Re: [IPsec] Some comments / questions on draft-ietf-ipsecme-ad-vpn-problem
Vishwas Manral <vishwas.ietf@gmail.com> Sat, 24 November 2012 17:21 UTC
Return-Path: <vishwas.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BFF921F8496 for <ipsec@ietfa.amsl.com>; Sat, 24 Nov 2012 09:21:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.458
X-Spam-Level:
X-Spam-Status: No, score=-2.458 tagged_above=-999 required=5 tests=[AWL=-0.060, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_13=0.6, J_CHICKENPOX_14=0.6, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2VnM8CU-7+rP for <ipsec@ietfa.amsl.com>; Sat, 24 Nov 2012 09:21:12 -0800 (PST)
Received: from mail-lb0-f172.google.com (mail-lb0-f172.google.com [209.85.217.172]) by ietfa.amsl.com (Postfix) with ESMTP id DCDC721F8481 for <ipsec@ietf.org>; Sat, 24 Nov 2012 09:21:10 -0800 (PST)
Received: by mail-lb0-f172.google.com with SMTP id y2so8272223lbk.31 for <ipsec@ietf.org>; Sat, 24 Nov 2012 09:21:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=jviClVHPfXqSxBfVTuIhklm8BwLGOSMYllVXlk52U6Y=; b=cflYJHAOz6u54iT4vnRVh27B9rgXuRicKhBN0ECQzXHb8RNjVAgpByDix+vn7Ouy/T ZYt0GcBnhYXpH0tGyWkIfm39wCFS42qN+7u0vGMLs86uvsKK+kLlTr4+uyfiNHridndG HbsSLZQmJP7f6FguSPJKAuZXgetRM7pwcL0xAH4RYSHlw8c5eoKIApw1Qvp7XvTClofT +GqrzWPCJ5yLhMrRw9P9gF3cXUANEl+ntc3HpVyVDX3Kr9lIJOD+A+mx0aXSsECQsu4k 0hdvYIRmo0IoQf2970YEnI7WEFqbtIVKuZixvEWxrIfeJUg+gX2ymw2vCP8/v+i1Gnhi IICQ==
MIME-Version: 1.0
Received: by 10.112.26.67 with SMTP id j3mr3198714lbg.39.1353777669826; Sat, 24 Nov 2012 09:21:09 -0800 (PST)
Received: by 10.114.75.110 with HTTP; Sat, 24 Nov 2012 09:21:09 -0800 (PST)
In-Reply-To: <CAOyVPHR4OVNuvMU-UxZAJUoKFugCWwUQq0dSRo-7gY=Y886LoQ@mail.gmail.com>
References: <50A5703F.4070305@labn.net> <CAOyVPHTWhv8=sP6kYkZmOEsjMsdr72P8fe=7w5XY0Hd_wP_9=w@mail.gmail.com> <50A58CDB.30402@labn.net> <CAOyVPHQ+n83DaVv6Q9Z0kvi0MyYrhPbB=L6ju4fwjTyRK1P22Q@mail.gmail.com> <50A682F8.9080907@labn.net> <CAOyVPHSvWhgaYm2s_8_37VuaR1e_5tiJai+04AKzm3HXkNwESg@mail.gmail.com> <50A689A9.1090803@labn.net> <CAOyVPHR1euA9TRnAp7V+OKjRkPARYYvQ+C0HnA70y-122sy9ZQ@mail.gmail.com> <50A68D30.2040203@labn.net> <CAOyVPHR4OVNuvMU-UxZAJUoKFugCWwUQq0dSRo-7gY=Y886LoQ@mail.gmail.com>
Date: Sat, 24 Nov 2012 09:21:09 -0800
Message-ID: <CAOyVPHRopwvE5U3ZF7kDxNe59OgTk7ydoFG6iqvZdOFUCvaGyA@mail.gmail.com>
From: Vishwas Manral <vishwas.ietf@gmail.com>
To: Lou Berger <lberger@labn.net>
Content-Type: multipart/alternative; boundary="bcaec55556781d692b04cf40edb4"
Cc: IPsecme WG <ipsec@ietf.org>
Subject: Re: [IPsec] Some comments / questions on draft-ietf-ipsecme-ad-vpn-problem
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Nov 2012 17:21:14 -0000
Hi WG-participants, As its been a week and I have not heard any objections, I will update this requirement and post the draft across. Thanks, Vishwas On Fri, Nov 16, 2012 at 11:10 AM, Vishwas Manral <vishwas.ietf@gmail.com>wrote: > Thanks Lou, > > Let me heard back from the WG on this, if they have any opinion. If not we > can go ahead with your suggestion. > > -Vishwas > > > On Fri, Nov 16, 2012 at 11:00 AM, Lou Berger <lberger@labn.net> wrote: > >> Vishwas, >> >> On 11/16/2012 1:48 PM, Vishwas Manral wrote: >> > Hi Lou, >> > >> > Got it. Can you suggest some text for this? I will try to incorporate >> > the same into the document. >> >> Assuming you don't like my prior attempt: >> X. The solution SHOULD support BGP/MPLS IP VPNs, see [RFC4364]. >> >> How about something like: >> X. The solution MUST support Provider Edge (PE) based VPNs. >> >> Note that this phrasing doesn't indicate a specific solutions which is >> why I now suggest "MUST" vs "SHOULD". >> >> Lou >> >> > >> > Thanks, >> > Vishwas >> > >> > On Fri, Nov 16, 2012 at 10:44 AM, Lou Berger <lberger@labn.net >> > <mailto:lberger@labn.net>> wrote: >> > >> > Vishwas, >> > Sure, but it's the BGP information that indicates what IPsec >> > tunnels >> > are needed / when the SAs get established... >> > >> > Again, I just asking for language that points to this use case, not >> > implementation details. >> > >> > Thanks, >> > Lou >> > >> > On 11/16/2012 1:34 PM, Vishwas Manral wrote: >> > > Hi Lou, >> > > >> > >> I'm not sure I agree with this statement. Let's say you have >> > >> a BGP VPN that uses IPsec tunnels between the PEs (which >> > >> was described in a couple of expired drafts and can be supported >> > >> using RFC5566), and then wants to be able to use dynamic PE >> > >> to PE IPsec tunnels. Does this fit your "2 different layer" >> > >> perspective? >> > > IPsec with ADVPN secures the tunnel and creates the mesh underlay >> on >> > > need basis/ or automatically. L3VPN creates the overlay, >> > identifies the >> > > tenant/ customer a packet belongs to and passes the packet on. >> > > >> > > Where do we see the need for tighter integration here? Is it >> allowing >> > > the ability to create groups of ADVPN instances? >> > > >> > > Thanks, >> > > Vishwas >> > > >> > > On Fri, Nov 16, 2012 at 10:16 AM, Lou Berger <lberger@labn.net >> > <mailto:lberger@labn.net> >> > > <mailto:lberger@labn.net <mailto:lberger@labn.net>>> wrote: >> > > >> > > Vishwas, >> > > >> > > Please see below. >> > > >> > > On 11/16/2012 12:49 PM, Vishwas Manral wrote: >> > > > Hi Lou, >> > > > >> > > > Thanks for the quick reply. Just a few comments prefixed >> > with a "VM>": >> > > > >> > > > > >> > > > > We can add something in the lines of additional >> protocols >> > > are run over >> > > > > the IPsec tunnels and the solution should make an >> > effort to >> > > allow for >> > > > > additional protocols like OSPF to be run optimally >> without >> > > too many >> > > > > changes in configuration. >> > > > > >> > > > > Infact we have a requirement to the effect in section >> 4.1 >> > > > >> > > > yes, this is what I referred to as 4.2 below, and >> > suggested some >> > > > replacement text... >> > > > >> > > > OK got it. >> > > > >> > > > > >> > > > > Gateways MUST allow tunnel binding, such that >> > > applications like >> > > > > Routing using the tunnels can work seamlessly >> > without any >> > > > updates to >> > > > > the higher level application configuration i.e. >> OSPF >> > > > configuration. >> > > > > >> > > > > - In section 4.2, how about: >> > > > > (replacement text) >> > > > > 3. Gateways MUST allow for the operation of >> > > tunneling and >> > > > > routing protocols operating over spoke-to-spoke >> > IPsec >> > > Tunnels >> > > > > with minimal, or no, configuration impact. >> > > > >> > > > VM> Ok will specifically specify tunnels and routing >> protocols. >> > > > >> > > >> > > Great. >> > > >> > > > >> > > > > >> > > > > >> > > > > X. The solution SHOULD support BGP/MPLS IP >> > VPNs, see >> > > > [RFC4364]. >> > > > > >> > > > > If you want, you can make the "SHOULD" a "MUST", >> and >> > > "support" >> > > > could be >> > > > > "be compatible with". >> > > > > >> > > > > I do not want to go ahead into details of what other >> > routing >> > > solutions >> > > > > it should support. >> > > > > >> > > > > With that said I am not sure what you mean by having >> BGP >> > > MPLS VPN >> > > > in an >> > > > > ADVPN scenario. BGP MPLS VPN is a provider >> provisioned VPN >> > > solution, >> > > > > this is a customer provisioned one. >> > > > >> > > > Ahh, interesting point. When I read the document I was >> > > looking to see >> > > > if it was scoped purely to CE/customer based solutions. >> > > Reading section >> > > > 2 (intro) and 2.2, I saw