Re: [bess] New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt

Ron Bonica <rbonica@juniper.net> Thu, 14 June 2018 14:53 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF216130E68 for <bess@ietfa.amsl.com>; Thu, 14 Jun 2018 07:53:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dQTo0CjOhcKd for <bess@ietfa.amsl.com>; Thu, 14 Jun 2018 07:53:18 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC5D8130E62 for <bess@ietf.org>; Thu, 14 Jun 2018 07:53:18 -0700 (PDT)
Received: from pps.filterd (m0108159.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5EEn3tL005926; Thu, 14 Jun 2018 07:53:18 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=dB9vq3XRByw5+o0t1KNXSt0gZBrtZrPvpbyj2BM49AQ=; b=kyXwtQ4jyXoRn/ohiQp+fg3fhbcak7D2vqnNbNRDZkDb+wkuUYxay+1J2qV4R0CDiYog 2aI0kCwDg7HLd4RYGKNRL4IjqKuAIvhIV2tJbV+HcV2EbFADNPmKtmKMPkVUu5gfLolZ 4XnFh9UBTDAWic33TrGy5rU9w5+wqxvHHG3sTtm6KB4oe9ORE/UGuhWDTPO8gOqDGKht LYt29IL527EhDK1OduN64V9DrReGQDQ1PDhIc/T9/l6kM3tuZS+o08zRPtwxeJTauB5b o+uYbpcMAsrDxNfBIiRYgDhBTUERrQUQiErvFDz2i5b89nL9ZB5wpJNKuMeQqz5lxfjh RA==
Received: from nam05-dm3-obe.outbound.protection.outlook.com (mail-dm3nam05lp0113.outbound.protection.outlook.com [216.32.181.113]) by mx0a-00273201.pphosted.com with ESMTP id 2jks7004yn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 14 Jun 2018 07:53:18 -0700
Received: from CO1PR05MB443.namprd05.prod.outlook.com (10.141.73.152) by CO1PR05MB268.namprd05.prod.outlook.com (10.141.71.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.863.6; Thu, 14 Jun 2018 14:53:15 +0000
Received: from CO1PR05MB443.namprd05.prod.outlook.com ([fe80::312a:3c1:f69:c7fb]) by CO1PR05MB443.namprd05.prod.outlook.com ([fe80::312a:3c1:f69:c7fb%13]) with mapi id 15.20.0863.016; Thu, 14 Jun 2018 14:53:15 +0000
From: Ron Bonica <rbonica@juniper.net>
To: "stephane.litkowski@orange.com" <stephane.litkowski@orange.com>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt
Thread-Index: AQHUAb0/C+i0io0nekOi/XAFLuZhe6RbeAcwgAPOgDCAAJITcA==
Date: Thu, 14 Jun 2018 14:53:14 +0000
Message-ID: <CO1PR05MB443218ED439186A6F6A0215AE7D0@CO1PR05MB443.namprd05.prod.outlook.com>
References: <152874653557.2807.17161289464973121006.idtracker@ietfa.amsl.com> <CO1PR05MB443FF492ECE04553EF9E17BAE780@CO1PR05MB443.namprd05.prod.outlook.com> <21095_1528957044_5B220874_21095_95_5_9E32478DFA9976438E7A22F69B08FF924B1BA942@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
In-Reply-To: <21095_1528957044_5B220874_21095_95_5_9E32478DFA9976438E7A22F69B08FF924B1BA942@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.300.84
dlp-reaction: no-action
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CO1PR05MB268; 7:Ic8BZu0Vugu7tQ0joPvMPrtug93doAWzcKTd36XjrNe3p19E0whAVLwWlf/o14vs5qFGc6hknND4vVC8uCsdcrDWJSBgxGMWiUqhTxyzWFbGNPWjaRhBNxJU4EotvdRE4aXpn6zoE7qqp/3A6PV/P1fMnOfACa18Z6MLwAEwguPiBAH45M9HEzQvjGC6jYTl2vqaOvhpHnHknKHBuaVsJqQ1MI4p7SQ5PqstWD7QE8gMnEodyMJgnNQEWh+ZNDgh
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 19e8fb7a-0ea2-4e6a-8b7f-08d5d2068ecb
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(711020)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:CO1PR05MB268;
x-ms-traffictypediagnostic: CO1PR05MB268:
x-microsoft-antispam-prvs: <CO1PR05MB268B82990AC7B2966FCA39CAE7D0@CO1PR05MB268.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(10436049006162)(192374486261705)(138986009662008)(18271650672692)(21532816269658);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3002001)(3231254)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123564045)(20161123560045)(6072148)(201708071742011)(7699016); SRVR:CO1PR05MB268; BCL:0; PCL:0; RULEID:; SRVR:CO1PR05MB268;
x-forefront-prvs: 0703B549E4
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(39380400002)(346002)(376002)(366004)(396003)(199004)(189003)(13464003)(486006)(68736007)(9686003)(26005)(99286004)(53936002)(59450400001)(102836004)(186003)(6506007)(25786009)(7696005)(53546011)(66066001)(97736004)(6116002)(3846002)(6306002)(76176011)(316002)(33656002)(5660300001)(5890100001)(7736002)(575784001)(86362001)(105586002)(6246003)(305945005)(8676002)(6436002)(74316002)(5250100002)(11346002)(110136005)(55016002)(966005)(2906002)(3280700002)(106356001)(2900100001)(15650500001)(476003)(14454004)(3660700001)(81166006)(81156014)(229853002)(478600001)(8936002)(446003)(2501003)(19627235001); DIR:OUT; SFP:1102; SCL:1; SRVR:CO1PR05MB268; H:CO1PR05MB443.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 9l13dKjdcZxJ/SCuMilC1iWEQvAEPzRT0NxmeRFPk9Ws27ugwE3GNBek3sAYa6Ev5rI3TtRFTAp0Lf/d0sbIHcie9tTaY/T1UDdptLhqezcNI8IbK6+aJw98AmhuuHpS9F/j0f/L0yDVhHm9+x+Lgh7jSthjpQtasPMZEfevb0ZaAp8M6d7n2RffKZrQSBFN
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 19e8fb7a-0ea2-4e6a-8b7f-08d5d2068ecb
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jun 2018 14:53:14.8884 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR05MB268
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-06-14_05:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806140165
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/v48muREoA4wZkZFobmR7oIrl7_w>
Subject: Re: [bess] New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jun 2018 14:53:22 -0000

Hi Stephane,

Yes, we are talking about a niche use case. We probably should have talked about the use case more in the draft.

Assume the following about an enterprise:

- It has many compartments (VPNs) that requires some degree of separation from one another
- It has many permanent sites
- It has a mission critical requirement for site mobility.

In response to some transient event (e.g., a natural disaster, a sporting event, a geopolitical event), the enterprise may have to add a new site. The site will be secured by the enterprise (hence, the C-PE) and will use whatever connectivity is available (e.g., hotel Wi-Fi).

The site is temporary. Once the transient event is over, the site goes away.

Yes, this is a niche use-case, but the market is large enough to warrant our attention.

                                                            Ron

> -----Original Message-----
> From: stephane.litkowski@orange.com <stephane.litkowski@orange.com>
> Sent: Thursday, June 14, 2018 2:17 AM
> To: Ron Bonica <rbonica@juniper.net>; bess@ietf.org
> Subject: RE: New Version Notification for draft-rosen-bess-secure-l3vpn-
> 00.txt
> 
> Hi Ron,
> 
> I have read quickly the document.
> I think the use case of having secure L3VPNs is valid and we already have all
> (or most of) the technology building blocks to do it.
> Now the draft takes a complete upside down approach comparing to our well
> known L3VPNs which are provider provisioned VPNs as you propose to build
> them at the CE side.
> This could be a valid approach but isn't it a niche use case ?
> 
> Customer sites connected over the Internet is for sure a use case to handle,
> and we already to it today by establishing an IPSec tunnel towards an SP-PE,
> the tunnel ends in the customer VRF.
> Customer data must not be exposed: also a valid use case. We have some
> customers doing IPSec transport within MPLS VPN for some specific traffic.
> On the other hand, from an SP point of view, when core links are not fully
> trusted, MACSEC or IPSec are also options.
> 
> I'm less convinced by the routing that should not be exposed. I agree that
> this is a possibility and a valid use case but I do not think that this is a big deal
> for most of customers (even those requiring more security). The good thing
> of MPLS VPN is the routing complexity is almost pushed to the SP and the
> customer has few things to do and they are happy with that.
> 
> The last case of the multitenancy on the customer side is also valid, but I also
> think that it is a niche use case.
> 
> My point is that the draft is currently focusing on one scenario which in my
> opinion addresses a niche use case while there may be intermediate
> scenarios (like no multitenancy and/or no need of routing protection) that
> could be more widely applicable.
> 
> Brgds,
> 
> Stephane
> 
> 
> -----Original Message-----
> From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Ron Bonica
> Sent: Monday, June 11, 2018 21:56
> To: bess@ietf.org
> Subject: [bess] FW: New Version Notification for draft-rosen-bess-secure-
> l3vpn-00.txt
> 
> Folks,
> 
> Please review and comment on this draft.
> 
>                                           Ron
> 
> 
> -----Original Message-----
> From: internet-drafts@ietf.org <internet-drafts@ietf.org>
> Sent: Monday, June 11, 2018 3:49 PM
> To: Ron Bonica <rbonica@juniper.net>; Eric Rosen <erosen@juniper.net>;
> Eric Rosen <erosen@juniper.net>
> Subject: New Version Notification for draft-rosen-bess-secure-l3vpn-00.txt
> 
> 
> A new version of I-D, draft-rosen-bess-secure-l3vpn-00.txt
> has been successfully submitted by Eric C. Rosen and posted to the IETF
> repository.
> 
> Name:		draft-rosen-bess-secure-l3vpn
> Revision:	00
> Title:		Augmenting RFC 4364 Technology to Provide Secure Layer
> L3VPNs over Public Infrastructure
> Document date:	2018-06-11
> Group:		Individual Submission
> Pages:		19
> URL:         https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__tools.ietf.org_html_draft-2Drosen-2Dbess-2Dsecure-2Dl3vpn-
> 2D00&d=DwIFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-
> ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-
> AWF2EfpHcAwrDThKP8&m=ynt6xEw1IEsGTlD_UKas9ALkZzKN_qfQO9ccs-
> D_xmk&s=WZHJlo1WtiFkNoPygS1bcJe-TVSTCSu4YrVoGckSTgA&e=
> Status:     https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__datatracker.ietf.org_doc_draft-2Drosen-2Dbess-2Dsecure-
> 2Dl3vpn_&d=DwIFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-
> ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-
> AWF2EfpHcAwrDThKP8&m=ynt6xEw1IEsGTlD_UKas9ALkZzKN_qfQO9ccs-
> D_xmk&s=siUM7bajtgMwdB8RGQEqfGIskeMmvVgmJbueM2TQfmc&e=
> Htmlized:  https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__tools.ietf.org_html_draft-2Drosen-2Dbess-2Dsecure-2Dl3vpn-
> 2D00&d=DwIFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-
> ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-
> AWF2EfpHcAwrDThKP8&m=ynt6xEw1IEsGTlD_UKas9ALkZzKN_qfQO9ccs-
> D_xmk&s=WZHJlo1WtiFkNoPygS1bcJe-TVSTCSu4YrVoGckSTgA&e=
> Htmlized:  https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__datatracker.ietf.org_doc_html_draft-2Drosen-2Dbess-2Dsecure-
> 2Dl3vpn&d=DwIFAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-
> ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-
> AWF2EfpHcAwrDThKP8&m=ynt6xEw1IEsGTlD_UKas9ALkZzKN_qfQO9ccs-
> D_xmk&s=8qEoWVnhEGQT-Xvmq5C8eGsH0eQv7zAhXoKmz7eN2Cw&e=
> 
> 
> Abstract:
>    The Layer 3 Virtual Private Network (VPN) technology described in RFC
>    4364 is focused on the scenario in which a network Service Provider
>    (SP) maintains a secure backbone network and offers VPN service over
>    that network to its customers.  Customers access the SP's network by
>    attaching "Customer Edge" (CE) routers to "Provider Edge" (PE)
>    routers, and exchanging cleartext IP packets.  PE routers generally
>    serve multiple customers, and prevent unauthorized communication
>    among customers.  Customer data sent across the backbone (from one PE
>    to another) is encapsulated in MPLS, using an MPLS label to associate
>    a given packet with a given customer.  The labeled packets are then
>    sent across the backbone network in the clear, using MPLS transport.
>    However, many customers want a VPN service that is secure enough to
>    run over the public Internet, and which does not require them to send
>    cleartext IP packets to a service provider.  Often they want to
>    connect directly to edge nodes of the public Internet, which does not
>    provide MPLS support.  Each customer may itself have multiple tenants
>    who are not allowed to intercommunicate with each other freely.  In
>    this case, the customer many need to provide a VPN service for the
>    tenants.  This document describes a way in which this can be achieved
>    using the technology of RFC 4364.  The functionality assigned therein
>    to a PE router can be placed instead in Customer Premises Equipment.
>    This functionality can be augmented by transmitting MPLS packets
>    through IPsec Security Associations.  The BGP control plane sessions
>    can also be protected by IPsec.  This allows a customer to use RFC
>    4364 technology to provide VPN service to its internal departments,
>    while sending only IPsec-protected packets to the Internet or other
>    backbone network, and eliminating the need for MPLS transport in the
>    backbone.
> 
> 
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> The IETF Secretariat
> 
> _______________________________________________
> BESS mailing list
> BESS@ietf.org
> https://urldefense.proofpoint.com/v2/url?u=https-
> 3A__www.ietf.org_mailman_listinfo_bess&d=DwIFAg&c=HAkYuh63rsuhr6Sc
> bfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-
> AWF2EfpHcAwrDThKP8&m=ynt6xEw1IEsGTlD_UKas9ALkZzKN_qfQO9ccs-
> D_xmk&s=qptmIVc7U_jc-kNnUXNcrnc9Gft_Utcc0-sn0jcMLJg&e=
> 
> __________________________________________________________
> __________________________________________________________
> _____
> 
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce
> message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete
> this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.