Re: [bess] John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
Linda Dunbar <linda.dunbar@futurewei.com> Wed, 28 February 2024 03:47 UTC
Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 803D6C14F5F1; Tue, 27 Feb 2024 19:47:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9OSdtJYR-f3R; Tue, 27 Feb 2024 19:47:36 -0800 (PST)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2107.outbound.protection.outlook.com [40.107.244.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AB85C14F714; Tue, 27 Feb 2024 19:47:36 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kYDTjtP6nrjQZF4kHsgfV5N/a8TS2Z/V54ql4jXW2dtwDBmHl11R4vfJah87SuOkkkNK8TS4mALDhA5BgjIeLwxSB9wUf6yiDj7eiuFN2LAlYktGu6/WlNDNFSkYcIEhYl8E3Fir/a5QEZPlqpARsynoVQxSvKVr0rE1QeExNXi+pRurlICUncNU79KTnzIvpkzNK2zee1VfQje95vc9yuyPb2kFVIwzVGenUgd0U9BX1gMQJKtrc6FT99AUxGYrxcjbBobMVDP3HumIkTeiomNI4YO3DQyiYzs9y2p5RH9MkfQQ1N/WSOM3WATpCx8BrxUedp+2nPHK6+cYV1IMRA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+CibUYsW7XmbaPhyttrSKfOzLx+iCJlEidZXcLyR3ko=; b=IeReXfqGpJ5ddQbI1pz7CGWIDJeERLlq/3hvFjCDx9sGkSdszc8odoqCuWh8mRZZPzPqI6tK0VZdpO924u5I9zmJDTAn7enbgL9aewIY5CbAfAbsv98wEDNwuRyPh3+oc7wSIfLq1sooodFeEqWsBk2b/jjofU4YZl1ZRhMfuMB5hDZK39ayQ2uF0zXdSRMND085z+jy0h1b2oubJr1VtJASTtQozQMs5cYeLy99KCB5LoDpuumV4zNEushEgC6jNrzdVaJB+Ko4DnCNyG03pHk42CzIkNGifcP7UE3MU39Q8a2rXaEGu7TwDw8V0PvzTlwpEPFzMM+cBrK9vyLCwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+CibUYsW7XmbaPhyttrSKfOzLx+iCJlEidZXcLyR3ko=; b=LvqlFA3D41py5Njwek85K2e1gfUY3KgrmWtmd99zM4hAFs2p2dmpNvUgfL8/zD5cDH4NEbXu0WmKANiJFb91qvJi2SGC8F05lXB+mncSs1iyYgQQ9eptmkoIVjDgkvCI9p03BUnO7FoOr0i9X0m35n1nOdeTgwG8mHQrppdpDwc=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by SJ0PR13MB5846.namprd13.prod.outlook.com (2603:10b6:a03:434::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.36; Wed, 28 Feb 2024 03:47:32 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::3964:b284:7035:fa48]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::3964:b284:7035:fa48%6]) with mapi id 15.20.7316.037; Wed, 28 Feb 2024 03:47:32 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: John Scudder <jgs@juniper.net>, The IESG <iesg@ietf.org>
CC: "draft-ietf-bess-bgp-sdwan-usage@ietf.org" <draft-ietf-bess-bgp-sdwan-usage@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "matthew.bocci@nokia.com" <matthew.bocci@nokia.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
Thread-Index: AQHaacrvlaDo1PCtykumhEfhM2Yb4bEe2Qtw
Date: Wed, 28 Feb 2024 03:47:32 +0000
Message-ID: <CO1PR13MB4920CCEDE24E814E38C504EF85582@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <170907231389.62883.1060466592403115326@ietfa.amsl.com>
In-Reply-To: <170907231389.62883.1060466592403115326@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|SJ0PR13MB5846:EE_
x-ms-office365-filtering-correlation-id: 6f3046e0-9dfb-48c8-93aa-08dc380ffe61
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR13MB4920.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB4920CCEDE24E814E38C504EF85582CO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6f3046e0-9dfb-48c8-93aa-08dc380ffe61
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2024 03:47:32.3058 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XqiVR6GQCn2OdyL1AbjsZEaNaQKKh0iPk4XTt+Q/BNDSCRcAjOy8KJc3mMNvg+a1bpIvbCw5DtbnYA2F1oPMgw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR13MB5846
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/CyXUbbeKZxHQplBP4Vo45odcnF8>
Subject: Re: [bess] John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 03:47:40 -0000
