Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Susan Hares <shares@ndzh.com> Wed, 28 February 2024 22:47 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB908C14F708; Wed, 28 Feb 2024 14:47:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.908
X-Spam-Level:
X-Spam-Status: No, score=-6.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tnIkL2jIP40n; Wed, 28 Feb 2024 14:46:57 -0800 (PST)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2100.outbound.protection.outlook.com [40.107.236.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B623C14F6F1; Wed, 28 Feb 2024 14:46:57 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FFut6z+YFcVrR+KX4Q89r1SS1iIXNaxamkv++1JMcs60QmbGomXK8/2o0aeiMEC9mzCxVu5yzzX19yKsm5Gm27uiA84Q9+ytdgOKFB9nBrxuI8z062U4lLqUUlWMkTjXx1q09Jh3UUD7Krq110UzhYvmxgBV1HJnUdShpeHQi0QuA2W23X0RaAtlRPydvRfUkXKUlYvzvAZlY82xSuttJRmGiBRTcD7dDK9oRTznLxE3W4Yf1K2pJBJPthCwV6W2kM2zw1hqibZ3GkzhdCTN8558GDn8HYtQPKBS/w93moJe9fXFDqgImCqjBYJN6LLVADaYlHJcHSUszKRXD/9ImA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=acg99uCBhWwvw0bXksQcSHsgbOhxMVgFxmCNmLlR24k=; b=GpIbiDajos2t/MbHHV9GOTJHXOXSRypVLexIUH/KgS7/ZExuAfyd9Y4iNxtwVIMFW9S349k+wOgwJGclEySmCmI/Zx5OKV+hzZp5cIdAV+ORDrAGX8AJvNMqHubUaTTiAmQUxRUBgt7yYZwE4aVpVComwoqfZbdYB6chFSBP5QkQa6Sv82a2jtsrISGsIuHo5yvzgwegbZKop1rieqXskJARNa1kkxMLLNNjya9UuSrPT2pagU/+A04N+0AwZH2zlp3J0cfMfMKfP7iAvmSVr7lPL/ePGrX5Tk98LOs1IOt8wJVpfMYhrs8tS82xiq8eJsgkfrQonrHqzIgBWBbIkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 104.47.73.168) smtp.rcpttodomain=futurewei.com smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=none (0)
Received: from DM6PR05CA0065.namprd05.prod.outlook.com (2603:10b6:5:335::34) by CYXPR08MB9589.namprd08.prod.outlook.com (2603:10b6:930:e8::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.27; Wed, 28 Feb 2024 22:46:54 +0000
Received: from DM6NAM12FT010.eop-nam12.prod.protection.outlook.com (2603:10b6:5:335:cafe::6d) by DM6PR05CA0065.outlook.office365.com (2603:10b6:5:335::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.12 via Frontend Transport; Wed, 28 Feb 2024 22:46:54 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.73.168) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.73.168 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.73.168; helo=NAM04-MW2-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (35.166.188.152) by DM6NAM12FT010.mail.protection.outlook.com (10.13.179.78) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7339.27 via Frontend Transport; Wed, 28 Feb 2024 22:46:54 +0000
Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04lp2168.outbound.protection.outlook.com [104.47.73.168]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id AFFFCC3673; Wed, 28 Feb 2024 22:46:52 +0000 (UTC)
Received: from DM6PR08MB4857.namprd08.prod.outlook.com (2603:10b6:5:44::25) by DS0PR08MB8678.namprd08.prod.outlook.com (2603:10b6:8:15d::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.39; Wed, 28 Feb 2024 22:46:50 +0000
Received: from DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e]) by DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e%6]) with mapi id 15.20.7316.039; Wed, 28 Feb 2024 22:46:49 +0000
From: Susan Hares <shares@ndzh.com>
To: Linda Dunbar <linda.dunbar@futurewei.com>, John Scudder <jgs@juniper.net>
CC: Robert Raszuk <robert@raszuk.net>, "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1aJbLjWCwZYUyhASue85C1X7EewhRQgAAOvwCAAAHU0IAACaoAgAABooCAAABKEIAACsCAgAAc0sCAAA8jgIAACusAgAE6xpA=
Date: Wed, 28 Feb 2024 22:46:49 +0000
Message-ID: <DM6PR08MB4857BF3D474D7097AEAF5DA7B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMEpC5caAtKCLSc6MrHUX1Qa3gtPO919nYpk9jyTdYXuSA@mail.gmail.com> <1DB2D1F0-E0F9-41F6-B49A-0126D25BE2DD@juniper.net> <PH0PR13MB4922F82CF2D623474D4BD8A585582@PH0PR13MB4922.namprd13.prod.outlook.com> <A1DC1B7C-B767-48A9-9BEA-A5EFBE85E9C9@juniper.net> <CO1PR13MB4920A1105DE8C0461BA1614F85582@CO1PR13MB4920.namprd13.prod.outlook.com> <ACC38EDA-99CF-4036-B6E8-866853A068B4@juniper.net> <CO1PR13MB4920A008CD4854E99F8BA8B585582@CO1PR13MB4920.namprd13.prod.outlook.com>
In-Reply-To: <CO1PR13MB4920A008CD4854E99F8BA8B585582@CO1PR13MB4920.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-traffictypediagnostic: DM6PR08MB4857:EE_|DS0PR08MB8678:EE_|DM6NAM12FT010:EE_|CYXPR08MB9589:EE_
X-MS-Office365-Filtering-Correlation-Id: bce0b52d-9afc-445c-4c43-08dc38af295c
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4857.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB4857BF3D474D7097AEAF5DA7B3582DM6PR08MB4857namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR08MB8678
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.73.168]; domain=NAM04-MW2-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.73.168]; domain=NAM04-MW2-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DM6NAM12FT010.eop-nam12.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 9ea954d5-f756-415e-b9c1-08dc38af26b0
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:35.166.188.152; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:NAM04-MW2-obe.outbound.protection.outlook.com; PTR:mail-mw2nam04lp2168.outbound.protection.outlook.com; CAT:NONE; SFS:(13230031)(36860700004)(82310400014); DIR:OUT; SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2024 22:46:54.2708 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bce0b52d-9afc-445c-4c43-08dc38af295c
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5; Ip=[35.166.188.152]; Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: DM6NAM12FT010.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CYXPR08MB9589
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/RADPlC7dShqmaYdgduuVJ_zr-cY>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 22:47:01 -0000

