Re: [Idr] Working group last call for draft-ietf-idr-tunnel-encaps-04

Lou Berger <lberger@labn.net> Thu, 25 May 2017 21:04 UTC

Return-Path: <lberger@labn.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C1AB1292C5 for <idr@ietfa.amsl.com>; Thu, 25 May 2017 14:04:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.701
X-Spam-Level:
X-Spam-Status: No, score=-4.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (768-bit key) header.d=labn.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h-6DCLrxj_mq for <idr@ietfa.amsl.com>; Thu, 25 May 2017 14:04:40 -0700 (PDT)
Received: from gproxy5.mail.unifiedlayer.com (gproxy5-pub.mail.unifiedlayer.com [67.222.38.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97AF9127B5A for <idr@ietf.org>; Thu, 25 May 2017 14:04:40 -0700 (PDT)
Received: from cmgw2 (unknown [10.0.90.83]) by gproxy5.mail.unifiedlayer.com (Postfix) with ESMTP id D19CE14043F for <idr@ietf.org>; Thu, 25 May 2017 15:04:39 -0600 (MDT)
Received: from box313.bluehost.com ([69.89.31.113]) by cmgw2 with id Ql4c1v0022SSUrH01l4f6c; Thu, 25 May 2017 15:04:39 -0600
X-Authority-Analysis: v=2.2 cv=Ibz3YSia c=1 sm=1 tr=0 a=h1BC+oY+fLhyFmnTBx92Jg==:117 a=h1BC+oY+fLhyFmnTBx92Jg==:17 a=N659UExz7-8A:10 a=xqWC_Br6kY4A:10 a=tJ8p9aeEuA8A:10 a=48vgC7mUAAAA:8 a=wU2YTnxGAAAA:8 a=OUXY8nFuAAAA:8 a=5X7pQ0OWmlG20kRLF3IA:9 a=pbxFD4ynq3rNf2me:21 a=z6U91yd1pYKWs-Yv:21 a=pILNOxqGKmIA:10 a=w1C3t2QeGrPiZgrLijVG:22 a=Yz9wTY_ffGCQnEDHKrcv:22 a=cAcMbU7R10T-QSRYIcO_:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version :Date:Message-ID:From:References:Cc:To:Subject:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=z1Na3Ynn9fsIHXau7xO4DSpCNmqHLMNYc+3MFAS9tAI=; b=NGH68CYev/6J8ErvhTg3UyepU5 lc0iKP0fj4Mdh0OOU0XnmHnuskJBol3uErt7pssXymXXeYIaXoF5XjcG2RdkaJfn/jhqU+r7ji1ky tjgnsAf3cj1JLAMdqGEkM0po0;
Received: from pool-100-15-84-20.washdc.fios.verizon.net ([100.15.84.20]:50112 helo=[IPv6:::1]) by box313.bluehost.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.87) (envelope-from <lberger@labn.net>) id 1dDzvv-0002nr-Re; Thu, 25 May 2017 15:04:35 -0600
To: John E Drake <jdrake@juniper.net>, Eric Rosen <erosen@juniper.net>, John Scudder <jgs@juniper.net>
Cc: "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-tunnel-encaps@ietf.org" <draft-ietf-idr-tunnel-encaps@ietf.org>
References: <2AEDAB02-02F4-46C2-92CA-8880BBAFAAAB@juniper.net> <213015a0-eb5f-3f17-f5f0-3aa864304a6d@labn.net> <c735e3fe-1b0e-23a6-78bf-7e773e605a52@juniper.net> <9a3866bf-a561-df26-38e9-aff3cc4f2eeb@labn.net> <5ec5e327-5872-2754-4543-19e3b3465a1c@juniper.net> <17d44a51-b48b-1541-afb4-9b3878436b47@labn.net> <4466bd05-0362-b4be-ecf8-5881e228722d@juniper.net> <CO2PR05MB618B4D4BC607325D25D29C0C7FF0@CO2PR05MB618.namprd05.prod.outlook.com>
From: Lou Berger <lberger@labn.net>
Message-ID: <6c89a60e-e205-223e-1823-c4b8499f1b2e@labn.net>
Date: Thu, 25 May 2017 17:04:23 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
In-Reply-To: <CO2PR05MB618B4D4BC607325D25D29C0C7FF0@CO2PR05MB618.namprd05.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - box313.bluehost.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - labn.net
X-BWhitelist: no
X-Source-IP: 100.15.84.20
X-Exim-ID: 1dDzvv-0002nr-Re
X-Source:
X-Source-Args:
X-Source-Dir:
X-Source-Sender: pool-100-15-84-20.washdc.fios.verizon.net ([IPv6:::1]) [100.15.84.20]:50112
X-Source-Auth: lberger@labn.net
X-Email-Count: 4
X-Source-Cap: bGFibm1vYmk7bGFibm1vYmk7Ym94MzEzLmJsdWVob3N0LmNvbQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/jYKqCKY6ex6mUiiBHyueqQd1ieY>
Subject: Re: [Idr] Working group last call for draft-ietf-idr-tunnel-encaps-04
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 May 2017 21:04:42 -0000

considering the impact of deprecating an RFC on other RFCs seems to me
to be a reasonable thing to cover in the rfc doing the deprecating...


