Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt

Robert Raszuk <robert@raszuk.net> Wed, 26 June 2019 18:32 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C83341203E7 for <idr@ietfa.amsl.com>; Wed, 26 Jun 2019 11:32:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TbDzzFmCcGWN for <idr@ietfa.amsl.com>; Wed, 26 Jun 2019 11:32:35 -0700 (PDT)
Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com [IPv6:2607:f8b0:4864:20::72d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0CE7120306 for <idr@ietf.org>; Wed, 26 Jun 2019 11:32:34 -0700 (PDT)
Received: by mail-qk1-x72d.google.com with SMTP id a27so2530146qkk.5 for <idr@ietf.org>; Wed, 26 Jun 2019 11:32:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=BOFr1JtL7ShnEuK3RLzE3l2BfB2dc1Zv9uJMziPU5yY=; b=btlSP2vd4hZAp8uDqgH75RcP0sIAzj/3OoOL1aoDRgxrwuQGuM0Uj2zvlXE3EfqNgw i1UsvI1SBlp6I2gxCD7KF82HLGymoleoRaqvglH4EE7cEHnD2e7qfQu+EkLFJ4Io8ObU W/9ees2M3D+LC5mbB316prepEaUq0Zl30Bc2G811M9Q0wld/4SayLc5gMciTCy0zxbgq dKnO6SRucsamaqjtajiunkn8lC7B/hAM2dLb7ikB/t1nwi7grDuXlX59WykppoL8TeNT TakRFiz7rfPbAsmXqUVAsjoY2a+/sjzKvdW90uSzqVDYoJWlfst5Ytq6ZhYwDp+4jRBZ Nxgg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=BOFr1JtL7ShnEuK3RLzE3l2BfB2dc1Zv9uJMziPU5yY=; b=XDQM8BqHQLYFEfxokJavasVyvEoBjoop5AAV57FdEz4xIandaAgzag1RVwXC6A0vf9 YGTMXI70ZWbevGaW5BbGqxj2cK0g3WIxyHJLJthKqHxjLDuM+zttt5ZC/prc7BSW27CI RieeG7CkUGvSk0pqnyOTfse09Xdw1NwEyjSOPPMv5hFZ27Z0Asi4rH4qJIxJni0vsfMk axcWd9NbS3KoVoECm2rjgrR8K3TVqt/Kl5uH5yKFvIlrlDBAyV/Q0IBLzG/DK5YNN60K FV1py1OAAir68k23TJc5nRchtSMeAZhgSfkAJc5nnBnp2mGrO7Q6ng88pZMLKIw/iajH b80w==
X-Gm-Message-State: APjAAAUgRPOADApTQYZIUgxEFu+igFUzU8D/TGAinv92M2esiLH4ju2F 6zXZK11DjA+A3iSDOhqST4Iir0b9x2pW81aMCtUkgg==
X-Google-Smtp-Source: APXvYqxLSHF1TGkTfZqY7HhhtB9Ce3SGMOvrbwSlVII8/jR+p3dNweNPXVQ33PqOhAqwIMX4fkDmzMEliSmYatCMcqo=
X-Received: by 2002:a05:620a:1285:: with SMTP id w5mr4907619qki.302.1561573953731; Wed, 26 Jun 2019 11:32:33 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR13MB358267E50BCEB2E7795046B785E50@MN2PR13MB3582.namprd13.prod.outlook.com> <BYAPR05MB5029672CA347E6EC1B94E476C7E40@BYAPR05MB5029.namprd05.prod.outlook.com> <MN2PR13MB358228DB2D7DD56204660F6985E40@MN2PR13MB3582.namprd13.prod.outlook.com> <BYAPR05MB502933857FE0AFBA3390734DC7E40@BYAPR05MB5029.namprd05.prod.outlook.com> <MN2PR13MB3582B880C792E0519A3A91C385E40@MN2PR13MB3582.namprd13.prod.outlook.com> <BYAPR05MB5029581D97C82FA968601CCDC7E70@BYAPR05MB5029.namprd05.prod.outlook.com> <MN2PR13MB35826741E00B40BBFE12616085E70@MN2PR13MB3582.namprd13.prod.outlook.com> <4F580631-0E2D-4311-9EDC-E25A4862DD84@juniper.net> <BYAPR05MB5029D7B984EB0506C7773E63C7E20@BYAPR05MB5029.namprd05.prod.outlook.com>
In-Reply-To: <BYAPR05MB5029D7B984EB0506C7773E63C7E20@BYAPR05MB5029.namprd05.prod.outlook.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Wed, 26 Jun 2019 20:32:22 +0200
Message-ID: <CAOj+MMH-0qBkaroKJEdtjM1-7-ZjOY1mWBkS7hLo8FOC_5A+Og@mail.gmail.com>
To: John E Drake <jdrake=40juniper.net@dmarc.ietf.org>
Cc: John Scudder <jgs@juniper.net>, Linda Dunbar <linda.dunbar@futurewei.com>, "idr@ietf.org" <idr@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000cda1ed058c3e4475"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/FEOONMxFupbxopc600h-p4L3CdA>
Subject: Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jun 2019 18:32:39 -0000

