Re: [bess] John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)

Linda Dunbar <linda.dunbar@futurewei.com> Wed, 28 February 2024 03:47 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 803D6C14F5F1; Tue, 27 Feb 2024 19:47:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.108
X-Spam-Level:
X-Spam-Status: No, score=-7.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9OSdtJYR-f3R; Tue, 27 Feb 2024 19:47:36 -0800 (PST)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2107.outbound.protection.outlook.com [40.107.244.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6AB85C14F714; Tue, 27 Feb 2024 19:47:36 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kYDTjtP6nrjQZF4kHsgfV5N/a8TS2Z/V54ql4jXW2dtwDBmHl11R4vfJah87SuOkkkNK8TS4mALDhA5BgjIeLwxSB9wUf6yiDj7eiuFN2LAlYktGu6/WlNDNFSkYcIEhYl8E3Fir/a5QEZPlqpARsynoVQxSvKVr0rE1QeExNXi+pRurlICUncNU79KTnzIvpkzNK2zee1VfQje95vc9yuyPb2kFVIwzVGenUgd0U9BX1gMQJKtrc6FT99AUxGYrxcjbBobMVDP3HumIkTeiomNI4YO3DQyiYzs9y2p5RH9MkfQQ1N/WSOM3WATpCx8BrxUedp+2nPHK6+cYV1IMRA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+CibUYsW7XmbaPhyttrSKfOzLx+iCJlEidZXcLyR3ko=; b=IeReXfqGpJ5ddQbI1pz7CGWIDJeERLlq/3hvFjCDx9sGkSdszc8odoqCuWh8mRZZPzPqI6tK0VZdpO924u5I9zmJDTAn7enbgL9aewIY5CbAfAbsv98wEDNwuRyPh3+oc7wSIfLq1sooodFeEqWsBk2b/jjofU4YZl1ZRhMfuMB5hDZK39ayQ2uF0zXdSRMND085z+jy0h1b2oubJr1VtJASTtQozQMs5cYeLy99KCB5LoDpuumV4zNEushEgC6jNrzdVaJB+Ko4DnCNyG03pHk42CzIkNGifcP7UE3MU39Q8a2rXaEGu7TwDw8V0PvzTlwpEPFzMM+cBrK9vyLCwg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+CibUYsW7XmbaPhyttrSKfOzLx+iCJlEidZXcLyR3ko=; b=LvqlFA3D41py5Njwek85K2e1gfUY3KgrmWtmd99zM4hAFs2p2dmpNvUgfL8/zD5cDH4NEbXu0WmKANiJFb91qvJi2SGC8F05lXB+mncSs1iyYgQQ9eptmkoIVjDgkvCI9p03BUnO7FoOr0i9X0m35n1nOdeTgwG8mHQrppdpDwc=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by SJ0PR13MB5846.namprd13.prod.outlook.com (2603:10b6:a03:434::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.36; Wed, 28 Feb 2024 03:47:32 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::3964:b284:7035:fa48]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::3964:b284:7035:fa48%6]) with mapi id 15.20.7316.037; Wed, 28 Feb 2024 03:47:32 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: John Scudder <jgs@juniper.net>, The IESG <iesg@ietf.org>
CC: "draft-ietf-bess-bgp-sdwan-usage@ietf.org" <draft-ietf-bess-bgp-sdwan-usage@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "matthew.bocci@nokia.com" <matthew.bocci@nokia.com>
Thread-Topic: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
Thread-Index: AQHaacrvlaDo1PCtykumhEfhM2Yb4bEe2Qtw
Date: Wed, 28 Feb 2024 03:47:32 +0000
Message-ID: <CO1PR13MB4920CCEDE24E814E38C504EF85582@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <170907231389.62883.1060466592403115326@ietfa.amsl.com>
In-Reply-To: <170907231389.62883.1060466592403115326@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|SJ0PR13MB5846:EE_
x-ms-office365-filtering-correlation-id: 6f3046e0-9dfb-48c8-93aa-08dc380ffe61
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR13MB4920.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB4920CCEDE24E814E38C504EF85582CO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6f3046e0-9dfb-48c8-93aa-08dc380ffe61
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2024 03:47:32.3058 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XqiVR6GQCn2OdyL1AbjsZEaNaQKKh0iPk4XTt+Q/BNDSCRcAjOy8KJc3mMNvg+a1bpIvbCw5DtbnYA2F1oPMgw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR13MB5846
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/CyXUbbeKZxHQplBP4Vo45odcnF8>
Subject: Re: [bess] John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 03:47:40 -0000

