Re: [IPsec] New draft for addressing ADVPN (draft-sathyanarayan-ipsecme-advpn-00)

Yoav Nir <ynir@checkpoint.com> Sun, 07 July 2013 06:30 UTC

Return-Path: <ynir@checkpoint.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0341E21F9E3A for <ipsec@ietfa.amsl.com>; Sat, 6 Jul 2013 23:30:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.528
X-Spam-Level:
X-Spam-Status: No, score=-10.528 tagged_above=-999 required=5 tests=[AWL=0.071, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i4X5FT3zkRdk for <ipsec@ietfa.amsl.com>; Sat, 6 Jul 2013 23:30:18 -0700 (PDT)
Received: from smtp.checkpoint.com (smtp.checkpoint.com [194.29.34.68]) by ietfa.amsl.com (Postfix) with ESMTP id BF36A21F9E2C for <ipsec@ietf.org>; Sat, 6 Jul 2013 23:30:17 -0700 (PDT)
Received: from IL-EX10.ad.checkpoint.com ([194.29.34.147]) by smtp.checkpoint.com (8.13.8/8.13.8) with ESMTP id r676Tst9012131; Sun, 7 Jul 2013 09:29:55 +0300
X-CheckPoint: {51D90AE2-0-1B221DC2-1FFFF}
Received: from DAG-EX10.ad.checkpoint.com ([169.254.3.48]) by IL-EX10.ad.checkpoint.com ([169.254.2.26]) with mapi id 14.02.0342.003; Sun, 7 Jul 2013 09:29:54 +0300
From: Yoav Nir <ynir@checkpoint.com>
To: Paul Hoffman <paul.hoffman@vpnc.org>
Thread-Topic: [IPsec] New draft for addressing ADVPN (draft-sathyanarayan-ipsecme-advpn-00)
Thread-Index: AQHOerzr9OayIPk4pkqQfzI+NF40QZlYjvmA
Date: Sun, 07 Jul 2013 06:29:55 +0000
Message-ID: <209064D8-D0E5-4B8A-82D9-C2DA3B60E173@checkpoint.com>
References: <CDFE22C0.546B4%praveenys@juniper.net> <85C666C9-A2D2-4F27-938E-4CD86D902A22@vpnc.org>
In-Reply-To: <85C666C9-A2D2-4F27-938E-4CD86D902A22@vpnc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [172.31.24.33]
x-kse-antivirus-interceptor-info: protection disabled
x-cpdlp: 118f9b4956168e9e4210d9487b63b8f8086742ee20
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <F9EBD03A52664943B1A153F41A255D91@ad.checkpoint.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: IPsecme WG <ipsec@ietf.org>, Praveen Sathyanarayan <praveenys@juniper.net>
Subject: Re: [IPsec] New draft for addressing ADVPN (draft-sathyanarayan-ipsecme-advpn-00)
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 07 Jul 2013 06:30:24 -0000

On Jul 7, 2013, at 5:51 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:

> On Jul 6, 2013, at 7:46 PM, Praveen Sathyanarayan <praveenys@juniper.net> wrote:
> 
>> We have "Appendix B Comparison Against ADVPN Requirements². This section
>> compares draft-ietf-ipsecme-ad-vpn-problem this proposed ADVPN protocol. I
>> believe, we meet the requirement completely. We welcome your feedback on
>> it. 
> 
> Sorry, I was being too terse. The appendix lists the requirements, but doesn't say how well the authors think they met or didn't meet each one. Are there requirements you feel that the proposal covers less well than others?

Hi Paul

I don't know if I speak for all the authors, but I think the draft covers all the absolute requirements, as in #2: "ADVPN peers MUST allow IPsec Tunnels to be setup with other members of the ADVPN without any configuration changes, even when peer addresses get updated every time the device comes up.". Yes, our document allows this. Where I feel there is still room for improvement is where the requirements are stated as "should be minimal" or "should be simple". Specifically:

Requirement #1: "For any network topology ... gateways and endpoints SHOULD minimize configuration changes when a new gateway or endpoint is added, removed or changed."
If Endpoint E sends traffic to networks b, c, and d through gateway G, then our protocol allows gateway G to introduce E to another gateway, say H, and to instruct E to send traffic to network c through gateway H. In a hub-and-spoke configuration, that means that endpoint E has to be preconfigured with all of the addresses in the ADVPN. So if we add a gateway (with its associated network) this new network has to be configured on all endpoints. This is not minimal. We are considering two ways of fixing this:
 1. Begin with all traffic going through the hub gateway, and add a "BYPASS" shortcut to tell the gateway about all the traffic that needs not be sent through the hub, or
 2. Introduce a "trusted peer" that can send shortcuts for any traffic selector, not just delegate what our policy already says to send through it.
Feedback about these two options will be highly appreciated.


Requirement #8: work behind NAT. In this version of the document, the gateway sending the SHORTCUT messages (the suggester) has done IKE_AUTH with both spokes, and knows whether one or the other is behind NAT. If one is behind NAT and the other is not, it can tell the one behind the NAT to be the initiator. If both are behind NAT, it can and should avoid suggesting a shortcut. We think this can be improved upon. After all, VoIP applications such as Skype manage to work pretty much anywhere where there isn't a firewall that is actively blocking them. We have considered adding NAT traversal mechanisms such as STUN, but we need to get more knowledge on the subject before we're ready to add this to our solution.


Requirement #15: per-peer QoS. Our protocol does not prevent peers from setting up multiple tunnels for multiple QoS classes. However, the SHORTCUT notification does not contain any QoS policy. So assuming that peer A learned of peer C through a message from peer B, it's unreasonable to believe that it would have a QoS policy for peer C. Not sure we need to do anything about this, but we'd be happy for people to tell us differently.

Yoav