[bess] FW: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt

Ron Bonica <rbonica@juniper.net> Mon, 11 June 2018 19:55 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58FA8130EC8 for <bess@ietfa.amsl.com>; Mon, 11 Jun 2018 12:55:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YXXE2mUfz0rs for <bess@ietfa.amsl.com>; Mon, 11 Jun 2018 12:55:34 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABCF7130EB1 for <bess@ietf.org>; Mon, 11 Jun 2018 12:55:34 -0700 (PDT)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5BJra80014588 for <bess@ietf.org>; Mon, 11 Jun 2018 12:55:34 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=Avl6NtMRZsYXZ7NHJNnbknBsEvs9dEKLsGhXv79u/uA=; b=NuTGRMAsAjiQAN7L/rr8OKLyW/4YbJ4qapqdKVfzXMpasfk/BDhn/PtQv70L2R9vyi8M 2rc3ss1g9vIjs8MPX/uI+AoWmVR7i0V2AgVvJdAtVc+AU84/4x+nqZhY9+l2nLO2pQP7 SlwxcePGI/xlmpxwNj7m0WKdKXA7oL6YXLL4REvP4gcfNfa/F/jgNhnLZkQqadEQvmm+ Eg+KGmHLEgrgxIikmRWHRq7uG5eCcniF3uMHkddgX/YOzXrDdgVE5Ympdf0X9kgIQYEz /hGW3XXsBg4Dm6mltkkm49FB3WnwlRcqK5eFesd5THvAX/iTET8acwWEqGFh5escd67A kw==
Received: from nam01-sn1-obe.outbound.protection.outlook.com (mail-sn1nam01lp0118.outbound.protection.outlook.com [207.46.163.118]) by mx0a-00273201.pphosted.com with ESMTP id 2jhv77rc94-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for <bess@ietf.org>; Mon, 11 Jun 2018 12:55:34 -0700
Received: from CO1PR05MB443.namprd05.prod.outlook.com (10.141.73.152) by CO1PR05MB538.namprd05.prod.outlook.com (10.141.73.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.863.6; Mon, 11 Jun 2018 19:55:31 +0000
Received: from CO1PR05MB443.namprd05.prod.outlook.com ([fe80::312a:3c1:f69:c7fb]) by CO1PR05MB443.namprd05.prod.outlook.com ([fe80::312a:3c1:f69:c7fb%13]) with mapi id 15.20.0863.010; Mon, 11 Jun 2018 19:55:31 +0000
From: Ron Bonica <rbonica@juniper.net>
To: "bess@ietf.org" <bess@ietf.org>
Thread-Topic: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt
Thread-Index: AQHUAb0/C+i0io0nekOi/XAFLuZhe6RbeAcw
Date: Mon, 11 Jun 2018 19:55:31 +0000
Message-ID: <CO1PR05MB443FF492ECE04553EF9E17BAE780@CO1PR05MB443.namprd05.prod.outlook.com>
References: <152874653557.2807.17161289464973121006.idtracker@ietfa.amsl.com>
In-Reply-To: <152874653557.2807.17161289464973121006.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.300.84
dlp-reaction: no-action
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CO1PR05MB538; 7:l/VujSVPlQ5dqByjq6VdOVzd4cAzg4+P61uEBRCOKoLvlcfHasRROthj5ek7I7anwF2p3vjQ06HojWeqRljeI7U92InlpusoEe4V0a0tXUshItEp796BN0ef3nMvOlgqbzFx0jl8TMVsmly82g7SXNokEmZRYfTQlQVeC+oKwxCeXcHbs3ATcptsPVrayl7MLeNnAEHb4thwNnFvdGsfUunDzFnQs/PTW/HY+p+S7ReS8yI6optpW0ct8u0Ym7iI
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:CO1PR05MB538;
x-ms-traffictypediagnostic: CO1PR05MB538:
x-microsoft-antispam-prvs: <CO1PR05MB53828DB72B0A657B3C9993DAE780@CO1PR05MB538.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(192374486261705)(138986009662008)(21532816269658);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231254)(944501410)(52105095)(3002001)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123558120)(20161123564045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:CO1PR05MB538; BCL:0; PCL:0; RULEID:; SRVR:CO1PR05MB538;
x-forefront-prvs: 070092A9D3
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(39380400002)(396003)(39860400002)(376002)(366004)(346002)(13464003)(199004)(189003)(33656002)(3280700002)(2906002)(2501003)(5250100002)(3660700001)(105586002)(476003)(25786009)(966005)(68736007)(478600001)(5890100001)(14454004)(15650500001)(6306002)(6436002)(9686003)(2351001)(5660300001)(8676002)(1730700003)(81156014)(81166006)(2473003)(3846002)(5640700003)(6116002)(8936002)(229853002)(74316002)(305945005)(7736002)(55016002)(106356001)(2900100001)(53546011)(316002)(6916009)(59450400001)(6506007)(99286004)(66066001)(486006)(86362001)(76176011)(7696005)(26005)(446003)(97736004)(53936002)(11346002)(102836004)(186003)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:CO1PR05MB538; H:CO1PR05MB443.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 1pmqIxW4alGAqxwjAN9YDhjs92owxhyaHjaEnRu+RtpvWg16R5M3Le0HMkd6TjrrU9WZdrOLVvO2Z4v9WctqQ8fAqFvOigUTdT9m/GOrT+43FSf3dlJpiCv7IwqQlhHwA88zsG3sFc8J9vrPVbBZnYTDKyeXst0nxGeFonozAA1Z1ifUHVpy05du6E8mawva
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: 85e74954-cbb6-468b-1566-08d5cfd549f2
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 85e74954-cbb6-468b-1566-08d5cfd549f2
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jun 2018 19:55:31.7597 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR05MB538
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-06-11_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806110224
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/V79-XfqlMo7u75E1fndZbjv3Ulo>
Subject: [bess] FW: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jun 2018 19:55:38 -0000

