Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Susan Hares <shares@ndzh.com> Wed, 28 February 2024 21:56 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA3F1C14F5FA; Wed, 28 Feb 2024 13:56:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9RwR11R3kZlN; Wed, 28 Feb 2024 13:55:58 -0800 (PST)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2100.outbound.protection.outlook.com [40.107.236.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D298C14F5F7; Wed, 28 Feb 2024 13:55:58 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YIR8ZbBY+tAT0YVms9UbCyZAn86K2gobH/p7UmGRyXyNMGnV/NqFAcrnStSP+aZBgFbcAdccv4izg+vidl1T3HEoX4N27X/+BfMysDQuzf4LjZqA0+vbXvCFO9U8p627igKQVyEX4i5bAlBPhpWRmZtgPo+1j4/e7mn93UDKNCmXxCW4heX8wnRm0dqjZCi2rk3pRUuO8ethlIZPqKvLFLSV47yR/zpKDjggtfHyM8XChnT/mTZ1qC/xOkWS2uyncEI/Ycu2HImOPn/bC5sl+n0zsWBmwvfO4+oz3jehSgjuibVCA5fWygyMbCFoDQclvL5+LK5ft2pMToTz+BeOaQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YzxB8MGHxSb9dH7M4VGdmitQK1n+uhFz+OYwdIiIr6Q=; b=Rmv0EGlEPQ95FBh5nKP2IQU9nR6gbeuayynXjtaCBY3Y1tyQXERylo35TUuQTdBPTq7/6lqxy7n7Ykr5kc457uGqaaUezhkiAemdgWQa9UBEM5u1feAkfpw3V/Wem/33QOj6NttHi3AaYhXOX/B/4xnkzejoJL8l2Bn1yPXpDiNxN6BkWuHJOwbabl15AQaSRjQIM07p6eQ3aTT2pjeVBm73Oh6mui2lJ/XfYYeB47ZMmDOC3W4j0nCJy5HOD1KWzCjUMVATqBRLdSI9loUr/BIfahJd5rmIV+lyl+QXXJ6ZuOipj84zNTGsLxC1lpg6gKqzINgQohga7LwPjfrbCQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 104.47.55.168) smtp.rcpttodomain=futurewei.com smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=none (0)
Received: from SJ0PR03CA0265.namprd03.prod.outlook.com (2603:10b6:a03:3a0::30) by PH0PR08MB7607.namprd08.prod.outlook.com (2603:10b6:510:106::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.36; Wed, 28 Feb 2024 21:55:54 +0000
Received: from MW2NAM12FT101.eop-nam12.prod.protection.outlook.com (2603:10b6:a03:3a0:cafe::3e) by SJ0PR03CA0265.outlook.office365.com (2603:10b6:a03:3a0::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.27 via Frontend Transport; Wed, 28 Feb 2024 21:55:54 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.55.168) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.55.168 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.55.168; helo=NAM12-BN8-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (44.224.15.38) by MW2NAM12FT101.mail.protection.outlook.com (10.13.181.220) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7339.25 via Frontend Transport; Wed, 28 Feb 2024 21:55:53 +0000
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12lp2168.outbound.protection.outlook.com [104.47.55.168]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id 68621C35AA; Wed, 28 Feb 2024 21:55:52 +0000 (UTC)
Received: from DM6PR08MB4857.namprd08.prod.outlook.com (2603:10b6:5:44::25) by CO1PR08MB6740.namprd08.prod.outlook.com (2603:10b6:303:9a::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 21:55:49 +0000
Received: from DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e]) by DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e%6]) with mapi id 15.20.7316.039; Wed, 28 Feb 2024 21:55:49 +0000
From: Susan Hares <shares@ndzh.com>
To: Linda Dunbar <linda.dunbar@futurewei.com>, John Scudder <jgs@juniper.net>
CC: "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1aJbLjWCwZYUyhASue85C1X7EewhRQgAAOvwCAAAHU0IABbprw
Date: Wed, 28 Feb 2024 21:55:48 +0000
Message-ID: <DM6PR08MB4857F124FA4CE1583505C585B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com>
In-Reply-To: <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-traffictypediagnostic: DM6PR08MB4857:EE_|CO1PR08MB6740:EE_|MW2NAM12FT101:EE_|PH0PR08MB7607:EE_
X-MS-Office365-Filtering-Correlation-Id: 130ca824-55ae-4538-7de3-08dc38a8090b
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4857.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB4857F124FA4CE1583505C585B3582DM6PR08MB4857namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR08MB6740
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.55.168]; domain=NAM12-BN8-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.55.168]; domain=NAM12-BN8-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: MW2NAM12FT101.eop-nam12.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 2a7cf032-c6d8-4bbf-d4c4-08dc38a8063c
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:44.224.15.38; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:NAM12-BN8-obe.outbound.protection.outlook.com; PTR:mail-bn8nam12lp2168.outbound.protection.outlook.com; CAT:NONE; SFS:(13230031)(36860700004)(82310400014); DIR:OUT; SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2024 21:55:53.6552 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 130ca824-55ae-4538-7de3-08dc38a8090b
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5; Ip=[44.224.15.38]; Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: MW2NAM12FT101.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR08MB7607
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/P-kB6OQrnJVyzI8Bsp5rWfCxbmA>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 21:56:02 -0000