John,

> Making the Remote Endpoint sub-TLV mandatory effectively associates the
attribute with the remote endpoint.

I am not sure why you draw such conclusion.

Including remote endpoint address does not bind this sub-TLV to be
advertised with the remote end point NLRI. Quite contrary this information
is needed on a per NLRI basis.

How could you not send endpoint address if the entire purpose of this
extension is to signal the address where the encapsulation should be
terminated at - no ?

Thx,
R.





On Wed, Jun 26, 2019 at 8:27 PM John E Drake <jdrake=
40juniper.net@dmarc.ietf.org> wrote:

> John,
>
>
>
> Oopsie, I missed that.  Do we really want to have this behavior?  Having
> it optional would give us a lot more flexibility and I thought an attribute
> was supposed to be associated with a route.  Making the Remote Endpoint
> sub-TLV mandatory effectively associates the attribute with the remote
> endpoint.
>
>
>
> Yours Irrespectively,
>
>
>
> John
>
>
>
>
>
> Juniper Business Use Only
>
> *From:* John Scudder <jgs@juniper.net>
> *Sent:* Wednesday, June 26, 2019 2:06 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>; John E Drake <
> jdrake@juniper.net>
> *Cc:* rtgwg@ietf.org; idr@ietf.org
> *Subject:* Re: [Idr] Tunnel-Encap Gaps for SD-WAN described in
> draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
>
>
>
> Linda, John,
>
>
>
> Your discussion is premised on the assumption that the remote endpoint
> sub-TLV is optional. Consider this paragraph, from section 5:
>
>
>
>    When the Tunnel Encapsulation attribute is carried in an UPDATE of
>
>    one of the AFI/SAFIs specified in the previous paragraph, each TLV
>
>    MUST have a Remote Endpoint sub-TLV.  If a TLV that does not have a
>
>    Remote Endpoint sub-TLV, that TLV should be treated as if it had a
>
>    malformed Remote Endpoint sub-TLV (see Section 3..1 <https://tools.ietf.org/html/draft-ietf-idr-tunnel-encaps-12#section-3.1>).
>
>
>
> There’s both a MUST clause and directions to ignore the sub-TLV if the
> remote endpoint is missing. To me this seems clear without any changes to
> the draft.
>
>
>
> Regards,
>
>
>
> —John
>
>
>
> On Jun 21, 2019, at 8:25 AM, Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
>
>
> John,
>
>
>
> I am with you hoping that the Tunnel-encap authors can clarify more.
>
> Based on the description of how the receivers of the Tunnel UPDATE msg add
> the Encapsulation Headers to client routes described in the Tunnel-Encap
> draft, it should be:
>
>    - If the “Remote endpoint” sub-TLV was present and containing the same
>    address as the route itself, then the receivers of the Tunnel UPDATE would
>    construct the encapsulation header with the Outer Destination Address equal
>    to the “route itself” (which is carried in the Remote Endpoint sub-TLV).
>
> I think this can be a serious problem.
>
>
>
>    - if the “Remote Endpoint” sub-TLV was not present, the receivers of
>    the Tunnel UPDATE would assume the UPDATE originator’s address as the
>    Tunnel Remote end point.
>
>
>
> If the processing behavior described above is NOT what the Tunnel-Encap
> draft intended, then the Tunnel-Encap draft needs to add text to clarify
> the description.
>
>
>
> Nevertheless, do you have objections of those gaps that Tunnel-Encap and
> Secure-EVPN:
>
>
>
> - Doesn’t have the functionality that would help the C-PE to register its
