Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Susan Hares <shares@ndzh.com> Wed, 28 February 2024 15:13 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3B8FC14F696; Wed, 28 Feb 2024 07:13:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.56
X-Spam-Level:
X-Spam-Status: No, score=-5.56 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UhWhXtdfWi6b; Wed, 28 Feb 2024 07:13:00 -0800 (PST)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2113.outbound.protection.outlook.com [40.107.93.113]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E95CC14F6AA; Wed, 28 Feb 2024 07:12:53 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PsQqF3dcTR/3R9SPHAdk0CzHbaSde3VTpte2epuYaHIwFPx5FBy/fd8kyHv9tL2TajTHbdkooJC/culNSTn6NPp1Rv/7+XLoVVGUoKmFbJLKxS2auK25HwYgTCK7l8e49EZvRSH6b9DIn6qtOPtoSoNzsxADhi1BcVVP9rkBP8B1aV2LY7TNnlMVKAMN5GAtsoZqQpiJitvj8mI60UsIS3Uz8+IO7Bg/UswPwrA0znWOXq5v+6S+x1CmFXPz3a5t7cyM7LF2Keoj6jKRfHv7kgrOJBk2/+OU/cA9IAjrKKmqSPZ8eUcAj8HgeOP1mHVi1Ownq4lsUj0qsJxALJtkSA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g8kyB5No9sS4HkubipXeWIE7sUQ6fGdTESS7iPdIZx0=; b=ixjdN8w+NQNDEfEwFJCzn0pHAvX6clRqkhT3qWBLfLLeeHaZw8uc5NX81BFdx7bVKB3sf0jtK9nBoHdWgF9tit8z2XCmTxm9yAZi9NpJHYJ+lG4Lj0joOAhT6y4K35iB5yPuE6qiw7nzAAAJ8lyi/zrlgjn0WQ81iUXOPYPcCvg81Giif8UHhExVuMdlHV7cJkUj6AiJY4fUcsCXgP/c8ceQwvEYKEslj84vXsQl3fhcjoEVmJlRWl3US2A1BpGGIlREFjIdFBHifmTaAkPQY3kOFf/J4VTTQRVdUDcX2VRH1k0GZW5h0aFxMmu6cEOkUzoOvmvhwjRYZkJvDd+3Sg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 104.47.55.101) smtp.rcpttodomain=arrcus.com smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=none (0)
Received: from MW4PR03CA0285.namprd03.prod.outlook.com (2603:10b6:303:b5::20) by MW5PR08MB8265.namprd08.prod.outlook.com (2603:10b6:303:1cb::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 15:12:50 +0000
Received: from MW2NAM12FT071.eop-nam12.prod.protection.outlook.com (2603:10b6:303:b5:cafe::7f) by MW4PR03CA0285.outlook.office365.com (2603:10b6:303:b5::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.28 via Frontend Transport; Wed, 28 Feb 2024 15:12:50 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.55.101) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.55.101 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.55.101; helo=NAM10-MW2-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (50.17.62.222) by MW2NAM12FT071.mail.protection.outlook.com (10.13.181.224) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7362.13 via Frontend Transport; Wed, 28 Feb 2024 15:12:50 +0000
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (mail-mw2nam10lp2101.outbound.protection.outlook.com [104.47.55.101]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id 6A9D2C351C; Wed, 28 Feb 2024 15:12:48 +0000 (UTC)
Received: from DM6PR08MB4857.namprd08.prod.outlook.com (2603:10b6:5:44::25) by DS7PR08MB6895.namprd08.prod.outlook.com (2603:10b6:5:3b0::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.41; Wed, 28 Feb 2024 15:12:44 +0000
Received: from DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e]) by DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e%6]) with mapi id 15.20.7316.039; Wed, 28 Feb 2024 15:12:44 +0000
From: Susan Hares <shares@ndzh.com>
To: John Scudder <jgs@juniper.net>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>, Keyur Patel <keyur@arrcus.com>
CC: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1aJbLjWCwZYUyhASue85C1X7Ee5DUw
Date: Wed, 28 Feb 2024 15:12:43 +0000
Message-ID: <DM6PR08MB4857CB13400760F85B847A94B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net>
In-Reply-To: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-traffictypediagnostic: DM6PR08MB4857:EE_|DS7PR08MB6895:EE_|MW2NAM12FT071:EE_|MW5PR08MB8265:EE_
X-MS-Office365-Filtering-Correlation-Id: a642ca80-d558-4171-2ed8-08dc386fba96
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4857.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(230273577357003)(38070700009); DIR:OUT; SFP:1102;
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB4857CB13400760F85B847A94B3582DM6PR08MB4857namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR08MB6895
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.55.101]; domain=NAM10-MW2-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.55.101]; domain=NAM10-MW2-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: MW2NAM12FT071.eop-nam12.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: be246816-c008-4f51-5a4a-08dc386fb6e6
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:50.17.62.222; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:NAM10-MW2-obe.outbound.protection.outlook.com; PTR:mail-mw2nam10lp2101.outbound.protection.outlook.com; CAT:NONE; SFS:(13230031)(230273577357003)(36860700004)(82310400014); DIR:OUT; SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2024 15:12:50.0666 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: a642ca80-d558-4171-2ed8-08dc386fba96
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5; Ip=[50.17.62.222]; Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: MW2NAM12FT071.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW5PR08MB8265
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/HYn7LOJNOC3meYIW7OrrDuyuBX8>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 15:13:04 -0000

