[bess] draft-ietf-bess-evpn-geneve-08

Susan Hares <shares@ndzh.com> Thu, 17 October 2024 14:35 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 641B2C14F69C; Thu, 17 Oct 2024 07:35:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3wOXWp7bDqIp; Thu, 17 Oct 2024 07:35:40 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on2104.outbound.protection.outlook.com [40.107.96.104]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3AAFC14F686; Thu, 17 Oct 2024 07:35:39 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=SCku0p4OjTBC3ApJe3TPfrkXBOwi9Ifa1HH2BK+soNLxvvoI6ZhnG3WJQuhpw0Sd9MAgmWU4rFtA4ik8e0D8ZB+8ja1AmJHdunWLjCVwMXJvtPZTqHYoOOHrmyQmH1QU0q9I5fALGqnW/TQRRbxO/BbLCxPtcnOM2UIt0qyhkrUeIAH1hjRn5UJ3IwdQmuBuEhN2zCHbX89E29Rr5qPbySfwZTFuqN32Lw8xTdN/68mFb4IEVEffDzwIhkZ4wkPddWOzW53gbh9Meh6BaTlj5h7PmrVVQgKkU2KUpAvB9gmRsf9pWl6HQdXyQklXPDjyxERVjb3IEEWL1EdnsUUgZQ==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DSm3oIyTko9uEZoZ3F/64+Go6xHlLfnvVz9dCt1+1xs=; b=zNF14Nwa3vOdCV04rRbezik90Ob+u7aaL7Zn3r1vKbvJA3ex4fe0/caL0Dnp8KO4EKHi0VFVFy8p86yNeWx1MxQA1qGA50XHcS7sWAF8nN4w1vyLJ+0Nke0llEzqrPhjC4GAYKyIgZ++pzs8bPex34dfgCIvIDe//3YJ/YHSIjAKl8Uc0Rr7xiK6K6LyRmMZ11ZjljYnBzirNVT1OvmX1L9qmDCVYkE1IjeNhsdELXskCSDihayXTeBPtEKFOsxTPc1hubzjRJQLZKKMU0jql3EFglnfJMw8ceyUcLZGZ2Zhj6cGCV3ZTh7HdeCelcGyc/p//2ao7DBy+yi8nL4mIw==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 104.47.57.171) smtp.rcpttodomain=ietf.org smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=ndzh.com] dkim=[1,1,header.d=ndzh.com] dmarc=[1,1,header.from=ndzh.com])
Received: from MW4PR03CA0185.namprd03.prod.outlook.com (2603:10b6:303:b8::10) by BY1PR08MB9932.namprd08.prod.outlook.com (2603:10b6:a03:5bd::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8048.18; Thu, 17 Oct 2024 14:35:37 +0000
Received: from SJ1PEPF0000231F.namprd03.prod.outlook.com (2603:10b6:303:b8:cafe::f6) by MW4PR03CA0185.outlook.office365.com (2603:10b6:303:b8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.19 via Frontend Transport; Thu, 17 Oct 2024 14:35:36 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.57.171) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.57.171 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.57.171; helo=NAM11-DM6-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (13.59.96.180) by SJ1PEPF0000231F.mail.protection.outlook.com (10.167.242.235) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.8069.17 via Frontend Transport; Thu, 17 Oct 2024 14:35:36 +0000
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2171.outbound.protection.outlook.com [104.47.57.171]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id 3F8E3C9842; Thu, 17 Oct 2024 14:35:35 +0000 (UTC)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=M4mZPbRpIl1Yg3IQBq1qFrdu8qEq+CTc8xS6vttJchsj5nprD++45Wz8yNvGj99FODmtyrThic3qzyQJIIJArpIaGpoe4PcZ7nEZ5hJRtHNztFaQE2i/JcVtMpvbC1ZVmXG3VqnDbztsr5zVvSyRZh/aoa15dp/UxZvaue6HcM30biQu18DRsn3tUBAixjurKdJglaG3sT6kTQephk/J8IFQDIDhR9uy0kjLVmFaorKfUasVU3VI1u+qMaIKiM+VNA5yqdw/M1fUsb8nQ80+y/0jPAiCSvNg0lDH3OS/O6DxwONoqFvgy7idbiwbvFL0ljoIFKGidJyshsTfWw/M8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DSm3oIyTko9uEZoZ3F/64+Go6xHlLfnvVz9dCt1+1xs=; b=FDAu69Hvk3njqRa4xoFmy7VvertBjEOMNJs0xH83xaJtEV7VZN4jyBG5ISS2EZBcUsDwkQqN6mnF57zHVjINC74sG8bVIVoe/zMPm0H2kgL36sKYcVEj00FQnys6N3s6FWFiRJZ/3HGX6vvwSgPifb8MOwa03e00PIxxkF7XqL/EZzTnNYxJDyEa53Nd8Z/VnSvR2K/oBNU/KKsyUHYkHUltwguPsWmmqrIGgH/qvgwncRw10Q8PLNk+3iCbnqvEBy48TW1R9MKkpGAkuRU2V5kObY6JmRSsb7HumlSFUNXMbDuEcyLb9P6EHPV6Ee4NhP6PFTfkcIEJxmJ2V3cz8Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ndzh.com; dmarc=pass action=none header.from=ndzh.com; dkim=pass header.d=ndzh.com; arc=none
Received: from CO1PR08MB6611.namprd08.prod.outlook.com (2603:10b6:303:98::12) by PH0PR08MB8394.namprd08.prod.outlook.com (2603:10b6:510:293::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.20; Thu, 17 Oct 2024 14:35:30 +0000
Received: from CO1PR08MB6611.namprd08.prod.outlook.com ([fe80::7744:8abd:9769:c2bf]) by CO1PR08MB6611.namprd08.prod.outlook.com ([fe80::7744:8abd:9769:c2bf%5]) with mapi id 15.20.8069.016; Thu, 17 Oct 2024 14:35:29 +0000
