Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community

Gyan Mishra <hayabusagsm@gmail.com> Wed, 28 February 2024 16:19 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20284C1516E0; Wed, 28 Feb 2024 08:19:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.995
X-Spam-Level:
X-Spam-Status: No, score=-1.995 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oZxUMOMmPv22; Wed, 28 Feb 2024 08:19:53 -0800 (PST)
Received: from mail-ej1-x62b.google.com (mail-ej1-x62b.google.com [IPv6:2a00:1450:4864:20::62b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9902C14F6F6; Wed, 28 Feb 2024 08:19:52 -0800 (PST)
Received: by mail-ej1-x62b.google.com with SMTP id a640c23a62f3a-a3e550ef31cso653861766b.3; Wed, 28 Feb 2024 08:19:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1709137191; x=1709741991; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=bvg2yQMJlhN/KrKxM5fFlhuj7F9yeRzH5RuiIvQPF8c=; b=GJ6sgsJ4kIGWG9hm2xxPlR76P768oi4N65IqbM71c0jGsLWrZeOyLiuoN9vLsz+SFx Ci8rG3ArOw/fXPTWLstX3B6F4H40rwHHayvJQhxg0uQJTr1Jbvhvp5jyfv0fP0sZGZwA G/pwnYo21DeYZUxQcOgWe/iA09WLjId5AFZ2cnPx9O8C4Tw0d1BiEPH84pEm6pcEhtIH VMaNlbTFqt6sD3U/QeZLiWCTd5WKpWlvC6+VSxdbhRm3Bw5GOeodDH/1NVXGhOlgwb3y OFbuDeyr0qc+y9btj6tf4A/c3LwFK5aXDlysji16JLkmwh9RjjyCIFfapOV5Rp4hnr/H oN6g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1709137191; x=1709741991; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=bvg2yQMJlhN/KrKxM5fFlhuj7F9yeRzH5RuiIvQPF8c=; b=v0KrsevXfNXzAcZri5H5UQ9tMHyZtREo5AVCakFcqxXB862GxVrd7HIH4UHxY+tCRy PbV65Hw9yTUDchQxUREFecErX78g5qif1lw5ZtHVE6qgHeyxtDObTnJOLluO76tM43U5 aIleO8wTrBK6DNGEdqnC7TPZEL+JvDR+2e1eZhKJb/plH1dzrpQxIbdz1gfzN7MTVLn7 QsOQTqfwwHNAoGbO+0KJCxkUKNRfrWyeQGgd8mgwfbrCeZAGVhVCwGhDahWZ0aiQsuRL ZtNeN2UxMMclcCfPWE/sVKBF+QU/r3B6ZOqBWgoAIvNKgFR7w1jSM7GZjjDvLNbF9Sew fQDw==
X-Forwarded-Encrypted: i=1; AJvYcCXFcD1Wd37+dxL0dvtL5hNN128d+Z+uTYR4BlkH5N+SvF/xk+7WBxJwoh5E46bGqK0FUqy+o3/BPW7aXN5v3wGIoDQlJzLcxhauCdoGDKcpuboaKsF/p6j4MPEuxRAQE5Hg/FQFCmWmEDxc
X-Gm-Message-State: AOJu0YwUNkRkCb7wrEnUPrYEue3fzs+Ypw1yReM8yIgoeWwNgfzI6uhX Za+wbiZdX50xqmuQP1Mx+9wGrG9C51HVR9q4E9UOddiPoiXaL8fBZ5IxRPyGuVXQZTHszt5WRUt u4rxkWBSAsq3yyk+qpSTn2TKDuCJ/VeWS
X-Google-Smtp-Source: AGHT+IF7x5dTZClA18yLvQ8UNJEqYgFp3QzraJFN6f1lZ9nnqyETuTib9g044hFGMuBYQVba0xw6PSLNjXBAeanpFwM=
X-Received: by 2002:a17:906:3b19:b0:a43:8c43:b702 with SMTP id g25-20020a1709063b1900b00a438c43b702mr151126ejf.8.1709137190599; Wed, 28 Feb 2024 08:19:50 -0800 (PST)
MIME-Version: 1.0
References: <7FDF55CE-3E6B-47EC-8504-C9884BD212A9@juniper.net> <CO1PR13MB4920A302CE1D5AE545CD243485592@CO1PR13MB4920.namprd13.prod.outlook.com> <3CC853C3-960C-4AE2-BB45-69E8F48356B9@juniper.net> <CO1PR13MB4920C89AD7FCF4245DF9444185592@CO1PR13MB4920.namprd13.prod.outlook.com> <CAOj+MMEpC5caAtKCLSc6MrHUX1Qa3gtPO919nYpk9jyTdYXuSA@mail.gmail.com> <1DB2D1F0-E0F9-41F6-B49A-0126D25BE2DD@juniper.net> <PH0PR13MB4922F82CF2D623474D4BD8A585582@PH0PR13MB4922.namprd13.prod.outlook.com> <A1DC1B7C-B767-48A9-9BEA-A5EFBE85E9C9@juniper.net> <CO1PR13MB4920A1105DE8C0461BA1614F85582@CO1PR13MB4920.namprd13.prod.outlook.com> <ACC38EDA-99CF-4036-B6E8-866853A068B4@juniper.net> <CO1PR13MB4920A008CD4854E99F8BA8B585582@CO1PR13MB4920.namprd13.prod.outlook.com> <D0C3031E-713E-4069-93B5-73FE6CABB5F0@juniper.net> <CABNhwV0-+skz86ASkFbNRHP3AnuGM2vDeRYKY_81mQBju_DNEQ@mail.gmail.com> <3D635EEE-AFEC-4096-86AD-C25275B2CE87@juniper.net>
In-Reply-To: <3D635EEE-AFEC-4096-86AD-C25275B2CE87@juniper.net>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Wed, 28 Feb 2024 11:19:36 -0500
Message-ID: <CABNhwV2mCG71FkmiqD64ykYez7VWhiukf=it2afh5VZucXDRPQ@mail.gmail.com>
To: John Scudder <jgs@juniper.net>
Cc: Linda Dunbar <linda.dunbar@futurewei.com>, Robert Raszuk <robert@raszuk.net>, "draft-ietf-idr-sdwan-edge-discovery@ietf.org" <draft-ietf-idr-sdwan-edge-discovery@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001e41ad0612738305"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/vwrjk-lxdgXPYIgdpxREV7_x03U>
Subject: Re: [Idr] Error in draft-ietf-idr-sdwan-edge-discovery use of Encapsulation Extended Community
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2024 16:19:57 -0000

