[bess] Re: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
Linda Dunbar <linda.dunbar@futurewei.com> Wed, 11 December 2024 18:24 UTC
Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40700C151543; Wed, 11 Dec 2024 10:24:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m62l0sNPbtgw; Wed, 11 Dec 2024 10:23:58 -0800 (PST)
Received: from NAM04-DM6-obe.outbound.protection.outlook.com (mail-dm6nam04on2110.outbound.protection.outlook.com [40.107.102.110]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2149C180B5A; Wed, 11 Dec 2024 10:23:58 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ZKYouI2AyU4TrBul/Lq2iByLpCO7joJE5uOIzjQ/TFUOGgA/2B1Z23qZqOAIb3jkcqoQOYf5LtUNSZ6EX33tTRaQlsVsmAAeKaXTJfXQo0MQxsDqh1TkkYyW4ALn4YxLbOURhFPYMgBkdYdv0qQW5tZtjPUXOqtiE/GrcXdD1VeJpChUrd1EZ+ez7pwmNuU1ZIcnBatsF5kIproNGgPG7LdQ3Ve3lzye9323zwjr3CXZS/Ur/IaaidLWN6o1zsrexdOR8JDSelBSt2igk2i/7suBKdKSXKDvodpf5h5YGcsi59BdBBpHmEOho7c/AjmjbZaipdPLjJHHzrqpuTB9gA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tAUPizmWSJ850oG3o8KaJoVLmfaeoMcc+gdCgigzX/Y=; b=H+s4M8hhAQtAZkXrSPGeSyc9egMbYYtJ2cxcxkl+MBRN3KLAGm2lu6iL9oWJucXiZBGfRlLrs1aoFXOiiG3mds0NeetbVKeb/mXzZneitTtwlvwE+TKnAAF236mFi+U4wvH/yzTO281VQar/Iyqn3ZlOEp8Xdw+rBfh1aw62aIexg8vDg5xSm6SPZ8R9yWs8uN2sukSgBQWLqtJbLmWYYvYURbrkqyiL7KY8xfpUPpfthv+eWGGoX6tsRyOcD1RRW+4JLBDxigg9919QLhqzR0+tF69icDNc7YLQRVeeQiA8NcHM6knBoOqwHyHgvsUqZajV7Y8eFHzEULPpR85EpQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tAUPizmWSJ850oG3o8KaJoVLmfaeoMcc+gdCgigzX/Y=; b=NQC17y3VTyYepUHt3UWvDmX2FSbCpyZQlNT7tFJYhXM1QbIJKLZNSvgD8nFZsld3tYl4Ow3DLs2qNfXH95I/8ZGQia5IAYfsVU7hafge85asYpHwPAeL+sPrO6EaY7uFHQQ/M3/8HgOdFgF+/oV+JU9JtAJpdhyBrSHMLTxc6GI=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by IA3PR13MB7003.namprd13.prod.outlook.com (2603:10b6:208:538::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8251.14; Wed, 11 Dec 2024 18:23:54 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::4021:909f:bb6c:72a6]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::4021:909f:bb6c:72a6%7]) with mapi id 15.20.8251.008; Wed, 11 Dec 2024 18:23:53 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: John Scudder <jgs@juniper.net>
Thread-Topic: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
Thread-Index: AQHaacrvlaDo1PCtykumhEfhM2Yb4bEe2QtwgAECa4CAOpHS4IAH1xkAgX+eExA=
Date: Wed, 11 Dec 2024 18:23:53 +0000
Message-ID: <CO1PR13MB492054A31DAA63E81D55CB38853E2@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <170907231389.62883.1060466592403115326@ietfa.amsl.com> <CO1PR13MB4920CCEDE24E814E38C504EF85582@CO1PR13MB4920.namprd13.prod.outlook.com> <84AE656D-708D-4458-9A4E-F91ACF02B5DA@juniper.net> <CO1PR13MB4920F84CBDC6F9F31D40968985032@CO1PR13MB4920.namprd13.prod.outlook.com> <35BD0F5D-C575-42E1-B019-7D31C4800CFE@juniper.net>
In-Reply-To: <35BD0F5D-C575-42E1-B019-7D31C4800CFE@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|IA3PR13MB7003:EE_
x-ms-office365-filtering-correlation-id: 47fc0526-b35a-4ad1-ff49-08dd1a10f7d9
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|376014|1800799024|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR13MB4920.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB492054A31DAA63E81D55CB38853E2CO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 47fc0526-b35a-4ad1-ff49-08dd1a10f7d9
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Dec 2024 18:23:53.6122 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: SgugmrcWsG4doX/bQJH30rgZfz6nw7B/M+p8fAE2T353Fy1XCTn8B7WRBHnpSIo2xpwbcS54nbIgRDgx7aZ21g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA3PR13MB7003
Message-ID-Hash: UTCADZNY236VTPSPLXT5XKCCAAKBYBAK
X-Message-ID-Hash: UTCADZNY236VTPSPLXT5XKCCAAKBYBAK
X-MailFrom: linda.dunbar@futurewei.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, "draft-ietf-bess-bgp-sdwan-usage@ietf.org" <draft-ietf-bess-bgp-sdwan-usage@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "matthew.bocci@nokia.com" <matthew.bocci@nokia.com>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [bess] Re: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT)
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/_4fu4tjUoifuWbe4HRTfQYcCwWE>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>
