[bess] Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn

"Ali Sajassi (sajassi)" <sajassi@cisco.com> Fri, 07 June 2024 04:53 UTC

Return-Path: <sajassi@cisco.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E774BC1519B2; Thu, 6 Jun 2024 21:53:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.584
X-Spam-Level:
X-Spam-Status: No, score=-9.584 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="bC/fkbB3"; dkim=pass (1024-bit key) header.d=cisco.com header.b="Pbsqv3Pv"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hKFwP7XBU76X; Thu, 6 Jun 2024 21:53:31 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1D0BC1519B0; Thu, 6 Jun 2024 21:53:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=30674; q=dns/txt; s=iport; t=1717736011; x=1718945611; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=y1Ut9OmfaVEm9sTXv+HyTPF9Lu05UhL/iHTMCFv7uFs=; b=bC/fkbB3m+/Aj48JUuQSwI3Jt3m02m/TwRZvv7gSvmcqAPNKb3KPe9nA jxkhBnZFXEQvQUsqsQbZ3NfFrbfvslvD2ZeDVf0Rf+a4m8vVK/l8nNkqV DyF+n+wPXwHXXibK7jcSGsYGl1CjeDje9MRCwftFWc03C9smyNSue9BuN k=;
X-CSE-ConnectionGUID: KxceU4MzT+u0yV+mMm8bZg==
X-CSE-MsgGUID: rwhVEy8HRo2psdfrUWQwQw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:FYndWhP82+x1p8e9qUIl6nfMWUAX0o4cdiYc7p4hzrVWfbvmotLpP VfU4rNmi1qaFYnY6vcRk+PNqOigQm0P55+drWoPOIJBTR4LiMga3kQgDceJBFe9LavCZC0hF 8MEX1hgrDmgKUYAIM/lfBXJp2GqqzsbGxHxLw1wc//8GIfJlMWf3OGp8JqVaAJN13KxZLpoJ 0CupB7K/okO1JFvKKs61lPFo2AdfeNQyCIgKQeYng334YG7+5sLzg==
IronPort-Data: A9a23:4yDe7KgI+qR0Q3UvXW1pWxXUX161exAKZh0ujC45NGQN5FlHY01je htvXj+PbqqDa2X8KNhxat7jpxwEscLUmNdiHlM//iwyEXtjpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+1H1dOCn9CEgvU2xbuKUIPbePSxsThNTRi4kiBZy88Y0mYcAbeKRW2thg vus5ZWPULOZ82QsaD5Mtfrc8EoHUMna4Vv0gHRvPZing3eG/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVTmZk5tZkSXqkMqShrefUoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICVuvusGuk2jUTzjxm+RQT0QTON0SyOkiVAmi9 dRAQNwMRhmHg+Tzy7WhR6w2wM8iN8LseogYvxmMzxmAUq1gGs6FGv6MvIQFtNszrpgm8fL2f MMbYCF0bTzLYgZEPREcD5dWcOKA3CigLmIH8A3LzUYxy3LMzDJcwejNCt2PYseGS99ooX+Hn 32TqgwVBTlBaYTAkmDamp62vcfDhyr1RMcTGaG2s/Rnm0bW3WEYFQcbEFaluf+Ri0OiVZRYM UN80iAjtrMa9UG3QJ/6RRLQnZKflhcYX9wVGOog5UTXjKHV+A2eQGMDS1atdeDKqucVVTcn6 wOsje+qGGR+jv6QbHfN/IWb+Gba1TcuEUcOYioNTA0g6tbloZ0ugh+ncjqFOPDt5jESMW+pq w1mvBQDa6MvYdnnPphXEHjOhzaq45POVANwvEPcX3mu6UVyY4vNi22UBbrzs6oowGWxFwXpU J04dy62t71m4Xalz3PlfQn1NOv1j8tpyRWF6bKVI7Ev9i6251modp1K7Td1KS9Ba5ldJmG4M BGM41gIvPe/2UdGi4cqPOpd7Ox3ksDd+SjNCZg4k/IXO8ksLFfXlM2QTRfKgjGFfLcQfVEXY srDLp32Uh72+IxszSG9QK8GwKQ3yyUljWLVTtaT8vhU+eT2WZJhcp9caAHmRrlgtMus+VyJm /4BbJHi40sED4XDjtz/rNR7waYidyZrXPgbaqV/K4a+H+aRMDt8U6GAm+18KtQNcmY8vr6gw 0xRk3RwkTLXrXbGMg6NLHtkbdvSsVxX9BrX4QRE0Y6U5kUe