Folks,

Please review and comment on this draft.

                                          Ron


-----Original Message-----
From: internet-drafts@ietf.org <internet-drafts@ietf.org> 
Sent: Monday, June 11, 2018 3:49 PM
To: Ron Bonica <rbonica@juniper.net>; Eric Rosen <erosen@juniper.net>; Eric Rosen <erosen@juniper.net>
Subject: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt


A new version of I-D, draft-rosen-bess-secure-l3vpn-00.txt
has been successfully submitted by Eric C. Rosen and posted to the IETF repository.

Name:		draft-rosen-bess-secure-l3vpn
Revision:	00
Title:		Augmenting RFC 4364 Technology to Provide Secure Layer L3VPNs over Public Infrastructure
Document date:	2018-06-11
Group:		Individual Submission
Pages:		19
URL:         https://tools.ietf.org/html/draft-rosen-bess-secure-l3vpn-00   
Status:     https://datatracker.ietf.org/doc/draft-rosen-bess-secure-l3vpn/    
Htmlized:  https://tools.ietf.org/html/draft-rosen-bess-secure-l3vpn-00     
Htmlized:  https://datatracker.ietf.org/doc/html/draft-rosen-bess-secure-l3vpn     


Abstract:
   The Layer 3 Virtual Private Network (VPN) technology described in RFC
   4364 is focused on the scenario in which a network Service Provider
   (SP) maintains a secure backbone network and offers VPN service over
   that network to its customers.  Customers access the SP's network by
   attaching "Customer Edge" (CE) routers to "Provider Edge" (PE)
   routers, and exchanging cleartext IP packets.  PE routers generally
   serve multiple customers, and prevent unauthorized communication
   among customers.  Customer data sent across the backbone (from one PE
   to another) is encapsulated in MPLS, using an MPLS label to associate
   a given packet with a given customer.  The labeled packets are then
   sent across the backbone network in the clear, using MPLS transport.
   However, many customers want a VPN service that is secure enough to
   run over the public Internet, and which does not require them to send
   cleartext IP packets to a service provider.  Often they want to
   connect directly to edge nodes of the public Internet, which does not
   provide MPLS support.  Each customer may itself have multiple tenants
   who are not allowed to intercommunicate with each other freely.  In
   this case, the customer many need to provide a VPN service for the
   tenants.  This document describes a way in which this can be achieved
   using the technology of RFC 4364.  The functionality assigned therein
   to a PE router can be placed instead in Customer Premises Equipment.
   This functionality can be augmented by transmitting MPLS packets
   through IPsec Security Associations.  The BGP control plane sessions
   can also be protected by IPsec.  This allows a customer to use RFC
   4364 technology to provide VPN service to its internal departments,
   while sending only IPsec-protected packets to the Internet or other
   backbone network, and eliminating the need for MPLS transport in the
   backbone.

                                                                                  


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat