Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Susan Hares <shares@ndzh.com> Wed, 28 February 2024 21:08 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B09EC14F6B7 for <idr@ietfa.amsl.com>; Wed, 28 Feb 2024 13:08:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YXS-zs38UVOX for <idr@ietfa.amsl.com>; Wed, 28 Feb 2024 13:08:22 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2098.outbound.protection.outlook.com [40.107.237.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96EC1C14F699 for <idr@ietf.org>; Wed, 28 Feb 2024 13:08:22 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=grFMEjb2DwPpclxuqm8KizlXheVywKDH6lqObzSHjE7SMz++zpdlTUlQL9W8tIRm+2oKJ/fCrXTxr0JVp9SdNt+sW7YN2Xw2do9S5W0vBhTxw+OQ+erlEj/49sycxGli5GedQYi2p2jUZe9nePIyVpbKvEYj/qQnn5yqYmxM+EoT3shbpv2ALXO+faKyzeoPp5OFMQnJ/oRSxuQYNSERFYkta8vTymE4gcaP0lVeLq57T16hYdp7lnLMCSQ0VnHjLdztQ+VfREcuI6vAgsxNpjzQhukrToahuBmdGRITCHb8OlqK99No7Gtz6/GfrtpHah6ip8ETMuchJN+nWDV4Jg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RTtMmIdr7duUz9dO1KnbFfAi601Lp5JrPUkV++bGkb4=; b=WR91cxjpQ2wsqf+u3OCU82b2IngZM4dQCQF8e+344tRa5hzcr2XbAtXNtZQ2ezwGQYtnVS+J6RfUAyR+AHATHMqqMDFRLdw5kFexJ0Zj1AlX60YMu4+Jv9R/uEWZot/JihnbaROowHWp1qpzc34Aaw+/d8krlrHpIQSs2riaWeBVqro2mCwjEaoJFSg+buXNyz+X7Q2QWatS92bG2FDfJngSztRvApwAEb6Z6YofAdNGoKreTgnihc1gj8K7QaWfN00lktdrqR/bTGHvDMhqkJgQxC6uRfmcJW817Tx88Ag8UMxnzRGFfLYZVTxCmdI5VkM6pugOC+V3NF49wiTHpg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=temperror (sender ip is 104.47.70.101) smtp.rcpttodomain=ietf.org smtp.mailfrom=ndzh.com; dmarc=none action=none header.from=ndzh.com; dkim=none (message not signed); arc=none (0)
Received: from MW4PR04CA0121.namprd04.prod.outlook.com (2603:10b6:303:84::6) by CH0PR08MB7409.namprd08.prod.outlook.com (2603:10b6:610:f2::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 21:08:16 +0000
Received: from MW2NAM12FT104.eop-nam12.prod.protection.outlook.com (2603:10b6:303:84:cafe::51) by MW4PR04CA0121.outlook.office365.com (2603:10b6:303:84::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.28 via Frontend Transport; Wed, 28 Feb 2024 21:08:14 +0000
X-MS-Exchange-Authentication-Results: spf=temperror (sender IP is 104.47.70.101) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ndzh.com;
Received-SPF: TempError (protection.outlook.com: error in processing during lookup of ndzh.com: DNS Timeout)
Received: from obx-outbound.inkyphishfence.com (13.59.96.180) by MW2NAM12FT104.mail.protection.outlook.com (10.13.181.144) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7339.25 via Frontend Transport; Wed, 28 Feb 2024 21:08:12 +0000
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2101.outbound.protection.outlook.com [104.47.70.101]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id C01F6C35EE; Wed, 28 Feb 2024 21:08:10 +0000 (UTC)
Received: from DM6PR08MB4857.namprd08.prod.outlook.com (2603:10b6:5:44::25) by CYXPR08MB9562.namprd08.prod.outlook.com (2603:10b6:930:e0::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 21:08:08 +0000
Received: from DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e]) by DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e%6]) with mapi id 15.20.7316.039; Wed, 28 Feb 2024 21:08:07 +0000
From: Susan Hares <shares@ndzh.com>
To: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaaobjeOv7IOhez0CukcOdsLxfq7EgP2XA
Date: Wed, 28 Feb 2024 21:08:07 +0000
Message-ID: <DM6PR08MB485790D888545AE5E9A97E22B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <DM6PR08MB4857DD2A863031B40AEA16DEB3582@DM6PR08MB4857.namprd08.prod.outlook.com> <DM6PR08MB48574E743FE5D72BBAC57F5FB3582@DM6PR08MB4857.namprd08.prod.outlook.com>
In-Reply-To: <DM6PR08MB48574E743FE5D72BBAC57F5FB3582@DM6PR08MB4857.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-traffictypediagnostic: DM6PR08MB4857:EE_|CYXPR08MB9562:EE_|MW2NAM12FT104:EE_|CH0PR08MB7409:EE_
X-MS-Office365-Filtering-Correlation-Id: 43615957-231a-45af-721e-08dc38a15f92
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4857.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB485790D888545AE5E9A97E22B3582DM6PR08MB4857namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CYXPR08MB9562
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.70.101]; domain=NAM10-BN7-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.70.101]; domain=NAM10-BN7-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: MW2NAM12FT104.eop-nam12.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: d395b642-7e57-4fcb-1b8c-08dc38a15cdb
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:13.59.96.180; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:NAM10-BN7-obe.outbound.protection.outlook.com; PTR:mail-bn7nam10lp2101.outbound.protection.outlook.com; CAT:NONE; SFS:(13230031)(36860700004)(82310400014); DIR:OUT; SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2024 21:08:12.2372 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 43615957-231a-45af-721e-08dc38a15f92
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5; Ip=[13.59.96.180]; Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: MW2NAM12FT104.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR08MB7409
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/IQ_BUCbZwmYHujzFvBX9fcId7dM>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 21:08:27 -0000