John,
Thank you very much for the detailed comments.
See the replies below to address your discussion points.

Linda

-----Original Message-----
From: John Scudder via Datatracker <noreply@ietf.org>
Sent: Tuesday, February 27, 2024 4:19 PM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-bess-bgp-sdwan-usage@ietf.org; bess-chairs@ietf.org; bess@ietf.org; matthew.bocci@nokia.com; matthew.bocci@nokia.com
Subject: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)

John Scudder has entered the following ballot position for
draft-ietf-bess-bgp-sdwan-usage-20: Discuss

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fabout%2Fgroups%2Fiesg%2Fstatements%2Fhandling-ballot-positions%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280685631%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=kzAe1rn6Lsl0Yahh8P5vO20AKgtL5qgnpMzOFtO2%2BTI%3D&reserved=0
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-bess-bgp-sdwan-usage%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280693385%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=uHr7%2B1kW2k9gdYWwLdihBeUYFkLtA%2FnrGYtGyONW7m0%3D&reserved=0



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

## DISCUSS

I have several concerns with this document, and I can't support it being
published in its current form. Details are below, listed roughly in order of
severity.

### What's it for?

My most fundamental concern is that I can't understand what this document is
for. It doesn't specify a procedure. It doesn't provide enough detail to allow
me to understand how to use the underlying technologies to build an SD-WAN
service. (Also some of the details that are provided are wrong, see subsequent
item.) It's not an architecture or framework document in the usual sense. It
does motivate at a high level, the understanding that one *can* use BGP as the
control plane, and IPSec as the data plane [*], to build an SD-WAN service, if
one knows how... but do we need an RFC for that?
[Linda] This document is intended to describe the SD-WAN scenarios and demonstrate the applicability of BGP as the control plane for multiple scenarios of SD-WAN (Software Defined WAN) overlay networks.

The closest I could find to a thesis statement was the abstract's "The document
aims to demonstrate how the BGP-based control plane is used for large-scale
SD-WAN overlay networks with little manual intervention." I guess if we allow
the word "demonstrate" to mean "motivate at a high level" rather than
"specify", then we can say it's not too far off. I don't see why we need an RFC
for that, though.

[Linda] This document (if published as the RFC) serves as a valuable resource offering comprehensive insights into the utilization of BGP as the control plane for SD-WAN overlay networks. This document is designed to provide the network industry with clear guidance on the methodologies and rationales behind harnessing BGP for SD-WAN control, elucidating the specific scenarios in which BGP proves to be an effective control mechanism for SD-WAN overlays.


[*] Or the concatenation of IPSec and "traditional" BESS VPN technologies, in
the "differential" case.

### Is it in charter?

Looking at the BESS charter, I don't see how this document fits. If it weren't
for the preceding question, I probably wouldn't have thought to look. But as it
stands, I have to ask: why does the WG think this is a chartered work item?
[Linda] BESS Charter states " The BGP Enabled Services (BESS) working group is responsible for
defining, specifying, and extending network services based on BGP."
This document is discussing using BGP for controlling a new network service(i.e., SD-WAN).


