Re: [Idr] Using BGP to advertise SD-WAN tunnels end point's private IPv6 addresses. (was registering tunnel types

Linda Dunbar <linda.dunbar@huawei.com> Mon, 05 November 2018 10:40 UTC

Return-Path: <linda.dunbar@huawei.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A271130934; Mon, 5 Nov 2018 02:40:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level:
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e3o6FwDSSbbo; Mon, 5 Nov 2018 02:40:45 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56DA112EB11; Mon, 5 Nov 2018 02:40:45 -0800 (PST)
Received: from lhreml704-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id DC9FBB5FC8E0D; Mon, 5 Nov 2018 10:40:41 +0000 (GMT)
Received: from SJCEML703-CHM.china.huawei.com (10.208.112.39) by lhreml704-cah.china.huawei.com (10.201.108.45) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 5 Nov 2018 10:40:42 +0000
Received: from SJCEML521-MBS.china.huawei.com ([169.254.2.103]) by SJCEML703-CHM.china.huawei.com ([169.254.5.104]) with mapi id 14.03.0415.000; Mon, 5 Nov 2018 02:40:37 -0800
From: Linda Dunbar <linda.dunbar@huawei.com>
To: Fred Baker <fredbaker.ietf@gmail.com>
CC: tom petch <ietfc@btconnect.com>, Joel Jaeggli <joelja@bogus.com>, "idr@ietf.org" <idr@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>
Thread-Topic: Using BGP to advertise SD-WAN tunnels end point's private IPv6 addresses. (was registering tunnel types
Thread-Index: AdR0BGE++Z0BF4I3RCC8M7+3nc3iHQBDGb8AAAd6+dA=
Date: Mon, 05 Nov 2018 10:40:36 +0000
Message-ID: <4A95BA014132FF49AE685FAB4B9F17F66B182B93@sjceml521-mbs.china.huawei.com>
References: <4A95BA014132FF49AE685FAB4B9F17F66B18249E@sjceml521-mbs.china.huawei.com> <6E397847-407E-4F69-AD31-E87D0001F603@gmail.com>
In-Reply-To: <6E397847-407E-4F69-AD31-E87D0001F603@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.126.174.222]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/y0X1ZSN5yunqp3SWUL-nQriJ7o4>
Subject: Re: [Idr] Using BGP to advertise SD-WAN tunnels end point's private IPv6 addresses. (was registering tunnel types
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Nov 2018 10:40:49 -0000

Fred, 

Thank you very much for the comments. 

Questions to you: 

If a CPE-1 has private IPv6 addresses for its ports behind NAT, and CPE-2 has IPv4 address, can CPE-1 communicate with CPE-2 by the NAT's IPv4 address? 

Linda

-----Original Message-----
From: Fred Baker [mailto:fredbaker.ietf@gmail.com] 
Sent: Monday, November 05, 2018 1:07 PM
To: Linda Dunbar <linda.dunbar@huawei.com>
Cc: tom petch <ietfc@btconnect.com>; Joel Jaeggli <joelja@bogus.com>; idr@ietf.org; int-area@ietf.org; ipv6@ietf.org
Subject: Re: Using BGP to advertise SD-WAN tunnels end point's private IPv6 addresses. (was registering tunnel types

Linda, I see a couple of issues here. Speaking as an individual.

First, IPv6 doesn't have private addresses, and in the general case doesn't use NATs. There is no direct counterpart to RFC 1918. The nearest parallel might be a ULA (RFC 4193), but they are by design not routable using BGP.

Second, yes NAT64 technology exists, but from a routing perspective the endpoint either has an IPv4 address or an IPv6 address, not an IPv6 address that is translated into an IPv4 address. That concept doesn't exist in routing.



> On Nov 4, 2018, at 1:13 PM, Linda Dunbar <linda.dunbar@huawei.com> wrote:
> 
> https://datatracker.ietf.org/doc/draft-dunbar-idr-bgp-sdwan-overlay-ext/ specifies a new BGP SAFI (=74) in order to advertise a SD-WAN edge node’s capabilities in establishing SD-WAN overlay tunnels with other SD-WAN nodes through third party untrusted networks.
> 
> Since a SD-WAN end point might use IPv6 private address, which is translated to IPv4 public address via NAT,  want to get IPv6 group & Inter Area WG feedback on the subTLV proposed in the draft:
> 
> EncapsExt sub-TLV is for describing additional information about the SD-WAN tunnel end-points, such as NAT property. A SD-WAN edge node can inquire STUN (Session Traversal of UDP Through Network Address Translation RFC 3489) Server to get the NAT property, the public IP address and the Public Port number to pass to peers.
> 
>      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |EncapExt Type  |  EncapExt subTLV Length       |I|O|R|R|R|R|R|R|
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     | NAT Type      |  Encap-Type   |Trans networkID|     RD ID     |
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |                Private  IP Address                            |
>             32-bits for IPv4, 128-bits for Ipv6
>                     ~~~~~~~~~~~~
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |                Private  Port                                  |
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |                Public IP                                      |
>             32-bits for IPv4, 128-bits for Ipv6
>                     ~~~~~~~~~~~~
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>     |                Public Port                                    |
>     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
> 
> Where:
> o       EncapExt Type: indicate it is the EncapExt SubTLV.
> o       EncapExt subTLV Length: the length of the subTLVE.
> o       Flags:
> o       I bit: if set to 0, indicate the private address is IPv4. If set to 1, it indicates the private address is IPv6.
> o       O bit: if set to 0, indicate the public address is IPv4. If set to 1, it indicates the public address is IPv6.
> o       R bits: reserved for future use. Must be set to 0 now.
> 
> o       NAT Type:without NAT; 1:1 static NAT; Full Cone; Restricted Cone; Port Restricted Cone; or Symmetric
> o       Encap Type:SD-WAN tunnel encapsulation types, such as IPsec+GRE, IPsec+VxLAN, IPsec without GRE, GRE (when tunnel is over secure underlay network)
> o       Transport Network ID:Central Controller assign a global unique ID to each transport network;
> o       RD ID:Routing Domain ID,Need to be global unique.
> o       Private IP:The local IP address of the tunnel end-point;
> o       Private Port:used by Remote SD-WAN node for establishing IPsec to this specific port.
> o       Public IP:The IP address after the NAT.
> o       Public Port:The Port after the NAT.
> 
> 
> Thank you very much for feedback.
> 
> Linda Dunbar
> 
> 
> -----Original Message-----
> From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of tom petch
> Sent: Friday, November 02, 2018 11:26 PM
> To: Joel Jaeggli <joelja@bogus.com>
> Cc: ipv6@ietf.org
> Subject: Re: registering tunnel types
> 
> ---- Original Message -----
> From: "Joel Jaeggli" <joelja@bogus.com>
> To: "tom petch" <ietfc@btconnect.com>
> Cc: <mohamed.boucadair@orange.com>; <ipv6@ietf.org>; "Alexandre 
> Petrescu" <alexandre.petrescu@gmail.com>
> Sent: Tuesday, October 30, 2018 8:23 PM
> 
> > On Oct 30, 2018, at 05:07, tom petch <ietfc@btconnect.com> wrote:
> >>
> >
> > Alex
> >
> > I agree, at least in part; tunnels and interfaces are different
> animals
> > and it is unfortunate that they were conflated in SMI.
> >
> > I was surprised that NETMOD had not produced a YANG module for 
> > tunnels but it seems that there has been no need for the past 
> > decade.  That said, I think that it is a good idea to have one.  
> > Whether or not it should mirror the Tunnel MIB I find more debatable.
> 
> It’s not entirely obvious to me that netted / netconfig would be where the tunnel models were produced.
> 
> They tend if fact to be produced by the tunnel protocol maintainers e.g.
> l3sm/l2sm/ccamp and so on. The management tools for a product tend to be developed itself in my experience.
> 
> <tp>
> 
> Joel
> 
> My concern is that something that cuts across a number of IETF WG should get adequate review.  The YANG interface module was much discussed in the netmod WG, with an existing MIB as guidance, before becoming an RFC.
> 
