Return-Path: <rafa@um.es>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id F14CD12036C;
 Thu, 25 Jul 2019 07:53:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001,
 SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
 autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id fp0WbUiIWvTi; Thu, 25 Jul 2019 07:53:47 -0700 (PDT)
Received: from xenon41.um.es (xenon41.um.es [155.54.212.167])
 by ietfa.amsl.com (Postfix) with ESMTP id EEB2E120347;
 Thu, 25 Jul 2019 07:53:44 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1])
 by xenon41.um.es (Postfix) with ESMTP id 9161220CBA;
 Thu, 25 Jul 2019 16:53:43 +0200 (CEST)
X-Virus-Scanned: by antispam in UMU at xenon41.um.es
Received: from xenon41.um.es ([127.0.0.1])
 by localhost (xenon41.um.es [127.0.0.1]) (amavisd-new, port 10024)
 with LMTP id 5GNvfvuixJmQ; Thu, 25 Jul 2019 16:53:43 +0200 (CEST)
Received: from quantum.inf.um.es (quantum.inf.um.es [155.54.204.208])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested) (Authenticated sender: rafa@um.es)
 by xenon41.um.es (Postfix) with ESMTPSA id F2E49206A4;
 Thu, 25 Jul 2019 16:53:40 +0200 (CEST)
From: Rafa Marin Lopez <rafa@um.es>
Message-Id: <D13C141A-5144-4CFD-A4D9-3A137144E45B@um.es>
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_46A1369C-EFA7-4609-9A39-8B85BF5E5A6F"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Thu, 25 Jul 2019 16:53:39 +0200
In-Reply-To: <041301d54141$c0bae090$4230a1b0$@gmail.com>
Cc: Rafa Marin Lopez <rafa@um.es>,
 =?utf-8?B?RmVybmFuZG8gUGVyZcOxw61ndWV6IEdhcmPDrWE=?=
 <fernando.pereniguez@cud.upct.es>, 
 =?utf-8?Q?Martin_Bj=C3=B6rklund?= <mbj@tail-f.com>, i2nsf@ietf.org,
 Gabriel Lopez <gabilm@um.es>, Yoav Nir <ynir.ietf@gmail.com>,
 "ipsec@ietf.org WG" <ipsec@ietf.org>
To: Valery Smyslov <smyslov.ietf@gmail.com>
References: <156253524318.473.14686910090362577746@ietfa.amsl.com>
 <4E36A715-3B6C-4BDF-A149-9E10574E3F96@um.es>
 <5758F23C-087D-49AB-87E0-FE7E0F6D15A1@gmail.com>
 <016c01d53f08$e0c2d1d0$a2487570$@gmail.com>
 <422BC608-F527-4BFF-A04F-B8FE42CA3169@um.es>
 <030c01d540a3$9e7a74d0$db6f5e70$@gmail.com>
 <AB6BD868-418B-4D79-9652-656E4C0297AD@gmail.com>
 <031f01d540a7$96424820$c2c6d860$@gmail.com>
 <CFE1D941-75CB-455F-A37E-151878B61571@um.es>
 <041301d54141$c0bae090$4230a1b0$@gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/iPJd1G9Xl6xx4rrUjKe2sa8SSyc>
Subject: Re: [I2nsf] I-D Action:
 draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*"
 <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>,
 <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>,
 <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2019 14:53:59 -0000


--Apple-Mail=_46A1369C-EFA7-4609-9A39-8B85BF5E5A6F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi Valery:

Great!. Thanks for these comments. Very valuable. Following your =
suggestion we would like to add similar text to part of the I-D =
describing the process of IPsec SA installation. This is inline with the =
previous text about rekeying we sent:


"Figure 4 describes the IKE-less case, when a data packet needs to be
protected in the path between the NSF A and NSF B:

   1.  The administrator establishes the flow-based security policies,
       and the Security Controller looks for the involved NSFs.

   2.  The Security Controller translates the flow-based security
       policies into IPsec SPD and SAD entries.

   3.  The Security Controller inserts these entries in both NSF A and
       NSF B IPsec databases (SPD and SAD).  The following text
       describes how this happens between two NSFs A and B:

       *  The Security Controller chooses two random values as SPIs: for
          example, SPIa1 for NSF A and SPIb1 for NSF B.  These numbers
          MUST not be in conflict with any IPsec SA in NSF A or NSF B.
          It also generates fresh cryptographic material for the new
          inbound/outbound IPsec SAs and their parameters and send
          simultaneously the new inbound IPsec SA with SPIa1 and new
          outbound IPsec SAs with SPIb1 to NSF A; and the new inbound
          IPsec SA with SPIb1 and new outbound IPsec SAs with SPIa1 to
          B, together with the corresponding IPsec policies.

       *  Once the Security Controller receives confirmation from NSF A
          and NSF B, the controller knows that the IPsec SAs are
          correctly installed and ready.

       If some of the operations described above fails (e.g. the NSF A
       reports an error when the Security Controller is trying to
       install the SPD entry, the new inbound and outbound IPsec SAs)
       the Security Controller must perform rollback operations by
       deleting any new inbound or outbound SA and SPD entry that had
       been successfully installed in any of the NSFs (e.g NSF B) and
       stop the process (NOTE: the Security Controller may retry several
       times before giving up).  Other alternative to this operation is:
       the Security Controller sends first the IPsec policies and new
       inbound IPsec SAs to A and B and once it obtains a successful
       confirmation of these operations from NSF A and NSF B, it
       proceeds with installing to the new outbound IPsec SAs.  However,
       this may increase the latency to complete the process.  As an
       advantage, no traffic is sent over the network until the IPsec
       SAs are completely operative.  In any case other alternatives may
       be possible.  Finally, it is worth mentioning that the Security
       Controller associates a lifetime to the new IPsec SAs.  When this
       lifetime expires, the NSF will send a sadb-expire notification to
       the Security Controller in order to start the rekeying process.

   4.  The flow is protected with the IPsec SA established by the
       Security Controller.
=E2=80=9C

We have also clarified proactive and reactive and the operations =
associated in a text below

"Instead of installing IPsec policies in the SPD and IPsec
SAs in the SAD in step 3 (proactive mode), it is also
possible that the Security Controller only installs the SPD
entries in step 3 (reactive mode). In such a case, when a
data packet requires to be protected with IPsec, the NSF
that saw first the data packet will send a sadb-acquire
notification that informs the Security Controller that needs
SAD entries with the IPsec SAs to process the data
packet. In such as reactive mode, since IPsec policies are
already installed in the SPD, the Security Controller
installs first the new IPsec SAs in NSF A and B with the
operations described in step 3 but without sending any IPsec
policies. Again, if some of the operations installing=20
the new inbound/outbound IPsec SAs fail,=20
the Security Controller stops the process and performs a
rollback operation by deleting any new inbound/outbound SAs 	=09
that had been successfully installed.=E2=80=9D

We hope this text also helps.

Thank you very much again.

