Re: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?

Jeff Tantsura <jefftant.ietf@gmail.com> Mon, 09 July 2018 21:03 UTC

Return-Path: <jefftant.ietf@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC724131023; Mon, 9 Jul 2018 14:03:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 15C8B0YrcN7Z; Mon, 9 Jul 2018 14:03:46 -0700 (PDT)
Received: from mail-yw0-x230.google.com (mail-yw0-x230.google.com [IPv6:2607:f8b0:4002:c05::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80802127332; Mon, 9 Jul 2018 14:03:46 -0700 (PDT)
Received: by mail-yw0-x230.google.com with SMTP id p129-v6so7055190ywg.7; Mon, 09 Jul 2018 14:03:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=user-agent:date:subject:from:to:cc:message-id:thread-topic :references:in-reply-to:mime-version; bh=1KtMntKcGJ6j3QENrbrVzDFun2PLEaSUY2fe5w0ezEo=; b=eakdzPLD5noNHUAEXM1+ouhp/l/BIsCE9XWXA0YdJj4FOL9gPo5tO1F4d3o8nXqyck DnlxpoqAX5Mrwk63sU0POtMhokcD//7kN5SBeu4Hj/CWkPSEKbV5++gND6i1PVN7HegP x+dzS+VphtriY+jsbOQxyOgOtLew1YUYNycs2+Xz6OCoyo0HcEB82LrGAY4Y7Oi2hZ78 O8pyQ4CzmIDm9cF2R8CU05FmWp/GWBXF2gu86DimfcFn27hLxvyIaIqFLc4IUetVM8ef 2xEU6ul76Gq9fT4p2jkVD17VDPvMO40KSvTJIyQHRevFH277UAObqUxn+tUpRPCdxuqE YQ4w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:user-agent:date:subject:from:to:cc:message-id :thread-topic:references:in-reply-to:mime-version; bh=1KtMntKcGJ6j3QENrbrVzDFun2PLEaSUY2fe5w0ezEo=; b=F3xms/+pQ4cpsqKEIrYKsMKznhOwT3ZVRpuV4wwfWJ8ZdoCAUxHIreJApJ6WGofwPD iF1mAPKazdIT38HtYNxRJTxprHpDFSsg+lJy2ha/J7AxITzfkTknfwN/qT6v6dvsCFor g8/yFuW/4dRxGGwLlNEeZe+uLndnjiG5czZjC2aPUsH8Y9y5z/mYfNKSVuPyvVYJLGrY 7yShTkavApVYJPmq2ga6kzpWUfpnYyGadkywU/1jRDmUv0PtPuY/LAe/EWlRbLvt6lLK Q8rnxJLtQlSsz+6vDazrVE/u1fWcN3iaIfNN9RCetTdbC3cOAQOtgyMoBgl1jBpfGRGU PCkw==
X-Gm-Message-State: APt69E0ysowZ3Vj772WndK/pL/gEjHBbfdjxSTMbyXORhTGgJoegs8Co p7/QCPzBRu8BqTrkei3SPQY=
X-Google-Smtp-Source: AAOMgpe61DStqFIhIbywY53rOn3klRzUDVfAY20jCebxfq87P3WUoNPok+wBP3naqdbVL0F2Q/+lKw==
X-Received: by 2002:a0d:f645:: with SMTP id g66-v6mr10494412ywf.253.1531170225663; Mon, 09 Jul 2018 14:03:45 -0700 (PDT)
Received: from [135.227.239.108] ([66.201.62.254]) by smtp.gmail.com with ESMTPSA id x69-v6sm4213415ywx.105.2018.07.09.14.03.44 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 09 Jul 2018 14:03:45 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/10.e.1.180613
Date: Mon, 09 Jul 2018 14:03:42 -0700
From: Jeff Tantsura <jefftant.ietf@gmail.com>
To: Robert Raszuk <robert@raszuk.net>, Linda Dunbar <linda.dunbar@huawei.com>
CC: Eric C Rosen <erosen@juniper.net>, "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-tunnel-encaps@ietf.org" <draft-ietf-idr-tunnel-encaps@ietf.org>
Message-ID: <E2217125-5BAB-4C85-9FF4-4A89B454214C@gmail.com>
Thread-Topic: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?
References: <78D707C9-6DC2-459F-81E4-A53B46F1F019@gmail.com> <4A95BA014132FF49AE685FAB4B9F17F66B0A8BCC@sjceml521-mbs.china.huawei.com> <DF0D0CFA-AFCA-44FF-ADD8-BE6EDC51AFEA@gmail.com> <4A95BA014132FF49AE685FAB4B9F17F66B0A8BEF@sjceml521-mbs.china.huawei.com> <CA+b+ERmENsva=5ZT_4x8+NaokXCpBEN+LTU0xwhN_W4cvmOsqQ@mail.gmail.com>
In-Reply-To: <CA+b+ERmENsva=5ZT_4x8+NaokXCpBEN+LTU0xwhN_W4cvmOsqQ@mail.gmail.com>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3613989824_2131015411"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Q1FCakzXuy3IRtW8JG9b9cBfeKg>
Subject: Re: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Jul 2018 21:03:50 -0000

