Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Gyan Mishra <hayabusagsm@gmail.com> Wed, 28 February 2024 15:51 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1882C14F5E4; Wed, 28 Feb 2024 07:51:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IApiJwdX_9wx; Wed, 28 Feb 2024 07:51:31 -0800 (PST)
Received: from mail-pg1-x535.google.com (mail-pg1-x535.google.com [IPv6:2607:f8b0:4864:20::535]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C8669C14F6A2; Wed, 28 Feb 2024 07:51:29 -0800 (PST)
Received: by mail-pg1-x535.google.com with SMTP id 41be03b00d2f7-5cdbc4334edso4119569a12.3; Wed, 28 Feb 2024 07:51:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1709135489; x=1709740289; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=0atqQ/GGx8+akwmmF6wT9ZosV2XHNl6UF6FwLUnO1Gs=; b=cFUmxfHDhk+zq6EYUhQZGweh77F4m1fdXf/JxeSuYUMPQnOQgtZCGkAwdmhnrljWiu DpgHXCc9+8gh7ta2gmEY6aFKd5hXjJCKuFgrf+XJeOW9FuUaSInYGWTln2dlcj6WXrXJ ZBjmfnraxz9kRwbxV5n0mFe5WYySQJWawlIed9MhgHDxw50vDG7LLN0VFVYP5yiyNYr+ sEtVysF2v/wGLc2r6HWmmrF27n8gald/69vQlk5fsB6W7poPRS1rlBRP1b5V08a1tT70 tIPk4+i3Nh2EnKjdkE6dxbpbZv3PcRdh2l0QhC3AuLxFARSgdseQwA2EWpilBO40/z+r z86A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709135489; x=1709740289; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=0atqQ/GGx8+akwmmF6wT9ZosV2XHNl6UF6FwLUnO1Gs=; b=t5v4EbPnjcadVcHnpbFeJauJPrGngC3Gj+z0BLTSpuSsBy1jEk5uIZeqxyo//jSK1h 4XLqRSwHTba0Yei6EUjiyKy6Xk+XANlTQkFkeGavkl8E4nYDbKf8ACVRMf1p1ffOnn98 bfRjLCGW1vj0LpYOxX82wSruXnv0zRuPP8TKwA8HF0qwcZAPbV3RFmnk7cqT2y13tyH+ CJ9SFkcabKyPtKMWgVp1YNIKpdJiUlksYtaDWq6rVlRMNQPms5LJ05lvR4D+iuhzIZ4V US66UihuR7GsF347d2PtGi6VCrexcYnCCSfoDuW6gMNG4CtK2mxy9pirKemOSa/exexG ircw==
X-Forwarded-Encrypted: i=1; AJvYcCXGObeCXqYvL93IL+Z6YH8CPrrVY8RStfOoPm/Bwcv0r6OQGcbVDPxkOub1JISGEoCm/7nOoDV0fkcwb3iuZmJ6MWYxxp8Ji5rNFJhwKrcgpAHp8gf0HA+76ERURTiIrctmHKbvH28AkAyf
X-Gm-Message-State: AOJu0YwSIYW21kaMgGQaZ2Tq/19u0nUuNH1q2V8qtM+ynLeuXM9PgmGd HqaynwytvIV9gs/wWfR2MviRzqym2+MYP4UCPe5At1gbsHUdYh53iaBIu+YGdnlHythk2CWAaXk /Ii9ZW+wMHvvIEIp7KSNUvp+IZKk=
X-Google-Smtp-Source: AGHT+IEUbgoV5GrsgLrDwL2GLPG6Ng4EnfOjMSHGJ8IgYGNr178veYG/YvE+23S2Izypbl43J/LWKEKGMRloBSsg2Q8=
X-Received: by 2002:a05:6a21:920b:b0:1a0:adbc:7a96 with SMTP id tl11-20020a056a21920b00b001a0adbc7a96mr5859015pzb.36.1709135488870; Wed, 28 Feb 2024 07:51:28 -0800 (PST)
MIME-Version: 1.0
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMEpC5caAtKCLSc6MrHUX1Qa3gtPO919nYpk9jyTdYXuSA@mail.gmail.com> <1DB2D1F0-E0F9-41F6-B49A-0126D25BE2DD@juniper.net> <PH0PR13MB4922F82CF2D623474D4BD8A585582@PH0PR13MB4922.namprd13.prod.outlook.com> <A1DC1B7C-B767-48A9-9BEA-A5EFBE85E9C9@juniper.net> <CO1PR13MB4920A1105DE8C0461BA1614F85582@CO1PR13MB4920.namprd13.prod.outlook.com> <ACC38EDA-99CF-4036-B6E8-866853A068B4@juniper.net> <CO1PR13MB4920A008CD4854E99F8BA8B585582@CO1PR13MB4920.namprd13.prod.outlook.com> <D0C3031E-713E-4069-93B5-73FE6CABB5F0@juniper.net>
In-Reply-To: <D0C3031E-713E-4069-93B5-73FE6CABB5F0@juniper.net>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Wed, 28 Feb 2024 10:51:17 -0500
Message-ID: <CABNhwV0-+skz86ASkFbNRHP3AnuGM2vDeRYKY_81mQBju_DNEQ@mail.gmail.com>
To: John Scudder <jgs=40juniper.net@dmarc.ietf.org>
Cc: Linda Dunbar <linda.dunbar@futurewei.com>, Robert Raszuk <robert@raszuk.net>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000aff3430612731d52"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/j075RWW_qjlGIgGXkCZ8vRnHj7w>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 15:51:35 -0000

Hi Linda and John

What if you use RCA in place of encapsulation extended community. This
draft was the original ELC update to fix route leak issue and then was made
generic next hop draft with ELC being the first use case.

https://datatracker.ietf.org/doc/html/draft-ietf-idr-entropy-label-13

John

You are pretty familiar with this draft.  What do you think?