IronPort-HdrOrdr: A9a23:ace/UqyKC/w0D3xzk2xbKrPxY+gkLtp133Aq2lEZdPULSL36qy n+ppQmPEHP6Qr5AEtQ6OxoWJPtfZvdnaQFmLX5To3SLDUO2VHYY72KiLGSoQEIdBeOi9K1uZ 0QFJSWTeeAc2SS7vyKrjVQcexQvOVvmZrA7YyxvhIdKT2CKZsQkDuRYTzranGeMTM2f6bRY6 DsnfavyQDQH0g/X4CQPFVAde7FoNHAiZLhZjA7JzNP0mOzpALtwoTXVzyD0Dkjcx4n+9ofGG 7+/DDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijsohzAXvUgZ5Sy+BQO5M2/4lcjl9 fB5z06Od5o1n/Xdmap5TPwxgjb1io04XOK8y7avZKjm726eNsJMbsEuWtrSGqf16PmhqA77E t/5RPdi3OQN2KYoM2y3amRa/ggrDvGnZNrq59gs5UYa/peVFeUxrZvpn+81/w7bXnHwZFiH+ 90AM7G4vFKNVuccnDCp2FqhMehR3IpA369MwI/U+GuonBrdUpCvgAl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SIGHv3QS6vCEWiELtCN2PGqpbx7rlw7Oa2eIYQxJ93nJ jaSltXuWM7ZkqrA8yT259A9AzLXQyGLHnQ49Ab44I8tqz3RbLtPyHGQFcyk9G4q/FaGcHfU+ bbAuMePxYiFxqZJW9k5XyIZ3AJEwhqbCQ8gKdOZ26z
X-Talos-CUID: 9a23:YdWTS2FnUFLHHCUWqmJE5EUZJ5wAYEGe0S/BHQy9LGM5Qo+aHAo=
X-Talos-MUID: 9a23:9/EdjAllFKA7saX87McUdnp4K8dWzrX+KHoKy40dt8eeCBNJJA6C2WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jun 2024 04:53:30 +0000
Received: from alln-opgw-5.cisco.com (alln-opgw-5.cisco.com [173.37.147.253]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 4574rUaF009429 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 7 Jun 2024 04:53:30 GMT
X-CSE-ConnectionGUID: 9QrT+yKBSaKLD1pxjHNC3w==
X-CSE-MsgGUID: bqk6B/+zS2OIFKztqMAJbg==
Authentication-Results: alln-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=sajassi@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.08,220,1712620800"; d="scan'208,217";a="10468208"
Received: from mail-mw2nam04lp2170.outbound.protection.outlook.com (HELO NAM04-MW2-obe.outbound.protection.outlook.com) ([104.47.73.170]) by alln-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jun 2024 04:53:29 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Rb3uWtJTEjZoIhJ3koLcDRIvGuD1KaP4GXH8oGnm+zmtKRfCmzFPiuwnEqJMQVClCUI7u7nqUBJCnLQRirjZtXJJJYLU2oc34lEaCtiGdugWB5oMkAxH1r0IwRZzBRly994UpOhO1d0Xu1AKTq5m+m6LnCewKep7qOrKyas1PEYxCcfv6etWMlPM0A+PUQCQ/cnNVqHbXueHlpPa8bq3bipLMbaZSZNoqXpTRNqF05j8RiVOeAZOzFteqhUQa1zIhx2ahwWLlhHVs1+8XavbdOjcGupK2MGR0WzX3qftUVdmIhtyVsbcNoHfI0c3uFLDGd6W/1bMcqjzn19/vA1sbw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=y1Ut9OmfaVEm9sTXv+HyTPF9Lu05UhL/iHTMCFv7uFs=; b=FRvXNAzH32Y11BJZmWhtXv7lVp4MJ8DtxGqohG+BPUW5NAvNv65MUmNZZkG8lAvqq7aituLAzDyitPDNYRoHDRwH0286YCdjxUhuD5XObAFLdxAKGxCD5+0VQ/Fv++DEzRBmiv7Iu0lhXMjTioisRy8I0nVkygwvfnimnAnRzYiIF9McWJMtVSOhtvAc7x6AupaD2NkDcV4eGjux//GxyHjFvITaYUi0NuRIR8AZpJlO1P+32lF5Q9GF7Yu6zkABW12yrA2+Dnv3weV9bXiSnpq1aA1gBTUGLEmeuD812MQaWRdFqlKPHvyzGLEmuFx6AFeYABg6WWWXcj7BDzGrbw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y1Ut9OmfaVEm9sTXv+HyTPF9Lu05UhL/iHTMCFv7uFs=; b=Pbsqv3PvsNNNeSqexIdrjuK/bk/A9uozzUN4tQqjJkEqX8WGyU9mxprY+GWjuuHyVemnejJV3DZ7Td0LJ0E8kkAfCG7EWSM5IkdbLeQOL2nCsZmU7ys2bxnFo37fp/wVEZE//4d12fMu9pBu6vjhVtlU9ouHF+hDCyhOm6Rq6cc=