Yes Robert, exactly and such I would question the use of BGP (KitchenSinkProtocol) to do so in general

 

Cheers,

Jeff

 

From: <rraszuk@gmail.com> on behalf of Robert Raszuk <robert@raszuk.net>
Date: Monday, July 9, 2018 at 13:53
To: Linda Dunbar <linda.dunbar@huawei.com>
Cc: Jeff Tantsura <jefftant.ietf@gmail.com>, Eric C Rosen <erosen@juniper.net>, "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-tunnel-encaps@ietf.org" <draft-ietf-idr-tunnel-encaps@ietf.org>
Subject: Re: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?

 

Hi Linda,

 

I think Jeff is asking why not to use well known community to scope the blast radius of the advertisement. 

 

But personally I think this is pretty weak protection - if this would be the only protection against IPSec credential's hijack. IMO this needs to be protected a bit stronger such that even leak of the update will cause no harm or VPN compromise.

 

Thx,
R.

 

 

 

On Mon, Jul 9, 2018 at 10:50 PM, Linda Dunbar <linda.dunbar@huawei.com> wrote:

Jeff, 

 

The answer to your question “Why would you want to build what you are trying to do into protocol?” is 

-        We want to use BGP to do more (i.e. use RR to distribute information injected from and by a controller). to eliminate dealing with the changes to NHRP/DSVPN. 

 

Can you elaborate the “the existing technology”?

 

Linda

 

From: Jeff Tantsura [mailto:jefftant.ietf@gmail.com] 
Sent: Monday, July 09, 2018 3:35 PM


To: Linda Dunbar <linda.dunbar@huawei.com>; Eric C Rosen <erosen@juniper.net>; idr@ietf.org; draft-ietf-idr-tunnel-encaps@ietf.org
Subject: Re: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?

 

Linda,

 

You meant to say – you’d use RR to distribute information injected from and by a controller?

Reflector (as the name suggests) reflects the routes, it doesn’t originates them as part of the reflector functionality  (it for sure could as a BGP speaker if such functionality is collocated with RR)

 

Please read my initial questions, it looks like what you are trying to achieve could be done with the existing technology.

Thanks!

 

Cheers,

Jeff

 

From: Linda Dunbar <linda.dunbar@huawei.com>
Date: Monday, July 9, 2018 at 13:28
To: Jeff Tantsura <jefftant.ietf@gmail.com>, Eric C Rosen <erosen@juniper.net>, "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-tunnel-encaps@ietf.org" <draft-ietf-idr-tunnel-encaps@ietf.org>
Subject: RE: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?

 

Jeff, 

 

We would like to use RR as controller to distribute more detailed tunnel information, such as IPsec configuration & keys because in managed large scale Overlay deployment (SD-WAN), it doesn’t scale to allow all CPEs to negotiate IPsec keys. 

 

Linda

 

From: Jeff Tantsura [mailto:jefftant.ietf@gmail.com] 
Sent: Monday, July 09, 2018 3:25 PM
To: Linda Dunbar <linda.dunbar@huawei.com>; Eric C Rosen <erosen@juniper.net>; idr@ietf.org; draft-ietf-idr-tunnel-encaps@ietf.org
Subject: Re: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?

 

Hi Linda,

 

Why would you want to build what you are trying to do into protocol?

#1 local policy

#2  NO_ADVERTISE does that exactly 

 

Cheers,

Jeff

 

From: Idr <idr-bounces@ietf.org> on behalf of Linda Dunbar <linda.dunbar@huawei.com>
Date: Monday, July 9, 2018 at 13:14
To: Eric C Rosen <erosen@juniper.net>, "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-tunnel-encaps@ietf.org" <draft-ietf-idr-tunnel-encaps@ietf.org>
Subject: [Idr] Possible to set up priority for Tunnels established by draft-ietf-idr-tunnel-encaps-09 ?

 

Eric, 

 

draft-ietf-idr-tunnel-encaps-09 discussed ways to resolve conflicts of multiple UPDATE messages with Tunnel Encap attributes. 

 

Is it possible to have following capability? 

-        Have a bit indicating a specific UPDATE is from authoritative source, therefore overwrite all other Tunnel Attributes for the Prefix X to avoid recursive next hop issues and tunnel selection at the receiving Router? 

-        Have a bit indicating that a specific UPDATE only contain Tunnel attributes for the receiving Router, therefore can’t be forwarded? 

 

You said that SAFI 7 is deprecated because no one seemed interested in using it. We are very interested in using it because 

-        it can be easily distinguished from normal  BGP UPDATE

-         The receiving router doesn’t have to “Filter” the tunnel attributes before forwarding to others.  

-        Can even be used for passing reconfigured IPsec keys to two ends of a tunnel. 

 

Therefore we think SAFI 7 should be reserved. 

 

Thanks, Linda Dunbar

 

From: Eric C Rosen [mailto:erosen@juniper.net] 
Sent: Tuesday, July 03, 2018 12:21 PM
To: Linda Dunbar <linda.dunbar@huawei.com>; idr@ietf.org; draft-ietf-idr-tunnel-encaps@ietf.org
Subject: Re: What are side effect for having Encap SAFI? can draft-ietf-idr-tunnel-encaps-09 preserve trigger tunnel creation before VPN is established?

 

On 7/2/2018 6:31 PM, Linda Dunbar wrote:

Eric, IDR group, 

 

It is indicated that RFC5512 is to be replaced by draft-ietf-idr-tunnel-encaps. But draft-ietf-idr-tunnel-encaps-09 stated that it deprecates the

Encapsulation SAFI. 

 

We find the Encapsulation SAFI is quite useful for CPE based EVPN.  For example, a Controller (say RR) can send an update with Encapsulation SAFI to two end points to trigger a tunnel establishment between them. 

What are side effect for having Encap SAFI? Can we preserve it in draft-ietf-idr-tunnel-encaps?

 

Thanks, Linda Dunbar

 


SAFI 7 was deprecated because no one seemed interested in using it, it creates additional operational issues, there is no real need for it, and it was discouraging folks from actually using the Tunnel Encapsulation attribute.  This is discussed briefly in section 1.2 of the draft.

You can get a similar effect by using the technique described in section 7 of the draft.

If PE1 is the egress point of a tunnel, have PE1 originate an UPDATE whose NLRI is PE1's loopback address.  Put the Tunnel Encapsulation attribute (with PE1 as remote endpoint) on this UPDATE.  (The next hop field of this UPDATE doesn't really matter, as long as it is resolvable.)  When PE1 originates VPN routes, it sets the next hop to be its loopback address.  Per section 7, this will result in packets being sent to PE1 though the specified tunnel.

 

_______________________________________________ Idr mailing list Idr@ietf.org https://www.ietf.org/mailman/listinfo/idr 


_______________________________________________
Idr mailing list
Idr@ietf.org
https://www.ietf.org/mailman/listinfo/idr