[bess] 为什么 Tunnel-Type suggested by draft-wang-bess-secservice 没有 indication of SRv6 header?
Linda Dunbar <linda.dunbar@futurewei.com> Mon, 10 June 2024 23:18 UTC
Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEAC0C14F6F4; Mon, 10 Jun 2024 16:18:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lcZFksfv_qq7; Mon, 10 Jun 2024 16:18:13 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2126.outbound.protection.outlook.com [40.107.244.126]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9349CC14F6E9; Mon, 10 Jun 2024 16:18:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c3X1oWHhqOIi5xA7Q2zhMy7CN7kG7oPqiHGIG4vbFUyCvLZEeSmufDS/xmq0I5eJJtjTe47vwXkcavSvig436h/3lCa5nu1g6wRGF/N67ywF+upBBMg2BmwvxE6RN9bUw6NWyFHZGus5faJIAnxvDgziSsrTfTRJNUc/niauZriLjWIM35FWvOZTavwJNsy05O5TDt3QZe68mqVd6wLmsC0sUP16Dv5gOKWbe2EGe09hMRwaqtbOasl3wKQEM8ej63UNLpc3DJTNWQQ7YRRkja5J2VG740H52XwGXmolQ6xQ10zqHTP0/0pbarcP89LQdzBJNlQNcLEsngTonTb/ZQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=h3n18tpw/p9Z13A69zkG4GDnThdtJZSE+obkIZu0qBI=; b=UbELMwyYBowdnzbzfbAonOvx/euKuaPESufepen/9kVj+IPmT+bl3rHAdirmHAK6ZAUp4BFkQb2dqP3AmxHgC4QdsriEYTV+kAcViX0Kn8qbJA87L2hdQkLsp0ySZXefBAN8anf8Jy4UKk6dZ0QulI+SLBZ4Kf2seWPuX5B0l6h+c3fAncgra4YD3H1DxtcgFOTJ+ApxzbfjAMX1xAbweBZReewMylIroQThD7MR7LCHnXH+Sg2fPDpSZWRZutrzwqvASsCyzs50YITrgGBSiHvJIPBn/iM+8CLxiJE1/FXQudBKYDS6UEzudGjZhVpo/sePlNOogmftdM/lrGdLYg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=h3n18tpw/p9Z13A69zkG4GDnThdtJZSE+obkIZu0qBI=; b=nqGpZBK37wu543+c4MljwbArBt1102Kdal2deBD2ePOFh8TgsKTGFEV5+Yil1LkLhJyCmyLUvTZmzKGNtdyPMkF6Ne4eYQ7Los4O6z/WwAfyld8pEaUrSImeHFpEyAjTT2dwiYKWqR2PvCiZX93Px6wyv8fvw52VcHPmh99j47Q=
Received: from CO1PR13MB4920.namprd13.prod.outlook.com (2603:10b6:303:f7::17) by LV3PR13MB6848.namprd13.prod.outlook.com (2603:10b6:408:27d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.17; Mon, 10 Jun 2024 23:18:07 +0000
Received: from CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::4021:909f:bb6c:72a6]) by CO1PR13MB4920.namprd13.prod.outlook.com ([fe80::4021:909f:bb6c:72a6%5]) with mapi id 15.20.7677.014; Mon, 10 Jun 2024 23:18:07 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: "shihang (C)" <shihang9@huawei.com>, "Wanghaibo (Rainsword)" <rainsword.wang@huawei.com>, Shengcheng <shengcheng@huawei.com>
Thread-Topic: 为什么 Tunnel-Type suggested by draft-wang-bess-secservice 没有 indication of SRv6 header?
