Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

John Scudder <jgs@juniper.net> Wed, 28 February 2024 15:45 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAE81C14F5F8; Wed, 28 Feb 2024 07:45:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.805
X-Spam-Level:
X-Spam-Status: No, score=-2.805 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="rDJNRVMB"; dkim=pass (1024-bit key) header.d=juniper.net header.b="i4cYOCTY"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w8vUWseKhYgq; Wed, 28 Feb 2024 07:45:55 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEBF2C14F5F3; Wed, 28 Feb 2024 07:45:54 -0800 (PST)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 41S9t3S0009923; Wed, 28 Feb 2024 07:45:52 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=PPS1017; bh=Ul3DWvC8g7oRhylExZ5N9a KtIChww0PLTXZ2njH/0KU=; b=rDJNRVMBjekwdspdBY81lkIVen7szgmZLGuk6L Deuch+7n3LImq2tiWhOyj2JbDaKdOWWDkM+KcV0iPvidoQw/V5jR/jLvJFpHYSwX ifG/ElXsQBgbWg8gQBgtMH8+DJzg7HG6PJSjO3NeQYImG3110EXCfcJdMulFWEQo +QTaRdAlnocydnlFu6sw9YMGUbLUEl1+Gd+ShkROS4hOvsdi0RQX7UI3egxpVccR He3zZKs7JqqU7zpcFPnSA7cciHYDFOCs89FrkWWvcZnPAcvZL2KO7zPYFi+Hh9+C 81hiYFhekoq6xM3cVse8T1WZ8KZOPImOTz4TWM7oHQD8YPfg==
Received: from bl2pr02cu003.outbound.protection.outlook.com (mail-eastusazlp17012018.outbound.protection.outlook.com [40.93.11.18]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3wfgey7nu8-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 28 Feb 2024 07:45:51 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ma4/EWlQT9yQ2y6mIvREJ/Lubo+BmTOqwuHU4kCFd9dFiYmZyM/UR43AjeHc5xTM0o69OGADeu50dvdRKuGa7hXsNhrB2V4SK5G4vn25RajkCglsfNwp2rpHFoGcmNLDZDLYsO56tFKQy78cJuKD2HPS9MuUUlpqmQw3XNul++NF10UQPXGaMgi3zse56ORwaSsZbP4qPuYxL/PXu0TRNZZcaTQJCgNMqwZK3mxxBu8NFv2cU/YWZ9AE0p1qqgcs0SaKcrh0uNamDrvrbIa+kMpgpndi0SG/Rule3s7qsYWhNB4Y+uSCPxBiWSjH7t9NV4sG7mTZhXwxlcvHS6tbxw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ul3DWvC8g7oRhylExZ5N9aKtIChww0PLTXZ2njH/0KU=; b=DLFCnvO1n+rm9jvMZZBGLabWzWgYtHDFPQ21Sb2xkfICbBD4HCsPvm6FH3U7ReVfil9cwnTNCHAf98rACIUlPX0K0fMte0JCqWnVGPBkKwK8YokumHgJGG6eeexVIFBi6gHa9/yFiAU0X8vnvicw7XKMRrDqLqwlW+EBZ1VOq+Gi36XMd1q2QSZT5wGMypLvDdDh1XkxXmMPiAHgZDzmAYZPwHZbO+zYRFS+z7w0e+uEusK4R+W+5RgvcxYNegNLg5zb1kX72jKb9KS3auj2fjgosW2QIJkJ4ZP4SZjC1NoHtYu6M8NifjyV/0ZQlTdM29LtGaDT1FCA3LmYo5//Tw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ul3DWvC8g7oRhylExZ5N9aKtIChww0PLTXZ2njH/0KU=; b=i4cYOCTYPqbc4KvaHw7agAkGpSOCPXKtpAe0pMA4Al4z/puMuvhSZyk99iFKWTzTgsOn6WTqwGVrPhY0mil7SPSaOEo3kmT0gi7JoJ6dHhsJ2FnzB+6QFRB/fdSzwVkGpniugpq2yUh9EayzKlLNXA2bprV/ipLhI0PM2Un2ZaU=
Received: from CH2PR05MB6856.namprd05.prod.outlook.com (2603:10b6:610:3e::11) by IA1PR05MB9453.namprd05.prod.outlook.com (2603:10b6:208:42f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.36; Wed, 28 Feb 2024 15:45:45 +0000
Received: from CH2PR05MB6856.namprd05.prod.outlook.com ([fe80::e182:8767:9915:7b07]) by CH2PR05MB6856.namprd05.prod.outlook.com ([fe80::e182:8767:9915:7b07%6]) with mapi id 15.20.7316.037; Wed, 28 Feb 2024 15:45:45 +0000
From: John Scudder <jgs@juniper.net>
To: Hares Susan <shares@ndzh.com>
CC: "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>, Keyur Patel <keyur@arrcus.com>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1b0El+Em0vTUqZbYQ57EWzzbEf3ayAgAAJLgA=
Date: Wed, 28 Feb 2024 15:45:45 +0000
Message-ID: <741B1F13-8082-40D6-8AAA-1E5EC7AB5398@juniper.net>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <DM6PR08MB4857CB13400760F85B847A94B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
In-Reply-To: <DM6PR08MB4857CB13400760F85B847A94B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3774.400.31)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH2PR05MB6856:EE_|IA1PR05MB9453:EE_
x-ms-office365-filtering-correlation-id: f14d075a-282d-47f9-d226-08dc387453ad
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR05MB6856.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_741B1F13808240D68AAA1E5EC7AB5398junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR05MB6856.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: f14d075a-282d-47f9-d226-08dc387453ad
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2024 15:45:45.0450 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1IJB/LUQvy4D5O94mgCJfhKF5zUvu1q5LxI1O4u7Qjv6DWgAmaMgMMo4Ebiag3Wj
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR05MB9453
X-Proofpoint-ORIG-GUID: AYhsuiLFcqOCXdY_dQjW8zsDYm0-tvHd
X-Proofpoint-GUID: AYhsuiLFcqOCXdY_dQjW8zsDYm0-tvHd
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-02-28_08,2024-02-27_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 mlxlogscore=999 priorityscore=1501 impostorscore=0 malwarescore=0 phishscore=0 spamscore=0 bulkscore=0 adultscore=0 clxscore=1011 suspectscore=0 lowpriorityscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2402120000 definitions=main-2402280123
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/irbocRJU_mQvfmA_pGtbaUDLAwo>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 15:45:59 -0000

