Re: [Int-area] Some thoughts on draft-yong-intarea-inter-sites-over-tunnels

Joe Touch <touch@isi.edu> Tue, 06 December 2016 21:29 UTC

Return-Path: <touch@isi.edu>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50F79129CA4 for <int-area@ietfa.amsl.com>; Tue, 6 Dec 2016 13:29:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.796
X-Spam-Level:
X-Spam-Status: No, score=-9.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-2.896] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7uBW5J2mMMhe for <int-area@ietfa.amsl.com>; Tue, 6 Dec 2016 13:29:13 -0800 (PST)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DBF2129C9B for <int-area@ietf.org>; Tue, 6 Dec 2016 13:29:13 -0800 (PST)
Received: from [192.168.1.189] (cpe-172-250-251-17.socal.res.rr.com [172.250.251.17]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id uB6LSSK1021828 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 6 Dec 2016 13:28:30 -0800 (PST)
To: "Templin, Fred L" <Fred.L.Templin@boeing.com>, Lucy yong <lucy.yong@huawei.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>, "int-area@ietf.org" <int-area@ietf.org>
References: <2a8ef418-91dc-b0c5-1384-203b4fde3830@gmail.com> <982c4212-34cb-21f1-c8a8-a23df18d5c30@isi.edu> <1ced07df7e8c453f8c0821363bc5604e@XCH15-06-08.nw.nos.boeing.com> <137debc3-eb11-5c13-884e-d8f6598e8ec9@isi.edu> <30ad1018463746b3b7ef5d864abc9ff3@XCH15-06-08.nw.nos.boeing.com> <e23fc6bd-c95d-9d38-74e1-c040bffe653f@isi.edu> <25503919e279426eb5fd827acf14d9c4@XCH15-06-08.nw.nos.boeing.com> <ceaf3563-ec86-8fe0-f67d-f50e9b9586ae@isi.edu> <05616d07ab3f420a8c0bd5556837d788@XCH15-06-08.nw.nos.boeing.com> <de82e183-f6dd-b872-eb21-981d57218a81@isi.edu> <a5713afee0f84c008e080f730350ed93@XCH15-06-08.nw.nos.boeing.com> <f69d6b1f-19fa-cb8d-f319-a18f7130bee6@isi.edu> <d9da3c70fcba42ddb6c7a60d8e80b6b4@XCH15-06-08.nw.nos.boeing.com> <622a5176-2b39-f08d-d31c-67aa076d52d6@isi.edu> <19fdababf617416ba19755fce7e2fcb7@XCH15-06-08.nw.nos.boeing.com> <c4cc5ab0-32b2-eff5-38de-803595263b21@isi.edu> <76d6861a032e444193553fe045a41eca@XCH15-06-08.nw.nos.boeing.com>
From: Joe Touch <touch@isi.edu>
Message-ID: <d6ef34df-3ff9-f989-1d5e-beafd512ff8a@isi.edu>
Date: Tue, 06 Dec 2016 13:28:27 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1
MIME-Version: 1.0
In-Reply-To: <76d6861a032e444193553fe045a41eca@XCH15-06-08.nw.nos.boeing.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/5CbubWuZe7zMfMJSs_H14EvhcCs>
Subject: Re: [Int-area] Some thoughts on draft-yong-intarea-inter-sites-over-tunnels
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Dec 2016 21:29:14 -0000

Fred,

...
>> A standard host Redirect affects only one host. This affects the entire
>> subnet and needs better protection - which isn't always available.
> That is what I said - several times. And, that is why RFC6706 specifies
> mitigations for links where insider attacks may be a concern. For other
> links, it could be that no mitigations are necessary.
>
> The due diligence of RFC6706 is a matter that I think should be appreciated
> and not scorned.

I never scorned it; I just said that it's not complete.

If this is to be a generally useful mechanism, it needs to come out of
the AERO spec and be described as a direct extension to IPv6 ND
redirects, but that requires a much more detailed discussion of the
security requirements and how they can be achieved in existing IPv6
deployments.

>
>>>>> AERO uses the NBMA tunnel virtual link model meaning that IPv6 ND works
>>>>> the same as for an NBMA physical link. The model supports traffic engineering,
>>>>> multi-homing, route optimization, fault tolerance, mobility management and
>>>>> security. Do you have a solution for these that does not require new code?
>>>> I already mentioned it - existing IP forwarding with virtual L2
>>>> interfaces. The existing IP forwarding supports TE, multihoming, route
>>>> optimization, etc - all without any new code.
>>> I am talking about traffic engineering in terms of selecting one or more underlying
>>> interfaces in the both the outbond and inbound directions.
>> Sure - the problem is that you have two different TEs running:
>>
>> - the main IP forwarding TE that picks the interface
> The main IP forwarding code will always pick the (singular) areo0 interface.
If there are multiple interfaces, why would it pick aero0? And what
would its QoS be? It can't have a single value, so the main IP
forwarding code can't decide between aero0 and other interfaces.

>
>> - the intra-interface forwarding that picks the L2 encaps
> Yes.
>
>> That means the main TE is basically blind to the TE over the subnet.
> So what?
That means you potentially have two TEs fighting each other. I

>
>> If you do this with separate L2 VIFs, the main TE can pick the VIF itself.
> The interface does the right thing.
The interface can only do the right thing with the traffic it has
already been given by the main IP forwarder. It can't collaborate with
that forwarder.

>
>> Everything you want can be done by the main IP forwarding engine -
>> including ECMP.
> You didn't address the point about mobility, nor the other points I raised.
> Are you aware of a mobility solution that requires no supporting code?
The other cases are either handled by existing IP forwarding or require
exactly the same amount of mechanism inside the IP forwarder that you
implement in the interface instead (e.g., for mobility and dogleg
redirection).

Joe