Thread-Index: AQHau4xzwiuvuN5ZzUSwlOsekVBJMg==
Date: Mon, 10 Jun 2024 23:18:07 +0000
Message-ID: <CO1PR13MB4920AB25599DF7EE0DBD579B85C62@CO1PR13MB4920.namprd13.prod.outlook.com>
References: <CO1PR13MB4920ED1F49CFE4D3F16A6772851C2@CO1PR13MB4920.namprd13.prod.outlook.com> <SJ0PR11MB577031DA2A534F38CEDB1223B0FB2@SJ0PR11MB5770.namprd11.prod.outlook.com>
In-Reply-To: <SJ0PR11MB577031DA2A534F38CEDB1223B0FB2@SJ0PR11MB5770.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=futurewei.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR13MB4920:EE_|LV3PR13MB6848:EE_
x-ms-office365-filtering-correlation-id: e3752f11-b604-4ffa-71e3-08dc89a39679
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|376005|1800799015|366007|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR13MB4920.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(376005)(1800799015)(366007)(38070700009);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CO1PR13MB4920AB25599DF7EE0DBD579B85C62CO1PR13MB4920namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR13MB4920.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e3752f11-b604-4ffa-71e3-08dc89a39679
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jun 2024 23:18:07.6684 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Redvf671UPHZ2Vx1RHQ3dJithepUbFG0luB30cxfNn2uHLemI9p7cmgAVrdkQHw0pHF0X894nFx86UliKS79xA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV3PR13MB6848
Message-ID-Hash: B7XIGN7RP4EDTFHA3MYIBA3GDCZQARCY
X-Message-ID-Hash: B7XIGN7RP4EDTFHA3MYIBA3GDCZQARCY
X-MailFrom: linda.dunbar@futurewei.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "bess@ietf.org" <bess@ietf.org>, "draft-ietf-bess-secure-evpn@ietf.org" <draft-ietf-bess-secure-evpn@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [bess] 为什么 Tunnel-Type suggested by draft-wang-bess-secservice 没有 indication of SRv6 header?
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/g_Hs_vTve3INGsPvXlObI09ER2Y>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>
Shihang, Haibo, and Sheng Cheng, draft-wang-bess-secservice-02 只要求加一个ESP-Encrypted-Payload。 我觉得Ali 说的有道理, draft-ietf-bess-secure-evpn-00 已经定义了 ESP-encrypted-payload (i.e., ESP-Transport), which expose the IPv6 header (including the SID fields) outside the ESP encryption. Another ESP-encrypted-payload type (ESP-in-UDP-Transport) leaves the UDP outside the ESP encryption. 除非是你们要加一个 新的 tunnel-type, that specifically saying about SRv6 outer header. E.g. ESP-in-SRv6-Transport). 为什么不叫 “ESP-in-SRv6-Transport”? is it necessary to have two options, option 1 has UDP port outside the ESP, option 2 has UDP port inside the ESP? Linda From: Ali Sajassi (sajassi) <sajassi@cisco.com> Sent: Thursday, June 6, 2024 9:53 PM To: Linda Dunbar <linda.dunbar@futurewei.com> Cc: bess@ietf.org; draft-ietf-bess-secure-evpn@ietf.org Subject: Re: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn Hi Linda, I don’t think we need to put too much explanation wrt SRv6 because with respect to IPsec, it is just a IPv6 encapsulation. So, let me expand on it with respect to your four points below: 1. Scenario description: The rational and the reasons for needing IPsec are basically the same whether it is for regular IPv6 or SRv6. So, such text is already covered in the draft. 2. Implementation Strategy: with respect to flow identification, policy configuration, etc. The draft already covers that and indicates different level of granularity (all the way at the flow level) for doing IPsec encap. 3. Security considerations and benefits: This is again applies to both IPv6+ VxLAN and SRv6. So, if we need to beef up some existing texts, we can do it. So, I can add a sentence or two to sections 9.1 and 9.2 mentioning that IPv6 can carry an extension header including SRv6. Cheers, Ali From: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> Date: Monday, May 6, 2024 at 12:40 PM To: Ali Sajassi (sajassi) <sajassi@cisco.com<mailto:sajassi@cisco.com>> Cc: bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>, draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org> <draft-ietf-bess-secure-evpn@ietf.org<mailto:draft-ietf-bess-secure-evpn@ietf.org>> Subject: Suggested wording to merge the content from draft-wang-bess-secservice to draft-bess-secure-evpn Ali, I am writing to follow up on our discussion during the IETF 119 BESS WG session regarding the draft-wang-bess-secservice. As you may recall, you endorsed Option 1 as the preferable approach for using SECURE-EVPN mechanism to encrypt selective SRv6 Flows into the Secure EVPN framework. Option 1: Merge with Secure EVPN, directly incorporating the section into the main body of the document. Additionally, consider adding a description of the necessary encapsulation methods in Section 9 and extending the discussion of new tunnel types in Section 10 to accommodate this feature. Proposed Integration: I suggest adding a new subsection, "Encrypting Selective SRv6 Flows," to Section 3 of the Secure EVPN draft. This addition would detail the use case and requirements for selectively applying IPsec encryption to SRv6 data flows within NSP-managed networks, addressing the need for heightened security measures for sensitive data. The proposed content for the subsection "Encrypting Selective SRv6 Flows" would include: Scenario Description: Highlighting environments where SRv6 is deployed and the types of data flows that require enhanced security measures. Implementation Strategy: Outlining the steps for implementing IPsec encryption, including flow identification, policy configuration, and the encryption mechanism itself. Security Considerations: Discussing the added complexity and necessary management adjustments to maintain performance and security. Benefits: Explaining how this approach secures sensitive information and ensures compliance with various regulatory requirements. Here is the wording proposal. You can modify them to fit the SECURE-EVPN style. 3.6 Encrypting Selective SRv6 Flows While a Network Service Provider (NSP) managed SRv6 domain is often considered a trusted and secure domain as detailed in RFC 8754, RFC 8402, and RFC 8986, certain scenarios require an enhanced security model. Particularly in cases where data flows carry sensitive or confidential information, there is a compelling need for additional security measures. Encrypting selective SRv6 flows caters to this need by providing robust protection even within a network environment presumed to be secure. Scenario Description In environments where SRv6 is deployed, data flows might include transactions requiring confidentiality, integrity, and authenticity assurances that exceed standard network security measures. Examples include financial transactions, personal data transmissions subject to privacy regulations, or corporate communications involving sensitive strategic content. In such cases, selectively encrypting specific SRv6 flows ensures that even if network breaches occur, the encrypted data remains secure. Implementation Strategy The implementation of IPsec for encrypting selective SRv6 flows involves the following steps: Flow Identification: Define criteria for selecting which SRv6 flows require encryption. This could be based on the type of data, the source/destination of the flows, or preconfigured security policies. Policy Configuration: Configure security policies that dictate the parameters for encryption, such as the algorithms used, the keys to be employed, and the duration of key validity. These policies are applied specifically to the identified SRv6 flows that require encryption. Encryption Mechanism: Utilize IPsec in transport mode to encrypt the payload of identified SRv6 packets. The SRH (Segment Routing Header) remains unencrypted to allow for the routing of the packet, while the payload is encrypted, ensuring the confidentiality and integrity of the data. Security Considerations Encrypting selective SRv6 flows introduces additional complexity into the network management. It requires careful coordination between network security policies and the dynamic requirements of SRv6 routing. Additionally, the overhead introduced by encryption needs to be evaluated to ensure that it does not impact the network performance adversely. Effective monitoring and management are crucial to detect and respond to security incidents in a timely manner. Benefits This approach enhances data security by protecting sensitive information from potential eavesdropping and tampering. It also provides compliance with various regulatory requirements for data protection, offering an added layer of security without encrypting all network traffic, which can be resource intensive. ________________________________ This addition will fit seamlessly into your existing document structure under Section 3, providing a detailed examination of how IPsec can be used to enhance the security of selective SRv6 flows in a network environment managed by NSPs. I look forward to your feedback on this proposal and am eager to assist in any drafting or revisions needed to facilitate this integration. Once we align on the approach, I will provide detailed text for adding a subsection in section 9 to describe encapsulation and adding extension of new tunnel type in section 10. Thank you for considering this enhancement. I believe it will make a substantial contribution to the deployment and effectiveness of SECURE-EVPN by addressing critical security needs in SRv6 networks. Linda
- [bess] Suggested wording to merge the content fro… Linda Dunbar
- [bess] Re: Suggested wording to merge the content… Ali Sajassi (sajassi)
- [bess] 为什么 Tunnel-Type suggested by draft-wang-be… Linda Dunbar
- [bess] Re: Suggested wording to merge the content… Linda Dunbar
- [bess] Re: Suggested wording to merge the content… Ali Sajassi (sajassi)
- [bess] Re: Suggested wording to merge the content… Linda Dunbar