Re: [I2nsf] 答复: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration

"Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com> Tue, 02 April 2019 21:24 UTC

Return-Path: <jun.hu@nokia.com>
X-Original-To: i2nsf@ietfa.amsl.com
Delivered-To: i2nsf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2474C1202FA; Tue, 2 Apr 2019 14:24:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.639
X-Spam-Level:
X-Spam-Status: No, score=-0.639 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, MANY_SPAN_IN_TEXT=1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g8TzmJFIDazo; Tue, 2 Apr 2019 14:24:01 -0700 (PDT)
Received: from FRA01-PR2-obe.outbound.protection.outlook.com (mail-eopbgr120138.outbound.protection.outlook.com [40.107.12.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E2C21202E6; Tue, 2 Apr 2019 14:24:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qXBqbRBTkH9wqXp38vTR1FdHWbGIOjtieBe6rYJzXQw=; b=s7jOCsxmgAZKBJL+lN/g85NtPF5xYTWTKG6Rqtzi7mRsovwU+iKCsRHS8Bo8d4a5M0BoTbAGUmziyupm0gwC3U2D3ORP8WNaN3Mdm0gI7rI6wCUjV55quEEzFAD1veOrXemD0RHRTAyaebDROstmIdJMDEchpQS5ShLMTQtUM8Q=
Received: from PR1PR07MB5755.eurprd07.prod.outlook.com (20.177.210.161) by PR1PR07MB4924.eurprd07.prod.outlook.com (20.177.211.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1771.9; Tue, 2 Apr 2019 21:23:53 +0000
Received: from PR1PR07MB5755.eurprd07.prod.outlook.com ([fe80::e93e:b63:6eab:e49b]) by PR1PR07MB5755.eurprd07.prod.outlook.com ([fe80::e93e:b63:6eab:e49b%3]) with mapi id 15.20.1771.006; Tue, 2 Apr 2019 21:23:53 +0000
From: "Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com>
To: "Xialiang (Frank, Network Standard & Patent Dept)" <frank.xialiang@huawei.com>, Robert Raszuk <rraszuk@gmail.com>
CC: Fernando Pereñíguez García <fernando.pereniguez@cud.upct.es>, Linda Dunbar <linda.dunbar@huawei.com>, Roman Danyliw <rdd@cert.org>, idr wg <idr@ietf.org>, "stephane.litkowski@orange.com" <stephane.litkowski@orange.com>, "i2nsf@ietf.org" <i2nsf@ietf.org>, "idr-chairs@ietf.org" <idr-chairs@ietf.org>, Gabriel López Millán <gabilm@um.es>, Yoav Nir <ynir.ietf@gmail.com>, Alvaro Retana <aretana.ietf@gmail.com>, "ipsec@ietf.org WG" <ipsec@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>, Rafa Marin Lopez <rafa@um.es>, Paul Wouters <paul@nohats.ca>
Thread-Topic: [I2nsf] 答复: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration
Thread-Index: AQHU6NcIKJcFgzifZke8IG/CKYX43qYn3nTggACs5lCAAA27AIAAmdhw
Date: Tue, 02 Apr 2019 21:23:37 +0000
Deferred-Delivery: Tue, 2 Apr 2019 21:00:00 +0000
Message-ID: <PR1PR07MB5755BDDA7C4322A6497471AE95560@PR1PR07MB5755.eurprd07.prod.outlook.com>
References: <4A95BA014132FF49AE685FAB4B9F17F66B33E27F@sjceml521-mbs.china.huawei.com> <CAB=gXc6aZ2D1K_q3MjVJMEYxEykJO_oxhoSkOEyytOOaa=_ouA@mail.gmail.com> <PR1PR07MB5755052B214EA1243DF2A7EE95550@PR1PR07MB5755.eurprd07.prod.outlook.com> <C02846B1344F344EB4FAA6FA7AF481F12CA424B2@dggemm511-mbx.china.huawei.com> <CA+b+ERn16Z65zx1zhh1n2dYPVodUbqB55WCp=2FtFQcCtrF-vQ@mail.gmail.com> <C02846B1344F344EB4FAA6FA7AF481F12CA4385B@dggemm511-mbx.china.huawei.com>
In-Reply-To: <C02846B1344F344EB4FAA6FA7AF481F12CA4385B@dggemm511-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jun.hu@nokia.com;
x-originating-ip: [205.154.222.48]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 34dd199d-23da-4611-3b91-08d6b7b181ab
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600139)(711020)(4605104)(4618075)(2017052603328)(7193020); SRVR:PR1PR07MB4924;
x-ms-traffictypediagnostic: PR1PR07MB4924:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <PR1PR07MB492409ECF35EB2557DBB72B995560@PR1PR07MB4924.eurprd07.prod.outlook.com>
x-forefront-prvs: 0995196AA2
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(346002)(366004)(39860400002)(376002)(136003)(189003)(199004)(5070765005)(3846002)(236005)(52536014)(6116002)(478600001)(966005)(102836004)(55016002)(6246003)(6306002)(54896002)(53936002)(9686003)(68736007)(26005)(2906002)(256004)(14444005)(53546011)(66066001)(76176011)(6506007)(7696005)(110136005)(186003)(790700001)(11346002)(54906003)(8936002)(446003)(66574012)(6436002)(7416002)(316002)(86362001)(486006)(476003)(97736004)(93886005)(81156014)(74316002)(81166006)(606006)(229853002)(7736002)(224303003)(105586002)(106356001)(5660300002)(14454004)(33656002)(99286004)(25786009)(71190400001)(4326008)(71200400001)(6666004); DIR:OUT; SFP:1102; SCL:1; SRVR:PR1PR07MB4924; H:PR1PR07MB5755.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: vWZCD09z09CxZkzRgf0/eCwDhdk8r9IXHlh24DV5dS6kbnHznjztVe1ebwcPkt4KIDINdCHPxGKiJ85ZQz3VerG7LiueTOIpTmrKQR28lRUOK5cxtP8MXZIjydKCAobI9aO6VLa9XmCW2dPw9Mkz16e3lr197whyYzukBh+K4VpVp0w8Lvxn8YHYEp0mEtAKwnUFiFK4CbwNG8NJHHLuTxycOYw7xK/pmyAPROx55u3gjuViHhKdDkFVB6zFVEcwBZowfYUTjHnNzF9iJW88CfM1Ri+GKOWXKxGsy09rMcnlTaXhsWds37a924SDSzxZyh9ivb2qO37d+2RRW2zupA/zNTO3sn5zo+GX4GR+pYnm4hf5+CDXR0d3Q3jABZJgVjvfHlmqQ9WqgfknZmKFpqB7GFb/834nPIcV3OPxXJY=
Content-Type: multipart/alternative; boundary="_000_PR1PR07MB5755BDDA7C4322A6497471AE95560PR1PR07MB5755eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 34dd199d-23da-4611-3b91-08d6b7b181ab
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Apr 2019 21:23:53.1360 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR1PR07MB4924
Archived-At: <https://mailarchive.ietf.org/arch/msg/i2nsf/b1tUyaHEAaw6MOKiPh5o_uKInak>
Subject: Re: [I2nsf] 答复: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration
X-BeenThere: i2nsf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "*I2NSF: Interface to Network Security Functions mailing list*" <i2nsf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i2nsf/>
List-Post: <mailto:i2nsf@ietf.org>
List-Help: <mailto:i2nsf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i2nsf>, <mailto:i2nsf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Apr 2019 21:24:04 -0000

However the use case does drive the design of the protocol, e.g. for SDN case, you might want separate every part of Ipsec (or other type of encryption) tunnel config so that controller has the flexibility to provision each of them differently on different node, and if you want to use BGP as the provision protocol, then that’s a quite lot a extensions to BGP;
While in other non SDN case, user might want a solution with least changes to BGP and least information advertised by each node, so you might want group multiple parts of tunnel configuration into a single part (e.g. the color sub-TLV in my draft)


From: Xialiang (Frank, Network Standard & Patent Dept) <frank.xialiang@huawei.com>
Sent: Tuesday, April 2, 2019 2:21 AM
To: Robert Raszuk <rraszuk@gmail.com>
Cc: Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com>; Fernando Pereñíguez García <fernando.pereniguez@cud.upct.es>; Linda Dunbar <linda.dunbar@huawei.com>; Roman Danyliw <rdd@cert.org>; idr wg <idr@ietf.org>; stephane.litkowski@orange.com; i2nsf@ietf.org; idr-chairs@ietf.org; Gabriel López Millán <gabilm@um.es>; Yoav Nir <ynir.ietf@gmail.com>; Alvaro Retana <aretana.ietf@gmail.com>; ipsec@ietf.org WG <ipsec@ietf.org>; Benjamin Kaduk <kaduk@mit.edu>; Rafa Marin Lopez <rafa@um.es>; Paul Wouters <paul@nohats.ca>
Subject: 答复: [I2nsf] 答复: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration

Hi Robert,
Thanks for further clarification, it helps for me.
Again, I think the key point is not the original use case, but the function gaps each draft can fill in.

B.R.
Frank

发件人: Robert Raszuk [mailto:rraszuk@gmail.com]
发送时间: 2019年4月2日 16:32
收件人: Xialiang (Frank, Network Standard & Patent Dept) <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>
抄送: Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com<mailto:jun.hu@nokia.com>>; Fernando Pereñíguez García <fernando.pereniguez@cud.upct.es<mailto:fernando.pereniguez@cud.upct.es>>; Linda Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>; Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>; idr wg <idr@ietf.org<mailto:idr@ietf.org>>; stephane.litkowski@orange.com<mailto:stephane.litkowski@orange.com>; i2nsf@ietf.org<mailto:i2nsf@ietf.org>; idr-chairs@ietf.org<mailto:idr-chairs@ietf.org>; Gabriel López Millán <gabilm@um.es<mailto:gabilm@um.es>>; Yoav Nir <ynir.ietf@gmail.com<mailto:ynir.ietf@gmail.com>>; Alvaro Retana <aretana.ietf@gmail.com<mailto:aretana.ietf@gmail.com>>; ipsec@ietf.org<mailto:ipsec@ietf.org> WG <ipsec@ietf.org<mailto:ipsec@ietf.org>>; Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>; Rafa Marin Lopez <rafa@um.es<mailto:rafa@um.es>>; Paul Wouters <paul@nohats.ca<mailto:paul@nohats.ca>>
主题: Re: [I2nsf] 答复: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration

Hi Frank,

This draft does not talk about distributing any security related parameters. Maybe the name is a bit confusing as for some it means to be IPSec related.

We have discussed the draft in Prague and agreed to also extend it with other types of secure encap.

I have not discussed it with other authors but perhaps a much proper name and clearly less controversial would be:
draft-hujun-idr-encrypted-transport-autodiscovery or draft-hujun-idr-eta (for short) or something along those lines to reflect what this work is really about and how it differs from other proposals.

Thx,
R.




On Tue, Apr 2, 2019 at 3:52 AM Xialiang (Frank, Network Standard & Patent Dept) <frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>> wrote:
Hi Jun,
My personal view is no matter which use cases (SDN-based or BGP-based) you are for, the basic goal is to configure/distribute the IPSec parameters between the associated peers, for next step IKEv2 session negotiation. That is why all these related drafts should be aligned in certain way.

B.R.
Frank

发件人: I2nsf [mailto:i2nsf-bounces@ietf.org<mailto:i2nsf-bounces@ietf.org>] 代表 Hu, Jun (Nokia - US/Mountain View)
发送时间: 2019年4月2日 6:22
收件人: Fernando Pereñíguez García <fernando.pereniguez@cud.upct.es<mailto:fernando.pereniguez@cud.upct.es>>; Linda Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>
抄送: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>; idr wg <idr@ietf.org<mailto:idr@ietf.org>>; stephane.litkowski@orange.com<mailto:stephane.litkowski@orange.com>; i2nsf@ietf.org<mailto:i2nsf@ietf.org>; idr-chairs@ietf.org<mailto:idr-chairs@ietf.org>; Gabriel López Millán <gabilm@um.es<mailto:gabilm@um.es>>; Yoav Nir <ynir.ietf@gmail.com<mailto:ynir.ietf@gmail.com>>; Alvaro Retana <aretana.ietf@gmail.com<mailto:aretana.ietf@gmail.com>>; ipsec@ietf.org<mailto:ipsec@ietf.org> WG <ipsec@ietf.org<mailto:ipsec@ietf.org>>; Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>; Rafa Marin Lopez <rafa@um.es<mailto:rafa@um.es>>; Paul Wouters <paul@nohats.ca<mailto:paul@nohats.ca>>
主题: Re: [I2nsf] [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration

Again, Linda, as discussed with you multiple times, my draft is really about extending current draft-ietf-idr-tunnel-encaps<https://datatracker.ietf.org/doc/draft-ietf-idr-tunnel-encaps/> to cover IPsec tunnel and other encryption tunnel like DTLS in next revsion (based on the feedback I got from Prague);
My draft is not intended to address SDN for IPsec use case and it does not require a central controller, and there are use cases where a central controller is not needed or can’t be used, my draft is intended for those cases;

So I really don’t see any conflict here

From: IPsec <ipsec-bounces@ietf.org<mailto:ipsec-bounces@ietf.org>> On Behalf Of Fernando Pere?íguez García
Sent: Monday, April 1, 2019 3:05 PM
To: Linda Dunbar <linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>
Cc: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>; idr wg <idr@ietf.org<mailto:idr@ietf.org>>; stephane.litkowski@orange.com<mailto:stephane.litkowski@orange.com>; i2nsf@ietf.org<mailto:i2nsf@ietf.org>; idr-chairs@ietf.org<mailto:idr-chairs@ietf.org>; Gabriel López Millán <gabilm@um.es<mailto:gabilm@um.es>>; Yoav Nir <ynir.ietf@gmail.com<mailto:ynir.ietf@gmail.com>>; Alvaro Retana <aretana.ietf@gmail.com<mailto:aretana.ietf@gmail.com>>; ipsec@ietf.org<mailto:ipsec@ietf.org> WG <ipsec@ietf.org<mailto:ipsec@ietf.org>>; Benjamin Kaduk <kaduk@mit.edu<mailto:kaduk@mit.edu>>; Rafa Marin Lopez <rafa@um.es<mailto:rafa@um.es>>; Paul Wouters <paul@nohats.ca<mailto:paul@nohats.ca>>
Subject: Re: [IPsec] using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec): potential conflict with the I2NSF's Controller facilitated IPsec configuration

Hi Linda,

We have revised draft-hujun-idr-bgp-ipsec and, to the best of our understanding, we do not see any conflict with our draft being discussed in I2NSF. The IPsec attributes configured through BGP are only the peer’s tunnel address and local/remote subnet prefixes (that are used for the traffic selectors).  The rest of the IPsec configuration (AH/ESP, cryptographic algorithms, keys, etc.) are obtained via a “color mapping”, which is something not covered by the draft since it assumes routers are somehow pre-provisioned with this information.

Thus, we do not see this draft is also facing the task of formalizing the complete configuration of an IPsec device. We appreciate any clarification in case we are wrong.

Best regards,
Fernando..

El jue., 28 mar. 2019 a las 16:01, Linda Dunbar (<linda.dunbar@huawei.com<mailto:linda.dunbar@huawei.com>>) escribió:

Just to reiterate the concerns and issues I raised during IDR Thurs session discussion on using BGP signaling to achieve IPsec Tunnel configuration (draft-hujun-idr-bgp-ipsec).
Copy I2NSF WG because there is similar discussion for over a year.
Copy IPsecme WG as the group has many experts on the IPsec configuration.


1.      I2NSF WG has an on-going discussion on Controller facilitated IPsec configuration which has been discussed for over a year.  Even though the I2NSF’s  IPsec Configuration is between Controller and devices, whereas the BGP signaling IPsec Configuration proposed by draft-hujun-idr-bgp-ipsec is between peers, the configuration parameters to the devices are for the same purpose, therefore, should be aligned to avoid future conflicts to the industry.



2.      When using IPsec Tunnel between two peers, usually they are separated by untrusted domain. If Router “A” is allowed to  gets the IPsec tunnel configurations from peers across untrusted domain (instead of the today’s practice of from administrators), then many issues come up, for example:



How can a router “A” trust the Traffic Selection policy from a remote peer B? If the router “A” already has its Traffic Selection policy configured for a specific IPsec tunnel, but different from the Traffic Selection policy from remote peer B, which policy should Route A enforce for the IPsec Tunnel?  If the router “A” doesn’t have Traffic Selection policy specified, there are two remote nodes B & C signaling the “A” with different Traffic Selection policy, what should A do?



3.      RFC5566 only specifies a simple indication of IPsec Encap, but doesn’t do any of the IPsec configuration portion.



As indicated by BESS WG chair, there are multiple drafts addressing IPsec in BESS, IDR, and WGs in Security Area, involved Chairs and ADs may need to agree where is the home for continuing the discussion to avoid future conflicts.


Cheers,
Linda Dunbar
_______________________________________________
IPsec mailing list
IPsec@ietf.org<mailto:IPsec@ietf.org>
https://www.ietf.org/mailman/listinfo/ipsec


--
----------------------------------------------------------------------------------------------------
Fernando Pereñíguez García, PhD
Department of Sciences and Informatics
University Defense Center, (CUD), Spanish Air Force Academy, MDE-UPCT
C/ Coronel Lopez Peña, s/n, 30720, San Javier, Murcia - SPAIN
Tel: +34 968 189 946 Fax: +34 968 189 970
------------------------------------------------------------------------------------------------------
_______________________________________________
I2nsf mailing list
I2nsf@ietf.org<mailto:I2nsf@ietf.org>
https://www.ietf.org/mailman/listinfo/i2nsf