John and Linda:

Thank you for your patience while I completed a set of reviews for the CAR document.   After further investigation,  as an author, I still think we will need to adjust this document before asking for IESG Publication.

This discussion in this email has 3 parts as a way of explanation of the basic concepts of the technology:

  *   SD-WAN-Hybrid – just Client Routes +  Tunnel encapsulation attribute (this email)
  *   SD-WAN-Hybrid with SD-WAN Underlay NRLI  - All Ports example
  *   SD-WAN-Hybrid with SD-WAN Underlay NLRI  - One Port update

[Chair hat on]
Due to the other WGLC traffic (CAR, CT, sr-safi-policy)  on the IDR list, it would be helpful if the discussion would go “offlist” as we work to fix these issues.
 [chair hat off]

Again, thanks for catching this error before we went to the IESG.  We’ll work to refine the draft, update the implementation report, and go through a 2nd WG LC on the update.

Sue Hares

=============

Part 1 – Restrict the work to Client Route + new Tunnel Encapsulation Attribute

See section 3.3 of the text.

Current text:/
As described in [SD-WAN-BGP-USAGE], two separate BGP UPDATE messages are used for SD-WAN Edge Discovery:
Client routes BGP UPDATE:
This UPDATE is precisely the same as the BGP VPN client route UPDATE. It uses the Encapsulation Extended Community and the Color Extended Community to link with the SD-WAN Tunnels UPDATE Message as specified in section 8 of [RFC9012].
A new Tunnel Type (SD-WAN-Hybrid) is added and used by the Encapsulation Extended Community or the Tunnel-Encap Path Attribute [RFC9012] to indicate mixed underlay networks.
SD-WAN UPDATE:
This UPDATE is for an edge node to advertise the properties of directly attached underlay networks, including the NAT information, pre-configured IPsec SA identifiers, and/or the underlay network-specific information. This UPDATE can also include the detailed IPsec SA attributes, such as keys, nonce, encryption algorithms, etc.
/

Restriction from RFC-9012
Section: 4.1

Current text:/
This extended community may be attached to a route of any AFI/SAFI to which the Tunnel Encapsulation attribute may be attached. Each such extended community identifies a particular tunnel type; its semantics are the same as semantics of a Tunnel TLV in a Tunnel Encapsulation attribute, for which the following three conditions all hold:

It identifies the same tunnel type.
It has a Tunnel Egress Endpoint sub-TLV for which one of the following two conditions holds:

Its Address Family subfield contains zero, or
Its Address subfield contains the address of the Next Hop field of the route to which the Tunnel Encapsulation attribute is attached.
It has no other sub-TLVs.
Such a Tunnel TLV is called a "barebones" Tunnel TLV.
/

Note:  If you change Section 3.3 above to the text below, you do not have a problem with the Tunnel Encap Attribute.

New text:/
Client routes BGP UPDATE:
This UPDATE is precisely the same as the BGP VPN client route UPDATE. It uses the Tunnel Encapsulation Attribute and the Color Extended Community to link with the SD-WAN Tunnels UPDATE Message as specified in section 8 of [RFC9012].
A new Tunnel Type (SD-WAN-Hybrid) is added and used by the Encapsulation Extended Community or the Tunnel-Encap Path Attribute [RFC9012] to indicate mixed underlay networks.
/
Please confirm that agree up  to this point by sending me email.
Client Routes:
Section 3.3 indicates:
Old text:/
C-PE2 advertises the attached client routes as below:
·         Client Route UPDATE:
o    Extended community: RT for SD-WAN VPN 1
o    NLRI: AFI=IPv4/IPv6 and SAFI = VPN
o    Prefix: 10.1.1.x; 20.1.1.x
o    NextHop: 2.2.2.2 (C-PE2)
o    Encapsulation Extended Community: tunnel-type=SD-WAN-Hybrid tunnel endpoint
o    Color Extended Community: Site-identifier

