Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

"UTTARO, JAMES" <ju1738@att.com> Thu, 19 November 2015 20:14 UTC

Return-Path: <ju1738@att.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A92AB1A9074 for <bess@ietfa.amsl.com>; Thu, 19 Nov 2015 12:14:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.261
X-Spam-Level:
X-Spam-Status: No, score=-1.261 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, KHOP_DYNAMIC=1.004, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hnhhJ2DHhQ1e for <bess@ietfa.amsl.com>; Thu, 19 Nov 2015 12:14:11 -0800 (PST)
Received: from mx0a-00191d01.pphosted.com (mx0a-00191d01.pphosted.com [67.231.149.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11D231B34D4 for <bess@ietf.org>; Thu, 19 Nov 2015 12:14:11 -0800 (PST)
Received: from pps.filterd (m0053301.ppops.net [127.0.0.1]) by mx0a-00191d01.pphosted.com (8.15.0.59/8.15.0.59) with SMTP id tAJK49JD034609; Thu, 19 Nov 2015 15:13:42 -0500
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by mx0a-00191d01.pphosted.com with ESMTP id 1y5ywfbrxb-1 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Nov 2015 15:13:41 -0500
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id tAJKDd4V031627; Thu, 19 Nov 2015 15:13:40 -0500
Received: from mlpi409.sfdc.sbc.com (mlpi409.sfdc.sbc.com [130.9.128.241]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id tAJKDRmN031423 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 19 Nov 2015 15:13:32 -0500
Received: from MISOUT7MSGHUBAB.ITServices.sbc.com (MISOUT7MSGHUBAB.itservices.sbc.com [130.9.129.146]) by mlpi409.sfdc.sbc.com (RSA Interceptor); Thu, 19 Nov 2015 20:13:07 GMT
Received: from MISOUT7MSGUSRCD.ITServices.sbc.com ([169.254.4.86]) by MISOUT7MSGHUBAB.ITServices.sbc.com ([130.9.129.146]) with mapi id 14.03.0248.002; Thu, 19 Nov 2015 15:13:07 -0500
From: "UTTARO, JAMES" <ju1738@att.com>
To: Osama Zia <osamaz@microsoft.com>, "UTTARO, JAMES" <ju1738@att.com>, Haoweiguo <haoweiguo@huawei.com>, John E Drake <jdrake@juniper.net>, "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>, "EXT - thomas.morin@orange.com" <thomas.morin@orange.com>, BESS <bess@ietf.org>
Thread-Topic: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
Thread-Index: AQHRHVckJGngb/4i3EuknzuoW5FiTp6eRdWAgAIKa4CAAIk6AIAAEQyAgACgdYCAAFnwwIACKpaA//+saUCAAFf2AP//roVAgABaZoD//7SJkA==
Date: Thu, 19 Nov 2015 20:13:07 +0000
Message-ID: <B17A6910EEDD1F45980687268941550F0CD4E345@MISOUT7MSGUSRCD.ITServices.sbc.com>
References: <1214F6D7-7E00-4C95-82C4-349393828A92@alcatel-lucent.com> <11888_1447341897_5644AF49_11888_5397_1_5644AF48.6000407@orange.com> <31144DC0-E53C-4890-AD51-29A49C45F6DB@alcatel-lucent.com> <26952_1447346782_5644C25E_26952_9119_1_5644C25D.8070806@orange.com> <94504E5E-B0D8-41DC-8967-E860E46F4C92@alcatel-lucent.com> <5645A614.4010806@orange.com> <E3917F57-B9F4-417D-9E9B-8D1330CC2506@alcatel-lucent.com> <28696_1447432615_564611A7_28696_1036_1_564611A6.2010509@orange.com> <61AE87C2-D215-4135-94A3-6C648FAA614E@alcatel-lucent.com> <5649F84E.8050605@orange.com> <FB4ADDD5-1C46-4DA7-8207-F8EB43018DA8@alcatel-lucent.com> <09C99D22-AE4B-4BF1-8010-18CD93CF5478@alcatel-lucent.com> <8929_1447753042_564AF552_8929_4548_1_564AF551.7010205@orange.com> <34D2D141-D065-463F-A181-B037E26C544E@alcatel-lucent.com>, <SN1PR0501MB1709202798F06131C22C3E8DC71D0@SN1PR0501MB1709.namprd05.prod.outlook.com> <DD5FC8DE455C3348B94340C0AB5517334F8E5185@nkgeml501-mbs.china.huawei.com> <B17A6910EEDD1F45980687268941550F0CD4D2A4@MISOUT7MSGUSRCD.ITServices.sbc.com> <BY2PR0301MB0696329E44CA415F924C5DC0CA1B0@BY2PR0301MB0696.namprd03.prod.outlook.com> <B17A6910EEDD1F45980687268941550F0CD4E2EC@MISOUT7MSGUSRCD.ITServices.sbc.com> <BY2PR0301MB0696A4928F3808509BEC3FA1CA1B0@BY2PR0301MB0696.namprd03.prod.outlook.com> <B17A6910EEDD1F45980687268941550F0CD4E319@MISOUT7MSGUSRCD.ITServices.sbc.com> <BY2PR0301MB06964BB2147ED72A037977D0CA1B0@BY2PR0301MB0696.namprd03.prod.outlook.com>
In-Reply-To: <BY2PR0301MB06964BB2147ED72A037977D0CA1B0@BY2PR0301MB0696.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.70.112.179]
Content-Type: multipart/alternative; boundary="_000_B17A6910EEDD1F45980687268941550F0CD4E345MISOUT7MSGUSRCD_"
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-11-19_13:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1507310000 definitions=main-1511190332
Archived-At: <http://mailarchive.ietf.org/arch/msg/bess/jPUiFCSdVQCJp5MCTVsTc4uCT58>
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Nov 2015 20:14:20 -0000

IMO an Option C model not CSC between to different administrative authorities where internal reachability state is exchanged is a non-starter.  But coming back to this draft it seems that tying the encap and the network architecture is a requirement or am I getting that wrong. If not, how should I interpret this draft? Should it be if I do Option C as I must have different AS domains between my internal DCs and WAN and my encap models are different in the WAN and DC, and I am using specific encaps in different places etcc... it would be in my solution space??

Jim Uttaro

From: Osama Zia [mailto:osamaz@microsoft.com]
Sent: Thursday, November 19, 2015 2:38 PM
To: UTTARO, JAMES; Haoweiguo; John E Drake; Henderickx, Wim (Wim); EXT - thomas.morin@orange.com; BESS
Subject: RE: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

CIL

From: UTTARO, JAMES [mailto:ju1738@att.com]
Sent: Thursday, November 19, 2015 11:16 AM
To: Osama Zia <osamaz@microsoft.com<mailto:osamaz@microsoft.com>>; UTTARO, JAMES <ju1738@att.com<mailto:ju1738@att.com>>; Haoweiguo <haoweiguo@huawei.com<mailto:haoweiguo@huawei.com>>; John E Drake <jdrake@juniper.net<mailto:jdrake@juniper.net>>; Henderickx, Wim (Wim) <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>; EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com> <thomas.morin@orange.com<mailto:thomas.morin@orange.com>>; BESS <bess@ietf.org<mailto:bess@ietf.org>>
Subject: RE: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

Comments In-Line..

Jim Uttaro

From: Osama Zia [mailto:osamaz@microsoft.com]
Sent: Thursday, November 19, 2015 2:06 PM
To: UTTARO, JAMES; Haoweiguo; John E Drake; Henderickx, Wim (Wim); EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com>; BESS
Subject: RE: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

CIL

From: UTTARO, JAMES [mailto:ju1738@att.com]
Sent: Thursday, November 19, 2015 10:56 AM
To: Osama Zia <osamaz@microsoft.com<mailto:osamaz@microsoft.com>>; UTTARO, JAMES <ju1738@att.com<mailto:ju1738@att.com>>; Haoweiguo <haoweiguo@huawei.com<mailto:haoweiguo@huawei.com>>; John E Drake <jdrake@juniper.net<mailto:jdrake@juniper.net>>; Henderickx, Wim (Wim) <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>; EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com> <thomas.morin@orange.com<mailto:thomas.morin@orange.com>>; BESS <bess@ietf.org<mailto:bess@ietf.org>>
Subject: RE: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

The assumption being based on one's view of what a DC is ;) Yes when an SP and a Cloud Provider connect an inter-AS model of some form is needed.. It is doubtful that it would ever be Option C as the exposes a tremendous amount of internal information.
[OZ] I would beg to disagree here. Customer traffic can be tunneled to a customer router in the cloud that should only expose customer routes. I had argued previously in IETF that current practice of option A is not scalable.
[Jim U>] So, do you mean a CSC model where the NHs are the customer CEs, if so, then that is not Classical Option C where PE LBs are exchanged as the NHs for the customers path/routes.
[OZ] Sorry for the confusion. My comment was not specific to the draft. I was responding to your comment  "Option C as the exposes a tremendous amount of internal information"

At the end of the day network architecture/design whether internal/external to a provider is not mandated by the IETF or any standards body. This draft seems to mix encap, interconnect etc.... If the encap "requires" a specific connectivity model than I am not sure how that exactly works.

Jim Uttaro

From: Osama Zia [mailto:osamaz@microsoft.com]
Sent: Thursday, November 19, 2015 1:51 PM
To: UTTARO, JAMES; Haoweiguo; John E Drake; Henderickx, Wim (Wim); EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com>; BESS
Subject: RE: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

Today many large enterprises connect to cloud providers using their existing MPLS VPN networks. This would mean different AS Numbers at WAN and DC sites.

Regards,
Osama

From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of UTTARO, JAMES
Sent: Thursday, November 19, 2015 9:46 AM
To: Haoweiguo <haoweiguo@huawei.com<mailto:haoweiguo@huawei.com>>; John E Drake <jdrake@juniper.net<mailto:jdrake@juniper.net>>; Henderickx, Wim (Wim) <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>; EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com> <thomas.morin@orange.com<mailto:thomas.morin@orange.com>>; BESS <bess@ietf.org<mailto:bess@ietf.org>>
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

A concern I have with this draft is that it pre-supposes the network architecture in terms of how DCs and WAN are connected. It assumes that DCs and WAN networks are in different AS domains. Why is that??

Jim Uttaro

From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Haoweiguo
Sent: Tuesday, November 17, 2015 11:24 PM
To: John E Drake; Henderickx, Wim (Wim); EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com>; BESS
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc


Hi,

The problem we are trying to solve is to reduce data center GW/ASBR-d's forwarding table size, the motivation is same as traditional MPLS VPN option-C. Currently, the most common practise on ASBR-d is to terminate VXLAN encapsulation, look up local routing table, and then perform MPLS encapsulation to the WAN network. ASBR-d needs to maintain all VM's MAC/IP. In Option-C method, only transport layer information needed to be maintained at GW/ASBR-d, the scalability will be greatly enhanced. Traditonal Option-C is only for MPLS VPN network interworking, because VXLAN is becoming pervasive in data center,  the solution in this draft was proposed for the heterogeneous network interworking.

The advantage of this solution is that only VXLAN encapsulation is required for OVS/TOR. Unlike Wim's solution, east-west bound traffic uses VXLAN encap, while north-south bound traffic uses MPLSoGRE/UDP encap.

There are two solutions in this draft:

1. Using VXLAN tunnel destination IP for stitching at ASBR-d.

No data plane modification requirements on OVS or TOR switches, only hardware changes on ASBR-d. ASBR-d normally is router, it has capability to realize the hardware changes. It will consume many IP addresses and the IP pool for allocation needs to be configured on ASBR-d beforehand.

2. Using VXLAN destination UDP port for stitching at ASBR-d.

Compared with solution 1, less IP address will be consumed for allocation. If UDP port range is too large, we can combine with solution 1 and 2.

In this solution, both data plane modification changes are needed at OVS/TOR and ASBR-d. ASBR-d also has capability to realize the hardware changes. For OVS, it also can realize the data plane changes. For TOR switch, it normally can't realize this function.  This solution mainly focuses on pure software based overlay network, it has more scalability. In public cloud data center, software based overlay network is the majority case.



Whether using solution 1 or 2 depends on the operators real envionment.



So I think our solution has no flaws, it works fine.

Thanks,

weiguo



________________________________
From: BESS [bess-bounces@ietf.org] on behalf of John E Drake [jdrake@juniper.net]
Sent: Wednesday, November 18, 2015 2:49
To: Henderickx, Wim (Wim); EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com>; BESS
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc
Hi,

I think Wim has conclusively demonstrated that this draft has fatal flaws and I don't support it.  I also agree with his suggestion that we first figure out what problem we are trying to solve before solving it.

Yours Irrespectively,

John

From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Henderickx, Wim (Wim)
Sent: Tuesday, November 17, 2015 12:49 PM
To: EXT - thomas.morin@orange.com<mailto:thomas.morin@orange.com>; BESS
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

- Snip -

No, the spec as it is can be implemented in its VXLAN variant with existing vswitches (e.g. OVS allows to choose the VXLAN destination port, ditto for the linux kernel stack).

(ToR is certainly another story, most of them not having a flexible enough VXLAN dataplane nor support for any MPLS-over-IP.)

WH> and how many ports simultaneously would they support? For this to work every tenant needs a different VXLAN UDP destination port/receive port.
There might be SW elements that could do some of this, but IETF defines solutions which should be implemented across the board HW/SW/etc. Even if some SW switches can do this, the proposal will impose so many issues in HW/data-plane engines that I cannot be behind this solution.

To make this work generically we will have to make changes anyhow. Given this, we better do it in the right way and guide the industry to a solution which does not imply those complexities. Otherwise we will stick with these specials forever with all consequences (bugs, etc).

- snip -

From: "thomas.morin@orange.com<mailto:thomas.morin@orange.com>" <thomas.morin@orange.com<mailto:thomas.morin@orange.com>>
Organization: Orange
Date: Tuesday 17 November 2015 at 01:37
To: Wim Henderickx <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>, BESS <bess@ietf.org<mailto:bess@ietf.org>>
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

Hi Wim, WG,

2015-11-16, Henderickx, Wim (Wim):

2015-11-13, Henderickx, Wim (Wim):
Thomas, we can discuss forever and someone need to describe requirements, but the current proposal I cannot agree to for the reasons explained.

TM> Well, although discussing forever is certainly not the goal, the reasons for rejecting a proposal need to be thoroughly understood.
WH> my point is what is the real driver for supporting a plain VXLAN data-plane here, the use cases I have seen in this txt is always where an application behind a NVE/TOR is demanding option c, but none of the NVE/TOR elements.


My understanding is that the applications  are contexts where overlays are present is when workloads (VMs or baremetal) need to be interconnected with VPNs. In these contexts, there can be reasons to want Option C to reduce the state on ASBRs.

In these context, its not the workload (VM or baremetal) that would typically handle VRFs, but really the vswitch or ToR.

WH2> can it not be all cases: TOR/vswitch/Application. I would make the solution flexible to support all of these not?

2015-11-13, Henderickx, Wim (Wim):

TM> The right trade-off to make may in fact depend on whether you prefer:
(a) a new dataplane stitching behavior on DC ASBRs (the behavior specified in this draft)
or (b) an evolution of the encaps on the vswitches and ToRs to support MPLS/MPLS/(UDP or GRE)

WH> b depends on the use case

I don't get what you mean by "b depends on the use case".
WH> see my above comment. If the real use case is an application behind NVE/TOR requiring model C, than all the discussion on impact on NVE/TOR is void. As such I want to have a discussion on the real driver/requirement for option c interworking with an IP based Fabric.

Although I can agree than detailing requirements can always help, I don't think one can assume a certain application to dismiss the proposal.

WH> for me the proposal is not acceptable for the reasons explained: too much impact on the data-planes

I wrote the above based on the idea that the encap used in MPLS/MPLS/(UDP or GRE), which hence has to be supported on the ToRs and vswitches.
Another possibility would be service-label/middle-label/Ethernet assuming an L2 adjacency between vswitches/ToRs and ASBRs, but this certainly does not match your typical DC architecture. Or perhaps had you something else in mind ?

WH> see above. The draft right now also requires changes in existing TOR/NVE so for me all this discussion/debate is void.

No, the spec as it is can be implemented in its VXLAN variant with existing vswitches (e.g. OVS allows to choose the VXLAN destination port, ditto for the linux kernel stack).

(ToR is certainly another story, most of them not having a flexible enough VXLAN dataplane nor support for any MPLS-over-IP.)

WH> and how many ports simultaneously would they support?

WH> and depending on implementation you don't need to change any of the TOR/vswitches.

Does this mean that for some implementations you may not need to change any of the TOR/vswitches, but that for some others you may ?

WH> any proposal on the table requires changes, so for me this is not a valid discussion

See above, the proposal in the draft does not necessarily need changes in vswitches.

Let me take a practical example : while I can quite easily see how to implement the procedures in draft-hao-bess-inter-nvo3-vpn-optionc based on current vswitch implementations of VXLAN, the lack of MPLS/MPLS/(UDP, GRE) support in commonplace vswitches seems to me as making that alternate solution you suggest harder to implement.

WH> I would disagree to this. Tell me which switch/TOR handles multiple UDP ports for VXLAN ?

I mentioned _v_switches, and many do support a variable destination port for VXLAN, which is sufficient to implement what the draft proposes.

-Thomas



From: Thomas Morin <thomas.morin@orange.com<mailto:thomas.morin@orange.com>>
Organization: Orange
Date: Friday 13 November 2015 at 09:57
To: Wim Henderickx <wim.henderickx@alcatel-lucent.com<mailto:wim.henderickx@alcatel-lucent.com>>
Cc: "bess@ietf.org<mailto:bess@ietf.org>" <bess@ietf.org<mailto:bess@ietf.org>>
Subject: Re: [bess] draft-hao-bess-inter-nvo3-vpn-optionc

Hi Wim,

I agree on the analysis that this proposal is restricted to implementations that supports the chosen encap with non-IANA ports (which may be hard to achieve for instance on hardware implementations, as you suggest), or to context where managing multiple IPs would be operationally viable.

However, it does not seem obvious to me how the alternative you propose [relying on 3-label option C with an MPLS/MPLS/(UDP|GRE) encap] addresses the issue of whether the encap behavior is supported or not (e.g. your typical ToR chipset possibly may not support this kind of encap,  and even software-based switches may not be ready to support that today).

My take is that having different options to adapt to various implementations constraints we may have would have value.

(+ one question below on VXLAN...)

-Thomas


2015-11-12, Henderickx, Wim (Wim):
On VXLAN/NVGRE, do you challenge the fact that they would be used with a dummy MAC address that would be replaced by the right MAC by a sender based on an ARP request when needed ?

Is the above the issue you had in mind about VXLAN and NVGRE ?

WH> yes

I you don't mind me asking : why do you challenge that ?




_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

France Telecom - Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorization.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, France Telecom - Orange shall not be liable if this message was modified, changed or falsified.

Thank you.