Re: [bess] Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage for SD-WAN Overlay Networks) to Informational RFC

Linda Dunbar <linda.dunbar@futurewei.com> Wed, 07 February 2024 00:23 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3422C14F5F2; Tue, 6 Feb 2024 16:23:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ho_8CIR55KWr; Tue, 6 Feb 2024 16:23:01 -0800 (PST)
Received: from NAM02-DM3-obe.outbound.protection.outlook.com (mail-dm3nam02on2133.outbound.protection.outlook.com [40.107.95.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB2FFC14F70E; Tue, 6 Feb 2024 16:22:48 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eSrk7GUB3+NcUycdiEc8kKaXJ2nxcimIfHb/wHv20Hjm81v20wfx6qU03DaW8ZwQ8vm5n41J1zxoa4ny72f+CM7rmCSXUMDJ8OVa+H6NA2o9LF30cASRWPIp3irFH7VqB/C8Cn1xUJOqRrMwvFxcvXD7/CDE9DUllezMMpTqQIhPuWsGfM273IayxMdCQGcZ5cBhV5A6Q5FcFjT9NAP56vpnRbA4qcaygYXK2IP140YB7ZNz157xyJQRAJEv6sQe3oMbYKtJ0VFD0wGtWGXPzN7qtbXkK/yyHlOmTdrY5eGwAMWgJq5l+nFeiPk93wklUFpWPmiOrKQ2FoTgdGg3mg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PIeL+++XHJS5qE9nUkgAF2y67YObsrv4l2nAiEcSDN0=; b=acZQMpdDXtS/wAgmLtF++zk+oRv7Rquj9WTydLKY7xsTQ8UpwprfzR+ges2lLnU/SoQ1nQB+Eq9IaQti0GeScEyqdrtcDJD7oH4emh/L2T9QGiPkTziTdcYgQjwPRgTIZuMZ4tn223BDl9JSKgzPpAFWFjajzNdrpKtDTPZ63En6q1Dzzd/4d/41SiYVokV3rQSO0ChCD6hZHl/dEf0RI5tkG1eMymlh3ekb9ycIhkVbD2Ygmg6aazArGA1dPx53UPykUNc7lFJIweZiwQ58I5vykNiijqYsvXfMEzVckHadABm/nDvNTe6RSbCggt7UgtFDbDcPb1Vgq1Bilv/aAg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PIeL+++XHJS5qE9nUkgAF2y67YObsrv4l2nAiEcSDN0=; b=O138G8QSgbqytdxise2KaFrOHPrvWnvQz0NFCfW7uOhqTdL7k/2gyyE6kf0lU4+7ETCEAnonXzln9+4dPVG8nI/9LGrw5QaelXYtjGg8ooPAXXa8WMDrcWmhCZNDixftMgRY0Q1ViAeFZEVQAXUyY5kT9wxu0pRiI3Z5fbvpawM=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by SJ2PR13MB6473.namprd13.prod.outlook.com (2603:10b6:a03:55b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.36; Wed, 7 Feb 2024 00:22:44 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::e6e5:1a02:6552:c0c1]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::e6e5:1a02:6552:c0c1%6]) with mapi id 15.20.7249.035; Wed, 7 Feb 2024 00:22:43 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "last-call@ietf.org" <last-call@ietf.org>
CC: "andrew-ietf@liquid.tech" <andrew-ietf@liquid.tech>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "draft-ietf-bess-bgp-sdwan-usage@ietf.org" <draft-ietf-bess-bgp-sdwan-usage@ietf.org>, "matthew.bocci@nokia.com" <matthew.bocci@nokia.com>
Thread-Topic: Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage for SD-WAN Overlay Networks) to Informational RFC
Thread-Index: AQHaVTBiWcZl2NNPm0K5lo5FrwqxkbD5LKAAgAR7kVA=
Date: Wed, 07 Feb 2024 00:22:43 +0000
Message-ID: <CO1PR13MB4920B5D713CA2FA40E66E10E85452@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <170680668432.50397.9113184985065227684@ietfa.amsl.com> <00e701da56eb$827e4eb0$877aec10$@olddog.co.uk>
In-Reply-To: <00e701da56eb$827e4eb0$877aec10$@olddog.co.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|SJ2PR13MB6473:EE_
x-ms-office365-filtering-correlation-id: 0f0bc136-fd2c-4c8f-0fe7-08dc2772e740
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR13MB4920.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(39850400004)(396003)(366004)(376002)(346002)(230922051799003)(451199024)(64100799003)(1800799012)(186009)(66899024)(86362001)(26005)(41300700001)(5660300002)(966005)(2906002)(30864003)(478600001)(44832011)(54906003)(110136005)(38070700009)(316002)(64756008)(66446008)(66556008)(76116006)(66476007)(66946007)(8676002)(8936002)(4326008)(9686003)(52536014)(71200400001)(6506007)(7696005)(53546011)(33656002)(38100700002)(55016003)(122000001)(83380400001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB4920B5D713CA2FA40E66E10E85452CO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0f0bc136-fd2c-4c8f-0fe7-08dc2772e740
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Feb 2024 00:22:43.8982 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: A97ayPH62xPiZqjeNBRijf/Xiv6GxTujDA474IICIuQUcP72U2tQ/PKM1VRaqNTXsv2WbRfIqxTHYrD+IBvaww==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR13MB6473
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/WUsI-0fGfLlVZmNY_JMZ2KbFtLs>
Subject: Re: [bess] Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage for SD-WAN Overlay Networks) to Informational RFC
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Feb 2024 00:23:05 -0000