John, Thank you very much for the detailed comments. See the replies below to address your discussion points. Linda -----Original Message----- From: John Scudder via Datatracker <noreply@ietf.org> Sent: Tuesday, February 27, 2024 4:19 PM To: The IESG <iesg@ietf.org> Cc: draft-ietf-bess-bgp-sdwan-usage@ietf.org; bess-chairs@ietf.org; bess@ietf.org; matthew.bocci@nokia.com; matthew.bocci@nokia.com Subject: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT) John Scudder has entered the following ballot position for draft-ietf-bess-bgp-sdwan-usage-20: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fabout%2Fgroups%2Fiesg%2Fstatements%2Fhandling-ballot-positions%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280685631%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=kzAe1rn6Lsl0Yahh8P5vO20AKgtL5qgnpMzOFtO2%2BTI%3D&reserved=0 for more information about how to handle DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-bess-bgp-sdwan-usage%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280693385%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=uHr7%2B1kW2k9gdYWwLdihBeUYFkLtA%2FnrGYtGyONW7m0%3D&reserved=0 ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- ## DISCUSS I have several concerns with this document, and I can't support it being published in its current form. Details are below, listed roughly in order of severity. ### What's it for? My most fundamental concern is that I can't understand what this document is for. It doesn't specify a procedure. It doesn't provide enough detail to allow me to understand how to use the underlying technologies to build an SD-WAN service. (Also some of the details that are provided are wrong, see subsequent item.) It's not an architecture or framework document in the usual sense. It does motivate at a high level, the understanding that one *can* use BGP as the control plane, and IPSec as the data plane [*], to build an SD-WAN service, if one knows how... but do we need an RFC for that? [Linda] This document is intended to describe the SD-WAN scenarios and demonstrate the applicability of BGP as the control plane for multiple scenarios of SD-WAN (Software Defined WAN) overlay networks. The closest I could find to a thesis statement was the abstract's "The document aims to demonstrate how the BGP-based control plane is used for large-scale SD-WAN overlay networks with little manual intervention." I guess if we allow the word "demonstrate" to mean "motivate at a high level" rather than "specify", then we can say it's not too far off. I don't see why we need an RFC for that, though. [Linda] This document (if published as the RFC) serves as a valuable resource offering comprehensive insights into the utilization of BGP as the control plane for SD-WAN overlay networks. This document is designed to provide the network industry with clear guidance on the methodologies and rationales behind harnessing BGP for SD-WAN control, elucidating the specific scenarios in which BGP proves to be an effective control mechanism for SD-WAN overlays. [*] Or the concatenation of IPSec and "traditional" BESS VPN technologies, in the "differential" case. ### Is it in charter? Looking at the BESS charter, I don't see how this document fits. If it weren't for the preceding question, I probably wouldn't have thought to look. But as it stands, I have to ask: why does the WG think this is a chartered work item? [Linda] BESS Charter states " The BGP Enabled Services (BESS) working group is responsible for defining, specifying, and extending network services based on BGP." This document is discussing using BGP for controlling a new network service(i.e., SD-WAN). ### Error in how RFC 9012 is used In Section 5.2, the Encapsulation Extended Community is misused. See https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fidr%2FumBB5yfoC3mFMpIWIT2K8159Gos%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280699157%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=AweC6NSJdVNUQyaEe3TO9lBQFsv%2Br%2BDOySf1xTZb2RA%3D&reserved=0 for related explanation of the error. The error recurs in Sections 5.3 and 5.4. [Linda] Please see the discussions related to the topic. For SD-WAN scenario, simple NextHop is not enough for client routes advertisement because different client routes need to be forwarded by different underlay paths. It is not practical to include all the information about the underlay path with the client routes advertisement. Also, there is no such thing as "TYPE = IPsec" (referenced in Sections 5.2 and 5.4), see