·         SD-WAN UPDATE:
o    C-PE2 can use the following Update messages to advertise the properties of Internet facing ports 192.0.0.1 and 170.0.0.1, and their associated IPsec SA related parameters.
o    Update #1 for the properties associated with the WAN port 192.0.0.1, such as the NAT properties, the underlay network properties, etc. (Details in Section 9.1).
o    Update #2 for the properties associated with the WAN port 170.0.0.1 associated properties. (Details in Section 9.1).
o    Update #3 for IPsec parameters associated with IPsec tunnel terminated at the Node level (2.2.2.2), such as the supported encryption methods, public keys, etc. (Details in Section 9.2).
/
If you use the Tunnel Encaps Attribute (TEA) [RFC9012] to describe the SD-Wan Hybrid tunnel, then
Client Route UPDATE
o    Extended community: RT for SD-WAN VPN 1  [Route Target Constraints [RFC4684]
o    NLRI: AFI=IPv4 (1)/IPv6 (2) and SAFI = VPN (128)
o    Color Extended Community: Site-identifier assigned as color for NLRI
o    Prefix: 10.1.1.x; 20.1.1.x
o    NextHop: 2.2.2.2 (C-PE2) (sets next-hop self) – Loopback address
o    Tunnel Attribute: tunnel-type=SD-WAN-Hybrid (type = 25)

           *   Tunnel endpoint 2.2.2.2
           *   Extended Port Sub-TLV for – B1-A1 - MPLS Link  - identified locally as 1001
           *   Extended Port Sub-TLV for – B2-A2 – IP-SEC - identified locally as 192.0.0.1
           *   Extended Port Sub-TLV for – B3-A3 – IP-Sec – identified locally as 170.0.0.1
           *   IP-SEC SA with security keys available for the IP-SEC links.
           *   Color TLV: Site-identifier

Key points:

  *   The inner ports are uniquely identified by logical tunnel endpoint (2.2.2.2), trans network ID,  RD, and local address, and local port (4 octets)
  *   Please notice that the Tunnel encapsulation can handle all the SDWAN functionality – just as other tunnels do.
     *   The tunnel end is 2.2.2.2.  It is set-up between 1.1.1.1 to 2.2.2.2.
     *   If the tunnel address Endpoint = 0, the tunnel’s address is the next hop.
  *   Every time the tunnel attributes change, this causes a change in the Update.
  *   Similar to SR Policy (draft-ietf-idr-sr-policy-safi) with multiple candidate routes (segments)
     *   Unlike SR Policy, it does require the use of the TEA End Point for validation.
Diagram for reference:
                                 +---+
                   +--------------|RR |----------+
                  /  Untrusted    +-+-+           \
                 /                                 \
                /                                   \
        +---------+  MPLS Path                      +-------+
11.1.1.x| C-PE1   A1-------------------------------B1 C-PE2 |10.1.1.x
        |         |                                 |       |
21.1.1.x|         A2(192.10.0.10)------( 192.0.0.1)B2       |20.1.1.x
        |         |                                 |       |
        | Addr    A3(160.0.0.1) --------(170.0.0.1)B3 Addr  |
        | 1.1.1.1 |                                 |2.2.2.2|

Do you agree with me? Please send me email.
Part 2: SD-WAN-Hybrid Tunnel + SDWAN Underlay Tunnel ID
The concept is the SDWAN Underlay NLRI to SD-WAN Hybrid tunnels identified by the tunnel Egress Endpoint.
   Node-1.1.1.1 -----------------Node-2.2.2.2
                   Hybrid SD-Wan-Tunnel
The virtual tunnel end-point is 2.2.2.2.
The SD-WAN NLRI is simply providing details on SD-WAN tunnels ending at Node-2.2.2.2.
SDWAN NLRI (IPv4)  - (P-ID, C, N)
  Port-Local-ID = 0 (for all ports) or specific port ID
  SD-WAN-Color = [4 octets]
  SD-WAN-Node-ID = 2.2.2.2 (See 2.2.2.2 as Tunnel Egress Endpoint)
+ TEA – Tunnel Attribute (1) – same encodings as above

  *   Tunnel endpoint 2.2.2.2
  *   Extended Port Sub-TLV for B1-A1 – ID: 1000,  Encapsulation: MPLS encapsulation
  *   Extended Port Sub-TLV for B2-A2 – ID: 192.0.0.1, Encapsulation:  IP-SEC
  *   Extended Port Sub-TLV for B3-A3 – ID: 170.0.0.1, Encapsulation: IP-SEC
  *   IP-SEC SA with security keys available for the IP-SEC links.
  *   Color TLV: Site-identifier