Adrian,

Thank you very much for the extensive comments and suggestions.
I am breaking the resolutions in two separate emails. This one addresses the comments to Section 3.1.2. Will have another email addressing the remaining comments.
Can you check if the resolutions to your comments inserted below are acceptable?

Thank you,
Linda

-----Original Message-----
From: Adrian Farrel <adrian@olddog.co.uk>
Sent: Saturday, February 3, 2024 3:54 PM
To: last-call@ietf.org
Cc: andrew-ietf@liquid.tech; bess-chairs@ietf.org; bess@ietf.org; draft-ietf-bess-bgp-sdwan-usage@ietf.org; matthew.bocci@nokia.com
Subject: RE: Last Call: <draft-ietf-bess-bgp-sdwan-usage-19.txt> (BGP Usage for SD-WAN Overlay Networks) to Informational RFC

Hi,

I read this document again as part of its second Last Call. I have a few comments that should ideally be fixed before passing the draft on to the RFC Editor. (I ran out of steam around Section 6, sorry.)

Thanks,
Adrian

===

I wondered about the implementation status of this document. One might say that an Informational I-D has nothing to be implemented, but this document seems to be telling us which elements of other RFCs to use and combine to make a working system. Seeing that some of my comments note that the text appears to recommend using a deprecated code point, and that the BESS wiki notes "Implementation Status" as one of the working group last call checklist items, I thought it might be nice if this document has an RFC 7942 section to help us know how solid the processes are.

[Linda] There are two implementations of the extension of BGP to control SD-WAN (https://wiki.ietf.org/group/idr/implementations/draft-ietf-idr-sdwan-edge-discovery  ).
 I will ask Matthews to add the link to the implementation reports.

---

Please fix John Drake's contact details.
[Linda] changed.
---

You have a different number of people on the front page and in the Authors' Addresses section.
[Linda] Thanks for catching the error. Fixed.
---

The RFC Editor is going to ask you whether you can find a different way of saying "traditional" in the many cases in this document. Mainly, I think you can just delete the word.
[Linda] Thanks for the suggestion. Deleted the "traditional" from the document.
---

The running footer seems to be broken ("xxx, et al.")
[Linda] ? should I remove the footnote (Dunbar, et al)?
---

The document title and abstract should not assume that the reader is familiar with the abbreviation "SD-WAN"
[Linda] expanded the acronym.
---

Why does the document title say "overlay networks" while the Abstract says "multiple scenarios".
[Linda] specifically:  "multiple scenarios of SD-WAN (Software Defined WAN) overlay networks".
---

Why isn't [MEF70.1] a normative reference? It seems that this document leans on it heavily for the definition of SD-WAN and for other material.
[Linda] Will listing non-IETF standard as normative delay the process?
---

1.

s/IP Packets/IP packets/
[Linda] changed.
---

1.

