Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Susan Hares <shares@ndzh.com> Wed, 28 February 2024 22:21 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 558A5C14F60A; Wed, 28 Feb 2024 14:21:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a9-ddd53poNo; Wed, 28 Feb 2024 14:21:16 -0800 (PST)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2133.outbound.protection.outlook.com [40.107.92.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 177FFC14F604; Wed, 28 Feb 2024 14:21:15 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=f44+CvVlToZVFqBgIwBTuY/+bgUQtrDf597kO7BFULtpvuWdH/UpLifIi/490T95aw1ewU6t33Rr5agugNwqPsZqjQ6gp4c8YwBwcE7EiQsbp3GKUQAwShZp0IDDMp5TQxPfUGyq87o+K7OGL80ToLCJDfsw9syoBwmzVLBzylGIz1fQz3SOEL0E+j3tqu1soRk5foMhTr3M5RYG1MzgSoYV+2uoPrn7oCRNY6VBvVCcED4PteYkWqij4cBdh9pBWf4g3Fr0olpmOnCsSlKDfoccuT3EKLsTNfj4M/Y8qoobmwwBbMHE4C9e1ISamqxxLk/FCBFZvLd1JcFhIg310A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jbfAan3ddfFpNFIo15oGUl25RCYnMdA7RJmVbM1nwI0=; b=LzvXhEL0pB6Gu2eXGRNDgZsMFWsNwxtDoihVXhHbsIx3TBKJL6HujQySBMWwTWCCtWUtwEI8hw3pwOevgjm2U4GzunJpTR8Oj7RoFiyNBGX+QTNCxdimKmanXxWmETXQ66uXsNPZuN9q9mkmoaJfOXx/03SkHtH5qfJQMUFllnhyTV2/Sj6nUM9LcLXhv55EGaI9lfLQsM9SQYbPTyIUh9cwD1wqrz5gsIcO2MIvjZkDjKFW/BWz2EPHnUlRiE+3bOphSwokLzX8elT62UxIVsaEx/8EGbquBJPM6uVI+JjYUb2FFXg0oDIH60oH4AtLnCAqDuUemMLMYJLQSTB/ww==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 104.47.59.168) smtp.rcpttodomain=futurewei.com smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=none (0)
Received: from BN0PR02CA0043.namprd02.prod.outlook.com (2603:10b6:408:e5::18) by CO1PR08MB6482.namprd08.prod.outlook.com (2603:10b6:303:9e::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.21; Wed, 28 Feb 2024 22:21:11 +0000
Received: from BN8NAM12FT087.eop-nam12.prod.protection.outlook.com (2603:10b6:408:e5:cafe::d9) by BN0PR02CA0043.outlook.office365.com (2603:10b6:408:e5::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7292.50 via Frontend Transport; Wed, 28 Feb 2024 22:21:10 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.59.168) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.59.168 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.59.168; helo=NAM12-DM6-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (13.59.96.180) by BN8NAM12FT087.mail.protection.outlook.com (10.13.182.111) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7339.22 via Frontend Transport; Wed, 28 Feb 2024 22:21:10 +0000
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2168.outbound.protection.outlook.com [104.47.59.168]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id C8AE2C361D; Wed, 28 Feb 2024 22:21:09 +0000 (UTC)
Received: from DM6PR08MB4857.namprd08.prod.outlook.com (2603:10b6:5:44::25) by SA1PR08MB7197.namprd08.prod.outlook.com (2603:10b6:806:1a9::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.41; Wed, 28 Feb 2024 22:21:07 +0000
Received: from DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e]) by DM6PR08MB4857.namprd08.prod.outlook.com ([fe80::1766:7272:5562:295e%6]) with mapi id 15.20.7316.039; Wed, 28 Feb 2024 22:21:07 +0000
From: Susan Hares <shares@ndzh.com>
