Re: [bess] Benoit Claise's Discuss on draft-ietf-bess-mvpn-extranet-04: (with DISCUSS and COMMENT)
Benoit Claise <bclaise@cisco.com> Wed, 27 January 2016 09:37 UTC
Return-Path: <bclaise@cisco.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EDD601B37A1; Wed, 27 Jan 2016 01:37:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level:
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aT63fXuql4Zt; Wed, 27 Jan 2016 01:37:49 -0800 (PST)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 987561B379D; Wed, 27 Jan 2016 01:37:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=21674; q=dns/txt; s=iport; t=1453887469; x=1455097069; h=subject:to:references:cc:from:message-id:date: mime-version:in-reply-to; bh=3NFbQFy29CWnD143yVjlzF+hSjQly9QrXpqNEDpFG6Y=; b=PJpWT8SPse8v5n//5ucWZdIN8djHbTahMfUI4YbFHrAPN9EHH+AqFn24 FoG2tzxFq8sT/P7jRYFP2VoMrE72aTNFn5c5OR9cAnzbE2ULIqOgJTIjb NFWDA86KXjTiTTirm89MC3BO9QBWEgbxKtpXtL+SGv30jnRiEPXdrlIhs Q=;
X-IronPort-AV: E=Sophos;i="5.22,354,1449532800"; d="scan'208,217";a="624827069"
Received: from aer-iport-nat.cisco.com (HELO aer-core-1.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Jan 2016 09:37:46 +0000
Received: from [10.60.67.86] (ams-bclaise-8915.cisco.com [10.60.67.86]) by aer-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id u0R9bjGd032059; Wed, 27 Jan 2016 09:37:46 GMT
To: Eric C Rosen <erosen@juniper.net>, Susan Hares <shares@ndzh.com>, 'The IESG' <iesg@ietf.org>
References: <20151217133049.1038.44405.idtracker@ietfa.amsl.com> <56741869.5020505@juniper.net> <00af01d139c6$898fb720$9caf2560$@ndzh.com> <567859EC.6030103@juniper.net> <006101d13ce1$725cd650$571682f0$@ndzh.com> <56799F9F.4010907@juniper.net> <000d01d13d94$80868a10$81939e30$@ndzh.com> <56966A3D.4000708@juniper.net>
From: Benoit Claise <bclaise@cisco.com>
Message-ID: <56A88FE9.7000505@cisco.com>
Date: Wed, 27 Jan 2016 10:37:45 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
In-Reply-To: <56966A3D.4000708@juniper.net>
Content-Type: multipart/alternative; boundary="------------010105000807060203090603"
Archived-At: <http://mailarchive.ietf.org/arch/msg/bess/3MbfHpIp_olrrzLxLbjXOH-VPrY>
Cc: draft-ietf-bess-mvpn-extranet@ietf.org, aretana@cisco.com, "'John G. Scudder'" <jgs@juniper.net>, bess-chairs@ietf.org, martin.vigoureux@alcatel-lucent.com, bess@ietf.org
Subject: Re: [bess] Benoit Claise's Discuss on draft-ietf-bess-mvpn-extranet-04: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Jan 2016 09:37:58 -0000
Thank you Sue for your review and your follow-up, and even proposing some new text. Much appreciated. Authors, this is an example of a very dense document. I understand that the MPLS VPN + BGP + Multicast can get complex, but it's difficult to extract the deployment considerations out of these 60 pages. There are some operational paragraph from time to time. I agree with Sue when she mentions: "The whole draft is a set of rules for handling policy, BGP A-D routes, tunnel set-up, and PIM Join/leaves in the case of an intra net. Unless these rules are followed exactly, traffic may flow into a VPN it is not suppose to." This document doesn't give an operator “so-what” for deployment in 60 pages. You know, a few summary paragraphs that indicates where this specification is useful and where it is not for operators, and the potential fragility of the solution (which could be in a new operational consideration section or in the security considerations. I don't think I've seen text around coordination to set up filter, for example. Sue has been trying to be helpful and even proposed some text: Whenever a VPN is provisioned, there is a risk that provisioning errors will result in an unintended cross-connection of VPNs, which would create a security problem for the customers. Extranet can be particularly tricky, as it intentionally cross-connects VPNs, but in a manner that is intended to be strictly limited by policy. If one is connecting two VPNs that have overlapping address spaces, one has to be sure that the inter-VPN traffic isn't to/from the part of the address space that is in the overlap. The draft discusses a lot of the corner cases, and a lot of the scenarios in which things can go wrong. Regards, Benoit > On to version -06 ... > > On 12/23/2015 10:13 AM, Susan Hares wrote: >> >> Sections which must be added to clear my concerns >> >> ---------------------------------------------------------------- >> >> *4.4.1 Extranet Source Extended Community * >> >> To facilitate this, we define a new Transitive Opaque Extended >> Community, the "Extranet Source" Extended Community. >> >> The value field of this extended community is all zeros. >> >> *Restrictions: *This value field MUST be set to zero upon >> origination, MUST be ignored upon reception and MUST be passed >> unchanged by intermediate routers. >> >> *Additional Restrictions: *A Route Reflector MUST NOT add/remove the >> Extranet Source Extended Community from the VPN-IP routes reflected >> by the Route Reflector, including