Key points:

  *   If Port-Local-Id = 0, then this passes the same information as example 1 for the tunnel endpoint.  (Explaining why ID, C, N instead of C, N, ID is missing in the text).
  *   SDWAN Hybrid tunnel – matches the Tunnel Endpoint (2.2.2.2), Port-ID and updates interface and IP-SEC information.
  *   This is similar to TEA with SR Policy with multiple Candidate Routes.
Response Request – please send comments on part
3. Application to single port
Revised Example from 9.1
Update #1
SD-WAN NLRI – AFI/SAFI (1/SD-Wan) SD-WAN  (ID, C, N)

  *   Local Port ID – 4 octets – 190.0.0.1
  *   Color  - 4 octet
  *   Node-ID – 2.2.2.2 (C-PE2)
  *   Next Hop - 2.2.2.2

Tunnel Encaps Attribute

  *   TEA Endpoint = 2.2.2.2
  *   Extended Port Sub-TLV for B2-A2 – ID: 192.0.0.1
  *   IP-SEC Sub-TLV – new Security associations

Update #2 – Just New Security
SD-WAN NLRI – AFI/SAFI (1/SD-Wan) SD-WAN  (ID, C, N)

  *   Local Port ID – 4 octets – 170.0.0.1
  *   Color  - 4 octet
  *   Node-ID – 2.2.2.2 (C-PE2)
  *   Next Hop - 2.2.2.2

Tunnel Encaps Attribute

  *   TEA Endpoint = 2.2.2.2
  *   Extended Port Sub-TLV for B2-A2 – ID: 170.0.0.1
  *   IP-SEC Sub-TLV – new Security associations

Key points:

  *   This usage comes from 9.1



From: John Scudder <jgs@juniper.net>
Sent: Tuesday, February 27, 2024 3:42 PM
To: draft-ietf-idr-sdwan-edge-discovery@ietf.org
Cc: idr@ietf.org
Subject: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Authors, WG, I just noticed draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Communi
External (jgs@juniper.net<mailto:jgs@juniper.net>)
  Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tL2EzMDk0NzNhYWY4NDM4ZDM4NGQ0ZTNlMWFmZGRkNjk0LzE3MDkwNjY1MDkuODE=#key=55e6f2f7ae470476befc29df1580940d>  FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>  GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky>


Hi Authors, WG,



I just noticed draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Community can be used, and I thought you should be aware of it. TL;DR, you’re specifying the use of SD-WAN-Hybrid tunnel type in an Encapsulation Extended Community, but this isn’t allowed. Details follow.



- RFC 9012, Section 4.1 tells us that the only permissible use of the Encapsulation Extended Community is when there are *no sub-TLVs*, other than the Address Family sub-TLV (item 3 in the list of conditions).



- In draft-ietf-idr-sdwan-edge-discovery-12 Section 6.3 we see the definition of the IPsec-SA-ID Sub-TLV of the SD-WAN-Hybrid tunnel type. This seems pretty central to the purpose of the spec. So, the SD-WAN-Hybrid tunnel type does have sub-TLVs in addition to the Address Family, and therefore MUST NOT be used in an Encapsulation Extended Community.



- Also, in draft-ietf-idr-sdwan-edge-discovery-12 Section 5.1 we see that the client route update uses the Encapsulation Extended Community (emphasis added):



```

5.  Client Route UPDATE



   The SD-WAN network's Client Route UPDATE message is the same as the

   L3 VPN or EVPN client route UDPATE message.  The SD-WAN Client Route

   UPDATE message uses the **Encapsulation Extended Community** and the

   Color Extended Community to link with the SD-WAN Underlay UPDATE

   Message.

```



- It’s clear from other parts of the spec that the tunnel type is SD-WAN-Hybrid, for example, this is both stated in Section 3.3, and then used in the example (same section).



- But RFC 9012 §4.1 told us we can’t use a tunnel type with sub-TLVs as an Encapsulation Extended Community!



I think what you really must be trying to do is use the Tunnel Encapsulation attribute (only!) to carry the SD-WAN-Hybrid in the SD-WAN Underlay route, and then have the client routes making use of that tunnel recurse into the underlay route (including tunnel) as per RFC 9012 Section 8. Note that Section 8 does NOT require that the client route carry the Encapsulation Extended Community — the next hop address is both necessary and sufficient to effectuate the linkage to the underlay route.



Thanks,



—John