Received: from SJ0PR11MB5770.namprd11.prod.outlook.com (2603:10b6:a03:421::6) by SA3PR11MB7610.namprd11.prod.outlook.com (2603:10b6:806:31d::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.21; Fri, 7 Jun 2024 04:53:27 +0000
Received: from SJ0PR11MB5770.namprd11.prod.outlook.com ([fe80::6380:de9d:7f00:e9ea]) by SJ0PR11MB5770.namprd11.prod.outlook.com ([fe80::6380:de9d:7f00:e9ea%2]) with mapi id 15.20.7633.021; Fri, 7 Jun 2024 04:53:27 +0000
From: "Ali Sajassi (sajassi)" <sajassi@cisco.com>
To: Linda Dunbar <linda.dunbar@futurewei.com>
Thread-Topic: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
Thread-Index: Adqf5r0n8EGG1Zz4QQiJzOIx39malQYr7WGg
Date: Fri, 07 Jun 2024 04:53:27 +0000
Message-ID: <SJ0PR11MB577031DA2A534F38CEDB1223B0FB2@SJ0PR11MB5770.namprd11.prod.outlook.com>
References: <CO1PR13MB4920ED1F49CFE4D3F16A6772851C2@CO1PR13MB4920.namprd13.prod.outlook.com>
In-Reply-To: <CO1PR13MB4920ED1F49CFE4D3F16A6772851C2@CO1PR13MB4920.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB5770:EE_|SA3PR11MB7610:EE_
x-ms-office365-filtering-correlation-id: 63bd4a0c-47fb-4a53-634f-08dc86adc540
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|366007|376005|1800799015|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ0PR11MB5770.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366007)(376005)(1800799015)(38070700009);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SJ0PR11MB577031DA2A534F38CEDB1223B0FB2SJ0PR11MB5770namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5770.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 63bd4a0c-47fb-4a53-634f-08dc86adc540
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Jun 2024 04:53:27.6126 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1mZbdUoRgQPZJS3VPBsD82CdPsK2m2rzynUkZlM0n2wGf304xt3LzWwz9J6h6x9/chC9lGx6SJBnBrv9SiOs/g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA3PR11MB7610
X-Outbound-SMTP-Client: 173.37.147.253, alln-opgw-5.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Message-ID-Hash: ZCDSEYV5MERAU7QPDYPGBQ55BA3J6JWA
X-Message-ID-Hash: ZCDSEYV5MERAU7QPDYPGBQ55BA3J6JWA
X-MailFrom: sajassi@cisco.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "bess@ietf.org" <bess@ietf.org>, "draft-ietf-bess-secure-evpn@ietf.org" <draft-ietf-bess-secure-evpn@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [bess] Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/fobTTffEu8QGyhihQf0QuyJCvtQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>

Hi Linda,

I don’t think we need to put too much explanation wrt SRv6 because with respect to IPsec, it is just a IPv6 encapsulation. So, let me expand on it with respect to your four points below:

  1.  Scenario description: The rational and the reasons for needing IPsec are basically the same whether it is for regular IPv6 or SRv6. So, such text is already covered in the draft.
  2.  Implementation Strategy: with respect to flow identification, policy configuration, etc. The draft already covers that and indicates different level of granularity (all the way at the flow level) for doing IPsec encap.
  3.  Security considerations and benefits: This is again applies to both IPv6+ VxLAN and SRv6. So, if we need to beef up some existing texts, we can do it.

So, I can add a sentence or two to sections 9.1 and 9.2 mentioning that IPv6 can carry an extension header including SRv6.

Cheers,
Ali

From: Linda Dunbar <linda.dunbar@futurewei.com>
Date: Monday, May 6, 2024 at 12:40 PM
To: Ali Sajassi (sajassi) <sajassi@cisco.com>
Cc: bess@ietf.org <bess@ietf.org>, draft-ietf-bess-secure-evpn@ietf.org <draft-ietf-bess-secure-evpn@ietf.org>
Subject: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn
Ali,

I am writing to follow up on our discussion during the IETF 119 BESS WG session regarding the draft-wang-bess-secservice. As you may recall, you endorsed Option 1 as the preferable approach for using SECURE-EVPN mechanism to encrypt selective SRv6 Flows into the Secure EVPN framework.
Option 1: Merge with Secure EVPN, directly incorporating the section into the main body of the document.
Additionally, consider adding a description of the necessary encapsulation methods in Section 9 and extending the discussion of new tunnel types in Section 10 to accommodate this feature.

Proposed Integration: I suggest adding a new subsection, "Encrypting Selective SRv6 Flows," to Section 3 of the Secure EVPN draft. This addition would detail the use case and requirements for selectively applying IPsec encryption to SRv6 data flows within NSP-managed networks, addressing the need for heightened security measures for sensitive data.

The proposed content for the subsection "Encrypting Selective SRv6 Flows" would include:

Scenario Description: Highlighting environments where SRv6 is deployed and the types of data flows that require enhanced security measures.
Implementation Strategy: Outlining the steps for implementing IPsec encryption, including flow identification, policy configuration, and the encryption mechanism itself.
Security Considerations: Discussing the added complexity and necessary management adjustments to maintain performance and security.
Benefits: Explaining how this approach secures sensitive information and ensures compliance with various regulatory requirements.

Here is the wording proposal. You can modify them to fit the SECURE-EVPN style.

3.6 Encrypting Selective SRv6 Flows
While a Network Service Provider (NSP) managed SRv6 domain is often considered a trusted and secure domain as detailed in RFC 8754, RFC 8402, and RFC 8986, certain scenarios require an enhanced security model. Particularly in cases where data flows carry sensitive or confidential information, there is a compelling need for additional security measures. Encrypting selective SRv6 flows caters to this need by providing robust protection even within a network environment presumed to be secure.

Scenario Description
In environments where SRv6 is deployed, data flows might include transactions requiring confidentiality, integrity, and authenticity assurances that exceed standard network security measures. Examples include financial transactions, personal data transmissions subject to privacy regulations, or corporate communications involving sensitive strategic content. In such cases, selectively encrypting specific SRv6 flows ensures that even if network breaches occur, the encrypted data remains secure.

Implementation Strategy
The implementation of IPsec for encrypting selective SRv6 flows involves the following steps:
Flow Identification: Define criteria for selecting which SRv6 flows require encryption. This could be based on the type of data, the source/destination of the flows, or preconfigured security policies.
Policy Configuration: Configure security policies that dictate the parameters for encryption, such as the algorithms used, the keys to be employed, and the duration of key validity. These policies are applied specifically to the identified SRv6 flows that require encryption.
Encryption Mechanism: Utilize IPsec in transport mode to encrypt the payload of identified SRv6 packets. The SRH (Segment Routing Header) remains unencrypted to allow for the routing of the packet, while the payload is encrypted, ensuring the confidentiality and integrity of the data.

Security Considerations
Encrypting selective SRv6 flows introduces additional complexity into the network management. It requires careful coordination between network security policies and the dynamic requirements of SRv6 routing. Additionally, the overhead introduced by encryption needs to be evaluated to ensure that it does not impact the network performance adversely. Effective monitoring and management are crucial to detect and respond to security incidents in a timely manner.

Benefits
This approach enhances data security by protecting sensitive information from potential eavesdropping and tampering. It also provides compliance with various regulatory requirements for data protection, offering an added layer of security without encrypting all network traffic, which can be resource intensive.
________________________________
This addition will fit seamlessly into your existing document structure under Section 3, providing a detailed examination of how IPsec can be used to enhance the security of selective SRv6 flows in a network environment managed by NSPs.



I look forward to your feedback on this proposal and am eager to assist in any drafting or revisions needed to facilitate this integration. Once we align on the approach, I will provide detailed text for adding a subsection in section 9 to describe encapsulation and adding extension of new tunnel type in section 10.

Thank you for considering this enhancement. I believe it will make a substantial contribution to the deployment and effectiveness of SECURE-EVPN by addressing critical security needs in SRv6 networks.

Linda