On 5/25/2017 2:10 PM, John E Drake wrote:
>
> Hi,
>
>  
>
> Is it really the responsibility of  a RFC which obsoletes a another
> RFC to explain how every RFC referencing the obsoleted RFC is to be
> updated?  I think it’s a much better idea to  update each of these
> RFCs individually.  So, as Eric suggests, I think an update to RFC
> 5566 is in order.
>
>  
>
> Yours Irrespectively,
>
>  
>
> John
>
>  
>
> *From:*Idr [mailto:idr-bounces@ietf.org] *On Behalf Of *Eric C Rosen
> *Sent:* Thursday, May 25, 2017 1:54 PM
> *To:* Lou Berger <lberger@labn.net>; John Scudder <jgs@juniper.net>
> *Cc:* idr@ietf.org; draft-ietf-idr-tunnel-encaps@ietf.org
> *Subject:* Re: [Idr] Working group last call for
> draft-ietf-idr-tunnel-encaps-04
>
>  
>
> On 5/23/2017 12:10 PM, Lou Berger wrote:
>
>         RFC 5566 assumes that the IPsec tunnel info and the authenticator
>
>         sub-TLV is conveyed on an update of the encapsulation SAFI.   I'm not
>
>         convinced that there are no addtional security issues to be considered
>
>         if this information is carried on updates of other address families. 
>
>     I think the assumption is that the sub-TLVs are conveyed with the
>
>     attribute.  I don't see how changing the SAFI impacts this.
>
>
> I'm not saying that it does or does not, just that I'm not sure, and
> I'm not prepared now to defend a claim that the security aspects are
> not altered by this change.  So I'd rather see that addressed in a
> different document.
>
>
>      
>
>      
>
>         Also, note that in RFC 5512, the tunnels only extend to the BGP next
>
>         hop, while in the tunnel-encaps draft the tunnel endpoints are not
>
>         necessarily the BGP next hop.  This might also change some of the
>
>         security properties.  I think this would have to be thought out fairly
>
>         thoroughly, and I don't think that work's been done yet.
>
>     So leaving 5566 as is introduces this issue already (due to the
>
>     introduction of the remote endpoint sub-tlv).  If the we deprecate 5566
>
>     with this document, this can be trivially addressed by saying that the
>
>     endpoint Authenticator sub-tlv applies to the endpoint identified in the
>
>     Remote Endpoint Sub-TLV.
>
>
> I'm also not prepared to defend a claim that this is has no signficant
> impact to the security characteristics.
>
> Since the existing contents of the document do not depend upon
> anything in RFC 5566, I think obsoleting and replacing RFC 5566 is
> better done in a separate document .
>
>
>         I don't see how it could be correct for an implementation to always
>
>         include an Encapsulation EC.  Sometimes you need to specify more than
>
>         the tunnel type in order to construct the encapsulation properly.
>
>          
>
>     It doesn't "hurt" to include it always and there is an implementation
>
>     that does this, so why not allow it?
>
>      
>
>
> It seems to me that it does hurt to include it.  If the intended
> tunnel endpoint is not the BGP next hop, or if the tunnel will not
> work unless the encapulation is prepared as specified within the
> attribute, then including an encapsulation EC for the same tunnel type
> provides false information.
>
>
>     The use of multiple tunnels between a pair of endpoints seems to make
>
>     sense, especially if the tunnels have different characteristics, and if
>
>     color can be used to map particular traffic flows to particular
>
>     tunnels.  This is something that has not changed from RFC 5512.  Note
>
>     also that even the Encapsulation EC allows multiple tunnels to be
>
>     specifiied (if they are of different types), since an EC attribute can
>
>     contain multiple instances of the same extended community.
>
>      
>
>         I'm not arguing it that it's not a real use case, but rather that it can
>
>         be solved using other existing, albeit more verbose, mechanisms.
>
>          
>
>
> Allowing a choice of tunnels between a pair of endpoints should not
> require the origination of multiple routes with different NLRIs, or
> (even worse) the use of add-paths.  I don't really see the merit of
> this suggestion.
>
>
>         If you receive two routes, and
>
>         want to aggregate them so that you only need to propagate one upstream,
>
>         and the two routes have different tunnel-encaps attributes, you need
>
>         some policy to decide what to do.  But that's true even if the
>
>         tunnel-encaps attribute only specifies one tunnel.
>
>      
>
>     Sure, and the policy may be to merge the tlv lists.  This is the kind of
>
>     information I'm suggesting should be added.
>
>
> I think such policies will be very application-specific, and thus are
> out of scope of this document.  A draft proposing the use of the
> tunnel encaps attribute for a particular purpose might well have to
> deal with these policy issues.
>
>
>  
>
>  
>