https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iana.org%2Fassignments%2Fbgp-tunnel-encapsulation%2Fbgp-tunnel-encapsulation.xhtml%23tunnel-types&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280703388%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=7PdBUNYeUXtjMK2pp3HxQjzA5XJ93GJCqIBlpEomCSc%3D&reserved=0 [Linda] RFC5566 has specified IPsec Tunnel Type (IPsec in Tunnel-mode: Tunnel Type = 4 [RFC4302], [RFC4303]). We can add the reference. This one should be straightforward to fix. It does lead me to be worried about the level of review the document has received, though. ### Section 3.1.5, security model BGP is well suited for this purpose. RFC4684 has specified the procedure to constrain the distribution of BGP UPDATE to only a subset of nodes. Each edge node informs the Route-Reflector (RR) [RFC4456] on its interested SD-WAN VPNs. The RR only propagates the BGP UPDATE from an edge to others within the same SD-WAN VPN. RFC 4684 is driven by demand -- a PE will advertise RT membership NLRI to "request" that it receive routes with the given RT. So, this means the security model is that the client router is implicitly trusted to declare its VPN membership(s) truthfully and accurately. I don't see this addressed in the Security Considerations. [Linda] Section 3.2 states that the SD-WAN Local Network Controller, e.g., RR in BGP-controlled SD-WAN, is managing the policy governing communication among peers. Here is the wording added in Section 3.1.5 to address your concern: "Route-Reflector (RR) [RFC4456], as an integral part of the SD-WAN controller, has the policy governing communication among peers. The RR only propagates the BGP UPDATE from an edge to its authorized peers." ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- ## COMMENT ### What's a "client route"? The document talks about "client routes", "client route updates", etc. It never defines the concept. I assume that these are analogous to a CE route in an RFC 4364 VPN, but the casual usage and lack of definition are unhelpful. [Linda] The term "Client Route" is adopted from the RFC4364. In this document, client route means the prefixes attached to the client ports of an SD-WAN edge. Add this to the Terminology section. ### MP-NRLI There's no such thing as "MP-NLRI". I guess you mean MP_REACH_NLRI and MP_UNREACH_NLRI. If you want to collectively refer to these as "MP-NLRI" then I think you need to add a definition. [Linda] Yes, Add the following definition in the terminology section. MP-NLRI: In this document, the term "MP-NLRI" serves as a concise reference for "MP_REACH_NLRI". ### Anti-DDoS Section 6.2.2 has For all packets from the Internet-facing WAN ports, the additional anti-DDoS mechanism has to be enabled to prevent potential attacks from the Internet-facing ports. What anti-DDoS mechanism is that? None is specified here, nor referenced. [Linda] anti-DDoS is a commonly used tool for any interface facing ports. It is out of the scope of this document to describe the details. Is adding the following sentence helpful? "The anti-DDoS mechanism comprises numerous components, and their detailed discussion is beyond the scope of this document." ### Figure 7 Figure 7 is mangled to the point of being unreadable. [Linda] Figure 7 is to show underlay paths can be via trusted VPN and "untrusted network". Over the "Untrusted Network", packets have to be encrypted. We greatly appreciate any suggestion to make it better. The intent is to demonstrate some traffic have to be forwarded via trusted VPN, while other traffic can be forwarded via either untrusted network (with encryption) or trusted VPN. Linda
- [bess] John Scudder's Discuss on draft-ietf-bess-… John Scudder via Datatracker
- Re: [bess] John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- Re: [bess] John Scudder's Discuss on draft-ietf-b… John Scudder
- Re: [bess] John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- Re: [bess] John Scudder's Discuss on draft-ietf-b… John Scudder
- Re: [bess] John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- [bess] Re: John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- [bess] BESS charter [was: Re: John Scudder's Disc… John Scudder
- Re: [bess] BESS charter [was: Re: John Scudder's … Susan Hares