> WAN Port properties. Some WAN ports are facing public internet with ISP
> assigned addresses that are in different address space than the SD-WAN
> address space, some WAN ports are assigned with private addresses which
> need to propagate NAT information to the trusted peers via Controllers,
> such as the virtual C-PEs instantiated in public Cloud DCs, and some WAN
> ports are facing the trusted MPLS network.
>
>
>
> - For the same Client route, e.g. 10.1.x.x, attached to a C-PE, need to be
> encrypted when forwarding to the WAN ports facing untrusted network, and
> can be forwarded without any encryption towards WAN ports facing trusted
> network.
>
>
>
>
>
> Thank you very much for the discussion. I have updated the Gap analysis to
> reflect what has been discussed in this email thread...
>
>
>
> Linda
>
>
>
> *From:* John E Drake <jdrake@juniper.net>
> *Sent:* Friday, June 21, 2019 8:14 AM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>; rtgwg@ietf.org;
> idr@ietf.org
> *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in
> draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
>
>
>
> Linda,
>
>
>
> It would be useful to get a clarification from the authors.  I had always
> thought that if the remote endpoint sub-TLV was either not present or
> present and containing the same address as the route itself, then the
> information in the tunnel encapsulation attribute pertains to the address
> specified in the route.  This is the assumption made in the Secure EVPN
> draft that I mentioned earlier in this thread.
>
>
>
> Alternatively, the route could specify a loopback address of the C-PE and
> the tunnel encapsulation attribute could contain the interface address and
> characteristics of each of its WAN-facing ports; this is completely
> compliant with your interpretation that the address specified in the route
> is reachable through an address specified in the remote endpoint sub-TLV.
>
>
>
> [Linda] But there is no field to indicate the property of the WAN ports.
>
>
>
> Yours Irrespectively,
>
>
>
> John
>
>
>
>
>
> Juniper Internal
>
> *From:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Sent:* Thursday, June 20, 2019 7:08 PM
> *To:* John E Drake <jdrake@juniper.net>; rtgwg@ietf.org; idr@ietf.org
> *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in
> draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
>
>
>
> John,
>
>
>
> Those addresses stated in the quoted paragraphs are for Clients Routes,
> i.e. the routes attached to the PE, not the PE’s lookback address, correct?
>
> The Loopback Address is specified in the “Remote Endpoint” SubTLV, so that
> receivers of the UPDATE can establish the Encapsulation with the outer
> destination address equal to the one specified by the “Remote endpoint”
> SubTLV.
>
>
>
> That was discussed in the long email discussion thread last week.
>
>
>
> We can ask the Tunnel-Encap authors to confirm.
>
>
>
> Linda
>
>
>
> *From:* John E Drake <jdrake@juniper.net>
> *Sent:* Thursday, June 20, 2019 5:50 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>; rtgwg@ietf.org;
> idr@ietf.org
> *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in
> draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
>
>
>
> Linda,
>
>
>
> From section 5 on the Tunnel Encapsulation Attribute draft:
>
>
>
> “[RFC5512] specifies the use of the Tunnel Encapsulation attribute in
>
> BGP UPDATE messages of AFI/SAFI 1/7 and 2/7.  That document restricts