Sorry for the SPAM, but I realized this response did not have the correct header.  This header lets the IESG catch it in their email filters.

Sue

From: Susan Hares
Sent: Wednesday, February 28, 2024 3:44 PM
To: idr@ietf.org
Cc: John Scudder <jgs@juniper.net>; draft-ietf-idr-sdwan-edge-discovery@ietf.org; Andrew Alston <Andrew.Alston@liquidtelecom.com>
Subject: FW: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Per John’s request -  I am returning this message to the main IDR list.

The point of this message is that SDWAN Underlay mechanisms [NLRI + TEA] are similar to the SR Policy Underlay [NLRI + TEA]

SD-WAN-Hybrid tunnel – abides by the [RFC9012] TEA restrictions for having the Tunnel Egress Endpoint + validation of route.
SR Policy tunnel – does not abide by the [RFC9012] TEA restrictions for having the

[RFC9012] states:

   The BGP Tunnel Encapsulation attribute MAY be carried in any BGP
   UPDATE message whose AFI/SAFI is 1/1 (IPv4 Unicast), 2/1 (IPv6
   Unicast), 1/4 (IPv4 Labeled Unicast), 2/4 (IPv6 Labeled Unicast),
   1/128 (VPN-IPv4 Labeled Unicast), 2/128 (VPN-IPv6 Labeled Unicast),
   or 25/70 (Ethernet VPN, usually known as EVPN).  Use of the Tunnel
   Encapsulation attribute in BGP UPDATE messages of other AFI/SAFIs is
   outside the scope of this document.

The SDWAN underlay SAFIs and the SR Policy tunnel are outside [RFC9012] usage.

John’s concerns break down into two categories of use of TEA:

  *   Category 1: TEA with the following NLRIs [1/1, 2/1,1/4, 2/4, 1/128, 2/128, 2/70
  *   Category 2: TEA with other NLRIs.
     *   SR Policy [1/73, 2/73] [draft-ietf-idr-sr-policy-safi]
     *   SD-WAN [1/74, 2/74] [draft-ietf-idr-sdwan-edge-discovery]

SDWAN – examples show category 1 (client routes + TEA) and category 2 (SD-WAN Underlay routes)
SR Policy (draft-ietf-idr-sr-policy-safi) – has only category 2

This message provides the details behind the comparison.  I am grateful for having to do the comparison since it helped me find weak areas in both drafts (draft-idr-sr-policy-safi, and draft-ietf-idr-sdwan-edge-discovery).

The next message will consider whether based on [RFC9012]  text the SDWAN can

  1.  Use the TEA to Identify SDWAN-Hybrid Logical tunnels  (Egress EndPoint address)
  2.  Create the details in an underlay associated with the Egress EndPoint address.