From: Susan Hares <shares@ndzh.com>
To: BESS <bess@ietf.org>
Thread-Topic: draft-ietf-bess-evpn-geneve-08
Thread-Index: AdsgmULDNuUmHOybS4SZTJ6Jq2Jeew==
Date: Thu, 17 Oct 2024 14:35:29 +0000
Message-ID: <CO1PR08MB661161F86C0DAD524AEB3070B3472@CO1PR08MB6611.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ndzh.com;
x-ms-traffictypediagnostic: CO1PR08MB6611:EE_|PH0PR08MB8394:EE_|SJ1PEPF0000231F:EE_|BY1PR08MB9932:EE_
X-MS-Office365-Filtering-Correlation-Id: d3699e60-31b1-42a2-b27d-08dceeb8f721
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230040|376014|366016|1800799024|8096899003|38070700018;
X-Microsoft-Antispam-Message-Info-Original: UCqY2pRpD05M8tg/s36CjXSv3bj5OgF9ZkQlnM+pVEb9HLXN59ACy8UnPBiXjMu0r2H2XJt/FZBh6ksiTSjhl/6USK3DJA8YfrylETwokvaq59B5DaSqNPoFyTraj6puUz84DSm6syMvznkgLCiGXjKD9zlNujZ0gq+dsl+5ibeW3+1SGwkcJfKOGMycUMzcVWpcKJxd1WNEOwxNkkYsFV6uh6PByLxSocLi3lqBT0NgzT2J5PZwyf5ph3qj5PHVqwWM79viDiDt0kLuPYTjBGtbkAbrnnzQiqQAAzNwCOoQkgIfKjsd5bqd8DPvby2iY0YRNUjZHG/Ku29pk9vU9FR5SUznDNEtgi+uchjDyNZUSuO+b7QeOs+RKoyhpME67BDoqfoxZmf8iQ1Y9GMtShb/2j0riecRBTnFGu/xp3+JjJs71/1zJ6TBb7PntNBPDxit+RYMl6QZLCkuc4srTZk+g0xop5RKBdfBFmD5bcVxECng0g+AboaOcoSMRUpENJbAp4X3rbcdBFGfvVSW79scMTtTnEBNJ7HdBhKFKWtYYs2XuASUCA0Xm+HO7ecus9mhtkHpAVTN/IrgXwH+LGPPb8T++/N7prTCV011eKJGGSkzdLT2W4huZQuTPkjcrqpVdrhvV6xNpOnb8MNEQTW2ho22iuN/cVnGUQHibbBBoKfNjggxorRbbO2Mcj1cp/Mgmqnr9swsLxRTFtx2Y1rVo1zGV1pe++31iN5GvNbFMd91Bg3cxO7l8wyYl3yhvFSL8Az2yjEdpKsdtymkTJch7SxtAV8ASvvMHmOvjtl9VdjoV+mR3tXigv2ghx5283kDH6SvTQ4hEEqPLNf862xNnBw21wF6SC+Eb2igGranHXSX97m/iezWoMZSUCQ1jkdRe1VhB3VO096lu62SIZxcWPxtk5eQZvzmqaGCmFzoUd3SWkv9IJl8Bc6Be45NFH1+Rt9vbPgI6loYFuQbYllZ44jtv2lJ1VJQwJHeTrY/Rfitp5TNs/TmWGMTWQnTfBzW+Y61jhIjw7C0+De9+dZY05ogDUVRAHMkhff/2v50WM3H82BT6jWQQCMPBpOn99XQJUBYFWKVvHg8RHcSNgyFKzfS+xfXkq7pAnkdXhq7j8HaP23d9BChmIG9F8Zb0awlcoteYZZ0i71rT3ZTbmQyjeFzjNffDozEkDb3cCp5z30l0tdVOdmYH1q+WwIUV1HCHWbwGl2zm4sqPTZFucWFVaVQHjaYFwFcNibkZZJJTgXok/D7eBIx3sJWDuYmfBnn8JWgOZa9XKsJSVDvq+G187FkqA6eWnejrTzP5UQLn7CKjCZuSPcVpF9wAWDl
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR08MB6611.namprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(8096899003)(38070700018);DIR:OUT;SFP:1102;
Content-Type: multipart/mixed; boundary="_004_CO1PR08MB661161F86C0DAD524AEB3070B3472CO1PR08MB6611namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR08MB8394
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.57.171];domain=NAM11-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.57.171];domain=NAM11-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: SJ1PEPF0000231F.namprd03.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: d41db7f1-41d0-4af4-6397-08dceeb8f2a3
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;ARA:13230040|35042699022|376014|82310400026|36860700013|1800799024|8096899003;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:13.59.96.180;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM11-DM6-obe.outbound.protection.outlook.com;PTR:mail-dm6nam11lp2171.outbound.protection.outlook.com;CAT:NONE;SFS:(13230040)(35042699022)(376014)(82310400026)(36860700013)(1800799024)(8096899003);DIR:OUT;SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Oct 2024 14:35:36.5622 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d3699e60-31b1-42a2-b27d-08dceeb8f721
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5;Ip=[13.59.96.180];Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: SJ1PEPF0000231F.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY1PR08MB9932
Message-ID-Hash: 7QDWBXBMHKBOAK76NABQ5EQNXK7JAGXL
X-Message-ID-Hash: 7QDWBXBMHKBOAK76NABQ5EQNXK7JAGXL
X-MailFrom: shares@ndzh.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "bess-chairs@ietf.org" <bess-chairs@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [bess] draft-ietf-bess-evpn-geneve-08
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/0kDtSG-vsGj85Iffiby_z9GqpHQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>