Linda:

The only valid Encapsulation Extended community is when the TEA would be: TEA (type +  Egress Address TLV).

You can have one of these choices
Route, Color-EC +  TEA with Egress Address TLV  + Sub-TLV – with an sub-underlay
Or
Route, TEA – with Egress Address TLV + Sub-TLV with sub-tunnel id (4 octets) + Color TLV
Or
Route,  Color-EC + (new) SDWAN-ID-EC (Egress tunnel, ID)

All of these choices require an adjustment to the text in draft-ietf-idr-sdwan-edge-discovery.

Sue


From: Linda Dunbar <linda.dunbar@futurewei.com>
Sent: Tuesday, February 27, 2024 11:01 PM
To: John Scudder <jgs@juniper.net>
Cc: Robert Raszuk <robert@raszuk.net>; idr@ietf.org; draft-ietf-idr-sdwan-edge-discovery@ietf.org
Subject: RE: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

John, The Color Extended Community alone is not enough. For example, one SD-WAN edge has 5 routes (Route #1 ~#5) with 3 types of underlay paths (IPsec over Internet, SRv6 , and unsecure internet). Rou
External (linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>)
  Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tLzBlYzJjOGJmMmViMmYzYjhhZTI0MjlkMDRjYzc2N2VlLzE3MDkwOTI4ODYuMw==#key=0b2224e48af5346641bc7ea28be2ff77>  FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>  GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky>

John,

The Color Extended Community alone is not enough.
For example, one SD-WAN edge has 5 routes (Route #1 ~#5) with 3 types of underlay paths (IPsec over Internet, SRv6 , and unsecure internet).

Route #1 &  #2 have to be forwarded by SRv6, but Route #1 needs to use the SRv6 Red Color paths, Route #2 needs to use the SRv6 Blue Color paths.

In conclusion: SD-WAN routes (or customer traffic) need to have both Encapsulation Extended Community and the Color Extended Community.

Linda

From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 9:14 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>; idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

You could accomplish that using the Color Extended Community. See second-last paragraph of Section 8.

—John

On Feb 27, 2024, at 9:31 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:

[External Email. Be cautious of content]

John,
Here is the SD-WAN scenario why simple Nexthop cannot do the job:

Suppose one SD-WAN edge has 3 client routes (#1, #2, #3)  and multiple underlay paths (public unsecure paths & private secure paths) to other peer nodes:
1) The client route #1 needs to be forwarded by a private path (such as network service provider's MPLS path),
2) The  client route #2 (at the same nextHop) can be forwarded by IPsec SA or MPLS (i.e., the Hybrid tunnel described in the document)
3) The client route #3 can be forwarded by unsecure path (such as web browsing traffic)

When this SD-WAN edge advertises Client Route #1, it needs to indicate the necessary encapsulation type to be MPLS.
When this SD-WAN edge advertises the Client Route #2, it needs to indicate the encapsulation type to be SD-WAN-Hybrid.
When the SD-WAN edge advertises the Client Route #3, it only needs to indicate the NextHop.

Linda

-----Original Message-----
From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 6:37 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>; idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Linda,

> On Feb 27, 2024, at 7:12 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
>
> Our intent of using Encapsulation Extended Community is to indicate
> that Client routes need to be forwarded by a tunnel, but there is too much information about the  Tunnel attributes to be included in the Client route advertisement and those attributes are associated with the WAN ports (instead with Client Routes).
>
> We need to interpret the "barebones" as a hook to inform the peer nodes to use information carried in  the second UPDATE to establish the tunnel for the Client routes.

I don’t see why you need any indication beyond the next hop. It’s both necessary (so that the recipient can find the route that has the tunnel information) and sufficient (because once it finds that route, it will see it includes tunnel information). This is exactly what Section 8 explains.

> I don't understand why RFC9012 doesn't allow this. What harm does it cause?

If RFC 9012 was still in draft, and you had suggested the idea above as a change to the spec, we could have had this discussion. But it’s moot now — RFC 9012 is what it is, and what it is, very specifically and precisely does *not* allow a tunnel type that has mandatory sub-TLVs to be used as an Encapsulation Extended Community, and does *not* require any additional information beyond the next hop to “glue” a client route to an underlay route that has a tunnel attribute.

If you want to use RFC 9012, it is what it is. If you think (for some reason I don’t yet understand) that you need to have an extra “hook” beyond the next hop, you can specify some new thing to do that.

—John