John, We are revising draft-ietf-bess-bgp-sdwan-usage-24 in response to the Directorate review of draft-ietf-idr-sdwan-edge-discovery, which recommended maintaining a separate draft to document SD-WAN use cases and requirements rather than merging its content into draft-ietf-idr-sdwan-edge-discovery. https://datatracker.ietf.org/doc/draft-ietf-bess-bgp-sdwan-usage/ Given the limited work on SD-WAN within the IETF, having a dedicated document to describe SD-WAN use cases and requirements can establish a baseline to guide not only discussions on BGP protocol extensions in the IDR but also related efforts, such as draft-ietf-rtgwg-multi-segment-sdwan in the RTGWG and draft-sheng-idr-gw-exchange-in-sd-wan. While BGP and IPsec are well-established technologies, their application in SD-WAN environments presents unique challenges, including scalability, traffic segmentation, and multi-homing. This document aims to establish a common foundation to support and guide the SD-WAN-related efforts in IETF. Here are the resolutions to your comments. Please let us know if they are satisfactory. Linda -----Original Message----- From: John Scudder <jgs@juniper.net> Sent: Wednesday, April 10, 2024 2:14 PM To: Linda Dunbar <linda.dunbar@futurewei.com> Cc: The IESG <iesg@ietf.org>; draft-ietf-bess-bgp-sdwan-usage@ietf.org; bess-chairs@ietf.org; bess@ietf.org; matthew.bocci@nokia.com Subject: Re: John Scudder's Discuss on draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT) Hi Linda, Looking at the diff between versions 20 and 22 I continue to have concerns. I don’t think I’ve gotten much in the way of responses to my first and second points, but to a large extent, these are for the AD and WG chairs; they can redirect back to the authors as needed, but let’s not focus on them right now. The third and fourth points are squarely in the authors’ court. Regarding my third DISCUSS point, about Section 5.2, in your revised version you’ve added, Note: The IPsec Tunnel Type specified in RFC5566 is obsolete. A new tunnel type is needed to represent the IPsec Tunnel underlay path. I don’t think it’s a good idea for us to be publishing RFCs that are effectively obsolete on delivery. If a new tunnel type is needed, then that work should be done before you publish a solution that depends on it! For that matter, Section 5.3 in the revision now has, [Linda] We have made the change in the version-24 as below: “Note: The IPsec Tunnel Type specified in RFC 5566 is obsolete. To indicate that the prefixes 192.0.2.4/30 and 192.0.2.8/30 are carried using a hybrid of IPsec underlay paths, a new tunnel type, such as one designed for SDWAN-Hybrid environments, is required. The specific definition and mechanism of such a tunnel type are expected to be addressed in future specifications.” UPDATE #1a for the client prefix 192.0.2.4/30: - MP-NLRI Path Attribute: 192.0.2.4/30 Nexthop: 192.0.2.2 (C-PE2) - Encapsulation Extended Community: TYPE = IPsec - Color Extended Community: RED Which has the same problem (but no disclaimer). It also recurs in Section 5.4, unchanged from the previous versions. [Linda] Change to IPsecSA with a note: “Note: The term "IPsecSA" is used here solely to illustrate the need for a new tunnel type. The specific definition and mechanism for such a tunnel type are expected to be defined in future specifications. “ There’s also a second problem, which is more critical than the (already serious) problem of using an obsolete type in a new RFC. That is, you don’t say anywhere what the intended *semantics* of the "Encapsulation Extended Community: TYPE = IPsec” are. What I understood (but I might be wrong) from our previous conversation is that it’s intended as a hint that when resolving the client route, if there are multiple tunnel types associated with 192.0.2.2, then the IPsec tunnel type should be preferred. As we discussed previously, I don’t think this is needed, RFC 9012 already has all the machinery you need using Color Extended Community. (Keep in mind that a thing can have more than one Color Extended Community associated with it.) [Linda] The new IPsecSA tunnel type explicitly signals the intended semantics for using IPsec tunnels in specific scenarios. As this is an informational document on use cases and requirement, it doesn’t define the tunnel type. While RFC 9012’s Color Extended Community provides a robust mechanism for encoding preferences, IPsecSA adds an essential layer of specificity for environments requiring strict adherence to IPsec-based encapsulation policies. While I don’t insist that you follow the approach I suggest, I do