The question for people to consider is

  *   RFC8669 – allowed logical tunnels (identified by Prefix-SID) to be attached to MP-BGP IPv4/Ipv6 Labeled Unicast [RFC4760][RFC8277]
     *   (  The BGP Prefix-SID attribute defined in this document can be attached to prefixes from Multiprotocol BGP IPv4/IPv6 Labeled Unicast  ([RFC4760] [RFC8277])).
  *   SR Policy (draft-ietf-idr-sr-policy-safi) – is created the underlay.

How is this different than the SD-WAN use?

Sue

PS  - It takes me time to write the detailed message.



================

RFC8669:

  The BGP Prefix-SID attribute defined in this document can be attached

   to prefixes from Multiprotocol BGP IPv4/IPv6 Labeled Unicast

   ([RFC4760] [RFC8277]).  Usage of the BGP Prefix-SID attribute for

   other Address Family Identifier (AFI) / Subsequent Address Family

   Identifier (SAFI) combinations is not defined herein but may be

   specified in future specifications.


From: Susan Hares
Sent: Wednesday, February 28, 2024 3:01 PM
To: 'Linda Dunbar' <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>; John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Cc: draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>; Keyur Patel <keyur@arrcus.com<mailto:keyur@arrcus.com>>; Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>
Subject: RE: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community - Offline discussion message #1

Linda, John, and Co-authors:

I am moving this offline due to IDR WG LC this week.  As indicated in my long message, I am structuring this discussion in the following steps:


  1.  Client Routes  Tunnel Encaps Attribute with SD-WAN Hybrid – is just another tunnel [Last message]



The SubTLV on IP-Sec  Sub-TLVs gives information security encapsulation over the logical tunnel.

The Extended Port Sub-TLV gives information about the links bound into the logical tunnel.


  1.  SDWAN Underlay routes mechanism are similar to the SR Policy underlay [This message]



SD-WAN NLRI (Port-id, Color, N) + TEA  (SD-WAN-Hybrid)  is similar to SR Policy Mechanisms (draft-ietf-idr-sr-policy-safi) [this email message]

SR Policy usage of SR Policy NLRI + SR Policy TEA (tunnel type = SR Policy)  ~= SD-WAN NLRI + SD-WAN-Hybrid tunnel.


  1.  What Should go Client routes versus Infrastructure routes?  [next email message]
Option 1: Full TEA
Option 2: TEA with just Hybrid Tunnel identifier

Please let me know if I am helping clarify the issues.

Sue

=================
Recap from last message:

SD-WAN NLRI – giving the (Port-ID, Color, N) + TEA attribute

  *   NLRI – identifies the Hybrid tunnel + Port  (Port-ID, Color, N) –
Port-Id – uniquely identifies sub-tunnel within the logical tunnel (zero – means all sub-tunnels)
Logical tunnel-ID -  (C = Color, N = Tunnel End Pont)

  *   TEA – provides updates per port.  A special case (address = 0/0) allows for the updates to apply to all ports.

SR Policy Tunnel is similar in format:

Use-1:  SR Policy tunnel (draft-ietf-idr-sr-policy-safi) (tunnel-type 15)
SR-Policy logical tunnels are identified by SR Policy NLRI.  The sub-tunnels are identified by Tunnel Encaps Tunnel type.

BGP Definition from  [draft-ietf-idr-sr-policy-safi-00] (was te-policy)

  *   SR Policy NLRI (Distinguisher, Policy-Color, Endpoint) [AFI/SAFI = 1/73, 2/72]
     *   Distinguisher – 4 octet uniquely identifying the Policy
     *   Color – 4 octet color
     *   Endpoint -  Address (IPv4, IPv6) or zero (all per color)

SR-Policy Identifier:  [Headend, Color, EndPoint] – Uniquely identifying the Policy
SR Candidate Path Route identifier:  [Protocol, Originator, Discriminator] – for BGP = [BGP, Node-Originating, discriminator]  (section 2.6 of RFC9256]



  *   SR Policy Tunnel-Encaps Attribute (23)

 Tunnel Type: SR Policy (15)

  TLVS:

     *   Binding SID – (optional, only 1)  SID that uniquely identifiers active candidate path [processed by SRPM]
     *   SRv6 Binding SID – (optional, multiple) - SRv6 Binding SID identifies SR Candidate Path.
     *   Preference (optional, only 1) – preference for a particular SR Candidate Path
     *   Priority (optional, only 1) – order in which the SR Policy [not the SR Candidate Path Priority)
     *   Policy Name (optional, only 1) – symbolic name for SR Policy
     *   Policy Candidate Path Name (optional, 1) – symbolic name for SR Candidate Path
     *   Explicit NULL Label Policy (optional, 1) – [Encapsulation policy) Null Label stack handling for unlabeled IPv4 traffic and unlabeled IPv6 traffic when steering over SR-MPLS
     *   Segment List – (optional, multiple) – Each segment-list may have many segments + a weight for the segment-list. Currently only segment types A (SR-MPLS) + B (SRv6 SID)
        *   Sub-TLVS – segment list + Weight

Common concepts between draft-ietf-idr-sr-policy-safi  + draft-ietf-idr-sdwan-edge-discovery


  *   NLRI identifies the logical end of the hybrid logical tunnel.
     *   SR Policy NLRI  (D, C, E)  identifies the headend of the tunnel – from which the segment list traverse to the egress point.  No validation via TEA [RFC9012] procedures. Only the SRPM validates the tunnel’s existence.
     *   SD-WAN identifies (Port-id, C, E) – identifies egress point of the tunnel which decapsulates the tunnel information.  TEA procedures validate end-point of tunnel.
  *   TEA provides additional details on the logical tunnel
     *   SR Policy tunnel type
        *   For SR-MPLS (logical tunnel) - SR Candidate Route is identified by a SRv6 Binding Sid.   Requires Segment list + Explicit Null level for appropriate functioning.
        *    For SR-v6 (logical tunnel) – SR Candidate Route is identified by SR Binding SID.     Logical tunnel is augmented by SRv6 behaviors.  Requires Segment list + Logical behaviors.
        *   For all – parameters for calculation in the SRPM.
     *   SD-WAN tunnel type
        *   For MPLS – identifies link,
        *   For IP – Identifies the port

Shepherd’s comment on Problems in the draft-ietf-idr-sr-policy-safi issues:

  *   NLRI’s
     *   NLRI Distinguisher – defined as “4 octet uniquely identifying the Policy” [draft-ietf-idr-sr-policy-safi] instead of the “The headend is the node where the policy is instantiated/implemented.” [section 2.1, RFC9252]
     *   SR Policy priority – Why is SR Policy priority on the Candidate Paths rather than the SR Policy? Is there some operational issue?
  *   TEA definitions:
     *   Each SR Policy Candidate paths – may have multiple segment list TLVs
     *   Multiple SR Policy Candidate Paths with only 1 active Candidate path.
        *   SRv6 Binding SID – indicates that multiple SRv6 Binding SIDs are possible with the rest of the parameters common.
        *   Based on this data, the SRPM may create many logical sub-tunnels within 1 SR Candidate Path.
     *   Debugging of the SR Candidate Paths (NLRI + TEA) does not have direct links between BGP packets --- and Active candidate paths.
        *   How does debugging work?
        *   What happens if information from BGP --> SRPM is not correctly copied?  What link?

Author’s comments on the draft-ietf-idr-sdwan-edge-discovery

  *   The usage of  SD-WAN NLRI + TEA are similar to SR Policy Candidate Routes.
     *   SDWAN Tunnel - uses validation of path to Egress Node of tunnel.
     *   SR Policy requires – SRPM must be used to validate SR Candidate Paths
  *   Question: Are the sub-tunnels identified clearly in the Extended Port Attribute? Do we need sub-tunnel identifiers

==========================
Definitions from RFC9256:

SR Policy [RFC9256] – logical tunnel (section 2)
“The general concept of SR Policy provides a framework that enables the instantiation of an ordered list of segments on a node for implementing a source routing policy for the steering of traffic for a specific purpose (e.g., for a specific Service Level Agreement (SLA)) from that node.”

Identification of SR Policy:  [RFC9256] – [Headend, Color, EndPoint] (section 2.1)
An SR Policy MUST be identified through the tuple <Headend, Color, Endpoint>. In the context of a specific headend, an SR Policy MUST be identified by the <Color, Endpoint> tuple. The headend is the node where the policy is instantiated/implemented. The headend is specified as an IPv4 or IPv6 address and MUST resolve to a unique node in the SR domain [RFC8402].