Hi Sue,

Thanks for your reply. I hope you don't mind, I'm keeping the IDR list in the CC, I think it's best for transparency, especially since this discussion intersects with my DISCUSS position on draft-ietf-bess-bgp-sdwan-usage-20. I don't have any objection to the co-authors taking their discussion off-line, if that's how you'd prefer to work, of course.

Regarding "Please confirm that agree up  to this point by sending me email”, yes, I agree. On the other “do you agree”/“please send comment” parts, that's going to take a little more time than I have right now I'm afraid, sorry. I'll try to get to it soon, so if you do make progress offline please update me so that I'm not reviewing text that's been overtaken by events!

Thanks a lot for your work on this.

--John

On Feb 28, 2024, at 10:12 AM, Susan Hares <shares@ndzh.com> wrote:



John and Linda:

Thank you for your patience while I completed a set of reviews for the CAR document.   After further investigation,  as an author, I still think we will need to adjust this document before asking for IESG Publication.

This discussion in this email has 3 parts as a way of explanation of the basic concepts of the technology:

  *   SD-WAN-Hybrid – just Client Routes +  Tunnel encapsulation attribute (this email)
  *   SD-WAN-Hybrid with SD-WAN Underlay NRLI  - All Ports example
  *   SD-WAN-Hybrid with SD-WAN Underlay NLRI  - One Port update


[Chair hat on]
Due to the other WGLC traffic (CAR, CT, sr-safi-policy)  on the IDR list, it would be helpful if the discussion would go “offlist” as we work to fix these issues.
 [chair hat off]

Again, thanks for catching this error before we went to the IESG.  We’ll work to refine the draft, update the implementation report, and go through a 2nd WG LC on the update.

Sue Hares

=============

Part 1 – Restrict the work to Client Route + new Tunnel Encapsulation Attribute

See section 3.3 of the text.

Current text:/
As described in [SD-WAN-BGP-USAGE], two separate BGP UPDATE messages are used for SD-WAN Edge Discovery:
Client routes BGP UPDATE:
This UPDATE is precisely the same as the BGP VPN client route UPDATE. It uses the Encapsulation Extended Community and the Color Extended Community to link with the SD-WAN Tunnels UPDATE Message as specified in section 8 of [RFC9012].
A new Tunnel Type (SD-WAN-Hybrid) is added and used by the Encapsulation Extended Community or the Tunnel-Encap Path Attribute [RFC9012] to indicate mixed underlay networks.
SD-WAN UPDATE:
This UPDATE is for an edge node to advertise the properties of directly attached underlay networks, including the NAT information, pre-configured IPsec SA identifiers, and/or the underlay network-specific information. This UPDATE can also include the detailed IPsec SA attributes, such as keys, nonce, encryption algorithms, etc.
/

Restriction from RFC-9012
Section: 4.1

Current text:/
This extended community may be attached to a route of any AFI/SAFI to which the Tunnel Encapsulation attribute may be attached. Each such extended community identifies a particular tunnel type; its semantics are the same as semantics of a Tunnel TLV in a Tunnel Encapsulation attribute, for which the following three conditions all hold:

It identifies the same tunnel type.
It has a Tunnel Egress Endpoint sub-TLV for which one of the following two conditions holds:

Its Address Family subfield contains zero, or
Its Address subfield contains the address of the Next Hop field of the route to which the Tunnel Encapsulation attribute is attached.
It has no other sub-TLVs.
Such a Tunnel TLV is called a "barebones" Tunnel TLV.
/

Note:  If you change Section 3.3 above to the text below, you do not have a problem with the Tunnel Encap Attribute.

New text:/
Client routes BGP UPDATE:
This UPDATE is precisely the same as the BGP VPN client route UPDATE. It uses the Tunnel Encapsulation Attribute and the Color Extended Community to link with the SD-WAN Tunnels UPDATE Message as specified in section 8 of [RFC9012].
A new Tunnel Type (SD-WAN-Hybrid) is added and used by the Encapsulation Extended Community or the Tunnel-Encap Path Attribute [RFC9012] to indicate mixed underlay networks.
/
Please confirm that agree up  to this point by sending me email.
Client Routes:
Section 3.3 indicates:
Old text:/
C-PE2 advertises the attached client routes as below:
•         Client Route UPDATE:
o    Extended community: RT for SD-WAN VPN 1
o    NLRI: AFI=IPv4/IPv6 and SAFI = VPN
o    Prefix: 10.1.1.x; 20.1.1.x
o    NextHop: 2.2.2.2 (C-PE2)
o    Encapsulation Extended Community: tunnel-type=SD-WAN-Hybrid tunnel endpoint
o    Color Extended Community: Site-identifier

•         SD-WAN UPDATE:
o    C-PE2 can use the following Update messages to advertise the properties of Internet facing ports 192.0.0.1 and 170.0.0.1, and their associated IPsec SA related parameters.
o    Update #1 for the properties associated with the WAN port 192.0.0.1, such as the NAT properties, the underlay network properties, etc. (Details in Section 9.1).
o    Update #2 for the properties associated with the WAN port 170.0.0.1 associated properties. (Details in Section 9.1).
o    Update #3 for IPsec parameters associated with IPsec tunnel terminated at the Node level (2.2.2.2), such as the supported encryption methods, public keys, etc. (Details in Section 9.2).
/
If you use the Tunnel Encaps Attribute (TEA) [RFC9012] to describe the SD-Wan Hybrid tunnel, then
Client Route UPDATE
o    Extended community: RT for SD-WAN VPN 1  [Route Target Constraints [RFC4684]
o    NLRI: AFI=IPv4 (1)/IPv6 (2) and SAFI = VPN (128)
o    Color Extended Community: Site-identifier assigned as color for NLRI
o    Prefix: 10.1.1.x; 20.1.1.x
o    NextHop: 2.2.2.2 (C-PE2) (sets next-hop self) – Loopback address
o    Tunnel Attribute: tunnel-type=SD-WAN-Hybrid (type = 25)

           *   Tunnel endpoint 2.2.2.2
           *   Extended Port Sub-TLV for – B1-A1 - MPLS Link  - identified locally as 1001
           *   Extended Port Sub-TLV for – B2-A2 – IP-SEC - identified locally as 192.0.0.1
           *   Extended Port Sub-TLV for – B3-A3 – IP-Sec – identified locally as 170.0.0.1
           *   IP-SEC SA with security keys available for the IP-SEC links.
           *   Color TLV: Site-identifier


Key points:

  *   The inner ports are uniquely identified by logical tunnel endpoint (2.2.2.2), trans network ID,  RD, and local address, and local port (4 octets)
  *   Please notice that the Tunnel encapsulation can handle all the SDWAN functionality – just as other tunnels do.
     *   The tunnel end is 2.2.2.2.  It is set-up between 1.1.1.1 to 2.2.2.2.
     *   If the tunnel address Endpoint = 0, the tunnel’s address is the next hop.
  *   Every time the tunnel attributes change, this causes a change in the Update.
  *   Similar to SR Policy (draft-ietf-idr-sr-policy-safi) with multiple candidate routes (segments)
     *   Unlike SR Policy, it does require the use of the TEA End Point for validation.
Diagram for reference:
                                 +---+
                   +--------------|RR |----------+
                  /  Untrusted    +-+-+           \
                 /                                 \
                /                                   \
        +---------+  MPLS Path                      +-------+
11.1.1.x| C-PE1   A1-------------------------------B1 C-PE2 |10.1.1.x
        |         |                                 |       |
21.1.1.x|         A2(192.10.0.10)------( 192.0.0.1)B2       |20.1.1.x
        |         |                                 |       |
        | Addr    A3(160.0.0.1) --------(170.0.0.1)B3 Addr  |
        | 1.1.1.1 |                                 |2.2.2.2|

Do you agree with me? Please send me email.
Part 2: SD-WAN-Hybrid Tunnel + SDWAN Underlay Tunnel ID
The concept is the SDWAN Underlay NLRI to SD-WAN Hybrid tunnels identified by the tunnel Egress Endpoint.
   Node-1.1.1.1 -----------------Node-2.2.2.2
                   Hybrid SD-Wan-Tunnel
The virtual tunnel end-point is 2.2.2.2.
The SD-WAN NLRI is simply providing details on SD-WAN tunnels ending at Node-2.2.2.2.
SDWAN NLRI (IPv4)  - (P-ID, C, N)
  Port-Local-ID = 0 (for all ports) or specific port ID
  SD-WAN-Color = [4 octets]
  SD-WAN-Node-ID = 2.2.2.2 (See 2.2.2.2 as Tunnel Egress Endpoint)
+ TEA – Tunnel Attribute (1) – same encodings as above

  *   Tunnel endpoint 2.2.2.2
  *   Extended Port Sub-TLV for B1-A1 – ID: 1000,  Encapsulation: MPLS encapsulation
  *   Extended Port Sub-TLV for B2-A2 – ID: 192.0.0.1, Encapsulation:  IP-SEC
  *   Extended Port Sub-TLV for B3-A3 – ID: 170.0.0.1, Encapsulation: IP-SEC
  *   IP-SEC SA with security keys available for the IP-SEC links.
  *   Color TLV: Site-identifier