Linda and John:

Thank you for digging into these points.!!  The first insertion of the Tunnel-Encapsulation Attribute was painful and took lots of work.  These new tunnel types require considerable thought.

Let’s pick up the attached email thread.  Please look at my discussion after I sent my second summary message.  I am looking at the email thread before I send my third message.

The client shown in section 3.3 have

  *   AFI/SAFI =  (1/128),
  *   Color = 4 octet value (site-identifier) [Extended Community]
  *   Prefixes 10,1.1/24, 20.1.1/24, Next-Hop - 2.2.2.2

If you used the Tunnel Encaps attribute, it would contain:

  *   Tunnel type = SD-Wan-Hybrid
  *   Egress-EndPoint TLV = 2.2.2.2

The Client routes simply look like a logical tunnel (from 1.1.1.1 to 2.2.2.2).

Note: Please note the TEA would have 1 TLVs – the Egress Endpoint.
The SDWAN procedures need to clearly state what happens if Color is specified in TEA (subTLV Color) + Extended Community [Color-EC}.
This issue requires a revision to the draft-ietf-sdwan-edge-discovery text.

The question is whether it is valid to use TEA with 1/128 (VPN Labeled Unicast)

[RFC9012] states”
6.  Semantics and Usage of the Tunnel Encapsulation Attribute

   The BGP Tunnel Encapsulation attribute MAY be carried in any BGP
   UPDATE message whose AFI/SAFI is 1/1 (IPv4 Unicast), 2/1 (IPv6
   Unicast), 1/4 (IPv4 Labeled Unicast), 2/4 (IPv6 Labeled Unicast),
   1/128 (VPN-IPv4 Labeled Unicast), 2/128 (VPN-IPv6 Labeled Unicast),
   or 25/70 (Ethernet VPN, usually known as EVPN).  Use of the Tunnel
   Encapsulation attribute in BGP UPDATE messages of other AFI/SAFIs is
   outside the scope of this document.

Note: This is John’s concern. There are two questions to ask:


1.  Is the usage (NLRI + TEA (Type = SDWAN-Hybrid, TLV=Egress Endpoint) valid according to RFC9012.

If you do not specify encapsulation in the customer route (NLRI (1/128) + TEA(tunnel = SDWAN-Hybrid, Egress Endpoint), then no procedures are directly broken.

At least section 6, 8

RFC 9012 (section 6)

   The full set of procedures for sending a packet through a particular

   tunnel type to a particular tunnel egress endpoint depends upon the

   tunnel type and is outside the scope of this document.  Note that

   some tunnel types may require the execution of an explicit tunnel

   setup protocol before they can be used for carrying data.  Other

   tunnel types may not require any tunnel setup protocol.