> El 23 jul 2019, a las 12:31, Valery Smyslov <smyslov.ietf@gmail.com> =
escribi=C3=B3:
>=20
> Hi Rafa,
> =20
> =20
> Hi Valery:
>=20
>=20
>> El 22 jul 2019, a las 18:07, Valery Smyslov <smyslov.ietf@gmail.com =
<mailto:smyslov.ietf@gmail.com>> escribi=C3=B3:
>> =20
>> Hi Yoav,
>> =20
>> I think that it is not the performance of the SC that would matter,
>> but the possible delays in the network. If we think of the network
>> connecting the SC and the NSFs as of one close to "ideal", then we =
have
>> no problems. Otherwise the SC must be prepared to deal with=20
>> network issues. Note, that in case of reactive SA setup and in case
>> of rekeying the SC must manage two NSFs in a synchronized manner,
>> and any of these NSF can go offline or reboot or stop responding
>> during this, and SC must properly deal with all this events,
>> making proper roll-back on the other NSF.
> =20
> Regarding this: steps 1, 2 and 3 in section 5.3.1 are lock-step. As =
you may see we mention:=20
> =20
> "Once the Security Controller receives confirmation from A and B, the =
controller knows that the inbound=20
> IPsec A are correctly installed.=E2=80=9D
> =20
> Having said this. Maybe this text after the description of steps 1, 2 =
and 3 may help:
> =20
> =E2=80=9CIf some of the operations in step 1 fails (e.g. the NSF1 =
reports an error when the Security Controller is trying to install anew =
new inbound IPsec SA) the Security Controller must perform rollback =
operations by removing any new inbound SA that had been successfully =
installed during step 1.=20
> =20
> If step 1 is successful but some of the operations in step 2 fails =
(e.g. the NSF1 reports an error when the Security Controller is trying =
to install the new outbound IPsec SA), the Security Controller must =
perform a rollback operation by deleting any new outbound SA that had =
been successfully installed during step 2 and by deleting the inbound =
SAs created in step 1.=20
> =20
> If the steps 1 an 2 are successful and the step 3 fails the Security =
Controller will avoid any rollback of the operations carried out in step =
1 and step 2 since new and valid IPsec SAs were created and are =
functional. The Security Controller may reattempt to remove the old =
inbound and outbound SAs in NSF1 and NSF2 several times until it =
receives a success or it gives up. In the last case, the old IPsec SAs =
will be removed when the hard lifetime is reached."=20
> =20
>           Yes, this text would help.
> =20
>           Thank you,
>           Valery.
> =20
> Btw, you can also find some text about NSF state loss in section =
5.3.2.=20
>=20
>=20
>> =20
>> With IKE case RFC7296 contains very specific advices what
>> to do in case of packet loss, delay etc (e.g in case of=20
>> simultaneous rekeying). I'd like to see the same advices
>> for SC's behavior in case of network issues.
>> =20
>> Regards,
>> Valery.
>> =20
>> =20
>> =20
>> =20
>> Hi, Valery
>> =20
>> Obviously, you need a security controller that scales to the number =
of SAs it needs to generate. But generating an SA in the IKE-less case =
is just generating 72 random bytes (for AES-GCM-256) and packaging them. =
 I don=E2=80=99t think with a properly scaled SC this would produce more =
latency than IKE between the nodes, which has 1/2 round-trips and =
requires asymmetric operations.
>> =20
>>=20
>>=20
>>=20
>>> On 22 Jul 2019, at 11:39, Valery Smyslov <smyslov.ietf@gmail.com =
<mailto:smyslov.ietf@gmail.com>> wrote:
>>> =20
>>> Hi Rafa,
>>> =20
>>> sure this problem is general for any SDN solution.
>>> My point was that if SC performs a lot of real-time=20
>>> (or near real-time) tasks as it may happen in IKE-less case,=20
>>> then this problem may become serious.
>>> =20
>>> Anyway, I'm happy with the updated text, thank you.
>>> However, in a following document(s), suggested by Yoav,
>>> I'd like to see more concrete advices of how SC should
>>> act in this situation to ensure that the consistence of the=20
>>> network is preserved despite all the possible delays etc.
>>> =20
>>> Regards,
>>> Valery.
>>> =20
>>> =20
>>> From: Rafa Marin Lopez <rafa@um.es <mailto:rafa@um.es>>=20
>>> Sent: Monday, July 22, 2019 6:11 PM
>>> To: Valery Smyslov <smyslov.ietf@gmail.com =
<mailto:smyslov.ietf@gmail.com>>
>>> Cc: Rafa Marin Lopez <rafa@um.es <mailto:rafa@um.es>>; Yoav Nir =
<ynir.ietf@gmail.com <mailto:ynir.ietf@gmail.com>>; i2nsf@ietf.org =
<mailto:i2nsf@ietf.org>; ipsec@ietf.org <mailto:ipsec@ietf.org>; =
Fernando Pere=C3=B1=C3=ADguez Garc=C3=ADa =
<fernando.pereniguez@cud.upct.es =
<mailto:fernando.pereniguez@cud.upct.es>>; mbj@tail-f.com =
<mailto:mbj@tail-f.com>; Gabriel Lopez <gabilm@um.es =
<mailto:gabilm@um.es>>
>>> Subject: Re: [I2nsf] I-D Action: =
draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt
>>> =20
>>> Hi Valery:
>>> =20
>>> Thank you very much for your comments. Please see ours inside.
>>>> El 20 jul 2019, a las 16:38, Valery Smyslov <smyslov.ietf@gmail.com =
<mailto:smyslov.ietf@gmail.com>> escribi=C3=B3:
>>>> =20
>>>> Hi,
>>>> =20
>>>> thank you for updating the document. I still think that some aspect
>>>> of IKE-less use case are not discussed yet (well, probably they are =
not=20
>>>> "serious", depending on one's definition of "serious").
>>>> =20
>>>> Unlike IKE case. which we can consider as mostly static =
configuration,
>>>> the IKE-less case is a dynamic one. If IPsec SA are being created=20=

>>>> on demand (via kernel-acquire) and the traffic volume is high,
>>>> then depending on the IPsec policy IKE-less case can become=20
>>>> a highly dynamic, which implies additional requirement on both
>>>> the network connecting SC and NSF and the performance of the =
protocol used to=20
>>>> secure their communications. In other words, in IKE case the =
communication
>>>> between IKE daemon and kernel is seamless, while in IKE-less
>>>> case the communication between NSF ("kernel") and SC adds
>>>> noticeable delay (and can potentially add quite a long delay),
>>>> which can influence total performance of the system.
>>>> =20
>>>> Generally IKE-less case requires more communications between
>>>> different nodes to establish or rekey IPsec SA, than IKE case
>>>> (I assume that IKE SA is already established), that may have
>>>> an impact on high-speed networks with short-lived IPsec SAs,
>>>> especially if they are created per transport connection
>>>> (say one IPsec SA for one TCP session).
>>> =20
>>> [Authors] What you have just described is what happens in any =
SDN-based network. In fact, your comment would be applicable to =
practically any scenario based on the SDN paradigm. In the particular =
case of the I-D, the IKE-less case is the most similar to case you can =
see in, for example, Openflow networks where latency is also important =
(just as an example : https://ieeexplore.ieee.org/document/6573052 =
<https://ieeexplore.ieee.org/document/6573052> )
>>>=20
>>>=20
>>>=20
>>>=20
>>>> =20
>>>> I believe, that SC's task of managing IPsec SAs in IKE-less case=20
>>>> may become quite complex, especially because due to the
>>>> additional delay, introduced by the network, the picture of the
>>>> state of the SAs the SC has can become inaccurate (well,=20
>>>> it will always be inaccurate, but with short delays it doesn't =
matter).
>>>> Just an example. Consider an SC receives a signal from NSF that an =
SA
>>>> is soft expired and starts rekeying process by first installing a =
new
>>>> pair of inbound SAs. It successfully installs them on the NSF
>>>> it receives notification from, but then it receives a notification
>>>> that the other NSF has rebooted, so it must clear all the SAs on
>>>> its peers, including the just installed new one (which is only
>>>> half-done). There seems to be a lot of nuances, and the document=20
>>>> completely ignores them. Not that I think that the task
>>>> is impossible, but the algorithm of managing the SAs can become
>>>> quite complex and possibly unreliable.
>>> =20
>>> [Authors] We largely thought about this kind of cases, although we =
do not see any different that may happen in SDN-based network nowadays. =
And it seems to me that SDN is becoming something generally accepted =
despite the different nuances that needs to be consider. In any case, =
what you mention is not ignored in our document because it is included =
in the text we have in section 5.3 (see below) where we highlight the =
complexity is shifted to the SC (that=E2=80=99s clear). But as I =
mentioned, this is not specific to IKE-less case but for any solution =
based on the pure SDN paradigm (such as Openflow networks). In other =
words, the cases you well mention are applicable to any SDN-based =
solution.
>>>=20
>>>=20
>>>=20
>>>=20
>>>> =20
>>>> I didn't find this discussion in the draft (sorry if I missed it).
>>> =20
>>> Your comments are somehow summarized in the following text section =
5.3
>>> =20
>>> "On the contrary, the overload of creating fresh IPsec
>>>    SAs is shifted to the Security Controller since IKEv2 is not in =
the
>>>    NSF.  As a consequence, this may result in a more complex
>>>    implementation in the controller side.  This overload may create =
some
>>>    scalability issues when the number of NSFs is high.
>>>=20
>>> In general, literature around SDN-based network management using a
>>>    centralized Security Controller is aware about scalability issues =
and
>>>    solutions have been already provided (e.g. hierarchical Security
>>>    Controllers; having multiple replicated Security Controllers, =
etc)."
>>> =20
>>> I would add that a high-speed dedicated management network between =
the SC and the NSFs can be also in place to even limit reduce these =
delays between the SC and NSFs (this idea comes again from Openflow =
networks). Also the SC can select more =E2=80=9Cintelligent=E2=80=9D =
lifetime to orchestrate better when the notifications may appear.
>>> =20
>>> In any case, we think we can improve that text as follows:=20
>>> =20
>>> "On the contrary, the overload of creating and managing IPsec
>>>    SAs is shifted to the Security Controller since IKEv2 is not in =
the
>>>    NSF. As a consequence, this may result in a more complex
>>>    implementation in the controller side in comparison with
>>>    IKE case.  For example, the Security Controller have to deal with=20=