     - Some traffic can be forwarded by edge nodes, based on their
       application identifiers instead of destination IP addresses

I think this is unintentionally ambiguous. Presumably it is not the application identifiers of the edge nodes.

I believe you are talking about traffic steering, although "forwarding"
may be an acceptable term. We normally think about forwarding onto a link or toward a next hop, and steering onto a path.

[Linda]. By the way, does IETF have a formal definition of "Steering" vs. "Forwarding"?

Are the following sentences better (or more accurate)?
-       Some traffic can be steered onto specific overlay paths based on the packets matching a predefined condition instead of destination IP addresses. The matching condition can be one or multiple fields of the IP header of the packets. More detailed attributes for steering traffic are described in the Table7 and Table 8 of [MEF70.1]. Using IPv6 [RFC8200] packets as an example, the Flow Label, the source address, a specific extension header field, or a combination of multiple IP header fields can be used to steer traffic.
      .

---

1.

     - Some traffic can be forwarded by edge nodes, based on their
       application identifiers instead of destination IP addresses,
       by placing the traffic onto specific overlay paths based on
       the application-specific policies. An "application identifier"
       in this document refers to one or multiple fields of the IP
       header of the packets.

I think this use of "application identifier" (and, later, "recognizing
applications") is significantly misleading. At best, what you have here is a "flow identifier". Further, you say that this is done "instead of the destination IP address", yet the destination IP address is surely a "field of the IP header of the packet". (By the way, by the time you get to Section 3.3, you are talking about flows.)

[Linda] This document was written before the "APN initiative. I can see why mentioning "Application ID" becomes so sensitive.

You go on to say:

       More detailed attributes that can be
       used for identifying applications are described in the Table7
       and Table 8 of [MEF70.1]

Table 7 includes fields that are not part of the IP header.
  - In general, matching on source and destination port IDs is
    considered an acceptable way of identifying traffic flows. But this
    is contrary to what you have previously said and is, in any case,
    problematic with some forms of encryption.
  - The concept of "Custom match including heuristic/algorithmic
    matching" is clearly not intended to relate purely to fields in
    the IP header, but includes some form of DPI. It is arguable that an
    SD-WAN edge node is part of the customer's network, and that the
    customer is allowed to inspect any user's traffic within their
    network. This, however, probably only applies to certain types of
    customer network. It is also likely to fail in the presence of
    end-to-end encryption.
    I do not find this topic discussed further in the draft, and I think
    it needs to be specifically excluded, or explained in some detail.
    I refer the AD to the discussion of "APN" within the IETF and to the
    careful efforts that have been made to attempt to achieve
    application flow identification for different traffic treatments and
    for traffic steering at the edge of the network without recourse to
DPI. This is, I think a serious problem with the document.
[Linda] totally got it. I am removing all reference of "Application Id" from the document.

Table 8 also includes fields that are not part of the IP header.
  - Using the Ethertype of the encapsulating Ethernet frame may be a
    tool that can be used, but you would need to make that clear as it
    is obviously not part of the IP header. Further, as the note in the
    table says, not all implementations will have access to the Ethertype
of the received frame.

[

It is possible that including a reference to Section 8 of MEF 70.1 might be helpful here, but I note that that document says:
   Although the term "Application Flow" includes the word "Application"
   there is only a loose connection between the two.
So, while you could continue to use the term "application" in your draft, I think that would be a bad idea. Sure, reference that fact that MEF 70.1 uses the term, but say something like:
   As noted in [MEF70.1] there is only a loose connection between an
   "Application" and what [MEF70.1] calls an "Application Flow". To
   avoid any confusion and remove any implication that individual
   applications can be identified by SD-WAN edge nodes, this document
   uses the term "traffic flow" (or simply "flow"). A flow is a
   collection of packets between the same source and destination pair
   that are subject to the same forwarding and policy decisions at the
   ingress SD-WAN edge node, and are identified by the settings of one
   or more fields in the packet headers.