   Sending a packet through a tunnel always requires that the packet be

   encapsulated, with an encapsulation header that is appropriate for

   the tunnel type.  The contents of the tunnel encapsulation header may

   be influenced by the Encapsulation sub-TLV.  If there is no

   Encapsulation sub-TLV present, the router transmitting the packet

   through the tunnel must have a priori knowledge (for example, by

   provisioning) of how to fill in the various fields in the

   encapsulation header.



2.  How is the client usage different BGP SID-Prefix [RFC8669]?

RFC8669:

   The BGP Prefix-SID attribute defined in this document can be attached

   to prefixes from Multiprotocol BGP IPv4/IPv6 Labeled Unicast

   ([RFC4760] [RFC8277]).  Usage of the BGP Prefix-SID attribute for

   other Address Family Identifier (AFI) / Subsequent Address Family

   Identifier (SAFI) combinations is not defined herein but may be

   specified in future specifications.

The BGP SID-Prefix identified a logical tunnel (SR Policy) for AFI/SAFI Labeled Unicast [RFC4760] or [RFC8277].

draft-ietf-idr-sr-policy-safi – will pass the underlay information for this logical tunnel (SR Policy)

Why is the use of BGP Prefix-SID RFC8669 valid,  and the SD-WAN-Hybrid Tunnel invalid?

This is not a light question. Consider based on the information contained - why one is valid and the other is invalid.

  *   Is it because the BGP prefix-SID is in another attribute outside the TEA?
  *   Is that really different?  The SR Policy tunnel type of the TEA passes the SID

It would be good to hear why John thinks the use case is invalid.

Sue

From: Linda Dunbar <linda.dunbar@futurewei.com>
Sent: Tuesday, February 27, 2024 6:35 PM
To: John Scudder <jgs@juniper.net>
Cc: idr@ietf.org; draft-ietf-idr-sdwan-edge-discovery@ietf.org
Subject: RE: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

John, See the answers below:  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌  ‌
External (linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>)
  Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tLzM4MWNjNDBlYTU2ZDUxYmFkNzhiZWQ2ZDA5NjI0NGY2LzE3MDkwNzY5MjAuMjQ=#key=6180d353fbc8c3f9aee37c35f9153722>  FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>  GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky>

John,

See the answers below:

-----Original Message-----
From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 5:10 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Linda,

What are the semantics of a Tunnel Encapsulation path attribute, with tunnel type = SD-WAN-Hybrid, and no sub-TLVs other than egress endpoint?

[Linda] There ARE sub-TLVs under the Tunnel Encapsulation Path Attribute, which specifies the detailed attributes associated with the IPsec tunnel for the SD-WAN Edge’s WAN Ports. I am trying to say that there are NO sub-TLVs under the client routes UPDATE (which has Encapsulation Extended Community)

draft-ietf-bess-bgp-sdwan-usage-20 describe how to use BGP,  stating There are two UPDATE2:
1) UPDATE 1 is for Client Route UPDATE (which follows the traditional BGP-based client routes)
2) UPDATE 2 for the Edges to advertise the WAN port information. In the UPDATE2, the Route prefix is the WAN port address.

draft-ietf-idr-sdwan-edge-discovery-12 specifies the detailed BGP extension for UPDDATE2. The UPDATE 2 has Tunnel Encapsulation Path Attribute with a new NLRI for Underlay Tunnel Update and the sub-TLVs specified in the document.