>>>    the latency existing in the path between the Security Controller=20=

>>>    and the NSF in order to solve tasks such as, rekey or creation =
and=20
>>>    installation of new IPsec SAs. However, this is not specific to =
our=20
>>>    contribution but a general aspect in any SDN-based network.=20
>>>    In summary, this overload may create some scalability and =
performance=20
>>>    issues when the number of NSFs is high.
>>>=20
>>>    Nevertheless, literature around SDN-based network management =
using a
>>>    centralized Security Controller is aware about scalability and
>>>    performance issues and solutions have been already provided and
>>>    discussed (e.g.  hierarchical Security Controllers; having =
multiple
>>>    replicated Security Controllers, dedicated high-speed management
>>>    networks, etc). In the context of SDN-based IPsec management, one
>>>    way to reduce the latency and alleviate some performance issues =
can
>>>    be the installation of the IPsec policies and IPsec SAs at the =
same time
>>>    (proactive mode, as described in Section 7.1) instead of waiting =
for
>>>    notifications (e.g. a notification sadb-acquire when a new IPsec =
SA=20
>>>    is required) to proceed with the IPsec SA installations (reactive =
mode).=20
>>>    Another way to reduce the overhead and the potential scalability =
and
>>>    performance issues in the Security Controller is to apply the IKE
>>>    case described in this document, since the IPsec SAs are managed
>>>    between NSFs without the involvement of the Security Controller =
at
>>>    all, except by the initial IKE configuration provided by the =
Security
>>>    Controller.=E2=80=9D
>>> =20
>>> Please see also our comments to Yoav.
>>> =20
>>> Best Regards.
>>>=20
>>>=20
>>>=20
>>>=20
>>>> =20
>>>> Regards,
>>>> Valery.
>>>> =20
>>>> =20
>>>> =20
>>>> =20
>>>> Thanks for getting this done and published.
>>>> =20
>>>> We will wait with requesting publication until the I2NSF session =
next week.  Between now and then, please re-read the draft and send a =
message to the list is something is seriously wrong.
>>>> =20
>>>> Barring any such shouting, we will request publication right after =
the meeting.
>>>> =20
>>>> Thanks again,
>>>> =20
>>>> Linda and Yoav
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>>=20
>>>>> On 16 Jul 2019, at 15:42, Rafa Marin-Lopez <rafa@um.es =
<mailto:rafa@um.es>> wrote:
>>>>> =20
>>>>> Dear all:
>>>>>=20
>>>>> We submitted a new version of the I-D (v05) where we have applied =
several changes. In the following you have a summary of the main =
changes, which we will expand/explain during our presentation:=20
>>>>>=20
>>>>> - We have dealt with YANG doctors=E2=80=99 review (Martin's)
>>>>>=20
>>>>> - We have dealt with Paul Wouters=E2=80=99 comments and Tero=E2=80=99=
s comments.
>>>>> =20
>>>>> - We have added more specific text in the descriptions.
>>>>>=20
>>>>> - Notifications have a simpler format now since most of the =
information that contained in the past is already handled by the =
Security Controller.
>>>>>=20
>>>>> - State data has been reduced. For example, in IKE case, most of =
the information is related with IKE and not with the specific details =
about IPsec SAs that IKE handles (after all, IKE can abstract this =
information from the Security Controller).
>>>>> =20
>>>>> - We have included text in the security section to discuss about =
the default IPsec policies that should be in the NSF when it starts =
before contacting with the SC such as the IPsec policies required to =
allow traffic between the SC and the NSF.
>>>>> =20
>>>>> - We have added a subsection 5.3.4 about NSF discovery by the =
Security Controller.
>>>>>=20
>>>>> - In order to specify the crypto-algorithms we have used a simple =
approach by including an integer and adding a text pointing the IANA in =
the reference clause. For example:
>>>>>=20
>>>>> typedef encryption-algorithm-type {
>>>>>            type uint32;
>>>>>            description=20
>>>>>                "The encryption algorithm is specified with a =
32-bit
>>>>>                number extracted from IANA Registry. The acceptable
>>>>>                values MUST follow the requirement levels for
>>>>>                encryption algorithms for ESP and IKEv2.";
>>>>>            reference=20
>>>>>                 "IANA Registry- Transform Type 1 - Encryption
>>>>>                 Algorithm Transform IDs. RFC 8221 - Cryptographic
>>>>>                 Algorithm Implementation Requirements and Usage
>>>>>                 Guidance for Encapsulating Security Payload (ESP)
>>>>>                 and Authentication Header (AH) and RFC 8247 -
>>>>>                 Algorithm Implementation Requirements and Usage
>>>>>                 Guidance for the Internet Key Exchange Protocol
>>>>>                 Version 2 (IKEv2).";
>>>>>        }
>>>>> =20
>>>>> - We have included three additional Annexes with examples in about =
the usage of the YANG model.
>>>>> =20
>>>>> - We have performed pyang --lint --lint-ensure-hyphenated-names =
and pyang -f yang --yang-line-length 69 in our model without warnings.
>>>>> =20
>>>>> Best Regards.
>>>>>=20
>>>>>=20
>>>>>=20
>>>>>=20
>>>>>=20
>>>>>> Inicio del mensaje reenviado:
>>>>>> =20
>>>>>> De: internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
>>>>>> Asunto: [I2nsf] I-D Action: =
draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt
>>>>>> Fecha: 7 de julio de 2019, 23:34:03 CEST
>>>>>> Para: <i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>>
>>>>>> Cc: i2nsf@ietf.org <mailto:i2nsf@ietf.org>
>>>>>> Responder a: i2nsf@ietf.org <mailto:i2nsf@ietf.org>
>>>>>> =20
>>>>>>=20
>>>>>> A New Internet-Draft is available from the on-line =
Internet-Drafts directories.
>>>>>> This draft is a work item of the Interface to Network Security =
Functions WG of the IETF.
>>>>>>=20
>>>>>>        Title           : Software-Defined Networking (SDN)-based =
IPsec Flow Protection
>>>>>>        Authors         : Rafa Marin-Lopez
>>>>>>                          Gabriel Lopez-Millan
>>>>>>                          Fernando Pereniguez-Garcia
>>>>>>            Filename        : =
draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt
>>>>>>            Pages           : 81
>>>>>>            Date            : 2019-07-07
>>>>>>=20
>>>>>> Abstract:
>>>>>>   This document describes how providing IPsec-based flow =
protection by
>>>>>>   means of a Software-Defined Network (SDN) controller (aka.  =
Security
>>>>>>   Controller) and establishes the requirements to support this =
service.
>>>>>>   It considers two main well-known scenarios in IPsec: (i) =
gateway-to-
>>>>>>   gateway and (ii) host-to-host.  The SDN-based service described =
in
>>>>>>   this document allows the distribution and monitoring of IPsec
>>>>>>   information from a Security Controller to one or several =
flow-based
>>>>>>   Network Security Function (NSF).  The NSFs implement IPsec to =
protect
>>>>>>   data traffic between network resources.
>>>>>>=20
>>>>>>   The document focuses on the NSF Facing Interface by providing =
models
>>>>>>   for configuration and state data required to allow the Security
>>>>>>   Controller to configure the IPsec databases (SPD, SAD, PAD) and =
IKEv2
>>>>>>   to establish Security Associations with a reduced intervention =
of the
>>>>>>   network administrator.
>>>>>>=20
>>>>>>=20
>>>>>> The IETF datatracker status page for this draft is:
>>>>>> =
https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-flow-protectio=
n/ =
<https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-flow-protecti=
on/>
>>>>>>=20
>>>>>> There are also htmlized versions available at:
>>>>>> =
https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-05 =
<https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protection-05=
>
>>>>>> =
https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-ipsec-flow-prot=
ection-05 =
<https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-ipsec-flow-pro=
tection-05>
>>>>>>=20
>>>>>> A diff from the previous version is available at:
>>>>>> =
https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-i2nsf-sdn-ipsec-flow-protec=
tion-05 =
<https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-i2nsf-sdn-ipsec-flow-prote=
ction-05>
>>>>>>=20
>>>>>>=20
>>>>>> Please note that it may take a couple of minutes from the time of =
submission
>>>>>> until the htmlized version and diff are available at =
tools.ietf.org <http://tools.ietf.org/>.
>>>>>>=20
>>>>>> Internet-Drafts are also available by anonymous FTP at:
>>>>>> ftp://ftp.ietf.org/internet-drafts/ =
<ftp://ftp.ietf.org/internet-drafts/>
>>>>>>=20
>>>>>> _______________________________________________
>>>>>> I2nsf mailing list
>>>>>> I2nsf@ietf.org <mailto:I2nsf@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/i2nsf =
<https://www.ietf.org/mailman/listinfo/i2nsf>
>>>>> =20
>>>>> -------------------------------------------------------
>>>>> Rafa Marin-Lopez, PhD
>>>>> Dept. Information and Communications Engineering (DIIC)
>>>>> Faculty of Computer Science-University of Murcia
>>>>> 30100 Murcia - Spain
>>>>> Telf: +34868888501 Fax: +34868884151 e-mail:=C2=A0rafa@um.es =
<mailto:rafa@um.es>
>>>>> -------------------------------------------------------
>>>>> =20
>>>>> =20
>>>>> =20
>>>>> =20
>>>>> _______________________________________________
>>>>> I2nsf mailing list
>>>>> I2nsf@ietf.org <mailto:I2nsf@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/i2nsf =
<https://www.ietf.org/mailman/listinfo/i2nsf>
> =20
> _______________________________________________
> I2nsf mailing list
> I2nsf@ietf.org
> https://www.ietf.org/mailman/listinfo/i2nsf