BESS WG, BESS-chairs, and authors:

I'm excited to see draft-ietf-bess-evpn-geneve-08.  I've provided my review below and attached as a text file.

Reviewer: IDR chair per BESS chair rqequest

Summary: The draft is a great start, but needs a lot of details tied down in the draft related to the Tunnel-encapsulation attribute (TEA).

I've provided comments and outlines for what should be in the draft.

Keep going it is important work on the right track.


I'll be glad to review the tunnel encapsulation details again.

Cheers,


===========

draft-ietf-bess-evpn-geneve-08

Summary: BGP extension description is not ready yet

pro: Basic concepts are solid for a limited down deployment

Con: The specification lacks the detail to provide the following:
a) clear augmentation to existing specifications for BGP tunnel encapsulation attribute,
b) validation of tunnel endpoints,
c) interactions with PMSI,
d) normal caveats (security, manageability, and error  handling)

Issue 1: Tunnels the subTLV is valid for (perhaps a new subsection before 5.10
It is unclear which Tunnels the Geneve Tunnel Option TLV is valid for.
https://www.iana.org/assignments/bgp-tunnel-encapsulation/bgp-tunnel-encapsulation.xhtml)

This document needs to extend the specification for each tunnel to accept this new SubTLV
(per the table) that this subTLVB is valid for to include subTLVs.