Linda

—John

> On Feb 27, 2024, at 6:03 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
>
>
> [External Email. Be cautious of content]
>
>
> John  The  Encapsulation Extended Community is only in the client routes BGP UPDATE, which is the BGP-based VPN/EVPN client routes UPDATE message. There are no sub-TLVs added. Section 6's first paragraph states the Client Route UPDATE follows the BGP-based VPN/EVPN client route UPDATE message..  The sub-TLVs discussed in the draft are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) which DOES NOT have Encapsulation Extended Community for SD-WAN edges to advertise the information about their WAN ports. Please see below for the details.
>  p.s. Are you referring to version-20?   Linda
> -----Original Message-----
> From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
> Sent: Tuesday, February 27, 2024 2:42 PM
> To: draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
> Cc: idr@ietf.org<mailto:idr@ietf.org>
> Subject: Error in draft-ietf-idr-sdwan-edge-discovery use of
> Encapsulation Extended Community  Hi Authors, WG,  I just noticed
> draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Community can be used, and I thought you should be aware of it. TL;DR, you’re specifying the use of SD-WAN-Hybrid tunnel type in an Encapsulation Extended Community, but this isn’t allowed. Details follow.
>  [Linda] That is just an example for needing a different Tunnel Type
> in the Encapsulation Extended Community
>  - RFC 9012, Section 4.1 tells us that the only permissible use of the Encapsulation Extended Community is when there are *no sub-TLVs*, other than the Address Family sub-TLV (item 3 in the list of conditions).
> [Linda] That is our understanding as well. This document doesn’t specify additional sub-TLVs to be added to the BGP UPDATE with the Encapsulation Extended Community.
>  - In draft-ietf-idr-sdwan-edge-discovery-12 Section 6.3 we see the definition of the IPsec-SA-ID Sub-TLV of the SD-WAN-Hybrid tunnel type. This seems pretty central to the purpose of the spec. So, the SD-WAN-Hybrid tunnel type does have sub-TLVs in addition to the Address Family, and therefore MUST NOT be used in an Encapsulation Extended Community.
> [Linda] All those sub-TLVs are NOT used with Encapsulation Extended Community. Those Sub-TLVs are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) for SD-WAN edges to advertise the information about their WAN ports. There is no Encapsulation Extended Community included when an edge node advertises its WAN port information. Please see Section 5 for BGP Walk Through details.
>  - Also, in draft-ietf-idr-sdwan-edge-discovery-12 Section 5.1 we see that the client route update uses the Encapsulation Extended Community (emphasis added):
>  [Linda] The Client Route UPDATE can use the Extended Community to indicate that their associated tunnel information is advertised by separate UDPATE. The purpose is to reduce the size of the Clint Route UPDATE message size because the tunnel associated with IPsec has a lot of information to be exchanged. They don’t change at the same frequency as the Client Routes.
> ```
> 5.  Client Route UPDATE
>     The SD-WAN network's Client Route UPDATE message is the same as the
>    L3 VPN or EVPN client route UDPATE message.  The SD-WAN Client Route
>    UPDATE message uses the **Encapsulation Extended Community** and the
>    Color Extended Community to link with the SD-WAN Underlay UPDATE
>    Message.
> ```
>  - It’s clear from other parts of the spec that the tunnel type is SD-WAN-Hybrid, for example, this is both stated in Section 3.3, and then used in the example (same section).
> [Linda] The Client Route Update message is NOT using RFC9012. Here is to indicate that another type might be needed. As this is a BGP usage draft, with the intent to explain how to use BGP, with the justification to BGP extension later.  - But RFC 9012 §4.1 told us we can’t use a tunnel type with sub-TLVs as an Encapsulation Extended Community!
> [Linda] The Client Route Update message is NOT using RFC9012.
>  I think what you really must be trying to do is use the Tunnel Encapsulation attribute (only!) to carry the SD-WAN-Hybrid in the SD-WAN Underlay route, and then have the client routes making use of that tunnel recurse into the underlay route (including tunnel) as per RFC 9012 Section 8. Note that Section 8 does NOT require that the client route carry the Encapsulation Extended Community — the next hop address is both necessary and sufficient to effectuate the linkage to the underlay route.
> [Linda] You are correct. The Tunnel Encapsulation Attribute is used to carry the SD-WAN-Hybrid for SD-WAN edge nodes to advertise the WAN ports (i.e. the under route).
>    Thanks,
>  —John