--Apple-Mail=_46A1369C-EFA7-4609-9A39-8B85BF5E5A6F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
dir=3D"auto" style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space;" class=3D""><div class=3D"">Hi =
Valery:</div><div class=3D""><br class=3D""></div><div class=3D"">Great!. =
Thanks for these comments. Very valuable. Following your suggestion we =
would like to add similar text to part of the I-D describing the process =
of IPsec SA installation. This is inline with the previous text about =
rekeying we sent:</div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div><div class=3D"">"Figure 4 describes the =
IKE-less case, when a data packet needs to be</div><div =
class=3D"">protected in the path between the NSF A and NSF B:</div><div =
class=3D""><br class=3D""></div><div class=3D"">&nbsp; &nbsp;1. =
&nbsp;The administrator establishes the flow-based security =
policies,</div><div class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;and the =
Security Controller looks for the involved NSFs.</div><div class=3D""><br =
class=3D""></div><div class=3D"">&nbsp; &nbsp;2. &nbsp;The Security =
Controller translates the flow-based security</div><div class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp;policies into IPsec SPD and SAD entries.</div><div =
class=3D""><br class=3D""></div><div class=3D"">&nbsp; &nbsp;3. =
&nbsp;The Security Controller inserts these entries in both NSF A =
and</div><div class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;NSF B IPsec =
databases (SPD and SAD). &nbsp;<b class=3D"">The following =
text</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;describes how this happens between two NSFs A and B:</b></div><div =
class=3D""><b class=3D""><br class=3D""></b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;* &nbsp;The Security Controller =
chooses two random values as SPIs: for</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; example, SPIa1 for NSF A =
and SPIb1 for NSF B. &nbsp;These numbers</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; MUST not be in conflict =
with any IPsec SA in NSF A or NSF B.</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; It also generates fresh =
cryptographic material for the new</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; inbound/outbound IPsec SAs =
and their parameters and send</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; simultaneously the new =
inbound IPsec SA with SPIa1 and new</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; outbound IPsec SAs with =
SPIb1 to NSF A; and the new inbound</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; IPsec SA with SPIb1 and =
new outbound IPsec SAs with SPIa1 to</b></div><div class=3D""><b =
class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; B, together with the =
corresponding IPsec policies.</b></div><div class=3D""><b class=3D""><br =
class=3D""></b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;* &nbsp;Once the Security Controller receives confirmation from =
NSF A</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; and NSF B, the controller knows that the IPsec SAs =
are</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; correctly installed and ready.</b></div><div class=3D""><b =
class=3D""><br class=3D""></b></div><div class=3D""><b class=3D"">&nbsp; =
&nbsp; &nbsp; &nbsp;If some of the operations described above fails =
(e.g. the NSF A</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp;reports an error when the Security Controller is trying =
to</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;install the SPD entry, the new inbound and outbound IPsec =
SAs)</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;the Security Controller must perform rollback operations =
by</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;deleting any new inbound or outbound SA and SPD entry that =
had</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;been successfully installed in any of the NSFs (e.g NSF B) =
and</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;stop the process (NOTE: the Security Controller may retry =
several</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;times before giving up). &nbsp;Other alternative to this operation =
is:</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;the Security Controller sends first the IPsec policies and =
new</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;inbound IPsec SAs to A and B and once it obtains a =
successful</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;confirmation of these operations from NSF A and NSF B, =
it</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;proceeds with installing to the new outbound IPsec SAs. =
&nbsp;However,</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; =
&nbsp; &nbsp;this may increase the latency to complete the process. =
&nbsp;As an</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;advantage, no traffic is sent over the network until the =
IPsec</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;SAs are completely operative. &nbsp;In any case other alternatives =
may</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;be =
possible. &nbsp;Finally, it is worth mentioning that the =
Security</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;Controller associates a lifetime to the new IPsec SAs. &nbsp;When =
this</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;lifetime expires, the NSF will send a sadb-expire notification =
to</b></div><div class=3D""><b class=3D"">&nbsp; &nbsp; &nbsp; &nbsp;the =
Security Controller in order to start the rekeying =
process.</b></div><div class=3D""><br class=3D""></div><div =
class=3D"">&nbsp; &nbsp;4. &nbsp;The flow is protected with the IPsec SA =
established by the</div><div class=3D"">&nbsp; &nbsp; &nbsp; =
&nbsp;Security Controller.</div><div class=3D""><b =
class=3D"">=E2=80=9C</b></div><div class=3D""><b class=3D""><br =
class=3D""></b></div><div class=3D"">We have also clarified proactive =
and reactive and the operations associated in a text below</div><div =
class=3D""><br class=3D""></div><div class=3D"">"Instead of installing =
IPsec policies in the SPD and IPsec</div><div class=3D"">SAs in the SAD =
in step 3 (proactive mode), it is also</div><div class=3D"">possible =
that the Security Controller only installs the SPD</div><div =
class=3D"">entries in step 3 (reactive mode). In such a case, when =
a</div><div class=3D"">data packet requires to be protected with IPsec, =
the NSF</div><div class=3D"">that saw first the data packet will send a =
sadb-acquire</div><div class=3D"">notification that informs the Security =
Controller that needs</div><div class=3D"">SAD entries with the IPsec =
SAs to process the data</div><div class=3D"">packet. In such as reactive =
mode, since IPsec policies are</div><div class=3D"">already installed in =
the SPD, the Security Controller</div><div class=3D"">installs first the =
new IPsec SAs in NSF A and B with the</div><div class=3D"">operations =
described in step 3 but without sending any IPsec</div><div =
class=3D"">policies. Again, if some of the operations =
installing&nbsp;</div><div class=3D"">the new inbound/outbound IPsec SAs =
fail,&nbsp;</div><div class=3D"">the Security Controller stops the =
process and performs a</div><div class=3D"">rollback operation by =
deleting any new inbound/outbound SAs <span class=3D"Apple-tab-span" =
style=3D"white-space:pre">		</span></div><div class=3D"">that =
had been successfully installed.=E2=80=9D</div><div class=3D""><br =
class=3D""></div><div class=3D"">We hope this text also helps.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Thank you very much =
again.</div><div class=3D""><br class=3D""><div><blockquote type=3D"cite" =
class=3D""><div class=3D"">El 23 jul 2019, a las 12:31, Valery Smyslov =
&lt;<a href=3D"mailto:smyslov.ietf@gmail.com" =
class=3D"">smyslov.ietf@gmail.com</a>&gt; escribi=C3=B3:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div =
class=3D"WordSection1" style=3D"page: WordSection1; font-family: =
Courier; font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;"><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">Hi Rafa,<o:p class=3D""></o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div =
style=3D"border-style: none none none solid; border-left-color: blue; =
border-left-width: 1.5pt; padding: 0cm 0cm 0cm 4pt;" class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">Hi Valery:<o:p =
class=3D""></o:p></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D"" type=3D"cite"><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">El 22 jul 2019, a las 18:07, Valery =
Smyslov &lt;<a href=3D"mailto:smyslov.ietf@gmail.com" style=3D"color: =
purple; text-decoration: underline;" =
class=3D"">smyslov.ietf@gmail.com</a>&gt; escribi=C3=B3:<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">Hi Yoav,</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span style=3D"font-size: =
14pt;" class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">I think that it is not the =
performance of the SC that would matter,</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">but =
the possible delays in the network. If we think of the =
network</span><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">connecting the SC and the NSFs as of one close to =
"ideal", then we have</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">no problems. Otherwise the SC must =
be prepared to deal with<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">network issues. Note, that in case of reactive SA setup and =
in case</span><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">of rekeying the SC must manage two NSFs in a =
synchronized manner,</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">and any of these NSF can go =