Perhaps it would be useful to have IANA keep track of that.  If that would help you,
I can write a short registration draft with that information.  We could then add
the table in tunnel-encapsulation #4 to IANA.

Issue 2: Sub-TLV clear specification (a revised sectino 5.1)

It is important to understand how subTLV changes (or does not change) the validation
procedures and the error handling for the tunnel.  By the way, whether the encapsulation
tunnel is specified by the Extended-Community or the Tunnel-Encapsulation, the
validation procedure has to be clearly specified.  The Extended-Community assumes
certain values (such as egress endpoint)

Ths SubTLV outline below can help you structure your subTLV portion to include key components.
Please consider putting these in this order.  It will help people quickly review your document.


Issue 3: PMSI interactions (perhaps a new section 5.3)

RFC9012 specifies that you must provide PMSI update if you are specifying a new tunnel.
Since this encapsulation may change the PMSI interactions, please review these questions.

What we are looking for is the answers to be included in a section 5.3

Issue 4: Error handling section.

You are missing an error handling section.  What happens with malformed SubTLV or adding
subTLV to tunnel that doesn't support it.  See RFC7606.

Issue 5: Security section

Two issues need to be include:

security-issue- 1) Walled garden or not?

You propose a walled garden as the EVPN control plane operates in a walled garden.
If you are limiting your tunnels to tunnels only in an EVPN, then section 5 and 6
needs to specify the Tunnel Encapsulation tunnel types you believe are in the walled garden.

Secure-issue-2: You need to consider that Tunnels may provide hidden reaches to your EVPN walled garden.

Look at the security section in draft-ietf-idr-sr-policy-safi.  Perhaps it will help

Issue 6:  Manageability - needs to be added to the draft

You need to consider how the operator is going limit the tunnels to just the tunnels you specify.
You need to consider what configuration errors could occur for those familar:
a) EVPN and not geneve tunnels
b) tunnels and not geneve.


================================
Tunnel encapsulation specification requires the following things for every tunnel:

1) Name -

Do: give a short name
Do not: Please do not replicate a subTLV name (segment lists)
2) Code (TBD or assigned number)

3) Description - short function description or a link to a longr text

4) list of all SubTLV defined for TEA

Do: Look at RFC9012 and any other TEA document you reference
(draft-ietf-idr-sr-policy-safi)
Gather a full list of subTLVs and put it in a table

Tunnel-name   SubTLV Supported   SubTLVs not supported
------------  ------------------ ----------------------


5) A validation procedures

Do: Write up a validation procedure for each Tunnel.
You can look at the validation procedures for [RFC9012],
but you do not have validate using Tunnel-Egress Endpoint.

Don't: Assume that one tunnel validation procedure
matches another.

5) Security Considerations
Please look draft-ietf-idr-sr-policy-safi for a good template.

6) Manageability section.

How is the operator going to create the three new tunnels in
configuration?  What problems do you envision gluing

It will be useful to have these in unique setions.

=================================================

Sub-TLV write-ups:

1) Title: One Line Summary (e.g. RPF Sub-TLV)
2) Type: 124   (either value or TBDXX) (e.g. 124)

3) Encoding of value byte
 3.1 diagram of byte layout
 (most people use 32 bit, but you can use 16 bit)
   0                   1
   0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
  +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
  |               |               |
  +---------------+---------------+

(on the RPF, I cannot tell if you have 1 byte or no bytes)

3.2 Description of each field with:
  a) title, definition  (e.g. RPF Su
  b) size
  c) limits on the field (e.g.

3.3) Error handling

What constitutes malformed subTLV?

3.4) What Tunnels this document specifies it can go in
3.5) Does this subTLV play a part in validation .

=================================================

PMSI + Tunnel Encapsulation template

1) When is the PMSI tunnel Attribute valid to attach by itself
2) When is the PMSI tunnel Attribute + the Tunnel-Encapsulation valid to attach together.
3) When could the PMSI tunnel attribute attachment be wrong.
4) What happnes when PMSI tunnel is malformed, but needs to be attached
5) What happens when the PMSI + Tunnel-Encapsulation are to both be attached and:
5-a) PMSI is malformed, and Tunnel-encapsulation