Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

John Scudder <jgs@juniper.net> Wed, 28 February 2024 15:58 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39DFFC14F5F1; Wed, 28 Feb 2024 07:58:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.995
X-Spam-Level:
X-Spam-Status: No, score=-6.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="izF4UN6t"; dkim=pass (1024-bit key) header.d=juniper.net header.b="Alxz3F4s"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V125T4178Y6a; Wed, 28 Feb 2024 07:58:39 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E69DCC14F5EF; Wed, 28 Feb 2024 07:58:38 -0800 (PST)
Received: from pps.filterd (m0108157.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 41SBHA05005969; Wed, 28 Feb 2024 07:58:36 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=PPS1017; bh=w6CPp10xlr46pEJNQx4a+N PHktt9TZyIT9zq0vcWhgs=; b=izF4UN6t2bN4e4nE4tn5CYFkgZIP3nmTqodVB3 hEs+xhsxLKNvlmlJ8wPmwIrWzs260KdprISpOZYvB+zeU8n25KiJjwHL7whLR99H 5lemEe05qXRsa8e32j8+ugxKmRbJZoo9dzN562/t4teBf/35aEtHaYPV1ZFB/UqO S3paTWjs4yAKE1Bv4kHa4a/ZvAmspH5OB5IID7AZ8d0Iw0hJo9+8+psm2Wzn9JAA KCHNNeCC3IM2FMWyDMddoUop/cVgFXFooriTCTTNI4fZzoJTHwUX9hfh7P+k1gnS Qrip8rKwmlGDwbND14o3d9rO/cKireIfWP8RQapZDcBYK6MQ==
Received: from bl2pr02cu003.outbound.protection.outlook.com (mail-eastusazlp17012018.outbound.protection.outlook.com [40.93.11.18]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3wfgkmyj1x-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 28 Feb 2024 07:58:35 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DA7KgpmrvCYspO2ZVRHAi+gAbSQaXiPtf8apTXUedgC+6Yk0RqMde3hVYfYocejOe8kQjCIuMgPoIUKAqZYrNfD9ZiYUzuhnkrNTVCZNf2wERrcWy0cyWBgIb54hYp2Q4qdSchUtv+DhLxVMAUx5lgILO73iz+sTYn59NpCyPLlA8K/7Fu/jM1Q+QlaaQvEFRiCa98T3lnfCFUMjS/uxhok3zDynGyLHybyV4V0HaAC2a3XfKjYCbF36QpWlQC+panUe0IXnd0LMS7B+6hVVXQf50dKoG7EFfXzSDHhd0psiwyssvx8x1AKkAimYKqs+0SQfLqavLbs38wQdV+hfgA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=w6CPp10xlr46pEJNQx4a+NPHktt9TZyIT9zq0vcWhgs=; b=QVd+QyG5eF8TqeGsYALxPE4Y+N/vSWw+7RQlTRTdanx5myG28wUuzmMKsOW10sNrlKANloUMppzuVLgalKUl1YWlxVrx79+brd/0kfcQBs+DZ9y2ejKmf5goI+9O2jd8tCw+BMqPc1+BW3wsvLU4XDSXpDWVQbzpvXWp8zohsRu0nN/OKmcMOWx+0pnbL4GUJ6Q7nW3UNvxOeh/1Uj5U8YqDn2xcTQ20mMsl5EjOEUT6sV/oadA4UdDTCWn5gip2JVYHrY9ezBCNpsDe8DLnRyp3z9WaauslpGQ9MUe4lkt4F5jR1+DiYPJmqMFvMvz8zLncvw8IBTxYF6Iwf8Neyg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w6CPp10xlr46pEJNQx4a+NPHktt9TZyIT9zq0vcWhgs=; b=Alxz3F4sFvgbGjXyoYPjOrwrzR+NXLEoXVsRmCUe3zOBtZ2pET3pOlOmA3TNolreRY6wlrR9Qu915q0i5g4f3uk94hO93b7Iyh0KPHKEEfZHzdYbPoQskKPvyffQIpZ38tIaMCduAOLaGQYrm3TusUdbCvEIv4bnf3qTSKSPzyM=
Received: from CH2PR05MB6856.namprd05.prod.outlook.com (2603:10b6:610:3e::11) by BY3PR05MB8924.namprd05.prod.outlook.com (2603:10b6:a03:3b2::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 15:58:32 +0000
Received: from CH2PR05MB6856.namprd05.prod.outlook.com ([fe80::e182:8767:9915:7b07]) by CH2PR05MB6856.namprd05.prod.outlook.com ([fe80::e182:8767:9915:7b07%6]) with mapi id 15.20.7316.037; Wed, 28 Feb 2024 15:58:32 +0000
From: John Scudder <jgs@juniper.net>
To: Gyan Mishra <hayabusagsm@gmail.com>
CC: Linda Dunbar <linda.dunbar@futurewei.com>, Robert Raszuk <robert@raszuk.net>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1b0El+Em0vTUqZbYQ57EWzzbEezuKAgAAB5ICAAAbwgIAABJsAgAABokaAAAQxgIAABswAgAAgDACAAAv2dYAADRuAgAADM9qAAMMzgIAAAfmA
Date: Wed, 28 Feb 2024 15:58:32 +0000
Message-ID: <3D635EEE-AFEC-4096-86AD-C25275B2CE87@juniper.net>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMEpC5caAtKCLSc6MrHUX1Qa3gtPO919nYpk9jyTdYXuSA@mail.gmail.com> <1DB2D1F0-E0F9-41F6-B49A-0126D25BE2DD@juniper.net> <PH0PR13MB4922F82CF2D623474D4BD8A585582@PH0PR13MB4922.namprd13.prod.outlook.com> <A1DC1B7C-B767-48A9-9BEA-A5EFBE85E9C9@juniper.net> <CO1PR13MB4920A1105DE8C0461BA1614F85582@CO1PR13MB4920.namprd13.prod.outlook.com> <ACC38EDA-99CF-4036-B6E8-866853A068B4@juniper.net> <CO1PR13MB4920A008CD4854E99F8BA8B585582@CO1PR13MB4920.namprd13.prod.outlook.com> <D0C3031E-713E-4069-93B5-73FE6CABB5F0@juniper.net> <CABNhwV0-+skz86ASkFbNRHP3AnuGM2vDeRYKY_81mQBju_DNEQ@mail.gmail.com>
In-Reply-To: <CABNhwV0-+skz86ASkFbNRHP3AnuGM2vDeRYKY_81mQBju_DNEQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3774.400.31)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH2PR05MB6856:EE_|BY3PR05MB8924:EE_
x-ms-office365-filtering-correlation-id: 94699322-80fc-4e2b-2dc8-08dc38761cfa
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR05MB6856.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(230273577357003)(38070700009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_3D635EEEAFEC409686ADC25275B2CE87junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR05MB6856.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 94699322-80fc-4e2b-2dc8-08dc38761cfa
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2024 15:58:32.2855 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xuHYWrykXRatDquJh4fXPeCb9ZrHJNcr/eeNbxx2oxITooT+L/xdKSCYClP0zwy1
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY3PR05MB8924
X-Proofpoint-GUID: cQEpO1jcyaN-u5rYWe5ttKlBnOp_lP1e
X-Proofpoint-ORIG-GUID: cQEpO1jcyaN-u5rYWe5ttKlBnOp_lP1e
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-02-28_08,2024-02-27_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 adultscore=0 priorityscore=1501 spamscore=0 impostorscore=0 mlxscore=0 suspectscore=0 phishscore=0 clxscore=1011 malwarescore=0 bulkscore=0 mlxlogscore=999 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2402120000 definitions=main-2402280124
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Edh2YHuv6pN8eH1fmikNxWbiKUE>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 15:58:43 -0000

Hi Gyan,

You mean, to mark tunnel-type affinity? I'm sure you could do that, but I don't see an advantage, especially since the tunnel endpoint information isn't going to be contained in ELC so the scope constraint feature doesn't end up covering the whole solution anyway. Also, as a practical matter, ELC hasn't reached RFC yet, so it would potentially be a downref, whereas extended communities are long-established.

—John

On Feb 28, 2024, at 10:51 AM, Gyan Mishra <hayabusagsm@gmail.com> wrote:



Hi Linda and John

What if you use RCA in place of encapsulation extended community. This draft was the original ELC update to fix route leak issue and then was made generic next hop draft with ELC being the first use case.

https://datatracker.ietf.org/doc/html/draft-ietf-idr-entropy-label-13<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-ietf-idr-entropy-label-13__;!!NEt6yMaO-gk!AbISHJTE2qZCfyfd3XGJSpgm968HdsNchYUKdZDzEQfGFNBWHOEJFCHL4WCdzPDY7fkeM1rLNwzs3puW_g$>

John

You are pretty familiar with this draft.  What do you think?

Kind Regards



[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<https://urldefense.com/v3/__http://www.verizon.com/__;!!NEt6yMaO-gk!AbISHJTE2qZCfyfd3XGJSpgm968HdsNchYUKdZDzEQfGFNBWHOEJFCHL4WCdzPDY7fkeM1rLNwyrvCsh7Q$>

Gyan Mishra
Network Solutions Architect
Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>
M 301 502-1347




On Tue, Feb 27, 2024 at 11:12 PM John Scudder <jgs=40juniper.net@dmarc.ietf.org<mailto:40juniper.net@dmarc.ietf.org>> wrote:
Well, you could use light red and dark red. Or you could use different next hop addresses. Or you could invent a new kind of extended community to indicate tunnel affinity. But Encapsulation Extended Community simply isn’t defined to do what you want.

—John

On Feb 27, 2024, at 11:01 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:



[External Email. Be cautious of content]


John,

The Color Extended Community alone is not enough.
For example, one SD-WAN edge has 5 routes (Route #1 ~#5) with 3 types of underlay paths (IPsec over Internet, SRv6 , and unsecure internet).

Route #1 &  #2 have to be forwarded by SRv6, but Route #1 needs to use the SRv6 Red Color paths, Route #2 needs to use the SRv6 Blue Color paths.

In conclusion: SD-WAN routes (or customer traffic) need to have both Encapsulation Extended Community and the Color Extended Community.

Linda

From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 9:14 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>; idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

You could accomplish that using the Color Extended Community. See second-last paragraph of Section 8.

—John


On Feb 27, 2024, at 9:31 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:

[External Email. Be cautious of content]

John,
Here is the SD-WAN scenario why simple Nexthop cannot do the job:

Suppose one SD-WAN edge has 3 client routes (#1, #2, #3)  and multiple underlay paths (public unsecure paths & private secure paths) to other peer nodes:
1) The client route #1 needs to be forwarded by a private path (such as network service provider's MPLS path),
2) The  client route #2 (at the same nextHop) can be forwarded by IPsec SA or MPLS (i.e., the Hybrid tunnel described in the document)
3) The client route #3 can be forwarded by unsecure path (such as web browsing traffic)

When this SD-WAN edge advertises Client Route #1, it needs to indicate the necessary encapsulation type to be MPLS.
When this SD-WAN edge advertises the Client Route #2, it needs to indicate the encapsulation type to be SD-WAN-Hybrid.
When the SD-WAN edge advertises the Client Route #3, it only needs to indicate the NextHop.

Linda

-----Original Message-----
From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 6:37 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>; idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Linda,

> On Feb 27, 2024, at 7:12 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
>
> Our intent of using Encapsulation Extended Community is to indicate
> that Client routes need to be forwarded by a tunnel, but there is too much information about the  Tunnel attributes to be included in the Client route advertisement and those attributes are associated with the WAN ports (instead with Client Routes).
>
> We need to interpret the "barebones" as a hook to inform the peer nodes to use information carried in  the second UPDATE to establish the tunnel for the Client routes.

I don’t see why you need any indication beyond the next hop. It’s both necessary (so that the recipient can find the route that has the tunnel information) and sufficient (because once it finds that route, it will see it includes tunnel information). This is exactly what Section 8 explains.

> I don't understand why RFC9012 doesn't allow this. What harm does it cause?

If RFC 9012 was still in draft, and you had suggested the idea above as a change to the spec, we could have had this discussion. But it’s moot now — RFC 9012 is what it is, and what it is, very specifically and precisely does *not* allow a tunnel type that has mandatory sub-TLVs to be used as an Encapsulation Extended Community, and does *not* require any additional information beyond the next hop to “glue” a client route to an underlay route that has a tunnel attribute.

If you want to use RFC 9012, it is what it is. If you think (for some reason I don’t yet understand) that you need to have an extra “hook” beyond the next hop, you can specify some new thing to do that.

—John

_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr<https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/idr__;!!NEt6yMaO-gk!AbISHJTE2qZCfyfd3XGJSpgm968HdsNchYUKdZDzEQfGFNBWHOEJFCHL4WCdzPDY7fkeM1rLNwxGOhWNWg$>