offline or reboot or stop responding</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">during this, and SC must properly deal with all this =
events,</span><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">making proper roll-back on the other NSF.</span><o:p =
class=3D""></o:p></div></div></div></blockquote><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Regarding this: steps 1, 2 and 3 in section 5.3.1 are =
lock-step. As you may see we mention:&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">"Once the Security =
Controller<span class=3D"Apple-converted-space">&nbsp;</span><b =
class=3D"">receives confirmation from A and B</b>, the controller knows =
that the inbound&nbsp;<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">IPsec A are correctly =
installed.=E2=80=9D<o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Having said this. Maybe this text after the description of =
steps 1, 2 and 3 may help:<o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">=E2=80=9CIf some of the operations in step 1 fails =
(e.g.&nbsp;the NSF1 reports an error when the Security Controller is =
trying to install anew new inbound IPsec SA) the&nbsp;Security =
Controller&nbsp;must perform rollback operations by removing any new =
inbound SA that had been successfully installed during step 1.&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">If step 1 is successful but some of the =
operations in step 2 fails (e.g.&nbsp;the NSF1 reports an error when the =
Security Controller is trying to install the new outbound IPsec SA), =
the&nbsp;Security Controller&nbsp;must perform a rollback operation by =
deleting any new outbound SA that had been successfully installed during =
step 2 and by deleting the inbound SAs created in step 1.&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">If the steps 1 an 2 are successful and =
the step 3 fails the&nbsp;Security Controller&nbsp;will avoid any =
rollback of the operations carried out in step 1 and step 2 since new =
and valid IPsec SAs were created and are functional. The&nbsp;Security =
Controller&nbsp;may reattempt to remove the old inbound and outbound SAs =
in NSF1 and NSF2 several times until it receives a success or it gives =
up. In the last case, the old IPsec SAs will be removed when the hard =
lifetime is reached."&nbsp;<o:p class=3D""></o:p></div><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span style=3D"font-size: 14pt;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-size: 14pt;" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">Yes, this text would help.<o:p =
class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thank =
you,<o:p class=3D""></o:p></span></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Valery.<o:p class=3D""></o:p></span></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" class=3D""><o:p =
class=3D"">&nbsp;</o:p></span></div></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Btw, you can also find some text about =
NSF state loss in section 5.3.2.&nbsp;<o:p =
class=3D""></o:p></div></div><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><br =
class=3D""><br class=3D""><o:p class=3D""></o:p></div><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D"" =
type=3D"cite"><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">With IKE case RFC7296 contains =
very specific advices what</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">to do in case of packet loss, =
delay etc (e.g in case of<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">simultaneous rekeying). I'd like to see the same =
advices</span><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">for SC's behavior in case of network =
issues.</span><o:p class=3D""></o:p></div></div><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">Regards,</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">Valery.</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div><div =
style=3D"border-style: none none none solid; border-left-color: blue; =
border-left-width: 1.5pt; padding: 0cm 0cm 0cm 4pt;" class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
class=3D"">Hi, Valery</span><o:p class=3D""></o:p></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Obviously, you need a security =
controller that scales to the number of SAs it needs to generate. But =
generating an SA in the IKE-less case is just generating 72 random bytes =
(for AES-GCM-256) and packaging them. &nbsp;I don=E2=80=99t think with a =
properly scaled SC this would produce more latency than IKE between the =
nodes, which has 1/2 round-trips and requires asymmetric operations.<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><br class=3D""><br class=3D""><br =
class=3D""><o:p class=3D""></o:p></div></div><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D"" =
type=3D"cite"><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">On 22 Jul 2019, at 11:39, Valery Smyslov &lt;<a =
href=3D"mailto:smyslov.ietf@gmail.com" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">smyslov.ietf@gmail.com</span></a>&gt; wrote:<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div style=3D"margin: =
0cm 0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">Hi Rafa,</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">sure this problem is general for any SDN =
solution.</span><o:p class=3D""></o:p></div></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">My point was that =
if SC performs a lot of real-time<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">(or near real-time) tasks as it may happen in IKE-less =
case,<span class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">then this problem may become serious.</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">Anyway, I'm happy with the updated text, thank =
you.</span><o:p class=3D""></o:p></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">However, in a following =
document(s), suggested by Yoav,</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">I'd like to see more concrete advices of how SC =
should</span><o:p class=3D""></o:p></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">act in this situation to ensure =
that the consistence of the<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">network is preserved despite all the possible delays =
etc.</span><o:p class=3D""></o:p></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">Regards,</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">Valery.</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" style=3D"font-size: =
14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div><div style=3D"border-style: none none =
none solid; border-left-color: blue; border-left-width: 1.5pt; padding: =
0cm 0cm 0cm 4pt;" class=3D""><div class=3D""><div style=3D"border-style: =
solid none none; border-top-color: rgb(225, 225, 225); border-top-width: =
1pt; padding: 3pt 0cm 0cm;" class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><b class=3D""><span =
lang=3D"EN-US" class=3D"">From:</span></b><span =
class=3D"apple-converted-space"><span lang=3D"EN-US" =
class=3D"">&nbsp;</span></span><span lang=3D"EN-US" class=3D"">Rafa =
Marin Lopez &lt;<a href=3D"mailto:rafa@um.es" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">rafa@um.es</span></a>&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><br class=3D""><b =
class=3D"">Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Monday, July 22, 2019 6:11 =
PM<br class=3D""><b class=3D"">To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Valery Smyslov &lt;<a =
href=3D"mailto:smyslov.ietf@gmail.com" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">smyslov.ietf@gmail.com</span></a>&gt;<br class=3D""><b =
class=3D"">Cc:</b><span class=3D"apple-converted-space">&nbsp;</span>Rafa =
Marin Lopez &lt;<a href=3D"mailto:rafa@um.es" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">rafa@um.es</span></a>&gt;; Yoav Nir &lt;<a =
href=3D"mailto:ynir.ietf@gmail.com" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">ynir.ietf@gmail.com</span></a>&gt;;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:i2nsf@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">i2nsf@ietf.org</span></a>;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:ipsec@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">ipsec@ietf.org</span></a>; Fernando Pere=C3=B1=C3=ADguez =
Garc=C3=ADa &lt;<a href=3D"mailto:fernando.pereniguez@cud.upct.es" =
style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" =
class=3D"">fernando.pereniguez@cud.upct.es</span></a>&gt;;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:mbj@tail-f.com" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">mbj@tail-f.com</span></a>; Gabriel Lopez &lt;<a =
href=3D"mailto:gabilm@um.es" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">gabilm@um.es</span></a>&gt;<br class=3D""><b =
class=3D"">Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [I2nsf] I-D Action: =
draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt</span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">Hi Valery:<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">Thank you =
very much for your comments. Please see ours inside.<o:p =
class=3D""></o:p></div></div></div><div class=3D""><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D"" =
type=3D"cite"><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">El 20 jul 2019, a las 16:38, Valery =
Smyslov &lt;<a href=3D"mailto:smyslov.ietf@gmail.com" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" class=3D"">smyslov.ietf@gmail.com</span></a>&gt; escribi=C3=B3:<o=
:p class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div><div class=3D""><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">Hi,</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">thank you for =