Key points:

  *   If Port-Local-Id = 0, then this passes the same information as example 1 for the tunnel endpoint.  (Explaining why ID, C, N instead of C, N, ID is missing in the text).
  *   SDWAN Hybrid tunnel – matches the Tunnel Endpoint (2.2.2.2), Port-ID and updates interface and IP-SEC information.
  *   This is similar to TEA with SR Policy with multiple Candidate Routes.
Response Request – please send comments on part
3. Application to single port
Revised Example from 9.1
Update #1
SD-WAN NLRI – AFI/SAFI (1/SD-Wan) SD-WAN  (ID, C, N)

  *   Local Port ID – 4 octets – 190.0.0.1
  *   Color  - 4 octet
  *   Node-ID – 2.2.2.2 (C-PE2)
  *   Next Hop - 2.2.2.2


Tunnel Encaps Attribute

  *   TEA Endpoint = 2.2.2.2
  *   Extended Port Sub-TLV for B2-A2 – ID: 192.0.0.1
  *   IP-SEC Sub-TLV – new Security associations

Update #2 – Just New Security
SD-WAN NLRI – AFI/SAFI (1/SD-Wan) SD-WAN  (ID, C, N)

  *   Local Port ID – 4 octets – 170.0.0.1
  *   Color  - 4 octet
  *   Node-ID – 2.2.2.2 (C-PE2)
  *   Next Hop - 2.2.2.2


Tunnel Encaps Attribute

  *   TEA Endpoint = 2.2.2.2
  *   Extended Port Sub-TLV for B2-A2 – ID: 170.0.0.1
  *   IP-SEC Sub-TLV – new Security associations

Key points:

  *   This usage comes from 9.1



From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 3:42 PM
To: draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Cc: idr@ietf.org<mailto:idr@ietf.org>
Subject: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community


Hi Authors, WG,

I just noticed draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Community can be used, and I thought you should be aware of it. TL;DR, you’re specifying the use of SD-WAN-Hybrid tunnel type in an Encapsulation Extended Community, but this isn’t allowed. Details follow.

- RFC 9012, Section 4.1 tells us that the only permissible use of the Encapsulation Extended Community is when there are *no sub-TLVs*, other than the Address Family sub-TLV (item 3 in the list of conditions).

- In draft-ietf-idr-sdwan-edge-discovery-12 Section 6.3 we see the definition of the IPsec-SA-ID Sub-TLV of the SD-WAN-Hybrid tunnel type. This seems pretty central to the purpose of the spec. So, the SD-WAN-Hybrid tunnel type does have sub-TLVs in addition to the Address Family, and therefore MUST NOT be used in an Encapsulation Extended Community.

- Also, in draft-ietf-idr-sdwan-edge-discovery-12 Section 5.1 we see that the client route update uses the Encapsulation Extended Community (emphasis added):

```
5.  Client Route UPDATE

   The SD-WAN network's Client Route UPDATE message is the same as the
   L3 VPN or EVPN client route UDPATE message.  The SD-WAN Client Route
   UPDATE message uses the **Encapsulation Extended Community** and the
   Color Extended Community to link with the SD-WAN Underlay UPDATE
   Message.
```

- It’s clear from other parts of the spec that the tunnel type is SD-WAN-Hybrid, for example, this is both stated in Section 3.3, and then used in the example (same section).

- But RFC 9012 §4.1 told us we can’t use a tunnel type with sub-TLVs as an Encapsulation Extended Community!

I think what you really must be trying to do is use the Tunnel Encapsulation attribute (only!) to carry the SD-WAN-Hybrid in the SD-WAN Underlay route, and then have the client routes making use of that tunnel recurse into the underlay route (including tunnel) as per RFC 9012 Section 8. Note that Section 8 does NOT require that the client route carry the Encapsulation Extended Community — the next hop address is both necessary and sufficient to effectuate the linkage to the underlay route.

Thanks,

—John