SR Policy  a logical tunnel that combines multiple sub-tunnels. [RFC9256]
An SR Policy is associated with one or more candidate paths. A candidate path is the unit for signaling of an SR Policy to a headend via protocol extensions like the Path Computation Element Communication Protocol (PCEP) [RFC8664<https://www.rfc-editor.org/rfc/rfc9256.html#RFC8664>] [PCEP-SR-POLICY-CP<https://www.rfc-editor.org/rfc/rfc9256.html#I-D.ietf-pce-segment-routing-policy-cp>] or BGP SR Policy [BGP-SR-POLICY<https://www.rfc-editor.org/rfc/rfc9256.html#I-D.ietf-idr-segment-routing-te-policy>].

Identification of a Candidate Path [RFC9256] -  A candidate path is identified in the context of a single SR Policy. The tuple <Protocol-Origin, Originator, Discriminator> uniquely identifies a candidate path.
[note: BGP, Node-Originating, discriminator]

BSID - Each candidate path MAY be defined with a BSID.  The BSID of an SR Policy is the BSID of its active candidate path.

  *   Candidate paths of the same SR Policy SHOULD have the same BSID.
  *   Candidate paths of different SR Policies MUST NOT have the same BSID.

Priority of an SR Policy (section 2.12, RFC9256)
“Upon topological change, many policies could be re-computed or revalidated. An implementation MAY provide a per-policy priority configuration. The operator may set this field to indicate the order in which the policies should be re-computed. Such a priority is represented by an integer in the range (0, 255) where the lowest value is the highest priority. The default value of priority is 128.

[Section 2.2] An SR Policy may comprise multiple candidate paths received from the same or different sources. A candidate path MAY be signaled with a priority value. When an SR Policy has multiple candidate paths with distinct signaled non-default priority values and the SR Policy itself does not have a priority value configured, the SR Policy as a whole takes the lowest value (i.e., the highest priority) amongst these signaled priority values.

[Section 4.4] Use of Explicit Null Label Policy:
When steering unlabeled IPv6 BGP destination traffic using an SR Policy composed of segment list(s) based on IPv4 SIDs, the Explicit Null Label Policy is processed as specified in [BGP-SR-POLICY<https://www.rfc-editor.org/rfc/rfc9256.html#I-D.ietf-idr-segment-routing-te-policy>] (now draft-ietf-idr-sr-policy-safi-00)
When an "IPv6 Explicit NULL label" is not present as the bottom label, the headend SHOULD automatically impose one. Refer to Section 8<https://www.rfc-editor.org/rfc/rfc9256.html#Steering> [RFC9256] for more details.

Definitions from [draft-ietf-idr-sr-policy-safi-00

  *   SR Policy SAFI - Distinguisher: 4-octet value uniquely identifying the policy in the context of <color, endpoint> tuple. The distinguisher has no semantic value and is solely used by the SR Policy originator to make unique (from an NLRI perspective) both for multiple candidate paths of the same SR Policy as well as candidate paths of different SR Policies (i.e. with different segment lists) with the same Color and Endpoint but meant for different headends.
  *   “The SRv6 Binding SID sub-TLV is used to signal the SRv6 Binding SID related information of an SR Policy candidate path. It enables the specification of the SRv6 Endpoint Behavior [RFC8986] to be instantiated on the headend node. The contents of this sub-TLV are used by the SRPM as described in section 6 in [RFC9256].  The SRv6 Binding SID sub-TLV is optional. More than one SRv6 Binding SID sub-TLVs MAY be signaled in the same SR Policy encoding to indicate one or more SRv6 SIDs, each with potentially different SRv6 Endpoint Behaviors to be instantiated.”
  *   Policy Priority SubTLV -  An operator MAY set the Policy Priority sub-TLV to indicate the order in which the SR policies are re-computed upon topological change. The contents of this sub-TLV are used by the SRPM as described in section 2.12 of [RFC9256<https://www.ietf.org/archive/id/draft-ietf-idr-sr-policy-safi-00.html#RFC9256>].