### Error in how RFC 9012 is used

In Section 5.2, the Encapsulation Extended Community is misused. See
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fidr%2FumBB5yfoC3mFMpIWIT2K8159Gos%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280699157%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=AweC6NSJdVNUQyaEe3TO9lBQFsv%2Br%2BDOySf1xTZb2RA%3D&reserved=0 for
related explanation of the error. The error recurs in Sections 5.3 and 5.4.
[Linda] Please see the discussions related to the topic. For SD-WAN scenario, simple NextHop is not enough for client routes advertisement because different client routes need to be forwarded by different underlay paths. It is not practical to include all the information about the underlay path with the client routes advertisement.

Also, there is no such thing as "TYPE = IPsec" (referenced in Sections 5.2 and
5.4), see
https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iana.org%2Fassignments%2Fbgp-tunnel-encapsulation%2Fbgp-tunnel-encapsulation.xhtml%23tunnel-types&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cf5f2c86a4f274f21f70808dc37e20eec%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638446691280703388%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=7PdBUNYeUXtjMK2pp3HxQjzA5XJ93GJCqIBlpEomCSc%3D&reserved=0

[Linda] RFC5566 has specified IPsec Tunnel Type (IPsec in Tunnel-mode: Tunnel Type = 4 [RFC4302], [RFC4303]).  We can add the reference.

This one should be straightforward to fix. It does lead me to be worried about
the level of review the document has received, though.

### Section 3.1.5, security model

   BGP is well suited for this purpose. RFC4684 has specified the
   procedure to constrain the distribution of BGP UPDATE to only a
   subset of nodes. Each edge node informs the Route-Reflector (RR)
   [RFC4456] on its interested SD-WAN VPNs. The RR only propagates
   the BGP UPDATE from an edge to others within the same SD-WAN VPN.

RFC 4684 is driven by demand -- a PE will advertise RT membership NLRI to
"request" that it receive routes with the given RT. So, this means the security
model is that the client router is implicitly trusted to declare its VPN
membership(s) truthfully and accurately. I don't see this addressed in the
Security Considerations.

[Linda] Section 3.2 states that the SD-WAN Local Network Controller, e.g., RR in BGP-controlled SD-WAN, is managing the policy governing communication among  peers.

Here is the wording added in Section 3.1.5 to address your concern:

"Route-Reflector (RR) [RFC4456], as an integral part of the SD-WAN controller, has the policy governing communication among  peers.  The RR only propagates the BGP UPDATE from an edge to its authorized peers."


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

## COMMENT

### What's a "client route"?

The document talks about "client routes", "client route updates", etc. It never
defines the concept. I assume that these are analogous to a CE route in an RFC
4364 VPN, but the casual usage and lack of definition are unhelpful.
[Linda] The term "Client Route" is adopted from the RFC4364. In this document, client route means the prefixes attached to the client ports of an SD-WAN edge. Add this to the Terminology section.

### MP-NRLI

There's no such thing as "MP-NLRI". I guess you mean MP_REACH_NLRI and
MP_UNREACH_NLRI. If you want to collectively refer to these as "MP-NLRI" then I
think you need to add a definition.
[Linda] Yes, Add the following definition in the terminology section.

MP-NLRI:                In this document, the term "MP-NLRI" serves as a concise reference for "MP_REACH_NLRI".



### Anti-DDoS

Section 6.2.2 has

                                                     For all packets
     from the Internet-facing WAN ports, the additional anti-DDoS
     mechanism has to be enabled to prevent potential attacks from
     the Internet-facing ports.

What anti-DDoS mechanism is that? None is specified here, nor referenced.
[Linda] anti-DDoS is a commonly used tool for any interface facing ports. It is out of the scope of this document to describe the details.  Is adding the following sentence helpful?
        "The anti-DDoS mechanism comprises numerous components, and their detailed discussion is beyond the scope of this document."



### Figure 7

Figure 7 is mangled to the point of being unreadable.
[Linda] Figure 7 is to show underlay paths can be via trusted VPN and "untrusted network". Over the "Untrusted Network", packets have to be encrypted. We greatly appreciate  any suggestion to make it better.  The intent is to demonstrate some traffic have to be forwarded via trusted VPN, while other traffic can be forwarded via either untrusted network (with encryption) or trusted VPN.

Linda