[Idr] FW: New Version Notification for draft-hujun-idr-bgp-ipsec-01.txt

"Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com> Thu, 05 September 2019 17:31 UTC

Return-Path: <jun.hu@nokia.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 370671202A0 for <idr@ietfa.amsl.com>; Thu, 5 Sep 2019 10:31:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KhNrKTqlcrqT for <idr@ietfa.amsl.com>; Thu, 5 Sep 2019 10:31:43 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60116.outbound.protection.outlook.com [40.107.6.116]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9718E120086 for <idr@ietf.org>; Thu, 5 Sep 2019 10:31:43 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=X1LthPXUb+id/tenGz6t4aCljjpNPETKTq/lOJToWA/pjBRetwkzMRRrQCpP2E+etc6bnSnhdeeZa5P61+SLwVMIfQlaLCpmLXNQtqNMcjm8w4u9zmowuxoz0iDP4pgYxr+uxXuNc9CgfR+y/jtuxTIvZsimhwqYrGhEsgQpKI8jbYLhsinNbPgOitjA7SSDuO1KEIs6YaOwzo61g7YfmCahBxMG7o0ecvPHaCIFJdZMW6/W1dnLrabBbVUrZ2IdXcIz5/ztmPTaaHiKeCAERVJgVqruvXnLcwMI4+cNFkdK3Z37Yy9VmEnX1S1nXu2kQ81DLgX6w6Dh1hnnFNlnrQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VOF2BreNhKI2MeM1OcHf8n9GKPgJ1r95mQZcFC9NQSg=; b=lLEzku6qiUSWW/EMbqbyulytvscw2Y7FRB68LXtPHj71V9EIp6sNKvR7XEEerAz6HIJ2TBujh1uWbusVcB7TW3UqoJcwh8OOpFQ0O9hXkAgvJ12uYHu18QL4RwrO7ty3jKd6YEVdGLch3+Sl8AQfhOSxoiIXSeXX+VgTLS2nsk8TBdngqcqPcN5UbjL8ZEfTV3sWvyj1UPLI74+7NfBJhopyw60aEhHEzi/w58cAtUvBOKIVJtifggMvHGVg4ayWWXkGvQeuEC7xbel9vmoJtYGKK6vPsSs8fzAutq7G7IlMSVCGx5CAVoxQijuXRFv1f4y2unio4Gd+LzJX/mnD7Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=VOF2BreNhKI2MeM1OcHf8n9GKPgJ1r95mQZcFC9NQSg=; b=YvUxse7UD0eqiCda1RFW8/qVdu3SRlmdlnD46xkSK+iud7+5zn1vMqnSBckBWXBdnZkRc68uXSufqa7uwBEZDy4N7e/d6J1CfNyj7Fn8ARS/OETitNZFpIWiKkZTYuznDbgDHnfr7ik6JMqMmTi7yRm2Qlz7HrUG9aUB3CPvdF4=
Received: from AM5PR0701MB2353.eurprd07.prod.outlook.com (10.169.150.18) by AM5PR0701MB2338.eurprd07.prod.outlook.com (10.169.152.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2263.7; Thu, 5 Sep 2019 17:31:41 +0000
Received: from AM5PR0701MB2353.eurprd07.prod.outlook.com ([fe80::405a:9e2:2599:d8c6]) by AM5PR0701MB2353.eurprd07.prod.outlook.com ([fe80::405a:9e2:2599:d8c6%5]) with mapi id 15.20.2241.014; Thu, 5 Sep 2019 17:31:41 +0000
From: "Hu, Jun (Nokia - US/Mountain View)" <jun.hu@nokia.com>
To: "idr@ietf.org" <idr@ietf.org>
CC: Paul Wouters <paul@nohats.ca>, Benjamin Kaduk <kaduk@mit.edu>
Thread-Topic: New Version Notification for draft-hujun-idr-bgp-ipsec-01.txt
Thread-Index: AQHVY6wB6d8bACpPXUuJQnI/R+pBAKcdVNkQ
Date: Thu, 5 Sep 2019 17:31:41 +0000
Message-ID: <AM5PR0701MB2353B420122A519C235DC3EF95BB0@AM5PR0701MB2353.eurprd07.prod.outlook.com>
References: <156766184602.22837.3945006842970068999.idtracker@ietfa.amsl.com>
In-Reply-To: <156766184602.22837.3945006842970068999.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jun.hu@nokia.com;
x-originating-ip: [2601:646:8500:5ce4:8cc7:eb0d:eb2f:c46]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9784d10e-bcc8-43d0-e4ae-08d73226ea14
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600166)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:AM5PR0701MB2338;
x-ms-traffictypediagnostic: AM5PR0701MB2338:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <AM5PR0701MB23388B2A03DAFCAD72341B6A95BB0@AM5PR0701MB2338.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 015114592F
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(346002)(136003)(366004)(39860400002)(396003)(376002)(13464003)(189003)(199004)(15650500001)(52536014)(6116002)(76116006)(66446008)(64756008)(66556008)(53546011)(66476007)(6506007)(5660300002)(229853002)(66946007)(55016002)(14444005)(256004)(102836004)(7736002)(316002)(54906003)(186003)(2351001)(2906002)(74316002)(305945005)(6916009)(11346002)(446003)(66574012)(33656002)(5640700003)(476003)(6436002)(76176011)(99286004)(86362001)(478600001)(71200400001)(71190400001)(25786009)(46003)(2501003)(53936002)(4326008)(8936002)(81166006)(81156014)(8676002)(1730700003)(486006)(2473003)(966005)(6306002)(7696005)(14454004)(9686003); DIR:OUT; SFP:1102; SCL:1; SRVR:AM5PR0701MB2338; H:AM5PR0701MB2353.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: c8nETYnsiksBWgniuluKrVjHWuS1RQd/wuz4VpzSC87r4S8FafG881H3BFyMMlAekmlW7KWYEFarq6Cng/h8vDp6lfnKVZz0xHaGKp8HQaq6z63ZcVRa4KgYfUSlpagq3+VAXEwE5ZgUNjumqBc74PLF9LdBGdrI8Ro52HWz1UEbsW8mKUvSpE0aT9tlkvty707BPlYctb17VSD/EQ3W2HesTRzF0dnIonvJxLRazFg5OFGrPpW32KCnNamggh/uHfbyaTvaNlKVB701xKGGTZPyMe8gfoy4Z4Eypr9y7UDN/FK8TWsL6zxyV+53isxPu4fBP6hlISZi8aEYvGOaACvYok0R5Wstiebb9sDUfqxVd06NCIr9sKn4dspm9jXjEBbIBdiR/iZE5geGwulyLxhmLSRdR89SYNDbvnIK6b8=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9784d10e-bcc8-43d0-e4ae-08d73226ea14
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Sep 2019 17:31:41.2658 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 0j/WNnnDpzqKjWJ72O+YfLQd4mTzJztwjUjBxsigED/6SrsKProjERIGbr3Fj4zI/61vRWP2cVdOFn/RQd+4Gg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0701MB2338
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/g_IP-jm9HdJXgdABtfyq6Mtxd5A>
Subject: [Idr] FW: New Version Notification for draft-hujun-idr-bgp-ipsec-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Sep 2019 17:31:46 -0000

