G/EoX/7LiALkwpFAlFcR5yfvRliXozhsy0WfELcVpZx8r2YgQKdf0JxZGCr2KazMvD2fm/fhioYQRKJmOBP0XtWB09z/jGrh22Yx/syZkT1J1FUaLPgko/i2O9RrEVELTqy4af9IMV67PqUWRqin3xNAkrjnAIKdbMNtUNA1Sp5htGMnlCYjpHaW2jyfa90TSGnCpeg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=OjVGA1Ict0L7t1vu+mDACLGWIM1dcm3WC9X6vnPjMuU=; b=BKqivnIXVE2FSwC582wvjlZCPRNKYpBbq0RZjvCOIwgLkCB8b+FyyQrRywihynTC1cH7Qz5zunLaSP2yWyRPVoY1MioEP8Mk5JLso+rpom57e8cUc60Uk/dR8LknvV9ewNL7R4iwruVtANImPKXFVZWuipAD8jAzFNZVEJk8Oe5mxnrQ5d890Go7+WZc/fyOFIUKu/yDi16IDI7Tm/rEqGLvgT9inw3ThapVhCjeOTnbMRTVRI4UH2sRIu8XUWj2oNIaVteh2NTZNKnQyClzEAMLvlEj107+g8UHCqmA3G0KGtXtId5aDgIBHlronZ9USm6Ujpwfpi6P/Ld2zhsg+w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OjVGA1Ict0L7t1vu+mDACLGWIM1dcm3WC9X6vnPjMuU=; b=oQDLjPCELmamRQ64n22JD8V4rrxBBCSaJr/RPMv+kh6x72oxGil9VZkK8HMAZCYqeoTCnRt/uPkqIW9PXgdc6SfSyqJcbmw5lJBxi85YRavWJMwnczbZBtiFv3xlGMPGlHuBVEDtDV90BXtws49MOlv+wSIZzHT/aJVnaVDd87M=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by MW5PR13MB5902.namprd13.prod.outlook.com (2603:10b6:303:1c9::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.28; Wed, 4 Oct 2023 17:40:34 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::77bf:7671:e667:5fb2]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::77bf:7671:e667:5fb2%6]) with mapi id 15.20.6838.033; Wed, 4 Oct 2023 17:40:34 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-bess-bgp-sdwan-usage@ietf.org" <draft-ietf-bess-bgp-sdwan-usage@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "matthew.bocci@nokia.com" <matthew.bocci@nokia.com>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-bess-bgp-sdwan-usage-15: (with DISCUSS and COMMENT)
Thread-Index: AQHZ9aAFT9RmOjQY0E+UUl4KxhwJC7A5u0kQ
Date: Wed, 04 Oct 2023 17:40:34 +0000
Message-ID: <CO1PR13MB49209CC37B992CBA412D7EAC85CBA@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <169629955587.62917.10801924845347298680@ietfa.amsl.com>
In-Reply-To: <169629955587.62917.10801924845347298680@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|MW5PR13MB5902:EE_
x-ms-office365-filtering-correlation-id: 2d49a1ef-1d38-4d81-89c2-08dbc501033a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR13MB4920.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(376002)(39840400004)(366004)(346002)(396003)(230922051799003)(1800799009)(451199024)(64100799003)(186009)(33656002)(55016003)(9686003)(26005)(76116006)(64756008)(110136005)(122000001)(66556008)(66946007)(66574015)(66446008)(316002)(54906003)(66476007)(71200400001)(41300700001)(4326008)(6506007)(7696005)(966005)(44832011)(38100700002)(478600001)(84970400001)(8676002)(8936002)(38070700005)(30864003)(45080400002)(83380400001)(86362001)(2906002)(5660300002)(52536014)(559001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB49209CC37B992CBA412D7EAC85CBACO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d49a1ef-1d38-4d81-89c2-08dbc501033a
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Oct 2023 17:40:34.2502 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /5QStkVymq99zct2e8SvNACuYi+lxLnmIyLfb9YAiBXMWZTF7RqfCoudCo0nXBr7YsEjC44aV6R/rhikDYBknw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW5PR13MB5902
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/-AT3GpMR6rr6-ywB5vWD7EbGk0w>
Subject: Re: [bess] Roman Danyliw's Discuss on draft-ietf-bess-bgp-sdwan-usage-15: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Oct 2023 17:40:49 -0000

Roman,

Thank you very much for the comments and review.

Please see the following resolutions to your "Discuss Points"  inserted below in BLUE and see if they have addressed your Discussion Points.

We will upload Revision 16 to include all the fixes for the issues you have pointed out.

Revision 16 also fixes the Boilerplate issue.


Linda

-----Original Message-----
From: Roman Danyliw via Datatracker <noreply@ietf.org>
Sent: Monday, October 2, 2023 9:19 PM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-bess-bgp-sdwan-usage@ietf.org; bess-chairs@ietf.org; bess@ietf.org; matthew.bocci@nokia.com; matthew.bocci@nokia.com
Subject: Roman Danyliw's Discuss on draft-ietf-bess-bgp-sdwan-usage-15: (with DISCUSS and COMMENT)

Roman Danyliw has entered the following ballot position for
draft-ietf-bess-bgp-sdwan-usage-15: Discuss

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fabout%2Fgroups%2Fiesg%2Fstatements%2Fhandling-ballot-positions%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7Ce0f19f33def14d3a436e08dbc3b724c2%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638318963621420332%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=1AqEfT2PETU0DkzNffW46zWGOLKcjuzAS6BFwnfs4oI%3D&reserved=0
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-bess-bgp-sdwan-usage%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7Ce0f19f33def14d3a436e08dbc3b724c2%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638318963621420332%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=q4E0YTYBppSon8OP%2FOv8LoIkNlGVJDD9Oh2yxRE67lg%3D&reserved=0



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

** Section 3.1.5.
   The BGP UPDATE messages must be sent over the secure channel
   (TLS, DTLS, etc.) to the RR.

Can this text say a bit more on the expectations of secure transport?  My
understanding was the IPsec was the common practice if confidentiality was
desired.  Are there pointers for BGP over DTLS? Over TLS?  The closest I was
able to find was BGP over QUIC per
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-retana-idr-bgp-quic%2F&data=05%7C01%7Clinda.dunbar%40futurewei.com%7Ce0f19f33def14d3a436e08dbc3b724c2%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638318963621420332%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=q89zUs37p1neo%2BazZNrPE2i9tdOOXGxpt4mXjHCbg3U%3D&reserved=0.

** Section 8.  This document seems to build on a number of other technologies.
Do their security considerations not apply (e.g., BGP, whatever ZTP
technologies is chosen)?


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you to Stephen Farrell for the SECDIR review.

** Section 1.  Editorial. s/Corporate HQ/corporate headquarters/.  Expand
acronym on first use.
[Linda] Fixed in version 16.

** Section 1.
     - Some traffic can be forwarded by edge nodes, based on their
       application identifiers

What are "application identifiers"?  Is an application in this context "HTTP"
or "a particular video streaming service provider"?
[Linda] Do you think adding the following statement to this bullet can address your concern?
      "An "application identifier" in this document refers to one or multiple fields of the IP header of the packets. Using IPv6 [RFC2460] packets as an example, the application identifier can be the Flow Label, the source address, a specific extension header field, or a combination of multiple IP header fields."

** Section 2.
               NSP usually provides more
               advanced network services, such as MPLS VPN, private
               leased lines, or managed Secure WAN connections, often
               within a private, trusted domain. In contrast, an ISP
               usually provides plain Internet services over public
               untrusted domains.

There is a distinction between made between NSP vs. ISP.  I understand the idea
of an NSP providing value added services.  What I could use help with is
understanding what "plain Internet service over public untrusted domains"
means.  How does an ISP provide services in a domain other than its own? As far
as I can tell, there is no subsequent text which relies on this nuanced
definition of NSP vs. ISP.

[Linda] You are correct. In the past, Network Service Providers prided themselves on selling backbone connectivity to other organizations.  Nowadays, all NSPs also call themselves ISPs. Therefore, I removed the term ISP from the document.


** Section 3.1.4.

... such as the device series number

Should this read as "serial number"?
[Linda] Yes. Changed in v-16.

** Section 3.1.4
   - Upon power-up, the SD-WAN edge can establish the transport layer
     secure connection (such as TLS, DTLS) [BCP195] to its controller,
     whose URL (or IP address) can be preconfigured on the edge device
     by manufacture default, external USB or secure Email given to the
     installer.

Can the last two configuration options be clarified.

-- per "external USB". Do you mean a USB _drive_ of some kind that is plugged
in and the edge device knows to read what ever is on the drive to configure
itself?  Does this mean anyone with physical access to the USB plug can power
cycle the machine and can reconfigure it?

--  per "secure email", does this mean that the installer configures the device
based on something typed in?  What's "secure" about the email?

Neither of these mechanisms seem like "Zero Touch".  They seems like the
definition of human-in-the-loop.
[Linda] You are correct again. The "Zero Touch" means that it is not necessary to dispatch a network engineer to the field to configure the remote device".  As stated at the beginning of the paragraph:
"SD-WAN zero-touch provisioning (ZTP) allows devices to be configured and provisioned centrally."
However, to make it clearer, I add the following note:
      ""Zero Touch Provisioning (ZTP)" means it no longer needs to dispatch a network engineer to the field to configure the remote devices."

** Section 3.1.4
     - The SD-WAN Controller authenticates the ZTP request from the
     remote SD-WAN edge with its configurations.

If only a URL is passed per the previous step, how is authentication of the
device realized?
[Linda] the pre-configuration on the device, external USP or secure Email contains the credential for the remote device to make the connection request. Added a subphrase to the bullet.

      "- Upon power-up, the SD-WAN edge can establish the transport layer secure connection (such as TLS, DTLS) [BCP195] to its controller, whose URL (or IP address) and credential for connection request can be preconfigured on the edge device by the manufacture, external USB or secure Email given to the installer."


** Section 3.1.5
   In this circumstance, the
   property of the SD-WAN edge node cannot be propagated to other nodes
   that are not authorized to communicate.
...
   Therefore, SD-WAN
   deployment needs to have a central point to distribute the
   properties of an SD-WAN edge node to its authorized peers.

-- I got confused here.  What is a property?  How do properties propagate (or
not)?

-- What does the SD-WAN distribute?  Is it a configuration or some kind of
credential?
[Linda] As this draft has been discussed in Routing Area, it was assumed that "distribution of edge property" is about distributing the network properties among the SD-WAN edges, such as its WAN port IP addresses, its attached client routes information, .
Added the following sentences to the beginning of the paragraph:
      " For an SD-WAN Edge to establish an IPsec tunnel to another one and announce the attached client routes to each other, both edges need to know each other's network properties, such as the IP addresses of the WAN ports, the edges' loopback address, the attached client routes, the supported encryption methods, etc. "



** Section 3.2
   Homogeneous Encrypted SD-WAN has some properties similar to the
   commonly deployed IPsec VPN, albeit the IPsec VPN is usually point-
   to-point among a small number of nodes and with heavy manual
   configuration for IPsec between nodes. In contrast, an SD-WAN
   network can have many edge nodes and a central controller to manage
   the configurations on the edge nodes.

There is a contrast being made that I don't understand.  If the SD-WAN can
manage the configuration of many edge notes, why can't it manage IPSec VPNs on
many edge nodes.  Doesn't Section 4.3 describe IPsec provisioning?  Aren't
IPsec VPNs part of what can secure some of the links over commodity internet
links?
[Linda] The intent is to emphasize that the traditional IPsec VPN is usually point-to-point among several nodes without an SD-WAN central controller. This draft demonstrates using BGP to scale the distribution of peer properties for IPsec VPN among many edge nodes.
Changed the text to the following:

      "Homogeneous Encrypted SD-WAN has some properties similar to the commonly deployed IPsec VPN, albeit the traditional IPsec VPN is usually point-to-point among a small number of nodes without an SD-WAN central controller. In contrast, an SD-WAN network can have many edge nodes and a central controller to manage the configurations on the edge nodes".

** Section 3.3
     Also, the connection between C-PEs and their Controller (RR) might
     be via the untrusted public network. It is necessary to encrypt
     the communication between RR and C-PEs, by TLS, DTLS, etc.

-- Is the use of TLS and DTLS are hard requirement?
[Linda] No, however, TLS/DTLS is lighter weight than creating an IPsec tunnel between C-PEs and their controller (RR)
-- Why do other sections say "secure transport (e.g., TLS, DTLS ...)"?