no such restriction. So I >> think >> > > section 2.2 >> > > > should be explicit on this point either way. Which is >> why I >> > > proposed the >> > > > text "There is also the case when L3VPNs operate over >> IPsec >> > > Tunnels." >> > > > (To explicitly include this case.) If the WG wants this >> > case >> > > excluded, >> > > > that's fine too. >> > > > >> > > > VM> It is not scoped purely as a CE device scenario, and >> > after seeing >> > > > your comment I see no reason to leave that out of scope >> > (though if I >> > > > understand your concern better I may feel otherwise). L3VPN >> > can work >> > > > over GRE tunnels/ L2TP tunnels, which can themselves use >> IPsec. >> > > Again in >> > > > my view the L3VPN and the IPsec VPN are 2 different layers >> > in the >> > > stack >> > > > if they run on the same device. >> > > >> > > I'm not sure I agree with this statement. Let's say you have >> > a BGP VPN >> > > that uses IPsec tunnels between the PEs (which was described >> > in a couple >> > > of expired drafts and can be supported using RFC5566), and >> > then wants to >> > > be able to use dynamic PE to PE IPsec tunnels. Does this fit >> > your "2 >> > > different layer" perspective? >> > > >> > > Either way, I think such usage should be explicitly in scope >> > as it is a >> > > very different model / use case from CE-based IPsec VPNs. >> > > >> > > > Do you see a reason to explicitly >> > > > mention L3VPN in this case? >> > > >> > > I'm open to different ways to cover the above. >> > > >> > > Much thanks, >> > > Lou >> > > > >> > > > Thanks, >> > > > Vishwas >> > > > >> > > > >> > > > >> > > > > I see the 2 working in different >> > > > > layers, and interacting only in edge gateways where >> both >> > > solutions >> > > > have >> > > > > an edge. >> > > > >> > > > Sure, but the problem exists for both. >> > > > >> > > > Thanks, >> > > > Lou >> > > > > >> > > > > >> > > > > I also have a few more minor comments: >> > > > > >> > > > > I am ok with the minor suggestions you have. >> > > > > >> > > > > Thanks, >> > > > > Vishwas >> > > > > >> > > > > >> > > > > >> > > > > - In section 2.1, you introduce the term "NAT >> > gateway" and >> > > > then later >> > > > > use just "gateway" when I suspect you mean "NAT >> > gateway". I >> > > > suggest >> > > > > using the term "NAT" and thereby not introduce >> > possible >> > > confusion >> > > > > between the gateway term defined in section 1.1 >> > and "NAT >> > > > gateways". >> > > > > >> > > > > - In section 2.2, s/occupies/requires >> > > > > >> > > > > - In sections 2.2, and Section 3.2 you say dynamic >> > > addresses makes >> > > > > static configuration impossible. This doesn't >> reflect >> > > the use of >> > > > > dynamic dns to handle this issues (and is >> currently >> > > supported >> > > > by some >> > > > > vendors.) >> > > > > >> > > > > Let me know what you think, >> > > > > Lou >> > > > > _______________________________________________ >> > > > > IPsec mailing list >> > > > > IPsec@ietf.org <mailto:IPsec@ietf.org> >> > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org>> >> > > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org> >> > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org>>> >> > > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org> >> > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org>> >> > > > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org> >> > <mailto:IPsec@ietf.org <mailto:IPsec@ietf.org>>>> >> > > > > https://www.ietf.org/mailman/listinfo/ipsec >> > > > > >> > > > > >> > > > > >> > > > >> > > > >> > > >> > > >> > >> > >> > >
- [IPsec] Some comments / questions on draft-ietf-i… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger