Re: [DMM] New Version Notification for draft-clt-dmm-tn-aware-mobility-07.txt

"Majumdar, Kausik" <Kausik.Majumdar@commscope.com> Mon, 26 October 2020 19:49 UTC

Return-Path: <prvs=561bec637=Kausik.Majumdar@commscope.com>
X-Original-To: dmm@ietfa.amsl.com
Delivered-To: dmm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 347F53A0E7A for <dmm@ietfa.amsl.com>; Mon, 26 Oct 2020 12:49:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=commscope.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id enzSAFbTsZKh for <dmm@ietfa.amsl.com>; Mon, 26 Oct 2020 12:49:10 -0700 (PDT)
Received: from esa2.commscope.iphmx.com (esa2.commscope.iphmx.com [68.232.142.175]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A707E3A0E77 for <dmm@ietf.org>; Mon, 26 Oct 2020 12:48:52 -0700 (PDT)
IronPort-SDR: bLYN18z5p2RbI0K89ddqOuwB0+CY5affXcphG8Fh5NZTgK0t35CBtDsZOu0E5hk2k1BwyMdrYy VkaoNytkn679Vcooo8RM5/dmO+bO9Ob4kIETS8S7D1UVE7vSZ4HUCxuR4CjpmKAknZQKiedct1 Iwx0lOYVzJKEdU4MEsKyUjhjYMqZvtKSunlJX9jjpXjYSIenrG8sKbR1NmbZxaQ9HmwYYnNOGr lhdlkDB8NbAygEyOMpgxhYV+KZbeImxc+ENkV478oruB423gCjLR55i2LdvKIzNZLTMTrkC6sn OAc=
X-IronPort-AV: E=Sophos;i="5.77,420,1596513600"; d="scan'208,217";a="131327261"
Received: from mail-dm6nam11lp2168.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.168]) by ob1.commscope.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 26 Oct 2020 15:48:53 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HX0v43nJRZntUk+ko+7uoa5SlVajf1HKXu5fY/TGmCvoburzthpMrxEpbl2BQjnzpNC8A+VyNFzZ9C4WkIez9tiXQkW9RYNppVq4Tu51ZufOY5jFDVyPr3n18Umx848KrgQB9zc8zKhDizEe9aKN/g11IhvmS8Dx7gRlCvRRafvF1ajZK3ohnCELKOrm5Q9Wqy5Ibdtz1CXO+fqxqiRxj5hVeNmfa+bMNzWzrHvThK1/s3aQFZGyn5RuxwtZ1ti9azs2zgkiABvMi5SUyAcztNtinlt6plv+wubIJS3r9FHkBSSegj2+zAhgBqw28ebZtE7DB6eRyvo0+I9C1IOiIA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1FWWsDQ80vXJA9CmxO2lIi7Iezr1aA65rBM/x+lDm+4=; b=HtxkXK8Xq9zKMYqTdAD/RgtxWGdn4Q4TEKTF9qUJ1Ys2yd8iuaii0p4qstOA5CR2O0klDimU/2WH/Foo1lVXAPUBDWeOqX0iS/Bvl29QHagWz6TIL1LCYSuPSnwHqiri/CVHidhrMeSi6j1plEfTf5mKYCvdBDj/5hSKZ8jgXGtjUqv7itLQozeFwdjS5U731nwVWms2h9A7ftlpA7S1KBME4iG6tohLWPDwbKzc+ragLp52Y0K8qBYpk4bNyb0CDaMf5ZDgK3jEcD5p3WLEfRcsXt/EoCUvOOHp3ls79rE0RBDVtcEG0/aIpCjS6utolg4ARdg41OpZBSrUTBQ9nw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip is 52.4.92.69) smtp.rcpttodomain=gmail.com smtp.mailfrom=commscope.com; dmarc=fail (p=none sp=none pct=100) action=none header.from=commscope.com; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=commscope.onmicrosoft.com; s=selector2-commscope-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1FWWsDQ80vXJA9CmxO2lIi7Iezr1aA65rBM/x+lDm+4=; b=a0Q0jaqPu5+LvQHgutS/boAUxYnbAw45bGWl0ph/fV8HwrR/EhFmFV9itH7I/mOB3onOwAuXI90TrCT8AUXIB2yDIxteKpiqsrmBXwFv2VBgWINmniJc4RF7rMbo6DrWtB/cuY/A27QsvKgTJruGPfFndTMGsFms7D8xJ5kTons=
Received: from BN4PR12CA0011.namprd12.prod.outlook.com (2603:10b6:403:2::21) by DM6PR14MB4172.namprd14.prod.outlook.com (2603:10b6:5:21e::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.27; Mon, 26 Oct 2020 19:48:50 +0000
Received: from BN7NAM10FT025.eop-nam10.prod.protection.outlook.com (2603:10b6:403:2:cafe::6e) by BN4PR12CA0011.outlook.office365.com (2603:10b6:403:2::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.18 via Frontend Transport; Mon, 26 Oct 2020 19:48:50 +0000
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is 52.4.92.69) smtp.mailfrom=commscope.com; gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=fail action=none header.from=commscope.com;
Received: from obc.inkyphishfence.com (52.4.92.69) by BN7NAM10FT025.mail.protection.outlook.com (10.13.156.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.18 via Frontend Transport; Mon, 26 Oct 2020 19:48:50 +0000
Received: from ip-172-25-50-113.ec2.internal (localhost [127.0.0.1]) by obc.inkyphishfence.com (Postfix) with ESMTPS id 12E9B2385A6; Mon, 26 Oct 2020 19:48:50 +0000 (UTC)
X-Inky-Outbound-Processed: True
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2175.outbound.protection.outlook.com [104.47.58.175]) by obc.inkyphishfence.com (Postfix) with ESMTPS id BD2D42385B0; Mon, 26 Oct 2020 19:48:49 +0000 (UTC)
Received: from BY5PR14MB4145.namprd14.prod.outlook.com (2603:10b6:a03:20e::20) by BY5PR14MB4148.namprd14.prod.outlook.com (2603:10b6:a03:204::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.23; Mon, 26 Oct 2020 19:48:48 +0000
Received: from BY5PR14MB4145.namprd14.prod.outlook.com ([fe80::a5bf:6dc8:89ca:66ed]) by BY5PR14MB4145.namprd14.prod.outlook.com ([fe80::a5bf:6dc8:89ca:66ed%9]) with mapi id 15.20.3477.028; Mon, 26 Oct 2020 19:48:48 +0000
From: "Majumdar, Kausik" <Kausik.Majumdar@commscope.com>
To: Uma Chunduri <umac.ietf@gmail.com>, dmm <dmm@ietf.org>
Thread-Topic: [DMM] New Version Notification for draft-clt-dmm-tn-aware-mobility-07.txt
Thread-Index: AQHWo+wuyUghKLyeEE+LLfvgwMn/NKmakocAgAfs/qCAAFsZAIAHcOyw
Date: Mon, 26 Oct 2020 19:48:48 +0000
Message-ID: <BY5PR14MB4145F71E0C515219EE1DA479FA190@BY5PR14MB4145.namprd14.prod.outlook.com>
References: <160133669315.20579.1349579162555966845@ietfa.amsl.com> <CAF18ct6U17CJ2_ijgKES2Rd9CqgxzwBAectqH6EhNtXUyA83ng@mail.gmail.com> <34BB0DFC-FACD-4D09-A4E1-791E41B25748@cisco.com> <BY5PR14MB41453099EB0C7E637CA411C4FA1C0@BY5PR14MB4145.namprd14.prod.outlook.com> <CAF18ct5T3_6PFKPRCa=+gEUSqYeJEOKQPz-MEYYfg5ZzExZRog@mail.gmail.com>
In-Reply-To: <CAF18ct5T3_6PFKPRCa=+gEUSqYeJEOKQPz-MEYYfg5ZzExZRog@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [134.242.133.1]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: 22fa0dec-82e7-42bb-3dd8-08d879e82938
x-ms-traffictypediagnostic: BY5PR14MB4148:|DM6PR14MB4172:
X-Microsoft-Antispam-PRVS: <DM6PR14MB4172F2E91D69DA71B24E1D19FA190@DM6PR14MB4172.namprd14.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 8OMyS8NJzTxIGW4jKjWXf3SyyrNZy5L4JJcg54Dr9zVhwId5QXfkz98qQs+5Bx9BaJEU5vCELfnZu2dWoXH7rgzXcKp74KmREklEv9HQvmNHlss6wTOl0EQBACUDP00WTQMJy5U3KEwXvpCXS2HoXFDXv31JuG5yZ87e5G2MiI/E7NVXw+JjlQ7PdyoppwX++Eq085Uxf9qKPGywxriiJp731GMKzlHhkq2hoG513DnjztfxBh7L/v5f4YmEtFFv1Dl1CKqqYa6+ylGCfLnXWyO99ZSfcfwYoAsqBOW7csarpWNx7p9w7V5iexUCn4ImXdzZkBqpmNpZQDjX1Ubqx/E76ez/e4bqz9fzV9YkGl5Yk75awDteC0OyqxHnT6mtkL+HaQmmJmKxjH6zhIINbw==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR14MB4145.namprd14.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(346002)(396003)(136003)(366004)(39860400002)(86362001)(5660300002)(2906002)(9326002)(52536014)(6506007)(966005)(53546011)(7696005)(83380400001)(8676002)(478600001)(8936002)(15650500001)(186003)(76116006)(64756008)(66446008)(66946007)(66556008)(66476007)(166002)(26005)(33656002)(71200400001)(9686003)(55016002)(110136005)(316002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BY5PR14MB4145F71E0C515219EE1DA479FA190BY5PR14MB4145namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR14MB4148
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: BN7NAM10FT025.eop-nam10.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: f1e3dcea-fd09-464d-6da3-08d879e8280f
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: bAfVGo21afAPoOiNrWTyinqXI2ZdSg/0d0qoYnqW5eoKfDxjyK4+wOcXI41jSpzyCPRUGiYYquSsthCob5weAUB+HZwCZ/aURY66DX1uyiKDqGWRjJZI9440J4eOUiDhl14xdB2WzaMhb/DFC8DPq4ZGWsHv9Ml0AsC0YufF22YfA3/bm8iFvpu7m27AsiydKUYSfutpULAdhvANzYSJ3gWF+mbmab9Wpq5nS5xU7Bklg/nxdiLsFYj9dC9u+kvzHIC0V4nb2s4SlPFDCHOYQMt9hng+4Y9My8zzYkNCAKatmbXhxv6QuDEh3YBTIfg4vSGynZ4j2xk57xo1J8vLPw/T/op3VkNVmYfnsRwsPYLrOLoOd156dKpoYxpUyyWDAMM+cpz7nqSI9xR28SD0zWcc5EaGGEgHMT7VNE5NZsuG0DAech35BG4DKpnIYUS0dhVyRf3LpzSG+1jvyL2YQA/LUazGxpXDy28GGe9OCAM=
X-Forefront-Antispam-Report: CIP:52.4.92.69; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:obc.inkyphishfence.com; PTR:obx-outbound.inkyphishfence.com; CAT:NONE; SFS:(396003)(346002)(376002)(136003)(39860400002)(46966005)(47076004)(8936002)(83380400001)(9686003)(316002)(82310400003)(7636003)(15650500001)(5660300002)(36906005)(110136005)(356005)(70206006)(9326002)(52536014)(8676002)(82740400003)(53546011)(7696005)(55016002)(6506007)(86362001)(478600001)(45080400002)(33964004)(966005)(33656002)(166002)(26005)(186003)(336012)(2906002); DIR:OUT; SFP:1101;
X-OriginatorOrg: commscope.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Oct 2020 19:48:50.3480 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 22fa0dec-82e7-42bb-3dd8-08d879e82938
X-MS-Exchange-CrossTenant-Id: 31472f81-8fe4-49ec-8bc3-fa1c295640d7
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=31472f81-8fe4-49ec-8bc3-fa1c295640d7; Ip=[52.4.92.69]; Helo=[obc.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: TreatMessagesAsInternal-BN7NAM10FT025.eop-nam10.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR14MB4172
Archived-At: <https://mailarchive.ietf.org/arch/msg/dmm/J1UDGdc45bq2n2zgmUykYGmzT9E>
Subject: Re: [DMM] New Version Notification for draft-clt-dmm-tn-aware-mobility-07.txt
X-BeenThere: dmm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Distributed Mobility Management Working Group <dmm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dmm>, <mailto:dmm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dmm/>
List-Post: <mailto:dmm@ietf.org>
List-Help: <mailto:dmm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dmm>, <mailto:dmm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Oct 2020 19:49:13 -0000

Hi Uma,

My comments are inline below.

From: dmm <dmm-bounces@ietf.org> On Behalf Of Uma Chunduri
Sent: Wednesday, October 21, 2020 6:18 PM
To: dmm <dmm@ietf.org>
Subject: Re: [DMM] New Version Notification for draft-clt-dmm-tn-aware-mobility-07.txt

Thanks Kaushik for your comments. Need a quick clarification (see below ..)  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌
Caution (External, umac.ietf@gmail.com<mailto:umac.ietf@gmail.com>)
Spam Content   Details<https://shared.outlook.inky.com/details?id=Y29tbXNjb3BlL2thdXNpay5tYWp1bWRhckBjb21tc2NvcGUuY29tLzZhMWU2MWE2MDA2ZDBkM2ZjM2Y3ZGQ3MThmM2M5NzdmLzE2MDMzMjk1MTQuMTg=#key=907e11ca2c9278a0aa07bfcd42e9c8a7>
Report This Email<https://shared.outlook.inky.com/report?id=Y29tbXNjb3BlL2thdXNpay5tYWp1bWRhckBjb21tc2NvcGUuY29tLzZhMWU2MWE2MDA2ZDBkM2ZjM2Y3ZGQ3MThmM2M5NzdmLzE2MDMzMjk1MTQuMTg=#key=907e11ca2c9278a0aa07bfcd42e9c8a7>  FAQ<https://www.inky.com/banner-faq/>  Protection by INKY<https://www.inky.com>

Thanks Kaushik for your comments. Need a quick clarification (see below ..)

On Wed, Oct 21, 2020 at 1:29 PM Majumdar, Kausik <Kausik.Majumdar@commscope.com<mailto:Kausik.Majumdar@commscope.com>> wrote:
Hi Uma et all,

Thanks for putting together this draft to describe the framework for mapping the slices in 5G mobile systems to transport slices in IP towards the UPF. This framework is valuable and we are actually looking for further extensions of the TN characteristics in non-mobility domain (SD-WAN) and that is being worked out to be submitted in RTG WG.

Thanks.


I would also request you to consider the Security Characteristics in addition to the current Transport Path characteristics. Preserving the security characteristics in non-mobility SD-WAN domain would be an important aspects. My suggestions would be to extend the current SST for secure traffic. As a result, it would be good if we can define additional UDP Source Port range to capture the Security characteristics for the current service types.

We already described the generic case where security is applied (section 2.6), when the user plane emits the packet to transport (could be N3/N9 interfaces or S1U interface terminating at SGWs).
That addresses mostly shared transport cases.
If I understand correctly, you want security done by PE's before gNB/UPF??  I can imagine few usef of this but can you explain why you are looking for this option?

Yes, I am looking for UE traffic to be secured by the PE’s before gNB/UPF. There could be specific traffic types for MIOT, EMBB, and URLLC service types where security is more important. Even this draft is addressing data path security for these service types the security characteristics needs to be preserved all the to the traffic destination, it can’t stop at SGWs or UPF. Then, the purpose for UE traffic to achieve end to end security is lost. Specially if we look into SD-WAN deployments the security is the key aspects and the SD-WAN Edge Nodes establish secure IPSec tunnels between them. Here https://tools.ietf.org/html/draft-dunbar-bess-bgp-sdwan-usage-08 nicely captures SD-WAN use cases for Homogeneous and Hybrid networks. Considering that, if the UE traffic needs to go beyond SGWs/UPF to the actual destination in the Data Network connected through SD-WAN Edge Nodes (Enterprise 5G case) the security characteristics for all the SSTs need to be preserved to maintain the E2E security.

I think it would be good to expand the UDP Src Port range table captured in Figure 2. For all of the current SST types we could come up with different Range where E2E security is the key requirement for the UE traffic like below:

UDP Src Port Range Ax – Ay : SST - MIOT with Security
..


In general, if we look into the SD-WAN use cases the security is the key aspects how SD-WAN edge nodes establishes and send secure traffic between them to connect different sites branches, branch to the cloud GW.


I would be happy to share more context on the use cases and discuss further on the approaches.

Sure. But is this a mandatory option for your E2E use case with SD-WAN beyond mobility domain?

I would say it is a mandatory option for E2E use cases with SD-WAN beyond mobility domain. If you look into the retail stores, education, etc (small to medium enterprise deployments), majority of the connections land into cloud with a secure tunnel connectivity to the cloud GW. These enterprise SD-WAN edge devices accept connections not only from wireless APs, but also for the mobility traffic through SWGs/UPF. In the case of UE mobility traffic needs to land into large enterprise with a security aspects, the SD-WAN GW in the corporate network need to preserve that behavior for E2E security.

Hope it clarifies. How the SD-WAN GW map the TN characteristics in non-mobility domain to maintain UE’s E2E traffic characteristics is being worked out, and would be submitted.

Regards,
Kausik

--
Uma C.


Regards,
Kausik