From: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Sent: Tuesday, February 27, 2024 6:04 PM
To: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Cc: idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: RE: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

John The Encapsulation Extended Community is only in the client routes BGP UPDATE, which is the BGP-based VPN/EVPN client routes UPDATE message. There are no sub-TLVs added. Section 6's first paragrap
External (linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>)
  Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tLzdhMzQyYmVkMzM4MDhlODk2NWM2ZjAzN2I4ZGUzZDJjLzE3MDkwNzUwMjQuOTY=#key=8af5eb05b3d0f7cdb95fe5e54f3da7cb>  FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>  GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky>

John

The  Encapsulation Extended Community is only in the client routes BGP UPDATE, which is the BGP-based VPN/EVPN client routes UPDATE message. There are no sub-TLVs added. Section 6's first paragraph states the Client Route UPDATE follows the BGP-based VPN/EVPN client route UPDATE message..

The sub-TLVs discussed in the draft are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) which DOES NOT have Encapsulation Extended Community for SD-WAN edges to advertise the information about their WAN ports. Please see below for the details.

p.s. Are you referring to version-20?

Linda
-----Original Message-----
From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 2:42 PM
To: draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Authors, WG,

I just noticed draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Community can be used, and I thought you should be aware of it. TL;DR, you’re specifying the use of SD-WAN-Hybrid tunnel type in an Encapsulation Extended Community, but this isn’t allowed. Details follow.

[Linda] That is just an example for needing a different Tunnel Type in the Encapsulation Extended Community

- RFC 9012, Section 4.1 tells us that the only permissible use of the Encapsulation Extended Community is when there are *no sub-TLVs*, other than the Address Family sub-TLV (item 3 in the list of conditions).
[Linda] That is our understanding as well. This document doesn’t specify additional sub-TLVs to be added to the BGP UPDATE with the Encapsulation Extended Community.

- In draft-ietf-idr-sdwan-edge-discovery-12 Section 6.3 we see the definition of the IPsec-SA-ID Sub-TLV of the SD-WAN-Hybrid tunnel type. This seems pretty central to the purpose of the spec. So, the SD-WAN-Hybrid tunnel type does have sub-TLVs in addition to the Address Family, and therefore MUST NOT be used in an Encapsulation Extended Community.
[Linda] All those sub-TLVs are NOT used with Encapsulation Extended Community. Those Sub-TLVs are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) for SD-WAN edges to advertise the information about their WAN ports. There is no Encapsulation Extended Community included when an edge node advertises its WAN port information. Please see Section 5 for BGP Walk Through details.

- Also, in draft-ietf-idr-sdwan-edge-discovery-12 Section 5.1 we see that the client route update uses the Encapsulation Extended Community (emphasis added):

[Linda] The Client Route UPDATE can use the Extended Community to indicate that their associated tunnel information is advertised by separate UDPATE. The purpose is to reduce the size of the Clint Route UPDATE message size because the tunnel associated with IPsec has a lot of information to be exchanged. They don’t change at the same frequency as the Client Routes.
```
5.  Client Route UPDATE

   The SD-WAN network's Client Route UPDATE message is the same as the
   L3 VPN or EVPN client route UDPATE message.  The SD-WAN Client Route
   UPDATE message uses the **Encapsulation Extended Community** and the
   Color Extended Community to link with the SD-WAN Underlay UPDATE
   Message.
```

- It’s clear from other parts of the spec that the tunnel type is SD-WAN-Hybrid, for example, this is both stated in Section 3.3, and then used in the example (same section).
[Linda] The Client Route Update message is NOT using RFC9012. Here is to indicate that another type might be needed. As this is a BGP usage draft, with the intent to explain how to use BGP, with the justification to BGP extension later.

- But RFC 9012 §4.1 told us we can’t use a tunnel type with sub-TLVs as an Encapsulation Extended Community!
[Linda] The Client Route Update message is NOT using RFC9012.

I think what you really must be trying to do is use the Tunnel Encapsulation attribute (only!) to carry the SD-WAN-Hybrid in the SD-WAN Underlay route, and then have the client routes making use of that tunnel recurse into the underlay route (including tunnel) as per RFC 9012 Section 8. Note that Section 8 does NOT require that the client route carry the Encapsulation Extended Community — the next hop address is both necessary and sufficient to effectuate the linkage to the underlay route.
[Linda] You are correct. The Tunnel Encapsulation Attribute is used to carry the SD-WAN-Hybrid for SD-WAN edge nodes to advertise the WAN ports (i.e. the under route).



Thanks,

—John