Kind Regards


<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *

*Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*



*M 301 502-1347*



On Tue, Feb 27, 2024 at 11:12 PM John Scudder <jgs=
40juniper.net@dmarc.ietf.org> wrote:

> Well, you could use light red and dark red. Or you could use different
> next hop addresses. Or you could invent a new kind of extended community to
> indicate tunnel affinity. But Encapsulation Extended Community simply isn’t
> defined to do what you want.
>
> —John
>
> On Feb 27, 2024, at 11:01 PM, Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
> 
>
> [External Email. Be cautious of content]
>
> John,
>
>
>
> The Color Extended Community alone is not enough.
>
> For example, one SD-WAN edge has 5 routes (Route #1 ~#5) with 3 types of
> underlay paths (IPsec over Internet, SRv6 , and unsecure internet).
>
>
>
> Route #1 &  #2 have to be forwarded by SRv6, but Route #1 needs to use the
> SRv6 Red Color paths, Route #2 needs to use the SRv6 Blue Color paths.
>
>
>
> In conclusion: SD-WAN routes (or customer traffic) need to have both
> Encapsulation Extended Community and the Color Extended Community.
>
>
>
> Linda
>
>
>
> *From:* John Scudder <jgs@juniper.net>
> *Sent:* Tuesday, February 27, 2024 9:14 PM
> *To:* Linda Dunbar <linda.dunbar@futurewei.com>
> *Cc:* Robert Raszuk <robert@raszuk.net>; idr@ietf.org;
> draft-ietf-idr-sdwan-edge-discovery@ietf.org
> *Subject:* Re: Error in draft-ietf-idr-sdwan-edge-discovery use of
> Encapsulation Extended Community
>
>
>
> You could accomplish that using the Color Extended Community. See
> second-last paragraph of Section 8.
>
>
>
> —John
>
>
>
> On Feb 27, 2024, at 9:31 PM, Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
> 
>
> *[External Email. Be cautious of content]*
>
>
>
> John,
>
> Here is the SD-WAN scenario why simple Nexthop cannot do the job:
>
>
>
> Suppose one SD-WAN edge has 3 client routes (#1, #2, #3)  and multiple
> underlay paths (public unsecure paths & private secure paths) to other peer
> nodes:
>
> 1) The client route #1 needs to be forwarded by a private path (such as
> network service provider's MPLS path),
>
> 2) The  client route #2 (at the same nextHop) can be forwarded by IPsec SA
> or MPLS (i.e., the Hybrid tunnel described in the document)
>
> 3) The client route #3 can be forwarded by unsecure path (such as web
> browsing traffic)
>
>
>
> When this SD-WAN edge advertises Client Route #1, it needs to indicate the
> necessary encapsulation type to be MPLS.
>
> When this SD-WAN edge advertises the Client Route #2, it needs to indicate
> the encapsulation type to be SD-WAN-Hybrid.
>
> When the SD-WAN edge advertises the Client Route #3, it only needs to
> indicate the NextHop.
>
>
>
> Linda
>
>
>
> -----Original Message-----
> From: John Scudder <jgs@juniper.net>
> Sent: Tuesday, February 27, 2024 6:37 PM
> To: Linda Dunbar <linda.dunbar@futurewei.com>
> Cc: Robert Raszuk <robert@raszuk.net>; idr@ietf.org;
> draft-ietf-idr-sdwan-edge-discovery@ietf.org
> Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of
> Encapsulation Extended Community
>
>
>
> Hi Linda,
>
>
>
> > On Feb 27, 2024, at 7:12 PM, Linda Dunbar <linda.dunbar@futurewei.com>
> wrote:
>
> >
>
> > Our intent of using Encapsulation Extended Community is to indicate
>
> > that Client routes need to be forwarded by a tunnel, but there is too
> much information about the  Tunnel attributes to be included in the Client
> route advertisement and those attributes are associated with the WAN ports
> (instead with Client Routes).
>
> >
>
> > We need to interpret the "barebones" as a hook to inform the peer nodes
> to use information carried in  the second UPDATE to establish the tunnel
> for the Client routes.
>
>
>
> I don’t see why you need any indication beyond the next hop. It’s both
> necessary (so that the recipient can find the route that has the tunnel
> information) and sufficient (because once it finds that route, it will see
> it includes tunnel information). This is exactly what Section 8 explains.
>
>
>
> > I don't understand why RFC9012 doesn't allow this. What harm does it
> cause?
>
>
>
> If RFC 9012 was still in draft, and you had suggested the idea above as a
> change to the spec, we could have had this discussion. But it’s moot now —
> RFC 9012 is what it is, and what it is, very specifically and precisely
> does *not* allow a tunnel type that has mandatory sub-TLVs to be used as an
> Encapsulation Extended Community, and does *not* require any additional
> information beyond the next hop to “glue” a client route to an underlay
> route that has a tunnel attribute.
>
>
>
> If you want to use RFC 9012, it is what it is. If you think (for some
> reason I don’t yet understand) that you need to have an extra “hook” beyond
> the next hop, you can specify some new thing to do that.
>
>
>
> —John
>
>
>
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr
>