Hi John

Yes that is what I was thinking to mark tunnel affinity.  Yep that would be
difficult since it’s separate from the tunnel endpoint TEA.  How to
correlate back to the tunnel endpoint would be tricky.

RFC 9012 deprecates RFC 5512 extended community but kept section 4.1 for
backwards compatibility to RFC 5512 and thus was encoded as a bare bones
TLV and not allowing sub TLVs.  In cases such as SD WAN draft and maybe
future use cases it would have been nice to allow for sub TLVs and not have
that restriction.

It seems the sub TLV restriction maybe was made for backwards compatibility
to RFC 5512?  What do you think?  Or maybe not.

Just wondering if would be worth an errata to lift the restriction since it
makes it difficult for the extended community to be useful.

I guess as you mentioned RFC 9012 could be updated adding a new TEA
extended community path attribute for future use cases such as this one.

Kind Regards

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *

*Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*



*M 301 502-1347*



On Wed, Feb 28, 2024 at 10:58 AM John Scudder <jgs@juniper.net> wrote:

> Hi Gyan,
>
> You mean, to mark tunnel-type affinity? I'm sure you could do that, but I
> don't see an advantage, especially since the tunnel endpoint information
> isn't going to be contained in ELC so the scope constraint feature doesn't
> end up covering the whole solution anyway. Also, as a practical matter, ELC
> hasn't reached RFC yet, so it would potentially be a downref, whereas
> extended communities are long-established.
>
> —John
>
> On Feb 28, 2024, at 10:51 AM, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>
>
>
> Hi Linda and John
>
> What if you use RCA in place of encapsulation extended community. This
> draft was the original ELC update to fix route leak issue and then was made
> generic next hop draft with ELC being the first use case.
>
> https://datatracker.ietf.org/doc/html/draft-ietf-idr-entropy-label-13
> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/draft-ietf-idr-entropy-label-13__;!!NEt6yMaO-gk!AbISHJTE2qZCfyfd3XGJSpgm968HdsNchYUKdZDzEQfGFNBWHOEJFCHL4WCdzPDY7fkeM1rLNwzs3puW_g$>
>
> John
>
> You are pretty familiar with this draft.  What do you think?
>
> Kind Regards
>
>
>
> <https://urldefense.com/v3/__http://www.verizon.com/__;!!NEt6yMaO-gk!AbISHJTE2qZCfyfd3XGJSpgm968HdsNchYUKdZDzEQfGFNBWHOEJFCHL4WCdzPDY7fkeM1rLNwyrvCsh7Q$>
> *Gyan Mishra*
> *Network Solutions A**rchitect *
> *Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*
>
>
> *M 301 502-1347 *
>
>
>
> On Tue, Feb 27, 2024 at 11:12 PM John Scudder <jgs=
> 40juniper.net@dmarc.ietf.org> wrote:
>
>> Well, you could use light red and dark red. Or you could use different
>> next hop addresses. Or you could invent a new kind of extended community to
>> indicate tunnel affinity. But Encapsulation Extended Community simply isn’t
>> defined to do what you want.
>>
>> —John
>>
>> On Feb 27, 2024, at 11:01 PM, Linda Dunbar <linda.dunbar@futurewei.com>
>> wrote:
>>
>> 
>>
>> [External Email. Be cautious of content]
>>
>>
>> John,
>>
>>
>>
>> The Color Extended Community alone is not enough.
>>
>> For example, one SD-WAN edge has 5 routes (Route #1 ~#5) with 3 types of
>> underlay paths (IPsec over Internet, SRv6 , and unsecure internet).
>>
>>
>>
>> Route #1 &  #2 have to be forwarded by SRv6, but Route #1 needs to use
>> the SRv6 Red Color paths, Route #2 needs to use the SRv6 Blue Color paths.
>>
>>
>>
>> In conclusion: SD-WAN routes (or customer traffic) need to have both
>> Encapsulation Extended Community and the Color Extended Community.
>>
>>
>>
>> Linda
>>
>>
>>
>> *From:* John Scudder <jgs@juniper.net>
>> *Sent:* Tuesday, February 27, 2024 9:14 PM
>> *To:* Linda Dunbar <linda.dunbar@futurewei.com>
>> *Cc:* Robert Raszuk <robert@raszuk.net>; idr@ietf.org;
>> draft-ietf-idr-sdwan-edge-discovery@ietf.org