Hi,
I have posted an update of my draft, following are the updates, should address the comments I have received so far,  review and comment are appreciated!
And regard IPsec transport mode protecting tunnel, like GRE with IPsec transport mode, requires quite different design from IPsec tunnel mode, and since it is not really tunnel stack/nest, so current ietf-idr-tunnel-encaps doesn't have mechanism to cover such case, I plan to submit a separate draft for Ipsec transport mode protecting tunnel;

      *  replaces color sub-TLV with a new IPsec configuration tag sub-
         TLV
      *  add rule on selecting TLV when there multiple feasible TLVs in
         Section 3
      *  change crypto used in example of Section 3
      *  change title from "BGP Signaled IPsec Tunnel Configuration" to
         "BGP Provisioned IPsec Tunnel Configuration"
      *  Add a Section 4.2 on some operation specifics
      *  add more content in Section 6
      *  add specification of number of time each new sub-TLV allowed in
         a given tunnel TLV
      *  add clarification in Section 1 to clarify IPsec tunnel
         means IPsec tunnel mode
      *  traffic selector protocol and port range now come from tag
         mapped configuration
 


-----Original Message-----
From: internet-drafts@ietf.org <internet-drafts@ietf.org> 
Sent: Wednesday, September 4, 2019 10:37 PM
To: Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com>om>; Hu, Jun (Nokia - US/Mountain View) <jun.hu@nokia.com>
Subject: New Version Notification for draft-hujun-idr-bgp-ipsec-01.txt


A new version of I-D, draft-hujun-idr-bgp-ipsec-01.txt has been successfully submitted by Hu Jun and posted to the IETF repository.

Name:		draft-hujun-idr-bgp-ipsec
Revision:	01
Title:		BGP Provisioned IPsec Tunnel Configuration
Document date:	2019-09-04
Group:		Individual Submission
Pages:		15
URL:            https://www.ietf.org/internet-drafts/draft-hujun-idr-bgp-ipsec-01.txt
Status:         https://datatracker.ietf.org/doc/draft-hujun-idr-bgp-ipsec/
Htmlized:       https://tools.ietf.org/html/draft-hujun-idr-bgp-ipsec-01
Htmlized:       https://datatracker.ietf.org/doc/html/draft-hujun-idr-bgp-ipsec
Diff:           https://www.ietf.org/rfcdiff?url2=draft-hujun-idr-bgp-ipsec-01

Abstract:
   This document defines a method of using BGP to provide IPsec tunnel
   configuration along with NLRI, it uses and extends tunnel
   encapsulation attribute as specified in [I-D.ietf-idr-tunnel-encaps]
   for IPsec tunnel.

                                                                                  


Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat