Re: [Idr] Working group last call for draft-ietf-idr-tunnel-encaps-04

Eric C Rosen <erosen@juniper.net> Thu, 25 May 2017 17:54 UTC

Return-Path: <erosen@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA71C129BBE; Thu, 25 May 2017 10:54:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.811
X-Spam-Level:
X-Spam-Status: No, score=-1.811 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UqSI982qM7Lx; Thu, 25 May 2017 10:54:09 -0700 (PDT)
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02on0097.outbound.protection.outlook.com [104.47.36.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EE45A129ACD; Thu, 25 May 2017 10:54:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=28RLfZm8M/KVJzq4T19HXAqhtaqogNUcS9JRDJZiN40=; b=FQzu80hVPxA5q7TTJERxjRfw9+nzD1I+tDKI72Feo/kPwKDHrxEpsV/xrvIX4BpVpyLMGi9mutkE1pPQeRji69UtJoGkO4JPpxSf81MlZpCBqUGukeiOcPYgFcRI6LSB72PbKAztrvWOgaUEcZDyrR1Njke3uVQWdMaZ8Sax8Kw=
Authentication-Results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=juniper.net;
Received: from [172.29.34.170] (66.129.241.10) by BL2PR05MB2180.namprd05.prod.outlook.com (2a01:111:e400:c74e::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1124.5; Thu, 25 May 2017 17:54:06 +0000
To: Lou Berger <lberger@labn.net>, "John G. Scudder" <jgs@juniper.net>
Cc: idr@ietf.org, draft-ietf-idr-tunnel-encaps@ietf.org
References: <2AEDAB02-02F4-46C2-92CA-8880BBAFAAAB@juniper.net> <213015a0-eb5f-3f17-f5f0-3aa864304a6d@labn.net> <c735e3fe-1b0e-23a6-78bf-7e773e605a52@juniper.net> <9a3866bf-a561-df26-38e9-aff3cc4f2eeb@labn.net> <5ec5e327-5872-2754-4543-19e3b3465a1c@juniper.net> <17d44a51-b48b-1541-afb4-9b3878436b47@labn.net>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <4466bd05-0362-b4be-ecf8-5881e228722d@juniper.net>
Date: Thu, 25 May 2017 13:54:02 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
In-Reply-To: <17d44a51-b48b-1541-afb4-9b3878436b47@labn.net>
Content-Type: multipart/alternative; boundary="------------C06DC5C02F5BC30B87297DEA"
Content-Language: en-US
X-Originating-IP: [66.129.241.10]
X-ClientProxiedBy: BN6PR11CA0029.namprd11.prod.outlook.com (2603:10b6:404:4b::15) To BL2PR05MB2180.namprd05.prod.outlook.com (2a01:111:e400:c74e::12)
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: BL2PR05MB2180:
X-MS-Office365-Filtering-Correlation-Id: cb9a4ee3-80db-4353-3bab-08d4a3970a3d
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(201703131423075)(201703031133081); SRVR:BL2PR05MB2180;
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 3:0aiSNhDSlL0Qo3yAj1wI3NPCVSZBLoiXaeNeW3XG0d5yQSRK4TQ1ZkEjDJ+9jvf836AlLHUu3Y5Vr64vJBNHs3jIzBwJZa9khyaWJ4+FEEZyrVx5h0NyPXTY0CVVhCphJ/XP0W6ygcnogXJCFJsviTGmVSrsuEQcgyv6TbB1evJM2c7FZ8D7x5qEVHJVtacvGcXHkJ/go6RvAhqVS9gyK9jLKgq8fMOrE5qgiamy3P5Ac+speCW7ZEnRq8AwcNceErdWAF8+bNom8hW2bVKmiWTNevXRFLcLOeOqX0SEz9QsnF1ZlLarHfKyBAGF8I1io8AarvlqZpd+zHHQkT6QA4/wDoFfAlj6Xk8A3SmYgTw=; 25:zy8Fzuy8laAZrM0059Y7p8UOe49pXQ3gA7QFDB2kgiY7bXRzfaXB9cyC/SGtUwBR2aFV7/EGm4s2dR+9+IidOG2BiBpaX71VSIMj02evURP8TSzXJCRpafqcu0eIOGHravPL41zUiOJkPNJ2TijtDTXDrvtzsDMtoqRKqp+9vajzrrQqzutbdeqyNbNDwcaWo9oigZhGPoUwm1DFfN5NVR7SgKRrawQ6mj0j61lX9kH0NF3Ytc0J8pJeQdOT50jGYyX/rnrKRfjVQ4K60kr1I7Yn8qOwiOdTbNnAuRB1DFZJ/ey1J4lX1FqGcIrVYr102ouWYbGr2lFDrmNgP+hCUBlyH1Qf0OBCVoKdUdibIq9bV/kHSN4QVVD4j/RdMykWthnGQuSV0rDosfknfz6d9n0hSP/byXF+ZmaV1/lym7AHzYLvxH5BjlJBOWCubJaUqCu+jpYgJIVmgQLaRHW1ZToMxqbtSXLAW/UdYZo7VjM=
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 31:1dda1KK/wKtlUsIqk3rgX2Z7oyGeLC0+Jgb4Zgq5bda9Sc/vUyajiWM4uDGG93fL/Z/mJr67/HgkXkGUzd2OPs1THcjRDFuB8LlpcuZO3BajzxXcl+9Q1coH46troSf3QwGYY9ir7GUz2SAIF99Ccl0APbdWfEW3LXbdnbyG0I/CtWnN1IGYqyZAlU3PRY/NrNRdUeXq3H9E8ys6aJp7gqKO+H9s2ctOLMV9IWT2JME=; 20:+uHNFGznt88nRpY/iZNZuXSMIBWFoMd4ZGGV6PjVSZnuqABpj/HGicDbqQ17qZrryZlntrNxU6OigwIktVHljCtBjI9N3kaXhwri28TKCViQj8NduWwPik0/CQDNeDRtgh7QJWrewYFHRuS89RxL0ezsAWd+SMFSv65DhhqJlgZyyP8NyzvqtBYwfHttVIRA6/PHeUx7IxW8rbXuSsjdkmLWC1sx1AhT6Vr74GKSCS+X+kLYwnCWyTI1mj6iDf8nCygDBQ5gnNutm2A0/MWTjhe/Q2PEJV/4/8XaM2ED7xQ7cL5v+/HEZJpRBqcQ5eHeKVyTJQ6cvB9ibVw1Q+vHCFMQnAQ2vaz8kbxdlRMMJ2f5ylLC8OR1q7R3oL6byG3pPtKeEtX5PowNINzARNA2XQcVleOl3M2KbToNvZ2soqtNuwRH4w5gB2cTFBGq8+xzMQY/hOo0IRZocF7KKd4nuc0n+eTPqbazKrgA6YyIeijbXBXGLasWCzEjz0OkK4HsJ+xeUeF28hc413186ysZUSTKi+SJX2ory32rBbClsEq7vj2EQYkLHVOx02CI9vsv1jb9hDL0CGdqKvip1qw5CghgGcal9xgX2dzD6/sGvSo=
X-Microsoft-Antispam-PRVS: <BL2PR05MB218063295470E43FE2EB4097D4FF0@BL2PR05MB2180.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(6055026)(6041248)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123558100)(20161123562025)(20161123560025)(6072148); SRVR:BL2PR05MB2180; BCL:0; PCL:0; RULEID:; SRVR:BL2PR05MB2180;
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 4: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
X-Forefront-PRVS: 0318501FAE
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(4630300001)(6049001)(6009001)(39840400002)(39450400003)(39860400002)(39400400002)(39850400002)(39410400002)(24454002)(377454003)(65826007)(38730400002)(2950100002)(478600001)(270700001)(5660300001)(81166006)(77096006)(189998001)(8676002)(7736002)(33646002)(3846002)(6636002)(6486002)(4326008)(3260700006)(2906002)(25786009)(54896002)(6666003)(53546009)(50986999)(54356999)(76176999)(66066001)(83506001)(93886004)(65956001)(65806001)(84326002)(6246003)(31696002)(36756003)(86362001)(31686004)(230783001)(42186005)(53936002); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2PR05MB2180; H:[172.29.34.170]; FPR:; SPF:None; MLV:sfv; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 23: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
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 6: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; 5:wWMLG0jdfaHzZXZMHikwEn0xqQoAMr1wZrXE1+3GUKGO8MASi+y9vx0ebzSkdIy8uNSSZYOZ5u/r9VPRlvnp39Es/3hv3duMbuGVmvAARnMzRWqU8agSx3OKd3esetf5LE+AunHutazhiy/widLMx909O+m0c208bMTnFNpr5tA=; 24:MmBulMTmcWbOrk/z1QPd4gE/dFwyY6bMjrgR/c22ckaPv1smvANg36x15BPOtHltXR5y3c/f2ZHU59VNTyFIkJIhFmnyKI7ofS2n+sSH504=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BL2PR05MB2180; 7:Ljh8vdIU499drSNdU7FKRJ1n2024rwFwUwgjQ/ZkE2N2gVG18MSQRdgjI7eLlXkQdyBcCKcbjk6V5kXP+RDf4NBKSR4vwii8nDoNTGVz3f/4xpuqIUf79JNYoepd2VPb/AlWZ8DHXqBliTi41f1KlCboXuLayGibTwXBT/Pzf9ukNxjh06j87ED4NsBa0mp/ixz9Lpv6sF7TRxVQwzTxMUbJq09qQtPbpI79qTAmHt7iDAMhGs7QNEjKO6ZlvH2gNeAk+vle/C9qYjbHQffJu5XEOtRGdGr/9zydzNT8r7GGfnwi6t6LXkeEzZ2Dzm5SbhE5PK3kZUa5BUZnpaGFgQ==
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 May 2017 17:54:06.7944 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR05MB2180
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/0m_Ve4pKitI2aqU49UlUvX4w2O0>
Subject: Re: [Idr] Working group last call for draft-ietf-idr-tunnel-encaps-04
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 May 2017 17:54:12 -0000

On 5/23/2017 12:10 PM, Lou Berger wrote:
>> RFC 5566 assumes that the IPsec tunnel info and the authenticator
>> sub-TLV is conveyed on an update of the encapsulation SAFI.   I'm not
>> convinced that there are no addtional security issues to be considered
>> if this information is carried on updates of other address families.
> I think the assumption is that the sub-TLVs are conveyed with the
> attribute.  I don't see how changing the SAFI impacts this.

I'm not saying that it does or does not, just that I'm not sure, and I'm 
not prepared now to defend a claim that the security aspects are not 
altered by this change.  So I'd rather see that addressed in a different 
document.

>
>> Also, note that in RFC 5512, the tunnels only extend to the BGP next
>> hop, while in the tunnel-encaps draft the tunnel endpoints are not
>> necessarily the BGP next hop.  This might also change some of the
>> security properties.  I think this would have to be thought out fairly
>> thoroughly, and I don't think that work's been done yet.
> So leaving 5566 as is introduces this issue already (due to the
> introduction of the remote endpoint sub-tlv).  If the we deprecate 5566
> with this document, this can be trivially addressed by saying that the
> endpoint Authenticator sub-tlv applies to the endpoint identified in the
> Remote Endpoint Sub-TLV.

I'm also not prepared to defend a claim that this is has no signficant 
impact to the security characteristics.

Since the existing contents of the document do not depend upon anything 
in RFC 5566, I think obsoleting and replacing RFC 5566 is better done in 
a separate document .

>> I don't see how it could be correct for an implementation to always
>> include an Encapsulation EC.  Sometimes you need to specify more than
>> the tunnel type in order to construct the encapsulation properly.
> It doesn't "hurt" to include it always and there is an implementation
> that does this, so why not allow it?
>

It seems to me that it does hurt to include it.  If the intended tunnel 
endpoint is not the BGP next hop, or if the tunnel will not work unless 
the encapulation is prepared as specified within the attribute, then 
including an encapsulation EC for the same tunnel type provides false 
information.

> The use of multiple tunnels between a pair of endpoints seems to make
> sense, especially if the tunnels have different characteristics, and if
> color can be used to map particular traffic flows to particular
> tunnels.  This is something that has not changed from RFC 5512.  Note
> also that even the Encapsulation EC allows multiple tunnels to be
> specifiied (if they are of different types), since an EC attribute can
> contain multiple instances of the same extended community.
>
>> I'm not arguing it that it's not a real use case, but rather that it can
>> be solved using other existing, albeit more verbose, mechanisms.

Allowing a choice of tunnels between a pair of endpoints should not 
require the origination of multiple routes with different NLRIs, or 
(even worse) the use of add-paths.  I don't really see the merit of this 
suggestion.

>> If you receive two routes, and
>> want to aggregate them so that you only need to propagate one upstream,
>> and the two routes have different tunnel-encaps attributes, you need
>> some policy to decide what to do.  But that's true even if the
>> tunnel-encaps attribute only specifies one tunnel.
>
> Sure, and the policy may be to merge the tlv lists.  This is the kind of
> information I'm suggesting should be added.

I think such policies will be very application-specific, and thus are 
out of scope of this document.  A draft proposing the use of the tunnel 
encaps attribute for a particular purpose might well have to deal with 
these policy issues.