Re: [Idr] draft-hujun-idr-bgp-ipsec

Robert Raszuk <robert@raszuk.net> Fri, 08 March 2019 23:19 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8ECC1277E7 for <idr@ietfa.amsl.com>; Fri, 8 Mar 2019 15:19:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RP2loDKQuc_B for <idr@ietfa.amsl.com>; Fri, 8 Mar 2019 15:19:13 -0800 (PST)
Received: from mail-qt1-x835.google.com (mail-qt1-x835.google.com [IPv6:2607:f8b0:4864:20::835]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DB8C1277DB for <idr@ietf.org>; Fri, 8 Mar 2019 15:19:12 -0800 (PST)
Received: by mail-qt1-x835.google.com with SMTP id z39so23176235qtz.0 for <idr@ietf.org>; Fri, 08 Mar 2019 15:19:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=juC05y/lkLuDiT0juLagYHuaCsdt13DhO33pqxBxHws=; b=A1fAdZOgCHznjiREvvPkn+rLdbgevBUGdTHsav9GXUC0FezH4T1GgwoKPQygYOOdzb cBeImqTxA5ZpidWEVIEYkrscvv38qqqaztEK/felivxEseQ8PTEaI50c0zd448TWEp6o ecDg2RAm1UbseSmeknVwEkJsYoiHldEy6YpDv0Ex+hUIVeljv+QLHAjo20CW6nKedccb eqr648h8DLzk5BOo8W3pcMOeWZxE4pmY1bo7DUmLDXkdjJMtNitmNhm1h+/TbpTZwMS7 5SIqJ42aYZZlClLKo/bPRXUe/DvTLjCBRGTUPS0K8/aIaM6KYwLVN1uQH21BWWCea4nd aTaA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=juC05y/lkLuDiT0juLagYHuaCsdt13DhO33pqxBxHws=; b=TM5pV4w2X2EKion8KLUMrdi+q1C4YBOVMrWgYwjEKtZ7pAaqN5QFHFlvSEFFu4mYPH ZLFWLh9/4W+zYEUBdnoYt/DLz+t8njts1hergq1FviCqzRbivAcrZOcwJNByREq+MSTG xMB5D7ptuDyOYp7C5oDMW+MkkSupDLTFCJLN6whRvO9oSAGSfs42eIXQI9qbd+AEezlk 34DNcIurSJRBFBVHpyElQdEekWdy7jvK/akYl5WM0r3fWtSYPbiWKZQ5PkM2w5V55cYE swEdpn5XZfVOVzNniBFD+lVLWZjsfU72JdwBbqhB4g3Y1t8I51KNePiiyk1B8/7FaR0O OLJw==
X-Gm-Message-State: APjAAAW8E9zO6WvCIM/T3WKXHEOL6ZVB2s9p4khjUGnoXUnhiMgu7918 3v6KDeOElZLJyJqp68yZGQUvyVjHjMiOYWKJ/EwZfA==
X-Google-Smtp-Source: APXvYqy45fq8UAmwSSZGz7HikBR6tMc0xZVzyCkVYnkrw6jFjX8jvuzv296PDNk5EZfNmbSJIMVoQS/hoh5Zuxknuos=
X-Received: by 2002:ac8:3f98:: with SMTP id d24mr16525111qtk.219.1552087151960; Fri, 08 Mar 2019 15:19:11 -0800 (PST)
MIME-Version: 1.0
References: <CAOj+MMGYYO-0CmnGeXMfRo+VnVV0pYdyrR-ds56mqoRoLsh8Ew@mail.gmail.com> <PR1PR07MB5755FF20AC4C0309ED2B170D954D0@PR1PR07MB5755.eurprd07.prod.outlook.com> <CAOj+MMGmqx5+p4ZyjaKpQ-2+83kFBqUmT6XvnwHNnd9-0K735Q@mail.gmail.com> <PR1PR07MB57559863F4ABDF1C509B2EAE954D0@PR1PR07MB5755.eurprd07.prod.outlook.com>
In-Reply-To: <PR1PR07MB57559863F4ABDF1C509B2EAE954D0@PR1PR07MB5755.eurprd07.prod.outlook.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Sat, 09 Mar 2019 00:19:02 +0100
Message-ID: <CAOj+MME-wJVFZGVXXH9aVoPKy59TxGjLAGvB10S9P4sLtZoLwA@mail.gmail.com>
To: "Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com>
Cc: "idr@ietf. org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005a7b2d05839d7313"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Knnc1WFjjn2ANcQnI-vrROyXmgE>
Subject: Re: [Idr] draft-hujun-idr-bgp-ipsec
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Mar 2019 23:19:16 -0000

Hi,

I think that the references are a bit wrong. And the confusion may be not
even your own fault,
but IETF process related.

I was looking for type 4 tunnel type in your normative reference but there
is none.

[I-D.ietf-idr-tunnel-encaps]
              Rosen, E., Patel, K., and G. Velde, "The BGP Tunnel
              Encapsulation Attribute",
draft-ietf-idr-tunnel-encaps-11
<https://tools.ietf.org/html/draft-ietf-idr-tunnel-encaps-11>
              (work in progress), February 2019.


The reference your text may be referring to is perhaps RFC5566 instead

since this is where type 4 for IPSec in Tunnel mode was defined.
Different document.


