Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Susan Hares <shares@ndzh.com> Wed, 28 February 2024 22:04 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDE98C14F60A; Wed, 28 Feb 2024 14:04:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aoNsieE3c6eK; Wed, 28 Feb 2024 14:04:11 -0800 (PST)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2133.outbound.protection.outlook.com [40.107.243.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AC73FC14F5F7; Wed, 28 Feb 2024 14:04:10 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=McBnB3EI2UenwZtYoYmAbXyd5bBSrCfuV6SFaAWpvZo3Q4iYv/PFAL8QeVmayd2rUuyWp61hTD1OMLd8djBhZ737nXr06CjOhyQ2xHhIdjxJezcZwpgVUWXzNhh94HdnGHp7OlRv1pXdD9XRbGvF9qVsyTt2qhyv/as2aC4IabjW66OfWui704lXk7zWeaDYntsEyPwpoYEw0QX9EK2AevzZ+R17XW7+ihbUpGDBmpyHm06+1qgk18WuGcKgsCIn4sY5ZxpWfxllGxFEHUAj08TOEUlfNXU8tn/4V4CB5bp1yTIVYdI04iToeFGWEugMVy+MvnsLeySeS/f/hQlogg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+4NzIsJBBo1jqJ3jVBQWDCqJ5rZ/46jggOrceeIN+Po=; b=WooYbpll89Q06D1eyFSDm6HijSdrF9Co8GBDX3n9aCDn+UfbiOuas4P8CBO+TRIrqAkQnNhuZHCJ7VQAbyl1GJoorZcq7d/LPOv9OEz0lrQ7L1JDmxiT7YJETYNzVfEdoq6418ZVvFLi+cKX5zUo3lvPd7o1El1WkE7FL9HkifAAGEEM38UB5kWW4p489fN8rqzM9U87I8oDmyUTi97dkgKOraX2mOcoMDir/ZBtuJIdbvNNK62HZNyp0ScCg9wS3gsPBhldoAAIiLOq9FMrxrfiIPNpEuLUYzOcBArRY3q9ny+7KtAvvWYo7D6BOZWEJDSBIi1O0X2qgriNKc9ohQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 104.47.73.169) smtp.rcpttodomain=futurewei.com smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=none (0)
Received: from BN9PR03CA0308.namprd03.prod.outlook.com (2603:10b6:408:112::13) by LV8PR08MB9077.namprd08.prod.outlook.com (2603:10b6:408:204::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.41; Wed, 28 Feb 2024 22:04:06 +0000
Received: from BN8NAM12FT107.eop-nam12.prod.protection.outlook.com (2603:10b6:408:112:cafe::f0) by BN9PR03CA0308.outlook.office365.com (2603:10b6:408:112::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.28 via Frontend Transport; Wed, 28 Feb 2024 22:04:06 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.73.169) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.73.169 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.73.169; helo=NAM04-MW2-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (13.59.96.180) by BN8NAM12FT107.mail.protection.outlook.com (10.13.183.50) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7339.10 via Frontend Transport; Wed, 28 Feb 2024 22:04:05 +0000
Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04lp2169.outbound.protection.outlook.com [104.47.73.169]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id A32FAC35F6; Wed, 28 Feb 2024 22:03:50 +0000 (UTC)
Received: from DM6PR08MB4857.namprd08.prod.outlook.com (2603:10b6:5:44::25) by BN0PR08MB7471.namprd08.prod.outlook.com (2603:10b6:408:156::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 22:03:48 +0000
Received: from DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e]) by DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e%6]) with mapi id 15.20.7316.039; Wed, 28 Feb 2024 22:03:48 +0000
From: Susan Hares <shares@ndzh.com>
To: John Scudder <jgs@juniper.net>, Linda Dunbar <linda.dunbar@futurewei.com>
CC: "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1aJbLjWCwZYUyhASue85C1X7EewhRQgAAOvwCAAAHU0IAACV4AgAFyilA=
Date: Wed, 28 Feb 2024 22:03:47 +0000
Message-ID: <DM6PR08MB4857F900ACB8589E9BDCBB58B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com> <ADCCB1FE-0D12-480D-B0E1-C57B85204D6F@juniper.net>
In-Reply-To: <ADCCB1FE-0D12-480D-B0E1-C57B85204D6F@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-traffictypediagnostic: DM6PR08MB4857:EE_|BN0PR08MB7471:EE_|BN8NAM12FT107:EE_|LV8PR08MB9077:EE_
X-MS-Office365-Filtering-Correlation-Id: 4cbcb41c-c3f8-4c26-b45f-08dc38a92e57
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4857.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB4857F900ACB8589E9BDCBB58B3582DM6PR08MB4857namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN0PR08MB7471
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.73.169]; domain=NAM04-MW2-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.73.169]; domain=NAM04-MW2-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: BN8NAM12FT107.eop-nam12.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 06261e25-03ff-42c5-2208-08dc38a923ba
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:13.59.96.180; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:NAM04-MW2-obe.outbound.protection.outlook.com; PTR:mail-mw2nam04lp2169.outbound.protection.outlook.com; CAT:NONE; SFS:(13230031)(36860700004)(82310400014); DIR:OUT; SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2024 22:04:05.7114 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4cbcb41c-c3f8-4c26-b45f-08dc38a92e57
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5; Ip=[13.59.96.180]; Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: BN8NAM12FT107.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR08MB9077
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/D3gvGsFi70_0HEmH3L6ztViTepc>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 22:04:15 -0000

John and Linda:

Client routes use of the TEA just Tunnel Egress Endpoint.
The tunnel endpoint identifies a tunnel of type  SD-WAN-Hybrid.

The details of this internal tunnel are passed in the SD-WAN NLRI + TEA.

If this usage is clearly specified for the Tunnel type =15,
It does not seem to break the text of RFC9012.

The draft-ietf-idr-sdwan-edge-discovery procedures need to differentiate the
Processing for NLRI SAFI (1/128 or 2/128)  versus  SD-WAN SAFI.
(IMO – the draft-ietf-idr-sdwan-edge-discovery needs to be adjust to make this clear. )

Sue


From: John Scudder <jgs@juniper.net>
Sent: Tuesday, February 27, 2024 6:51 PM
To: Linda Dunbar <linda.dunbar@futurewei.com>
Cc: idr@ietf.org; draft-ietf-idr-sdwan-edge-discovery@ietf.org
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Linda, That’s not how the Encapsulation Extended Community is defined. Please see RFC 9012 Section 4.1. As I wrote in my first note in this thread, it looks like what you should be specifying for c
External (jgs@juniper.net<mailto:jgs@juniper.net>)
  Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tLzIyZWQxYzYwZWZmNGJlZmU0ZmQzNWY0YjU2MGY4MDc4LzE3MDkwNzc4NDYuODE=#key=314e2147e3924e3a30ff23d2bdf5bf05>  FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>  GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky>


Hi Linda,



That’s not how the Encapsulation Extended Community is defined. Please see RFC 9012 Section 4.1. As I wrote in my first note in this thread, it looks like what you should be specifying for client routes, is that they do NOT include an Encapsulation Extended Community, and that they DO recurse (via their next hop) to another route that carries the tunnel information (you call this “UPDATE 2”).



If, after reading RFC 9012 Section 4.1 you still think Encapsulation Extended Community can be used in the way you’ve written, I’d be interested in knowing exactly why, because we tried to be clear in 9012 that an Encapsulation Extended Community is exactly and only an alias for a “barebones Tunnel TLV”, i.e. I Tunnel TLV that has no sub-TLVs other than Tunnel Egress Endpoint.



—John



> On Feb 27, 2024, at 6:35 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:

>

>

> John,  See the answers below:  -----Original Message-----

> From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>

> Sent: Tuesday, February 27, 2024 5:10 PM

> To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>

> Cc: idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>

> Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

>  Hi Linda,

>  What are the semantics of a Tunnel Encapsulation path attribute, with tunnel type = SD-WAN-Hybrid, and no sub-TLVs other than egress endpoint?

>  [Linda] There ARE sub-TLVs under the Tunnel Encapsulation Path Attribute, which specifies the detailed attributes associated with the IPsec tunnel for the SD-WAN Edge’s WAN Ports. I am trying to say that there are NO sub-TLVs under the client routes UPDATE (which has Encapsulation Extended Community)

>  draft-ietf-bess-bgp-sdwan-usage-20 describe how to use BGP,  stating There are two UPDATE2:

> 1) UPDATE 1 is for Client Route UPDATE (which follows the traditional BGP-based client routes)

> 2) UPDATE 2 for the Edges to advertise the WAN port information. In the UPDATE2, the Route prefix is the WAN port address.

>  draft-ietf-idr-sdwan-edge-discovery-12 specifies the detailed BGP extension for UPDDATE2. The UPDATE 2 has Tunnel Encapsulation Path Attribute with a new NLRI for Underlay Tunnel Update and the sub-TLVs specified in the document.  Linda  —John

>  > On Feb 27, 2024, at 6:03 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:

> > > > [External Email. Be cautious of content]

> > > > John  The  Encapsulation Extended Community is only in the client routes BGP UPDATE, which is the BGP-based VPN/EVPN client routes UPDATE message. There are no sub-TLVs added. Section 6's first paragraph states the Client Route UPDATE follows the BGP-based VPN/EVPN client route UPDATE message..  The sub-TLVs discussed in the draft are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) which DOES NOT have Encapsulation Extended Community for SD-WAN edges to advertise the information about their WAN ports. Please see below for the details.

> >  p.s. Are you referring to version-20?   Linda

> > -----Original Message-----

> > From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>

> > Sent: Tuesday, February 27, 2024 2:42 PM

> > To: draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>

> > Cc: idr@ietf.org<mailto:idr@ietf.org>

> > Subject: Error in draft-ietf-idr-sdwan-edge-discovery use of > Encapsulation Extended Community  Hi Authors, WG,  I just noticed > draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Community can be used, and I thought you should be aware of it. TL;DR, you’re specifying the use of SD-WAN-Hybrid tunnel type in an Encapsulation Extended Community, but this isn’t allowed. Details follow.

> >  [Linda] That is just an example for needing a different Tunnel Type > in the Encapsulation Extended Community

> >  - RFC 9012, Section 4.1 tells us that the only permissible use of the Encapsulation Extended Community is when there are *no sub-TLVs*, other than the Address Family sub-TLV (item 3 in the list of conditions).

> > [Linda] That is our understanding as well. This document doesn’t specify additional sub-TLVs to be added to the BGP UPDATE with the Encapsulation Extended Community.

> >  - In draft-ietf-idr-sdwan-edge-discovery-12 Section 6.3 we see the definition of the IPsec-SA-ID Sub-TLV of the SD-WAN-Hybrid tunnel type. This seems pretty central to the purpose of the spec. So, the SD-WAN-Hybrid tunnel type does have sub-TLVs in addition to the Address Family, and therefore MUST NOT be used in an Encapsulation Extended Community.

> > [Linda] All those sub-TLVs are NOT used with Encapsulation Extended Community. Those Sub-TLVs are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) for SD-WAN edges to advertise the information about their WAN ports. There is no Encapsulation Extended Community included when an edge node advertises its WAN port information. Please see Section 5 for BGP Walk Through details.

> >  - Also, in draft-ietf-idr-sdwan-edge-discovery-12 Section 5.1 we see that the client route update uses the Encapsulation Extended Community (emphasis added):

> >  [Linda] The Client Route UPDATE can use the Extended Community to indicate that their associated tunnel information is advertised by separate UDPATE. The purpose is to reduce the size of the Clint Route UPDATE message size because the tunnel associated with IPsec has a lot of information to be exchanged. They don’t change at the same frequency as the Client Routes.

> > ```

> > 5.  Client Route UPDATE

> >     The SD-WAN network's Client Route UPDATE message is the same as the

> >    L3 VPN or EVPN client route UDPATE message.  The SD-WAN Client Route

> >    UPDATE message uses the **Encapsulation Extended Community** and the

> >    Color Extended Community to link with the SD-WAN Underlay UPDATE

> >    Message.

> > ```

> >  - It’s clear from other parts of the spec that the tunnel type is SD-WAN-Hybrid, for example, this is both stated in Section 3.3, and then used in the example (same section).

> > [Linda] The Client Route Update message is NOT using RFC9012. Here is to indicate that another type might be needed. As this is a BGP usage draft, with the intent to explain how to use BGP, with the justification to BGP extension later.  - But RFC 9012 §4.1 told us we can’t use a tunnel type with sub-TLVs as an Encapsulation Extended Community!

> > [Linda] The Client Route Update message is NOT using RFC9012.

> >  I think what you really must be trying to do is use the Tunnel Encapsulation attribute (only!) to carry the SD-WAN-Hybrid in the SD-WAN Underlay route, and then have the client routes making use of that tunnel recurse into the underlay route (including tunnel) as per RFC 9012 Section 8. Note that Section 8 does NOT require that the client route carry the Encapsulation Extended Community — the next hop address is both necessary and sufficient to effectuate the linkage to the underlay route.

> > [Linda] You are correct. The Tunnel Encapsulation Attribute is used to carry the SD-WAN-Hybrid for SD-WAN edge nodes to advertise the WAN ports (i.e. the under route).

> >    Thanks,

> >  —John