To: Robert Raszuk <robert@raszuk.net>, Linda Dunbar <linda.dunbar@futurewei.com>, John Scudder <jgs@juniper.net>
CC: "idr@ietf.org" <idr@ietf.org>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Thread-Topic: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
Thread-Index: AQHaab1aJbLjWCwZYUyhASue85C1X7EewhRQgAAOvwCAAAHU0IAACaoAgAF0UrA=
Date: Wed, 28 Feb 2024 22:21:07 +0000
Message-ID: <DM6PR08MB485764381C8B5B75EBB82589B3582@DM6PR08MB4857.namprd08.prod.outlook.com>
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMEpC5caAtKCLSc6MrHUX1Qa3gtPO919nYpk9jyTdYXuSA@mail.gmail.com>
In-Reply-To: <CAOj+MMEpC5caAtKCLSc6MrHUX1Qa3gtPO919nYpk9jyTdYXuSA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-traffictypediagnostic: DM6PR08MB4857:EE_|SA1PR08MB7197:EE_|BN8NAM12FT087:EE_|CO1PR08MB6482:EE_
X-MS-Office365-Filtering-Correlation-Id: 741868d5-eafe-47ea-5003-08dc38ab9135
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: U2ynItQoP3b4TZugzmln6ZXk38HCm5dPefbM7Fb6cC4dP38woEQ5TeqTddARmV3JzFoV6H1tyQd9F+nHVX8Gmr5xQu4WBu8qstYdeKL6UdgLhLYaORNw3CzFqjj82Yr1ji/kA2FV50k7ZZB0S8QJtSlJlMyokbq1xQiy7krkz+ZnB0GZDtp0iUjtB9gXC5mq2nYjiWL/2bUj7vezcPnW3FE/QNGFdCw8/fg6Xo3Qy7tx9KUVBygYh0uSfak6cj8vyfgJkrDelhq9lWrUkwNXoCkT/G3efd2EM+xai4+m45u1qYD4kjFADFIwl+yObGmrsjJ+BpT+tPxIozxvzqfwaBGXENfkM+fLsPxvdDIKxiiCB2D5oFvJ5nZwWfw0PLaTqeALb6ztSpjCaBcpGF4SilynTw97z8WQPo6IKHCr7HKMoq4XRIze/c+i0X8IhJWfnP6JX1mfw4f2Oxy+Puoi/m70W2P/L6Jlb8BqUHfPssInOmFMpGd5IROt/qax5BaNj5oYVplCqksOoE/smzlVSSfHgRnA048v86v/SiTa/er69aIQ0EgarSng2k04aDRa9c3O+DUM27QkUWgpiZu5QGProawpwrH0VZ+Bolhr00wBWRJeNvs1Bc9i8SgLdgkDNc3cPxL50XFdNTPhBmt7Q1V/FyJ/MLOkkUHCDKHF1Jd0HCcUR9Lrrb4Mzs7hzJBTaB7hsQewUCSzg/ZkE9+pNj1DOpi1T+2z37B33Fl4N2A=
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR08MB4857.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(38070700009); DIR:OUT; SFP:1102;
Content-Type: multipart/alternative; boundary="_000_DM6PR08MB485764381C8B5B75EBB82589B3582DM6PR08MB4857namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR08MB7197
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.59.168]; domain=NAM12-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.59.168]; domain=NAM12-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: BN8NAM12FT087.eop-nam12.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 8cc1b792-149d-4d1d-0cb0-08dc38ab8f5e
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:13.59.96.180; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:NAM12-DM6-obe.outbound.protection.outlook.com; PTR:mail-dm6nam12lp2168.outbound.protection.outlook.com; CAT:NONE; SFS:(13230031)(36860700004)(82310400014); DIR:OUT; SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2024 22:21:10.5896 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 741868d5-eafe-47ea-5003-08dc38ab9135
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5; Ip=[13.59.96.180]; Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: BN8NAM12FT087.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR08MB6482
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/kzXWuPUB06hFNtVKm6JQ0Z3Lbfo>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 22:21:20 -0000

Robert:

[chair hat on]
If the text changes are minor, the text can go through a 2nd WG LC on text changes.  It is wiser to do a WG LC on changes to avoid legal issues.
[chair hat off]

[author hat on]
It is important for John in his discussion with the IESG to have a clear understanding of the Encapsulation Extended community + the use cases.   I hope my lengthy message points to similar usage in SR Policy (old te-policy).

The current draft-ietf-idr-sdwan-edge-discovery text does not clearly state the following two points regarding client routes:


  1.  What NLRIs are supported for client routes

Section 3:
 The text gives an example of 1/128


Section 5: Procedure text states:
“The SD-WAN network's Client Route UPDATE message is the same as the L3 VPN (AFI= 1 or 2, SAFI = 128) or EVPN client route UDPATE message.”

What needs to be improved: This needs to be tightened to the exactly which AFI/SAFI are supported for the client functions.


  1.  What type of encapsulation in each type of port:

Section 5.2 (see below) indicates

  *   MPLS link – will need to use the MPLS label encoding
  *   IP-SEC tunnel with GRE encapsulation inside [VPN ID = SD-WAN VPN-ID]
  *   IP-SEC tunnel with network overlay [VXLAN, GENEVE, etc].

This information needs to be passed in the SDWAN-NLRI + TEA.

Sue



Text reference for encapsulation.
==============
5.2. SD-WAN VPN ID in Data Plane
For an SD-WAN edge node which can be reached by both MPLS and IPsec paths, the client packets reached by MPLS network will be encoded with the MPLS Labels based on the scheme specified by [RFC8277].

For GRE Encapsulation within an IPsec tunnel, the GRE key field can be used to carry the SD-WAN VPN ID. For network virtual overlay (VxLAN, GENEVE, etc.) encapsulation within the IPsec tunnel, the Virtual Network Identifier (VNI) field is used to carry the SD-WAN VPN ID.



From: Robert Raszuk <robert@raszuk.net>
Sent: Tuesday, February 27, 2024 6:52 PM
To: Linda Dunbar <linda.dunbar@futurewei.com>; John Scudder <jgs@juniper.net>
Cc: idr@ietf.org; draft-ietf-idr-sdwan-edge-discovery@ietf.org
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi, I think John's point is that use of Encapsulation Extended Community as defined should be removed. RFC9012 leaves Encapsulation Extended Community for backwards compatibility so in the case of thi
External (robert@raszuk.net<mailto:robert@raszuk.net>)
  Report This Email<https://protection.inkyphishfence.com/report?id=bmV0b3JnMTA1ODY5MTIvc2hhcmVzQG5kemguY29tL2E0NDQ1MGIwYWUzMzA1MjhkN2Y2NTVhNjU4YzI4ZDliLzE3MDkwNzc5MjEuMDQ=#key=e7dc1f7d064030095025e29f21ff687e>  FAQ<https://www.godaddy.com/help/report-email-with-advanced-email-security-40813>  GoDaddy Advanced Email Security, Powered by INKY<https://www.inky.com/protection-by-inky>

Hi,

I think John's point is that use of Encapsulation Extended Community as defined should be removed.

RFC9012 leaves Encapsulation Extended Community for backwards compatibility so in the case of this draft can be avoided/removed and we can signal encap using Tunnel Encapsulation Attribute.

If the references to use of Encapsulation Extended Community is removed I am not sure if this requires new LC as it does not introduce any new feature.

Thx,
R.



On Wed, Feb 28, 2024 at 12:35 AM Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
John,

See the answers below:

-----Original Message-----
From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
Sent: Tuesday, February 27, 2024 5:10 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Cc: idr@ietf.org<mailto:idr@ietf.org>; draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Hi Linda,

What are the semantics of a Tunnel Encapsulation path attribute, with tunnel type = SD-WAN-Hybrid, and no sub-TLVs other than egress endpoint?

[Linda] There ARE sub-TLVs under the Tunnel Encapsulation Path Attribute, which specifies the detailed attributes associated with the IPsec tunnel for the SD-WAN Edge’s WAN Ports. I am trying to say that there are NO sub-TLVs under the client routes UPDATE (which has Encapsulation Extended Community)

draft-ietf-bess-bgp-sdwan-usage-20 describe how to use BGP,  stating There are two UPDATE2:
1) UPDATE 1 is for Client Route UPDATE (which follows the traditional BGP-based client routes)
2) UPDATE 2 for the Edges to advertise the WAN port information. In the UPDATE2, the Route prefix is the WAN port address.

draft-ietf-idr-sdwan-edge-discovery-12 specifies the detailed BGP extension for UPDDATE2. The UPDATE 2 has Tunnel Encapsulation Path Attribute with a new NLRI for Underlay Tunnel Update and the sub-TLVs specified in the document.

Linda

—John

> On Feb 27, 2024, at 6:03 PM, Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
>
>
> [External Email. Be cautious of content]
>
>
> John  The  Encapsulation Extended Community is only in the client routes BGP UPDATE, which is the BGP-based VPN/EVPN client routes UPDATE message. There are no sub-TLVs added. Section 6's first paragraph states the Client Route UPDATE follows the BGP-based VPN/EVPN client route UPDATE message..  The sub-TLVs discussed in the draft are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) which DOES NOT have Encapsulation Extended Community for SD-WAN edges to advertise the information about their WAN ports. Please see below for the details.
>  p.s. Are you referring to version-20?   Linda
> -----Original Message-----
> From: John Scudder <jgs@juniper.net<mailto:jgs@juniper.net>>
> Sent: Tuesday, February 27, 2024 2:42 PM
> To: draft-ietf-idr-sdwan-edge-discovery@ietf.org<mailto:draft-ietf-idr-sdwan-edge-discovery@ietf.org>
> Cc: idr@ietf.org<mailto:idr@ietf.org>
> Subject: Error in draft-ietf-idr-sdwan-edge-discovery use of
> Encapsulation Extended Community  Hi Authors, WG,  I just noticed
> draft-ietf-idr-sdwan-edge-discovery-12 and was looking at its use of RFC 9012. There seems to be a fundamental misunderstanding of how the Encapsulation Extended Community can be used, and I thought you should be aware of it. TL;DR, you’re specifying the use of SD-WAN-Hybrid tunnel type in an Encapsulation Extended Community, but this isn’t allowed. Details follow.
>  [Linda] That is just an example for needing a different Tunnel Type
> in the Encapsulation Extended Community
>  - RFC 9012, Section 4.1 tells us that the only permissible use of the Encapsulation Extended Community is when there are *no sub-TLVs*, other than the Address Family sub-TLV (item 3 in the list of conditions).
> [Linda] That is our understanding as well. This document doesn’t specify additional sub-TLVs to be added to the BGP UPDATE with the Encapsulation Extended Community.
>  - In draft-ietf-idr-sdwan-edge-discovery-12 Section 6.3 we see the definition of the IPsec-SA-ID Sub-TLV of the SD-WAN-Hybrid tunnel type. This seems pretty central to the purpose of the spec. So, the SD-WAN-Hybrid tunnel type does have sub-TLVs in addition to the Address Family, and therefore MUST NOT be used in an Encapsulation Extended Community.
> [Linda] All those sub-TLVs are NOT used with Encapsulation Extended Community. Those Sub-TLVs are under the Tunnel Encapsulation Path attribute in a separate UPDATE (U2 in the document) for SD-WAN edges to advertise the information about their WAN ports. There is no Encapsulation Extended Community included when an edge node advertises its WAN port information. Please see Section 5 for BGP Walk Through details.
>  - Also, in draft-ietf-idr-sdwan-edge-discovery-12 Section 5.1 we see that the client route update uses the Encapsulation Extended Community (emphasis added):
>  [Linda] The Client Route UPDATE can use the Extended Community to indicate that their associated tunnel information is advertised by separate UDPATE. The purpose is to reduce the size of the Clint Route UPDATE message size because the tunnel associated with IPsec has a lot of information to be exchanged. They don’t change at the same frequency as the Client Routes.
> ```
> 5.  Client Route UPDATE
>     The SD-WAN network's Client Route UPDATE message is the same as the
>    L3 VPN or EVPN client route UDPATE message.  The SD-WAN Client Route
>    UPDATE message uses the **Encapsulation Extended Community** and the
>    Color Extended Community to link with the SD-WAN Underlay UPDATE
>    Message.
> ```
>  - It’s clear from other parts of the spec that the tunnel type is SD-WAN-Hybrid, for example, this is both stated in Section 3.3, and then used in the example (same section).
> [Linda] The Client Route Update message is NOT using RFC9012. Here is to indicate that another type might be needed. As this is a BGP usage draft, with the intent to explain how to use BGP, with the justification to BGP extension later.  - But RFC 9012 §4.1 told us we can’t use a tunnel type with sub-TLVs as an Encapsulation Extended Community!
> [Linda] The Client Route Update message is NOT using RFC9012.
>  I think what you really must be trying to do is use the Tunnel Encapsulation attribute (only!) to carry the SD-WAN-Hybrid in the SD-WAN Underlay route, and then have the client routes making use of that tunnel recurse into the underlay route (including tunnel) as per RFC 9012 Section 8. Note that Section 8 does NOT require that the client route carry the Encapsulation Extended Community — the next hop address is both necessary and sufficient to effectuate the linkage to the underlay route.
> [Linda] You are correct. The Tunnel Encapsulation Attribute is used to carry the SD-WAN-Hybrid for SD-WAN edge nodes to advertise the WAN ports (i.e. the under route).
>    Thanks,
>  —John