updating the document. I still think that some aspect</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">of IKE-less use =
case are not discussed yet (well, probably they are not<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">"serious", =
depending on one's definition of "serious").</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">Unlike IKE case. =
which we can consider as mostly static configuration,</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">the IKE-less case =
is a dynamic one. If IPsec SA are being created<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">on demand (via =
kernel-acquire) and the traffic volume is high,</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">then depending on =
the IPsec policy IKE-less case can become<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">a highly dynamic, =
which implies additional requirement on both</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">the network =
connecting SC and NSF and the performance of the protocol used to<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">secure their =
communications. In other words, in IKE case the communication</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">between IKE daemon =
and kernel is seamless, while in IKE-less</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">case the =
communication between NSF ("kernel") and SC adds</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">noticeable delay =
(and can potentially add quite a long delay),</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">which can influence =
total performance of the system.</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">Generally IKE-less =
case requires more communications between</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">different nodes to =
establish or rekey IPsec SA, than IKE case</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">(I assume that IKE =
SA is already established), that may have</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">an impact on =
high-speed networks with short-lived IPsec SAs,</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">especially if they =
are created per transport connection</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">(say one IPsec SA =
for one TCP session).</span><o:p =
class=3D""></o:p></div></div></div></div></div></blockquote><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">[Authors] What you have just described is what happens in any =
SDN-based network. In fact, your comment would be applicable to =
practically any scenario based on the SDN paradigm. In the particular =
case of the I-D, the IKE-less case is the most similar to case you can =
see in, for example, Openflow networks where latency is also important =
(just as an example :<span class=3D"apple-converted-space">&nbsp;</span><a=
 href=3D"https://ieeexplore.ieee.org/document/6573052" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" =
class=3D"">https://ieeexplore.ieee.org/document/6573052</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>)<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><br class=3D""><br =
class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div></div></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D"" type=3D"cite"><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div></div></div><div=
 class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">I =
believe, that SC's task of managing IPsec SAs in IKE-less case<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">may become quite =
complex, especially because due to the</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">additional delay, =
introduced by the network, the picture of the</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">state of the SAs =
the SC has can become inaccurate (well,<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">it will always be =
inaccurate, but with short delays it doesn't matter).</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">Just an example. =
Consider an SC receives a signal from NSF that an SA</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">is soft expired and =
starts rekeying process by first installing a new</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">pair of inbound =
SAs. It successfully installs them on the NSF</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">it receives =
notification from, but then it receives a notification</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">that the other NSF =
has rebooted, so it must clear all the SAs on</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">its peers, =
including the just installed new one (which is only</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">half-done). There =
seems to be a lot of nuances, and the document<span =
class=3D"apple-converted-space">&nbsp;</span></span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">completely ignores =
them. Not that I think that the task</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">is impossible, but =
the algorithm of managing the SAs can become</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">quite complex and =
possibly unreliable.</span><o:p =
class=3D""></o:p></div></div></div></div></div></blockquote><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">[Authors] We largely thought about this kind of cases, =
although we do not see any different that may happen in SDN-based =
network nowadays. And it seems to me that SDN is becoming something =
generally accepted despite the different nuances that needs to be =
consider. In any case, what you mention is not ignored in our document =
because it is included in the text we have in section 5.3 (see below) =
where we highlight the complexity is shifted to the SC (that=E2=80=99s =
clear). But as I mentioned, this is not specific to IKE-less case but =
for any solution based on the pure SDN paradigm (such as Openflow =
networks). In other words, the cases you well mention are applicable to =
any SDN-based solution.<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><br =
class=3D""><br class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div></div></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D"" type=3D"cite"><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div></div></div><div=
 class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">I =
didn't find this discussion in the draft (sorry if I missed =
it).</span><o:p =
class=3D""></o:p></div></div></div></div></div></blockquote><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Your comments are somehow summarized in the following text =
section 5.3<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><p class=3D"MsoNormal" style=3D"margin: 0cm =
0cm 12pt; font-size: 11pt; font-family: Calibri, sans-serif;">"On the =
contrary, the overload of creating fresh IPsec<br class=3D"">&nbsp; =
&nbsp;SAs is shifted to the Security Controller since IKEv2 is not in =
the<br class=3D"">&nbsp; &nbsp;NSF. &nbsp;As a consequence, this may =
result in a<span class=3D"apple-converted-space">&nbsp;</span><b =
class=3D"">more complex<br class=3D"">&nbsp; =
&nbsp;implementation</b><span =
class=3D"apple-converted-space">&nbsp;</span>in the controller side. =
&nbsp;This overload may create some<br class=3D"">&nbsp; =
&nbsp;scalability issues when the number of NSFs is high.<o:p =
class=3D""></o:p></p><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">In general, literature around SDN-based =
network management using a<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;centralized Security Controller is aware about scalability issues =
and<o:p class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;solutions have been already provided (e.g. hierarchical =
Security<o:p class=3D""></o:p></div></div></div></div><div class=3D""><div=
 class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;Controllers; having multiple replicated Security Controllers, =
etc)."<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">I would =
add that a high-speed dedicated management network between the SC and =
the NSFs can be also in place to even limit reduce these delays between =
the SC and NSFs (this idea comes again from Openflow networks). Also the =
SC can select more =E2=80=9Cintelligent=E2=80=9D lifetime to orchestrate =
better when the notifications may appear.<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">In any =
case, we think we can improve that text as follows:&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">"On the =
contrary, the overload of creating and managing IPsec<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">&nbsp; &nbsp;SAs is =
shifted to the Security Controller since IKEv2 is not in the<br =
class=3D"">&nbsp; &nbsp;NSF. As a consequence, this may result in a more =
complex<br class=3D"">&nbsp; &nbsp;implementation in the controller side =
in comparison with<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;IKE case. &nbsp;For example, the =
Security&nbsp;Controller have to deal with&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;the latency existing in the path&nbsp;between the Security =
Controller&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;and the NSF in order to solve tasks&nbsp;such =
as, rekey or creation and&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;installation of new IPsec SAs. However, this is not specific to =
our&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;contribution but a general aspect in any =
SDN-based network.&nbsp;<o:p class=3D""></o:p></div></div></div></div><div=
 class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;In summary, this overload may create some =
scalability and performance&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;issues when the number of NSFs is high.<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><br =
class=3D"">&nbsp; &nbsp;Nevertheless, literature around SDN-based =
network management using a<br class=3D"">&nbsp; &nbsp;centralized =
Security Controller is aware about scalability and<br class=3D"">&nbsp; =
&nbsp;performance issues and solutions have been already provided and<br =
class=3D"">&nbsp; &nbsp;discussed (e.g. &nbsp;hierarchical Security =
Controllers; having multiple<br class=3D"">&nbsp; &nbsp;replicated =
Security Controllers, dedicated high-speed management<br class=3D"">&nbsp;=
 &nbsp;networks, etc). In the context of SDN-based IPsec management, =
one<o:p class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;way to reduce the latency and alleviate some performance issues =
can<o:p class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;be the installation of the IPsec policies and IPsec SAs at the =
same time<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;(proactive mode, as described in Section 7.1) =
instead of waiting for<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;notifications (e.g. a notification sadb-acquire =
when a new IPsec SA&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;is required) to proceed with the IPsec SA installations (reactive =
mode).&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp; &nbsp;Another way to reduce the overhead and the =
potential scalability and<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp; =
&nbsp;performance issues in the Security Controller is to apply the =
IKE<br class=3D"">&nbsp; &nbsp;case described in this document, since =
the IPsec SAs are managed<br class=3D"">&nbsp; &nbsp;between NSFs =
without the involvement of the Security Controller at<br class=3D"">&nbsp;=
 &nbsp;all, except by the initial IKE configuration provided by the =
Security<br class=3D"">&nbsp; &nbsp;Controller.=E2=80=9D<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">Please =
see also our comments to Yoav.<o:p class=3D""></o:p></div></div></div><div=
 class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">Best Regards.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><br class=3D""><br =
class=3D""><br class=3D""><br class=3D""><o:p =
class=3D""></o:p></div></div></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;" class=3D"" type=3D"cite"><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">&nbsp;</span><o:p class=3D""></o:p></div></div></div></div><div=
 class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" style=3D"font-size: 14pt;" =
class=3D"">Regards,</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">Valery.</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
lang=3D"EN-US" style=3D"font-size: 14pt;" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div><div style=3D"border-style: =
none none none solid; border-left-color: blue; border-left-width: 1.5pt; =
padding: 0cm 0cm 0cm 4pt;" class=3D""><div class=3D""><div class=3D""><div=
 class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D""><span lang=3D"EN-US" =
class=3D"">Thanks for getting this done and published.</span><o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span lang=3D"EN-US" class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">We will wait with requesting publication until the I2NSF =
session next week. &nbsp;Between now and then, please re-read the draft =
and send a message to the list is something is seriously wrong.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Barring any such shouting, we will =
request publication right after the meeting.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Thanks again,<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Linda and Yoav<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><br class=3D""><br class=3D""><br class=3D""><br class=3D""><br=
 class=3D""><o:p class=3D""></o:p></div></div></div></div><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D"" =
type=3D"cite"><div class=3D""><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">On 16 Jul 2019, at 15:42, =
Rafa Marin-Lopez &lt;<a href=3D"mailto:rafa@um.es" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" class=3D"">rafa@um.es</span></a>&gt; wrote:<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Dear all:<br class=3D""><br class=3D"">We=
 submitted a new version of the I-D&nbsp;(v05) where we have applied =
several changes. In the following you have a summary of the main =
changes, which we will expand/explain during our presentation:&nbsp;<br =
class=3D""><br class=3D"">- We have dealt with YANG doctors=E2=80=99 =
review (Martin's)<br class=3D""><br class=3D"">-&nbsp;We have dealt =
with&nbsp;Paul Wouters=E2=80=99 comments and Tero=E2=80=99s =
comments.<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">-=
 We have added more specific text in the descriptions.<br class=3D""><br =
class=3D"">- Notifications have a simpler format now since most of the =
information that contained in the past is already handled by the =
Security Controller.<br class=3D""><br class=3D"">- State data has been =
reduced. For example, in IKE case, most of the information is related =
with IKE and not with the specific details about IPsec SAs that IKE =
handles (after all, IKE can abstract this information from the Security =
Controller).<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">-=
 We have included text in the security section to discuss about the =
default IPsec policies that should be in the NSF when it starts before =
contacting with the SC such as the IPsec policies required to allow =
traffic between the SC and the NSF.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">- We have added a subsection 5.3.4 =
about NSF discovery by the Security Controller.<br class=3D""><br =
class=3D"">- In order to specify the crypto-algorithms we have used a =
simple approach by including an integer and adding a text pointing the =
IANA&nbsp;in the&nbsp;<b class=3D"">reference</b>&nbsp;clause. For =
example:<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><br class=3D"">typedef =
encryption-algorithm-type {<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;type uint32;<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;description&nbsp;<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;"The encryption algorithm is specified with a =
32-bit<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;number extracted from IANA Registry. The =
acceptable<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;values MUST follow the requirement levels =
for<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;encryption algorithms for ESP and IKEv2.";<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;reference&nbsp;<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;"IANA Registry- Transform Type 1 - =
Encryption<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Algorithm Transform IDs. RFC 8221 - =
Cryptographic<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Algorithm Implementation Requirements =
and Usage<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Guidance for Encapsulating Security =
Payload (ESP)<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;and Authentication Header (AH) and RFC =
8247 -<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Algorithm Implementation Requirements =
and Usage<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Guidance for the Internet Key Exchange =
Protocol<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Version 2 (IKEv2).";<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;}<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">- We have included three additional =
Annexes with examples in about the usage of the YANG model.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">- We have performed&nbsp;pyang --lint =
--lint-ensure-hyphenated-names and pyang -f yang --yang-line-length 69 =
in our model without warnings.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D"">Best Regards.<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><br class=3D""><br class=3D""><br class=3D""><br class=3D""><br=
 class=3D""><o:p class=3D""></o:p></div></div></div></div><blockquote =
style=3D"margin-top: 5pt; margin-bottom: 5pt;" class=3D"" =
type=3D"cite"><div class=3D""><div class=3D""><div class=3D""><div =
class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; =
font-family: Calibri, sans-serif;" class=3D"">Inicio del mensaje =
reenviado:<o:p class=3D""></o:p></div></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><b class=3D""><span style=3D"font-family:=
 Helvetica, sans-serif;" class=3D"">De:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D""><a =
href=3D"mailto:internet-drafts@ietf.org" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">internet-drafts@ietf.org</span></a></span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Asunto: [I2nsf] I-D Action: =
draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt</span></b><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Fecha:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">7 de julio de =
2019, 23:34:03 CEST</span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Para:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D"">&lt;<a =
href=3D"mailto:i-d-announce@ietf.org" style=3D"color: purple; =
text-decoration: underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">i-d-announce@ietf.org</span></a>&gt;</span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Cc:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D""><a =
href=3D"mailto:i2nsf@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">i2nsf@ietf.org</span></a></span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><b class=3D""><span style=3D"font-family: Helvetica, =
sans-serif;" class=3D"">Responder a:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-family: Helvetica, sans-serif;" class=3D""><a =
href=3D"mailto:i2nsf@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">i2nsf@ietf.org</span></a></span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
style=3D"margin: 0cm 0cm 0.0001pt; font-size: 11pt; font-family: =
Calibri, sans-serif;" class=3D""><br class=3D"">A New Internet-Draft is =
available from the on-line Internet-Drafts directories.<br class=3D"">This=
 draft is a work item of the Interface to Network Security Functions WG =
of the IETF.<br class=3D""><br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Title =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: =
Software-Defined Networking (SDN)-based IPsec Flow Protection<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Authors =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: Rafa Marin-Lopez<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;Gabriel Lopez-Millan<br =
class=3D"">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;Fernando Pereniguez-Garcia<br class=3D""><span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;</span><span =
class=3D"apple-converted-space">&nbsp;</span>Filename =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: =
draft-ietf-i2nsf-sdn-ipsec-flow-protection-05.txt<br class=3D""><span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;</span><span class=3D"apple-converted-space">&nbsp;</span>Pages=
 &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: 81<br =
class=3D""><span =
class=3D"apple-tab-span">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;</span><span class=3D"apple-converted-space">&nbsp;</span>Date =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: =
2019-07-07<br class=3D""><br class=3D"">Abstract:<br =
class=3D"">&nbsp;&nbsp;This document describes how providing IPsec-based =
flow protection by<br class=3D"">&nbsp;&nbsp;means of a Software-Defined =
Network (SDN) controller (aka. &nbsp;Security<br =
class=3D"">&nbsp;&nbsp;Controller) and establishes the requirements to =
support this service.<br class=3D"">&nbsp;&nbsp;It considers two main =
well-known scenarios in IPsec: (i) gateway-to-<br =
class=3D"">&nbsp;&nbsp;gateway and (ii) host-to-host. &nbsp;The =
SDN-based service described in<br class=3D"">&nbsp;&nbsp;this document =
allows the distribution and monitoring of IPsec<br =
class=3D"">&nbsp;&nbsp;information from a Security Controller to one or =
several flow-based<br class=3D"">&nbsp;&nbsp;Network Security Function =
(NSF). &nbsp;The NSFs implement IPsec to protect<br =
class=3D"">&nbsp;&nbsp;data traffic between network resources.<br =
class=3D""><br class=3D"">&nbsp;&nbsp;The document focuses on the NSF =
Facing Interface by providing models<br class=3D"">&nbsp;&nbsp;for =
configuration and state data required to allow the Security<br =
class=3D"">&nbsp;&nbsp;Controller to configure the IPsec databases (SPD, =
SAD, PAD) and IKEv2<br class=3D"">&nbsp;&nbsp;to establish Security =
Associations with a reduced intervention of the<br =
class=3D"">&nbsp;&nbsp;network administrator.<br class=3D""><br =
class=3D""><br class=3D"">The IETF datatracker status page for this =
draft is:<br class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-flow-p=
rotection/" style=3D"color: purple; text-decoration: underline;" =
class=3D""><span style=3D"color: purple;" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-i2nsf-sdn-ipsec-flo=
w-protection/</span></a><br class=3D""><br class=3D"">There are also =
htmlized versions available at:<br class=3D""><a =
href=3D"https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-protec=
tion-05" style=3D"color: purple; text-decoration: underline;" =
class=3D""><span style=3D"color: purple;" =
class=3D"">https://tools.ietf.org/html/draft-ietf-i2nsf-sdn-ipsec-flow-pro=
tection-05</span></a><br class=3D""><a =
href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-ipsec-f=
low-protection-05" style=3D"color: purple; text-decoration: underline;" =
class=3D""><span style=3D"color: purple;" =
class=3D"">https://datatracker.ietf.org/doc/html/draft-ietf-i2nsf-sdn-ipse=
c-flow-protection-05</span></a><br class=3D""><br class=3D"">A diff from =
the previous version is available at:<br class=3D""><a =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-i2nsf-sdn-ipsec-flo=
w-protection-05" style=3D"color: purple; text-decoration: underline;" =
class=3D""><span style=3D"color: purple;" =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-i2nsf-sdn-ipsec-=
flow-protection-05</span></a><br class=3D""><br class=3D""><br =
class=3D"">Please note that it may take a couple of minutes from the =
time of submission<br class=3D"">until the htmlized version and diff are =
available at<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://tools.ietf.org/" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">tools.ietf.org</span></a>.<br class=3D""><br =
class=3D"">Internet-Drafts are also available by anonymous FTP at:<br =
class=3D""><a href=3D"ftp://ftp.ietf.org/internet-drafts/" style=3D"color:=
 purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" class=3D"">ftp://ftp.ietf.org/internet-drafts/</span></a><br =
class=3D""><br =
class=3D"">_______________________________________________<br =
class=3D"">I2nsf mailing list<br class=3D""><a =
href=3D"mailto:I2nsf@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">I2nsf@ietf.org</span></a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2nsf" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" =
class=3D"">https://www.ietf.org/mailman/listinfo/i2nsf</span></a><o:p =
class=3D""></o:p></div></div></div></div></div></div></blockquote></div><d=
iv class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm =
0cm 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">&nbsp;<o:p class=3D""></o:p></div></div></div></div><div =
class=3D""><div class=3D""><div class=3D""><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D""><span =
style=3D"font-size: 12pt; font-family: Courier;" =
class=3D"">-------------------------------------------------------<br =
class=3D"">Rafa Marin-Lopez, PhD<br class=3D"">Dept. Information =
and&nbsp;Communications&nbsp;Engineering (DIIC)<br class=3D"">Faculty of =
Computer&nbsp;Science-University of&nbsp;Murcia<br class=3D"">30100 =
Murcia - Spain<br class=3D"">Telf: +34868888501 =
Fax:&nbsp;+34868884151<span =
class=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:rafa@um.es"=
 style=3D"color: purple; text-decoration: underline;" class=3D""><span =
style=3D"color: purple;" class=3D"">e-mail:&nbsp;rafa@um.es</span></a><br =
class=3D"">-------------------------------------------------------</span><=
o:p class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><span style=3D"font-size: 12pt; font-family: Courier;" =
class=3D"">&nbsp;</span><o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" class=3D"">&nbsp;<o:p =
class=3D""></o:p></div></div></div></div></div><div class=3D""><div =
class=3D""><div class=3D""><div style=3D"margin: 0cm 0cm 0.0001pt; =
font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D"">_______________________________________________<br =
class=3D"">I2nsf mailing list<br class=3D""><a =
href=3D"mailto:I2nsf@ietf.org" style=3D"color: purple; text-decoration: =
underline;" class=3D""><span style=3D"color: purple;" =
class=3D"">I2nsf@ietf.org</span></a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2nsf" style=3D"color: =
purple; text-decoration: underline;" class=3D""><span style=3D"color: =
purple;" =
class=3D"">https://www.ietf.org/mailman/listinfo/i2nsf</span></a><o:p =
class=3D""></o:p></div></div></div></div></div></blockquote></div></div></=
div></div></blockquote></div></div></div></div></div></blockquote></div></=
div></div></div></blockquote></div><div style=3D"margin: 0cm 0cm =
0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;" =
class=3D""><o:p class=3D"">&nbsp;</o:p></div></div></div></div></div><span=
 style=3D"font-family: Courier; font-size: 14px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" =
class=3D"">_______________________________________________</span><br =
style=3D"font-family: Courier; font-size: 14px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px;" class=3D""><span style=3D"font-family: =
Courier; font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; float: =
none; display: inline !important;" class=3D"">I2nsf mailing =
list</span><br style=3D"font-family: Courier; font-size: 14px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px;" class=3D""><span =
style=3D"font-family: Courier; font-size: 14px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-stroke-width: 0px; float: none; display: inline =
!important;" class=3D""><a href=3D"mailto:I2nsf@ietf.org" =
class=3D"">I2nsf@ietf.org</a></span><br style=3D"font-family: Courier; =
font-size: 14px; font-style: normal; font-variant-caps: normal; =
font-weight: normal; letter-spacing: normal; orphans: auto; text-align: =
start; text-indent: 0px; text-transform: none; white-space: normal; =
widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px;" =
class=3D""><span style=3D"font-family: Courier; font-size: 14px; =
font-style: normal; font-variant-caps: normal; font-weight: normal; =
letter-spacing: normal; orphans: auto; text-align: start; text-indent: =
0px; text-transform: none; white-space: normal; widows: auto; =
word-spacing: 0px; -webkit-text-stroke-width: 0px; float: none; display: =
inline !important;" class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/i2nsf" =
class=3D"">https://www.ietf.org/mailman/listinfo/i2nsf</a></span></div></b=
lockquote></div><br class=3D""></div></div></body></html>=

--Apple-Mail=_46A1369C-EFA7-4609-9A39-8B85BF5E5A6F--