>> *Subject:* Re: Error in draft-ietf-idr-sdwan-edge-discovery use of
>> Encapsulation Extended Community
>>
>>
>>
>> You could accomplish that using the Color Extended Community. See
>> second-last paragraph of Section 8.
>>
>>
>>
>> —John
>>
>>
>>
>> On Feb 27, 2024, at 9:31 PM, Linda Dunbar <linda.dunbar@futurewei.com>
>> wrote:
>>
>> 
>>
>> *[External Email. Be cautious of content]*
>>
>>
>>
>> John,
>>
>> Here is the SD-WAN scenario why simple Nexthop cannot do the job:
>>
>>
>>
>> Suppose one SD-WAN edge has 3 client routes (#1, #2, #3)  and multiple
>> underlay paths (public unsecure paths & private secure paths) to other peer
>> nodes:
>>
>> 1) The client route #1 needs to be forwarded by a private path (such as
>> network service provider's MPLS path),
>>
>> 2) The  client route #2 (at the same nextHop) can be forwarded by IPsec
>> SA or MPLS (i.e., the Hybrid tunnel described in the document)
>>
>> 3) The client route #3 can be forwarded by unsecure path (such as web
>> browsing traffic)
>>
>>
>>
>> When this SD-WAN edge advertises Client Route #1, it needs to indicate
>> the necessary encapsulation type to be MPLS.
>>
>> When this SD-WAN edge advertises the Client Route #2, it needs to
>> indicate the encapsulation type to be SD-WAN-Hybrid.
>>
>> When the SD-WAN edge advertises the Client Route #3, it only needs to
>> indicate the NextHop.
>>
>>
>>
>> Linda
>>
>>
>>
>> -----Original Message-----
>> From: John Scudder <jgs@juniper.net>
>> Sent: Tuesday, February 27, 2024 6:37 PM
>> To: Linda Dunbar <linda.dunbar@futurewei.com>
>> Cc: Robert Raszuk <robert@raszuk.net>; idr@ietf.org;
>> draft-ietf-idr-sdwan-edge-discovery@ietf.org
>> Subject: Re: Error in draft-ietf-idr-sdwan-edge-discovery use of
>> Encapsulation Extended Community
>>
>>
>>
>> Hi Linda,
>>
>>
>>
>> > On Feb 27, 2024, at 7:12 PM, Linda Dunbar <linda.dunbar@futurewei.com>
>> wrote:
>>
>> >
>>
>> > Our intent of using Encapsulation Extended Community is to indicate
>>
>> > that Client routes need to be forwarded by a tunnel, but there is too
>> much information about the  Tunnel attributes to be included in the Client
>> route advertisement and those attributes are associated with the WAN ports
>> (instead with Client Routes).
>>
>> >
>>
>> > We need to interpret the "barebones" as a hook to inform the peer nodes
>> to use information carried in  the second UPDATE to establish the tunnel
>> for the Client routes.
>>
>>
>>
>> I don’t see why you need any indication beyond the next hop. It’s both
>> necessary (so that the recipient can find the route that has the tunnel
>> information) and sufficient (because once it finds that route, it will see
>> it includes tunnel information). This is exactly what Section 8 explains.
>>
>>
>>
>> > I don't understand why RFC9012 doesn't allow this. What harm does it
>> cause?
>>
>>
>>
>> If RFC 9012 was still in draft, and you had suggested the idea above as a
>> change to the spec, we could have had this discussion. But it’s moot now —
>> RFC 9012 is what it is, and what it is, very specifically and precisely
>> does *not* allow a tunnel type that has mandatory sub-TLVs to be used as an
>> Encapsulation Extended Community, and does *not* require any additional
>> information beyond the next hop to “glue” a client route to an underlay
>> route that has a tunnel attribute.
>>
>>
>>
>> If you want to use RFC 9012, it is what it is. If you think (for some
>> reason I don’t yet understand) that you need to have an extra “hook” beyond
>> the next hop, you can specify some new thing to do that.
>>
>>
>>
>> —John
>>
>>
>>
>> _______________________________________________
>> Idr mailing list
>> Idr@ietf.org
>> https://www.ietf.org/mailman/listinfo/idr
>> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/idr__;!!NEt6yMaO-gk!AbISHJTE2qZCfyfd3XGJSpgm968HdsNchYUKdZDzEQfGFNBWHOEJFCHL4WCdzPDY7fkeM1rLNwxGOhWNWg$>
>>
>
>