>
> the use of this attribute to UPDATE messsages of those SAFIs.  This
>
> document removes that restriction.
>
>
>
> The BGP Tunnel Encapsulation attribute MAY be carried in any BGP
>
> UPDATE message whose AFI/SAFI is 1/1 (IPv4 Unicast), 2/1 (IPv6
>
> Unicast), 1/4 (IPv4 Labeled Unicast), 2/4 (IPv6 Labeled Unicast),
>
> 1/128 (VPN-IPv4 Labeled Unicast), 2/128 (VPN-IPv6 Labeled Unicast),
>
> or 25/70 (Ethernet VPN, usually known as EVPN)).  Use of the Tunnel
>
> Encapsulation attribute in BGP UPDATE messages of other AFI/SAFIs is
>
> outside the scope of this document.”
>
>
>
> What this means is that the tunnel encapsulation draft can be use exactly
>
> as I described in my previous email to describe the characteristics of
>
> of an SD-WAN port.
>
>
>
> Yours Irrespectively,
>
>
>
> John
>
>
>
>
>
> Juniper Internal
>
> *From:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Sent:* Thursday, June 20, 2019 6:08 PM
> *To:* John E Drake <jdrake@juniper.net>; rtgwg@ietf.org; idr@ietf.org
> *Subject:* RE: Tunnel-Encap Gaps for SD-WAN described in
> draft-ietf-rtgwg-net2cloud-gap-analysis-02.txt
>
>
>
> John,
>
>
>
> Thank you very much for the feedback.
>
> Comments are inserted below:
>
>
>
> *From:* John E Drake <jdrake@juniper.net>
> *<Snip> *
>
>
>
> -------------------------------------------
>
>
>
> -       [Tunnel-Encap] doesn’t have the functionality that would help the
> C-PE to register its WAN Port properties.
>
>
>
> -       A SD-WAN tunnel, e.g. IPsec-based, requires a negotiation between
> the tunnel’s end points for supported encryption algorithms and tunnel
> types before it can be properly established, whereas [Tunnel-Encap]  only
> allow the announcement of one endpoint’s supported encapsulation
> capabilities for specific attached routes and no negotiation between tunnel
> end points is needed.
>
>
>
> *[JD]  What you need to do is implement the model described in  the Secure
> EVPN draft (https://tools.ietf.org/html/draft-sajassi-bess-secure-evpn-01
> <https://nam03.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.proofpoint...com%2Fv2%2Furl%3Fu%3Dhttps-3A__nam03.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Ftools.ietf.org-252Fhtml-252Fdraft-2Dsajassi-2Dbess-2Dsecure-2Devpn-2D01-26data-3D02-257C01-257Clinda.dunbar-2540futurewei.com-257C28557a27c1c64de4997708d6f5b30f7f-257C0fee8ff2a3b240189c753a1d5591fedc-257C1-257C1-257C636966546754208641-26sdata-3DqLd2LVx5Lng7QccAIB0weIfpXE3IBOQfq0kiLUJqFMs-253D-26reserved-3D0%26d%3DDwMFAg%26c%3DHAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI%26r%3DCRB2tJiQePk0cT-h5LGhEWH-s_xXXup3HzvBSMRj5VE%26m%3Dv-ZrS-NTEa3rPqhwNaoM5gNU8iL1zGd7DutDZaH0C4w%26s%3DnivOMac2lUDvbaJX-GTBeiLAWMqfyKOsTpqvG3AB27A%26e%3D&data=02%7C01%7Clinda.dunbar%40futurewei..com%7C84c6ed1f7cb342efda1208d6f64a6827%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C636967196777678003&sdata=3wnRuxLXyDo9qPVXcIfbGNWZMNC37wef0hd4kBJlEWQ%3D&reserved=0>).
> Viz, the SD-WAN C-PEs are attached to a route reflector and each uses the
> route reflector to advertise its security-related  information the other
> C-PEs.  As we discussed in Prague the tunnel encapsulation attribute is not
> associated with client routes.  Rather it is associated with the loopback
> or interface addresses of the advertising SD-WAN C-PE.  I.e., IPv4/IPv6
> addresses rather than VPN IPv4/IPv6 addresses*
>
>
>