[Linda] Secure Transport is the right words.  Change the text to the following:
      "It is necessary to establish secure Transport (e.g., TLS, DTLS) for communication between RR and C-PEs."


** Section 3.4.  Editorial.
   Throughout this document, this scenario is also called Internet
   Offload for Private VPN, or PE-based SD-WAN.

My crude search suggest that these scenario names are not used in the rest of
the document.
[Linda] Those terms are created by MEF70.1 (MEF SD-WAN Service Attributes and Service Framework). I added the reference.

** Section 4.2.  Editorial.
   Policies are needed
   to govern which underlay paths can carry an application flow, as
   described by Section 8 of MEF70.1

Something got mangled in the document rendering.  What is "MEF70.1"?
[Linda] MEF70.1 (SD-WAN Service Attributes and Service Framework.) is the specification standardized by MEF . https://www.mef.net/resources/mef-70-1-sd-wan-service-attributes-and-service-framework/

** Section 4.3
   SD-WAN edge nodes must negotiate the supported IPsec encryption
   algorithms (AES256, AES192, AES128, etc.), the hash algorithm (SHA2
   512, SHA2 384, SHA2256, etc.), and the DH groups to establish IPsec
   tunnels between them.

Recommend removing the different algorithm names.  At the level of abstraction
of this text, it isn't clear that it is necessary to even call which IPsec
parameters need to get negotiated.

NEW
SD-WAN edge nodes must negotiate various cryptographic parameters to establish
IPsec tunnels between them.
[Linda] thank you for the suggestion. Changed.

** Section 4.3.
   For a BGP-controlled SD-WAN, BGP UPDATE
   messages can propagate each node's IPsec-related attribute values
   for peers to choose the common values supported, traditionally done
   by IPsec IKEv2 [RFC7296].

Please provide a reference to the specification which provides guidance on the
BGP TLVs to provision IPsec.  Is that draft-ietf-idr-sdwan-edge-discovery?
This should be a normative reference.

[Linda] No, this draft is only to show using the BGP update messages. It doesn't depend on the new TLVs specified  by draft-ietf-idr-sdwan-edge-discovery.

** Section 5.1

   For an SD-WAN network with a small number of nodes, the traditional
   hub and spoke model utilizing Next Hop Resolution Protocol (NHRP) or
   Dynamic Smart VPN (DSVPN)/Dynamic Multipoint VPN (DMVPN) protocol
   has been found to work reasonably well.

-- Please provide a citation to DSVPN and DMVPN?
[Linda] Both DSVPN and DMVPN are vendor specific approaches. I was told it is not appropriate to have them in the document during the Area Directors review. This one sentence was missed during the last revision. Thank you very much for pointing out. I have changed the text to the following:

      "For an SD-WAN network with a few nodes, the traditional hub and spoke model utilizing Next Hop Resolution Protocol (NHRP) or having a hub node (or controller) managing the edge nodes, including local & public addresses and tunnel identifiers mapping, has worked reasonably well."


-- What does "work[s] reasonably well" intended to convey?  Does it not "work"?
[Linda] meaning, the amount of configuration is manageable.


** Section 5.2
   In the figure below, the BGP UPDATE message from C-PE2 to RR can
   have the client routes encoded in the MP-NLRI Path Attribute and the
   IPsec Tunnel associated information encoded in the Tunnel-Encap
   [RFC9012] Path Attributes as described in the [SECURE-EVPN].

Where in [SECURE-EVPN] is this relevant guidance?  Please provide the relevant
section in the text.
[Linda] The intent is to say that "More examples are described in the [SECURE-EVPN]."

** Section 8.
   2) Potential risk of illegal traffic being injected via the
   Internet-facing WAN ports.

What is "illegal" traffic?  What are the issues of legality?  Is this perhaps
"malicious traffic" or "traffic prohibited by policy"?
[Linda] You are correct. Changed to your suggested words:


** Section 8.  The different deployment models also seem to place different
levels of trust in the service providers.  Consider mentioning these
differences.
[Linda] You are correct. Added a third security risk:
   "3) For the Differential Encrypted SD-WAN deployment model, there is a risk of unauthorized traffic injected into the Internet-facing WAN ports being leaked to the L2/L3 VPN networks."