[Linda] Thank you very much for the suggestion.
---

1.

   [Net2Cloud-Problem] describes the network-related problems
   relating to connecting enterprises' branch offices to dynamic
   workloads in different Cloud Data Centers (DC). SD-WAN has been
   positioned as a flexible way to solve those issues; however, this
   can create significant scaling issues when hundreds or thousands
   of nodes need to be interconnected by SD-WAN overlay networks.

I was distracted by this paragraph. I'm not sure it adds to the document, and it seems to present some challenges: for example, this document purports to address "large-scale SD-WAN overlay networks"
(Abstract) yet here you say that there is a scaling problem for large networks. Asides from this, the only mention of scalability is in Section 5.1

My suggestion would be to scrap this paragraph since it is really only saying that you can use SD-WAN to address some problems of, erm, SD-WAN deployments.

If you *do* decide to keep the paragraph, then I suggest adding a new section to the draft for "Scalability Considerations."

[Linda] Take your suggestion. Removed this paragraph.

---

1.

   BGP for SD-WAN overlay is a
   different layer from the underlay networks' BGP control plane
   instances.

I think, more importantly, it is a different BGP instance. Or is it?

[Linda] Yes. Changed to the following to make it clearer:
      "It's important to distinguish the BGP instance as the control plane for SD-WAN overlay from the BGP instances governing the underlay networks".

---

2.

   Controller: Used interchangeably with SD-WAN controller to manage
               SD-WAN overlay path creation/deletion and monitor the
               path conditions between sites.

The overlay paths are somewhat trivial, I believe, seeing that in the overlay all edges are adjacent and the path is a single hop. Reading ahead, the more important (the only?) roles of the controller are to manage subscription of edge nodes to the SD-WAN, to assist with ZTP, and to determine which edges should be connected to which other edges.

[Linda] Is the following statement better?

      "Controller: Used interchangeably with SD-WAN controller to manage SD-WAN overlay networks in this document. In the specific context of BGP-controlled SD-WAN, the controller functions as an integral component of the BGP Route Reflector."
---

2.

s/A SD-WAN/An SD-WAN/

[Linda] Changed.
---

2.

CPE-Based VPN is defined in this section, but the term is not used anywhere in the document.

This is somewhat confusing, and looking at the scenarios in section 3, it appears that you intend that all deployments use CPE-CPE security of some form. This appears to be a fundamental component of the SD-WAN that you are describing. Perhaps you need to bring this point out very clearly in the description of what an SD-WAN is.

[Linda]  thanks for catching it. The term was used in the earlier version. Removed the term.
---

2.

   SD-WAN IPsec SA: IPsec Security Association between two SD-WAN
               ports or nodes.

The "nodes" in this case are SD-WAN edges (or CPEs).
And the "ports" are ports on those nodes. Possibly "WAN ports" q.v.
[Linda] Changed.
---

2.

   SD-WAN over Hybrid Networks

The term used in the document seems to be "Hybrid Underlay"

[Linda] Yes. Changed to make it clearer.

---

2.

s/an Network/a Network/

[Linda] changed.
---

2.

It seems to me to be confusing to define a new term "C-PE" which:
- doesn't seem to stand for anything
- means "SD-WAN Edge node" which is already defined
- "can be Customer Premises Equipment (CPE)" which is a very similar
  abbreviation

Why can you not stick with "SD-WAN Edge node"?
[Linda]  For SD-WAN network expended from VPN, need to emphasize  the C-PE having additional port o another network.

---

2. and 3.1.4

Decide between "Zero Touch Provisioning" and "zero-touch provisioning"
[Linda] Zero Touch Provisioning
---

3.1.1

Please expand VRF and provide a citation
[Linda] added.
---

3.1.1

   As SD-WAN is an overlay network arching over multiple types of
   networks, MPLS L2VPN/L3VPN or pure L2 underlay can continue using
   the VPN ID, VN-ID, or VLAN in the data plane to differentiate
   packets belonging to different SD-WAN VPNs.


There are some unexplained abbreviations here.
[Linda] Add the reference.

---

3.1.2

Please expand UNI
[Linda] Added.
---