> The proposed YANG tunnel module, which borrows the concepts of the interface module, that additions should be made by the Tunnel MIB Designated Expert to a registry and then propagated to the Tunnel MIB and the Tunnel YANG module, has not been discussed in any WG.  The proposal, as I mentioned before, has been added to the I-D after IETF Last Call has been completed so appears to me to be the work of one individual, without any review; the I-D lists seven editors, six of whom appear to be absent.  TheWG mailing list seems devoid of any discussion.
> 
> I believe that the IETF succeeds because of peer review, and I struggle to see that here.
> 
> Tom Petch
> 
> > My own homework came across other IP in IP varieties which do not 
> > appear.
> >
> > Tom Petch
> >
> >
> >>
> >> Alex
> >>
> >>>
> >>> If you need a new value or if you have a question about a given
> > interface tunnel type, please follow the guidelines in the url cited 
> > above. All this is out of the scope of draft-ietf-softwire-yang.
> >>>
> >>> Cheers,
> >>> Med
> >>>
> >>>> -----Message d'origine-----
> >>>> De : ipv6 [mailto:ipv6-bounces@ietf.org] De la part de Alexandre
> > Petrescu
> >>>> Envoyé : jeudi 25 octobre 2018 09:54 À : ipv6@ietf.org Objet : Re:
> >>>> registering tunnel types
> >>>>
> >>>> Are:
> >>>> -IPv6 in UDPv4 and
> >>>> -IPv6 in IPv6 as used by openvpn;
> >>>>
> >>>> covered by the list below?
> >>>>
> >>>> These are a few tunnelling mechanisms I use routinely.
> >>>>
> >>>> Existing identity 6tofour should be deprecated, if that means 
> >>>> 6to4, which is deprecated.
> >>>>
> >>>> Existing identity iphttps has a version number for IP?
> >>>>
> >>>> Alex
> >>>>
> >>>> Le 24/10/2018 à 17:57, tom petch a écrit :
> >>>>> draft-ietf-softwire-yang
> >>>>> completed IETF Last Call two weeks ago and, since then, has
> > acquired a
> >>>>> YANG module that defines tunnel types, as listed below.  It is
> > intended
> >>>>> to be a IANA-maintained module and so changes to the list of
> > tunnels
> >>>>> will not require a reissue of the softwires RFC-to-be.  At the
> > same
> >>>>> time, getting it right first time never did any harm so if 
> >>>>> anyone
> > can
> >>>>> think of any missing, or can think of other places where there
> > might be
> >>>>> other tunnels lurking, now would be a good time to mention it.
> >>>>>
> >>>>> It is based on RFC4087 Tunnel MIB (which created an SMI Textual 
> >>>>> Convention that went up to Teredo) so tunnels from that vintage
> > are
> >>>>> likely well catered for.  softwires is not where I would have
> > first
> >>>>> looked for tunnel types, but it has a certain logic to it.
> >>>>>
> >>>>>       identity  other
> >>>>>
> >>>>>       identity direct
> >>>>>
> >>>>>       identity gre
> >>>>>
> >>>>>       identity minimal
> >>>>>
> >>>>>       identity l2tp
> >>>>>
> >>>>>       identity pptp
> >>>>>
> >>>>>       identity l2f
> >>>>>
> >>>>>       identity udp
> >>>>>
> >>>>>       identity atmp
> >>>>>
> >>>>>       identity msdp
> >>>>>
> >>>>>       identity sixtofour
> >>>>>
> >>>>>       identity sixoverfour
> >>>>>
> >>>>>       identity isatap
> >>>>>
> >>>>>       identity teredo
> >>>>>
> >>>>>       identity iphttps
> >>>>>
> >>>>>       identity softwiremesh
> >>>>>
> >>>>>       identity dslite
> >>>>>
> >>>>>       identity  aplusp
> >>>>>
> >>>>> Tom Petch
> >>>>>
> >>
> >>>> -----------------------------------------------------------------
> >>>> --
> -
> >>>>> IETF IPv6 working group mailing list ipv6@ietf.org 
> >>>>> Administrative
> >>>>> Requests:
> > https://www.ietf.org/mailman/listinfo/ipv6
> >>
> >>>> -----------------------------------------------------------------
> >>>> --
> -
> >>>>>
> >>>>
> >>
> >>> ------------------------------------------------------------------
> >>> --
> >>>> IETF IPv6 working group mailing list ipv6@ietf.org Administrative
> >>>> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >>
> >>> ------------------------------------------------------------------
> >>> --
> >>
> >> -------------------------------------------------------------------
> >> - IETF IPv6 working group mailing list ipv6@ietf.org Administrative 
> >> Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >> -------------------------------------------------------------------
> >> -
> >>
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list ipv6@ietf.org 
> > <mailto:ipv6@ietf.org> Administrative Requests: 
> > https://www.ietf.org/mailman/listinfo/ipv6
> <https://www.ietf.org/mailman/listinfo/ipv6>
> > --------------------------------------------------------------------
> 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------

--------------------------------------------------------------------------------
Victorious warriors win first and then go to war, Defeated warriors go to war first and then seek to win.
     Sun Tzu