> *[Linda]Yes, using Loopback address would be a good way for tunnel, but
> that is not what Tunnel-Encap specified. The draft Tunnel-Encap is to
> advertise supported Encap capabilities for specified routes.*
>
> *I have another section (4.3) on the gap analysis for SECURE-EVPN,
> specifically, Secure-EVPN does not address the scenario of C-PE having some
> ports facing trusted MPLS VPN and other ports facing the untrusted public
> Internet. The document assumes that a client route is either forwarded all
> encrypted through one tunnel, or not encrypted at all through a different
> tunnel. In SD-WAN, one client route can be forwarded encrypted at one time
> through the untrusted network and be forwarded unencrypted at different
> time through MPLS VPN.*
>
> *If you think the secure-evpn has addressed those scenarios, can you
> please indicate which section? Thank you.*
>
>
>
>
>
> The establishment of a SD-WAN tunnel can fail, e.g., in case the two
> endpoints support different encryption algorithms. That is why a SD-WAN
> tunnel needs to be established and maintained independently from
> advertising client routes attached to the edge node.
>
>
>
> *[JD]  See above *
>
>
>
> -       [Tunnel-Encap] requires all tunnels updates are associated with
> routes. There can be many client routes associated with the SD-WAN IPsec
> tunnel between two C-PEs’ WAN ports; the corresponding destination prefixes
> (as announced by the aforementioned routes) may also be reached through the
> VPN underlay without any encryption.. A more realistic approach to separate
> SD-WAN tunnel management from client routes association with the SD-WAN
> tunnels.
>
>
>
> *[JD]  See above *
>
>
>
> -       When SD-WAN tunnel and clients routes are separate, the SD-WAN
> Tunnel establishment may not have routes associated.
>
> There is a suggestion on using a “Fake Route” for a SD-WAN node to use
> [Tunnel-Encap] to advertise its SD-WAN tunnel end-points properties.
> However, using “Fake Route” can raise some design complexity for large
> SD-WAN networks with many tunnels. For example, for a SD-WAN network with
> hundreds of nodes, with each node having many ports & many endpoints to
> establish SD-WAN tunnels with their corresponding peers, the node would
> need as many “fake addresses”. For large SD-WAN networks (such as those
> comprised of more than 10000 nodes), each node might need 10’s thousands of
> “fake addresses”, which is very difficult to manage and requires lots of
> configuration tasks to get the nodes properly set up.
>
>
>
> *[JD]  There is no need for a ‘Fake Route’.  We advertise a tunnel
> encapsulation attribute with security-related information for a specific
> SD-WAN port on the C-PE as identified by its IPv4/IPv6 interface address.
> If a set of SD-WAN ports have common security-related information a tunnel
> encapsulation attribute can be advertised with a C-PE’s loopback address.*
>
>
>
> *[Linda] this section is for Tunnel-Encap, which doesn’t allow Loopback
> address to be associated with the tunnel. If you think it does, can you
> please indicate which section? Thank you.*
>
>
>
> *Linda*
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_idr&d=DwICAg&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=hLt5iDJpw7ukqICc0hoT7A&m=iOdQsUCt3t0401DmUlaGf2LNe6GNFoppcHL9UmnRFs0&s=oVYZHedRWOsvb3oxa8GsufcZaZuDs9SgOtCSaMCwEmM&e=
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
>