think the spec has to be clear about what the "Encapsulation Extended Community: TYPE = IPsec” (or its replacement) is *for*, since it’s clearly *not* for what RFC 9012 documents the semantics of an Encapsulation Extended Community to be. Right now, this is left up to the imagination of the reader. Leaving things to the imagination of the reader is the opposite of what an RFC should do. [Linda] We agree. A new IPsecSA tunnel type in the Encapsulation Extended Community is intended to explicitly indicate a preference or requirement for using IPsec SA for traffic encapsulation in specific scenarios. Regarding my fourth DISCUSS point, about Section 3.1.5, my understanding from our conversation is that the security model is based on route reflectors having configured (possibly by a management system of course) policy that controls what PEs are allowed to receive what routes. Here’s your updated paragraph that makes it more explicit (thank you): BGP is well suited for this purpose. RFC4684 has specified the procedure to constrain the distribution of BGP UPDATE to only a subset of nodes. Route-Reflector (RR) [RFC4456], as an integral part of the SD-WAN controller, has the policy governing communication among peers. The RR only propagates the BGP UPDATE from an edge to others within the same SD-WAN VPN. I continue to wonder why you need RFC 4684 at all, given that you’re telling me that the “Route-Reflectors… has the policy governing communication among peers”, that is, it already *knows* where the routes are supposed to go, so why does it need RFC 4684 to tell it? [Linda] The reference to RFC4684 was removed in v-23. The updated paragraph is: “BGP is well suited for this purpose. A Route-Reflector (RR) [RFC4456], integrated into the SD-WAN controller, has the policy governing the communication among peers. The RR ensures that BGP UPDATE from an edge only is propagated to the edges within the same SD-WAN VPN.” Also, irrespective of the details of the above, I think the Security Considerations section deserves to have a clearer description of the security model, instead of having it only embedded in the middle of Section 3.1.5. (My understanding with the revised text, is that all security properties depend on the correct configuration and operation of the route reflectors. Which is fine, but shouldn’t you say so?) [Linda] We have revised the section to include a clearer description of the security model, as you suggested. The updated text now explicitly states that the security properties of the SD-WAN depend heavily on the correct configuration and operation of the Route Reflector (RR), which acts as the central control point. This includes secure communication channels, policy enforcement, and mitigation of risks associated with Internet-facing WAN ports. Regards, —John > On Apr 5, 2024, at 5:49 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote: > > John, > > Thank you very much for spending time with us during IETF 119 explaining your concerns of the draft. > > We have revised the draft that addressed all the comments and suggestions from the IESG LC comments and discussion during the IETF119 meeting. > > https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furld > efense.com%2Fv3%2F__https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-i > etf-bess-bgp-sdwan-usage%2F__%3B!!NEt6yMaO-gk!Aig25lrJiALWg7GcYb1GZy4G > v6IxUHna2EKPVJEx8bud-CQ8epcnZiXymefsUgLlR7_4hQYYmcS64Cu37Ii0qmA%24&dat > a=05%7C02%7Clinda.dunbar%40futurewei.com%7Cd3c9d07693c54c6b1f6808dc59a > 32139%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638483804391192490% > 7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik > 1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=k9IliE%2FLFPTZTwl2vsgjVnLz9IcL > MSQGfQ0%2FAmVIklk%3D&reserved=0 Can you please review and let us know > if the draft can be moved forward to RFC? > > This document describes the SD-WAN use cases, which explain why WAN port advertisements for the underlay path and client prefix advertisements need to be separated and illustrate how the BGP-based control plane can effectively manage large-scale SD-WAN overlay networks with minimal manual intervention. > > Thank you very much, > Linda > > -----Original Message----- > From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>> > Sent: Wednesday, February 28, 2024 9:05 AM > To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> > Cc: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>; > draft-ietf-bess-bgp-sdwan-usage@ietf.org<mailto:draft-ietf-bess-bgp-sdwan-usage@ietf.org>; bess-chairs@ietf.org<mailto:bess-chairs@ietf.org>; > bess@ietf.org<mailto:bess@ietf.org>; matthew.bocci@nokia.com<mailto:matthew.bocci@nokia.com> > Subject: Re: John Scudder's Discuss on > draft-ietf-bess-bgp-sdwan-usage-20: (with DISCUSS and COMMENT) > > Hi Linda, > > A few replies to some of the more specific/actionable points, below. > >> On Feb 27, 2024, at 10:47 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote: > ... >> ### Error in how RFC 9012 is used >> >> In Section 5.2, the Encapsulation Extended Community is misused. See >> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furl >> defense.com%2Fv3%2F__https%3A%2F%2Fnam11.safelinks.protection.outlook >> .com%2F%3Furl%3Dhttps*3A*2F*2Fmail__%3BJSUl!!NEt6yMaO-gk!Aig25lrJiALW >> g7GcYb1GZy4Gv6IxUHna2EKPVJEx8bud-CQ8epcnZiXymefsUgLlR7_4hQYYmcS64Cu3O >> fo47_s%24&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cd3c9d07693c54 >> c6b1f6808dc59a32139%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C6384 >> 83804391203378%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2 >> luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=l0LUHAnLoET%2 >> BfYWWEH5eov3gNTNZggKdtF6cdo%2F8OkY%3D&reserved=0 >> archive.ietf.org%2Farch%2Fmsg%2Fidr%2FumBB5yfoC3mFMpIWIT2K8159Gos%2F&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cb65cbbac81144d1fbb1808dc386ead26%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638447295225231753%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=CKLRVL8ylb5Ey6U3cmYMo2A%2FsmtBpLj8Ir%2BQ9Oq%2FwFU%3D&reserved=0 for related explanation of the error. The error recurs in Sections 5.3 and 5.4. >> >> [Linda] Please see the discussions related to the topic. For SD-WAN scenario, simple NextHop is not enough for client routes advertisement because different client routes need to be forwarded by different underlay paths. It is not practical to include all the information about the underlay path with the client routes advertisement. > > To paraphrase my reply to the other thread linked above, just because you want a nail, that doesn't mean Encapsulation Extended Community is a nail. In that last reply, I suggested a few other mechanisms you could use, but if you think you must have some kind of tunnel affinity indicator that isn’t color, you can specify one, there are plenty of unused extended community code points available. But Encapsulation Extended Community has already been specified and does not have the semantics you want. > > (As an aside, anywhere you’re referencing a code point, if you’re not > using the exact name found in the IANA registry, please mention the > numeric value also.) > >> Also, there is no such thing as “TYPE = IPsec” (referenced in >> Sections 5.2 and 5.4), see >> https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.com%2Fv3%2F__https%3A%2F%2Fnam11.safelinks.protection.outlook.com%2F%3Furl%3Dhttps*3A*2F*2Fwww__%3BJSUl!!NEt6yMaO-gk!Aig25lrJiALWg7GcYb1GZy4Gv6IxUHna2EKPVJEx8bud-CQ8epcnZiXymefsUgLlR7_4hQYYmcS64Cu37FMbm5A%24&data=05%7C02%7Clinda.dunbar%40futurewei.com%7Cd3c9d07693c54c6b1f6808dc59a32139%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C638483804391211116%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=uaV5OP%2BjfxETbvUnUcYfHmNShsM8BzKZaQnlrsaTN7w%3D&reserved=0 . >> iana.org%2Fassignments%2Fbgp-tunnel-encapsulation%2Fbgp-tunnel-encaps >> u >> lation.xhtml%23tunnel-types&data=05%7C02%7Clinda.dunbar%40futurewei.c >> o >> m%7Cb65cbbac81144d1fbb1808dc386ead26%7C0fee8ff2a3b240189c753a1d5591fe >> d >> c%7C1%7C0%7C638447295225239072%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj >> A >> wMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdat >> a >> =qrDlj1%2F2jHbhRd2G40zQMNybiwzNz3iN%2FBkrJ78grew%3D&reserved=0 >> >> [Linda] RFC5566 has specified IPsec Tunnel Type (IPsec in Tunnel-mode: Tunnel Type = 4 [RFC4302], [RFC4303]). We can add the reference. > > RFC 5566 status is Obsolete, Tunnel Type = 4 status is Deprecated (that’s why I put the link to the registry there, in part). I don’t think we should be publishing new RFCs with normative references to Obsolete RFCs and Deprecated code points. > >> This one should be straightforward to fix. It does lead me to be >> worried about the level of review the document has received, though. >> >> ### Section 3.1.5, security model >> BGP is well suited for this purpose. RFC4684 has specified the >> procedure to constrain the distribution of BGP UPDATE to only a >> subset of nodes. Each edge node informs the Route-Reflector (RR) >> [RFC4456] on its interested SD-WAN VPNs. The RR only propagates >> the BGP UPDATE from an edge to others within the same SD-WAN VPN. >> >> RFC 4684 is driven by demand -- a PE will advertise RT membership >> NLRI to "request" that it receive routes with the given RT. So, this >> means the security model is that the client router is implicitly >> trusted to declare its VPN >> membership(s) truthfully and accurately. I don't see this addressed >> in the Security Considerations. >> >> [Linda] Section 3.2 states that the SD-WAN Local Network Controller, e.g., RR in BGP-controlled SD-WAN, is managing the policy governing communication among peers. >> >> Here is the wording added in Section 3.1.5 to address your concern: >> “Route-Reflector (RR) [RFC4456], as an integral part of the SD-WAN controller, has the policy governing communication among peers. The RR only propagates the BGP UPDATE from an edge to its authorized peers.” > > If the RR has to be explicitly configured to police all propagation of routes, instead of trusting RT membership NLRI… what value does RFC 4684 bring? You’re already requiring that the distribution topology be comprehensively configured. > > (As an aside, no BGP speaker “propagates BGP UPDATE” messages, that’s > not a thing, the closest we get in our standards is BMP Route > Mirroring mode, but that’s not applicable here. What you mean is that > the RR only propagates BGP routes from an edge to its authorized > peers.) > >> >> --------------------------------------------------------------------- >> - >> COMMENT: >> ——————————————————————————————————— > ... >> [Linda] The term “Client Route” is adopted from the RFC4364. In this document, client route means the prefixes attached to the client ports of an SD-WAN edge. Add this to the Terminology section. > > I don’t see “client route” in RFC 4364, but if you’ve added a definition that’s fine. > > ... >> What anti-DDoS mechanism is that? None is specified here, nor referenced. >> >> [Linda] anti-DDoS is a commonly used tool for any interface facing ports. It is out of the scope of this document to describe the details. Is adding the following sentence helpful? >> “The anti-DDoS mechanism comprises numerous components, and their detailed discussion is beyond the scope of this document.” > > Not helpful to me — if it’s a commonly used tool, surely there might be some reference available for it. But I see Roman has raised this point too, I’ll defer to him for further discussion of it. > >> ### Figure 7 >> >> Figure 7 is mangled to the point of being unreadable. >> >> [Linda] Figure 7 is to show underlay paths can be via trusted VPN and “untrusted network”. Over the “Untrusted Network”, packets have to be encrypted. We greatly appreciate any suggestion to make it better. The intent is to demonstrate some traffic have to be forwarded via trusted VPN, while other traffic can be forwarded via either untrusted network (with encryption) or trusted VPN. > > I literally mean that the lines and boxes and such don’t line up, there are boxes without labels, etc. It looks like the ASCII-art got trashed in version 16, so my suggestion would be to revert to what was in version 15 as “figure 8”. Even that version is a little funky — is it really your intent that there be no connection between A3 and the adjacent PE? Seems like it couldn’t possibly be, since as currently pictured C-PE-a has no connection to the trusted VPN and therefore isn’t actually illustrating “hybrid”. So probably add that arc too. > > —John
- [bess] John Scudder's Discuss on draft-ietf-bess-… John Scudder via Datatracker
- Re: [bess] John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- Re: [bess] John Scudder's Discuss on draft-ietf-b… John Scudder
- Re: [bess] John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- Re: [bess] John Scudder's Discuss on draft-ietf-b… John Scudder
- Re: [bess] John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- [bess] Re: John Scudder's Discuss on draft-ietf-b… Linda Dunbar
- [bess] BESS charter [was: Re: John Scudder's Disc… John Scudder
- Re: [bess] BESS charter [was: Re: John Scudder's … Susan Hares