the case where VPN-IP routes >> received via IBGP are reflected to EBGP peers (inter-AS option (c), >> see [RFC6513] Section 10). >> > > The draft has the following text in section 4.4.1 ("The Extranet > Source Extended Community"): > > "The value field of the Extended Community MUST be set to zero. " > > "A PE router that interprets this Extended Community MUST ignore the > contents of the value field." > > and the following text in section 4.4.2 ("Distribution of Extranet > Source Extended Community"): > > "A Route Reflector MUST NOT add or remove the Extranet Source > Extended Community from the VPN-IP routes reflected by the Route > Reflector, including the case where VPN-IP routes received via IBGP > are reflected to EBGP peers (inter-AS option (c), see [RFC6513] > Section 10). The value of the Extended Community MUST NOT be changed > by the route reflector." > > "When re-advertising VPN-IP routes, ASBRs MUST NOT add/remove the > Extranet Source Extended Community from these routes. This includes > inter-AS options (b) and (c) (see [RFC6513] Section 10). The value of > the Extended Community MUST NOT be changed by the ASBRs." > > It seems to me that this contains the information you have requested. > It may not be in the format you prefer, but I think it goes beyond the > scope of an ops-dir review (or an IESG Discuss) to demand format changes. >> >> *4.4.2 Extranet Separation Extended community * >> >> ** >> >> We define a new Transitive Opaque Extended Community, the "Extranet >> Separation" Extended Community. This Extended Community is used >> only when extranet separation is being used. >> >> *Restrictions:* Its value field MUST be set to zero upon >> origination, MUST be ignored upon reception, and MUST be >> >> passed unchanged by intermediate routers. >> >> * Restrictions on Adding/deleting this community:* ?? (Eric – >> please add something here). >> > The draft now contains the following text in section 4.5 ("The > Extranet Separation Extended Community"): > > "We define a new Transitive Opaque Extended Community, the "Extranet > Separation" Extended Community (see [RFC4360], [RFC7153], and Section > 9 of this document). This Extended Community is used only when > extranet separation is being used. Its value field MUST be set to zero > upon origination, MUST be ignored upon reception, and MUST be passed > unchanged by intermediate routers. A Route Reflector MUST NOT add or > remove the Extranet Separation Extended Community from the routes it > reflects, including the case where routes received via IBGP are > reflected to EBGP peers (inter-AS option (c), see [RFC6513] Section 10)." > > It seems to me that this contains the information you have requested. > >> *Comments that could be put in a Security section: * >> >> ** >> >> Whenever a VPN is provisioned, there is a risk that provisioning >> errors will result in an unintended cross-connection of VPNs, which >> would create a security problem for the customers. Extranet can be >> particularly tricky, as it intentionally cross-connects VPNs, but in >> a manner that is intended to be strictly limited by policy. >> > The Security Considerations section already contains the following text: > > "As is the case with any application of technology based upon > [RFC4364], misconfiguration of the RTs may result in VPN security > violations (i.e., may result in a packet being delivered to a VPN > where, according to policy, it is not supposed to go)." > > I don't think the above requested text really adds anything, it's just > saying the same thing over again. >> >> If one is connecting two VPNs that have overlapping address spaces, >> one has to be sure that the inter-VPN traffic isn't to/from the part >> of the address space that is in the overlap. The draft discusses a >> lot of the corner cases, and a lot of the scenarios in which things >> can go wrong. >> > The difficulty of dealing with overlapping address spaces when > connecting two VPNs is already discussed extensively throughout the > document. I don't see that the requested paragraph adds anything of > substance. >
- [bess] Benoit Claise's Discuss on draft-ietf-bess… Benoit Claise
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Stephen Farrell
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Susan Hares
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Susan Hares
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Susan Hares
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Susan Hares
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Benoit Claise
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… joel jaeggli
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… joel jaeggli
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Eric C Rosen
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Martin Vigoureux
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Alvaro Retana (aretana)
- Re: [bess] Benoit Claise's Discuss on draft-ietf-… Susan Hares