Unfortunately 5566 relied on 5512 which is obsoleted now. And we never

concluded how any references to 5566 should be now handled.


1.4 <https://tools.ietf.org/html/draft-ietf-idr-tunnel-encaps-11#section-1.4>.
Impact on RFC 5566 <https://tools.ietf.org/html/rfc5566>

   [RFC5566] uses the mechanisms defined in [RFC5512
<https://tools.ietf.org/html/rfc5512>].  While this
   document obsoletes [RFC5512 <https://tools.ietf.org/html/rfc5512>],
it does not address the issue of how to
   use the mechanisms of [RFC5566
<https://tools.ietf.org/html/rfc5566>] without also using the
Encapsulation
   SAFI.  Those issues are considered to be outside the scope of this
   document.

And [I-D.ietf-idr-tunnel-encaps] does not define anything for IPSec.


So bottom line based on the current definition of Tunnel Encapsulation

Attribute I am not sure where and how you want to provide the defined

herein extensions.


Therefor it is now hard to comment on encoding specifics of provided examples

for two IPSec tunnel signalling options till normative references are
sorted out.


Thx,

RR.



On Fri, Mar 8, 2019 at 11:48 PM Hu, Jun (Nokia - US/Mountain View) <
jun.hu@nokia.com> wrote:

> I agree that making remote prefix sub-TLV optional and absence of it means
> ANY is a better idea, will update the draft and example in it;
>
>
>
> To address use case in your email, the BGP update of NLRI prefix C need to
> include a Tunnel Encap attr, which include two IPsec TLVs:
>
>    - IPsec TLV-1: include remote-prefix sub-TLV pA and color sub TLV A
>    - IPsec TLV-2: include remote-prefix sub-TLV pB and color sub TLV B
>
>
>
>
>
> *From:* Robert Raszuk <robert@raszuk.net>
> *Sent:* Friday, March 8, 2019 2:26 PM
> *To:* Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com>
> *Cc:* idr@ietf. org <idr@ietf.org>
> *Subject:* Re: draft-hujun-idr-bgp-ipsec
>
>
>
>
>
> Ok that was not very clear from the draft. While your explanation is good
> - there may be folks who will try to include all remote prefixes as this
> sub-TLV is mandatory. I guess if instead of all zero's you make it also
> optional the room for bad encoding becomes smaller.
>
>
>
> But let's assume that you have two different IPSec encapsulation
> requirements A & B for the same local prefix C and two different remote
> prefixes pA & pB.
>
>
>
> How would you encode it in the single update msg ?
>
>
>
> Thx,
>
> R.
>
>
>
> On Fri, Mar 8, 2019 at 10:31 PM Hu, Jun (Nokia - US/Mountain View) <
> jun.hu@nokia.com> wrote:
>
> Thanks for reviewing the draft;
>
> In your example (500 routers), R2 doesn’t necessary need to advertise 500
> remote prefixes because if R2 doesn’t have 500 different types IPsec
> encapsulation requirements for the NLRI, what it could do it just include a
> single all-zero remote prefix, means traffic from any source destined to
> this NLRI should use this particular IPsec tunnel encapsulation config;
>  and I would expect using all-zero remote prefix would be the common use
> case;
>
>
>
> *From:* Robert Raszuk <robert@raszuk.net>
> *Sent:* Friday, March 8, 2019 12:49 PM
> *To:* Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com>
> *Cc:* idr@ietf. org <idr@ietf.org>
> *Subject:* draft-hujun-idr-bgp-ipsec
>
>
>
> Hi,
>
>
>
> I have read your proposal and have one question.
>
>
>
> The proposed encoding of additional sub-TLVs define local and remote
> prefixes as traffic selectors. Looks great in your example of two end
> points only. But introduction talks about scale so let's consider scale
> factor.
>
>
>
> Assume you have 500 routers in the domain.
>
>
>
> When you advertise subnet B or C from R2 now you need to include in
> mandatory Remote prefix sub-TLV 500 ingress prefixes as for each subnet
> advertised you can only send it once in BGP. Then each ingress PE receiving
> this huge list would need now to store all 500 ingress ACLs (mappings to
> IPSec tunnels) where in fact perhaps realistically only one or two ingress
> traffic subnets may ever be traversing via given edge router.
>
>
>
> And 500 is just following your example where ingress prefixes are directly
> attached to ingress router (subnet A to R1). There can be valid mapping
> cases where such sources are not directly attached.
>
>
>
> This really does not look at all efficient and is prone to generate a lot
> of unnecessary state directly proportional to network size or expected
> incoming src prefix number.
>
>
>
> If you really would like to use p2mp protocol for this configuration push
> I would recommend to leave the current Tunnel Encapsulation Attribute
> unchanged and simply propose to define a new SAFI with proper NLRI syntax
> that it is precisely efficient to the very application you describe.
>
>
>
> Effectively what you are proposing is to carry in BGP src+dst based
> mapping to IPSec tunnel deeply embedding this into sub-TLVs of tunnel
> encapsulation attribute.
>
>
>
> In principle I agree that we do see more and more use cases for src+dst
> based IP lookups both for native forwarding and with some form of
> encapsulation but the proposed nested and not efficient encoding IMO
> requires to be modified to work well in the assumed large scale.
>
>
>
> Thx a lot,
>
> R.
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>