Re: [IPsec] Some comments / questions on draft-ietf-ipsecme-ad-vpn-problem
Lou Berger <lberger@labn.net> Fri, 16 November 2012 00:46 UTC
Return-Path: <lberger@labn.net>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F3A051F0C6A for <ipsec@ietfa.amsl.com>; Thu, 15 Nov 2012 16:46:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.051
X-Spam-Level:
X-Spam-Status: No, score=-101.051 tagged_above=-999 required=5 tests=[AWL=0.614, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, J_CHICKENPOX_14=0.6, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ENkfs1InfTZF for <ipsec@ietfa.amsl.com>; Thu, 15 Nov 2012 16:46:43 -0800 (PST)
Received: from oproxy8-pub.bluehost.com (oproxy8-pub.bluehost.com [69.89.22.20]) by ietfa.amsl.com (Postfix) with SMTP id 54FE91F041A for <ipsec@ietf.org>; Thu, 15 Nov 2012 16:46:42 -0800 (PST)
Received: (qmail 13182 invoked by uid 0); 16 Nov 2012 00:46:20 -0000
Received: from unknown (HELO box313.bluehost.com) (69.89.31.113) by oproxy8.bluehost.com with SMTP; 16 Nov 2012 00:46:20 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=labn.net; s=default; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=J+N2NA/l+oASQsz5n9mSg9HURUy7/FZIO5cH/m0KVLc=; b=swNxGkLKso158GwWS6Cj7Us20pujfEIzs8gkBwpIXIMg01/gQ4e3LYlRxFGokSREeO+cVfECmBoGMDZkKxs7D30zN/Xk4awqGM2D9Nil+6E+NV95yj56/p5sZn+V7R3d;
Received: from box313.bluehost.com ([69.89.31.113]:50159 helo=[127.0.0.1]) by box313.bluehost.com with esmtpa (Exim 4.76) (envelope-from <lberger@labn.net>) id 1TZA4a-00010Z-Bi; Thu, 15 Nov 2012 17:46:20 -0700
Message-ID: <50A58CDB.30402@labn.net>
Date: Thu, 15 Nov 2012 19:46:19 -0500
From: Lou Berger <lberger@labn.net>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20121026 Thunderbird/16.0.2
MIME-Version: 1.0
To: Vishwas Manral <vishwas.ietf@gmail.com>
References: <50A5703F.4070305@labn.net> <CAOyVPHTWhv8=sP6kYkZmOEsjMsdr72P8fe=7w5XY0Hd_wP_9=w@mail.gmail.com>
In-Reply-To: <CAOyVPHTWhv8=sP6kYkZmOEsjMsdr72P8fe=7w5XY0Hd_wP_9=w@mail.gmail.com>
X-Enigmail-Version: 1.4.5
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-Identified-User: {1038:box313.bluehost.com:labnmobi:labn.net} {sentby:smtp auth 69.89.31.113 authed with lberger@labn.net}
Cc: ipsec@ietf.org
Subject: Re: [IPsec] Some comments / questions on draft-ietf-ipsecme-ad-vpn-problem
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Nov 2012 00:46:44 -0000
Vishwas, Thanks for the quick response. Please see below. On 11/15/2012 7:14 PM, Vishwas Manral wrote: > Hi Lou, > > Thanks a lot for your detailed comments. I have just started to change > the document today, based on feedback I got on the list, so your > comments come at a good time. My answers are inline: > > In section 1.1, you define the term gateway. I'm assuming that you are > using the term in the normal IPsec context, and that it includes IPsec > enabled routers. Is this correct? If not, the text should make this > clear, and you can ignore the rest of my mail! > > Yes, the idea is an IPsec gateway will have Routing functionality too. > Now whether its a tunnel gateway with routing embedded or the otehr way > around is debatable. I also agree Routing is a big part of the > functionality to be optimized, though I would consider it a different > sub-part of the solution. > > > Assuming such routers are within scope, there are some complicating > issues with IPsec enabled routers that I think should be called out. I > don't think much text is needed to cover this case. I'm not sure the > best way to address these, but I have some suggestions to get the > conversation started (and yes, I expect that you'll edit the text): > > - In section 2.2, I think mentioning something about the routing > implications is worthwhile. How about at the end of the section adding > something along the lines of : > > Additionally, the routing implications of gateway-to-gateway > communication must be addressed. In the simple case, > selectors provide sufficient information for a gateway to > forward traffic appropriately. In other cases, additional > tunneling (e.g., GRE) and routing (e.g., OSPF) protocols are > run over IPsec tunnels, and the configuration impact on those > protocols must be considered. There is also the case when > L3VPNs operate over IPsec Tunnels. > > We can add something in the lines of additional protocols are run over > the IPsec tunnels and the solution should make an effort to allow for > additional protocols like OSPF to be run optimally without too many > changes in configuration. > > Infact we have a requirement to the effect in section 4.1 yes, this is what I referred to as 4.2 below, and suggested some replacement text... > > Gateways MUST allow tunnel binding, such that applications like > Routing using the tunnels can work seamlessly without any updates to > the higher level application configuration i.e. OSPF configuration. > > > > > > - In section 4.2, how about: > (replacement text) > 3. Gateways MUST allow for the operation of tunneling and > routing protocols operating over spoke-to-spoke IPsec Tunnels > with minimal, or no, configuration impact. > > and (new text) > > I cannot find Section 4.2 in the document > http://tools.ietf.org/html/draft-ietf-ipsecme-ad-vpn-problem-00 is there > more context you can provide for the same. 4.2 = 4.1 > > > X. The solution SHOULD support BGP/MPLS IP VPNs, see [RFC4364]. > > If you want, you can make the "SHOULD" a "MUST", and "support" could be > "be compatible with". > > I do not want to go ahead into details of what other routing solutions > it should support. > > With that said I am not sure what you mean by having BGP MPLS VPN in an > ADVPN scenario. BGP MPLS VPN is a provider provisioned VPN solution, > this is a customer provisioned one. Ahh, interesting point. When I read the document I was looking to see if it was scoped purely to CE/customer based solutions. Reading section 2 (intro) and 2.2, I saw no such restriction. So I think section 2.2 should be explicit on this point either way. Which is why I proposed the text "There is also the case when L3VPNs operate over IPsec Tunnels." (To explicitly include this case.) If the WG wants this case excluded, that's fine too. > I see the 2 working in different > layers, and interacting only in edge gateways where both solutions have > an edge. Sure, but the problem exists for both. Thanks, Lou > > > I also have a few more minor comments: > > I am ok with the minor suggestions you have. > > Thanks, > Vishwas > > > > - In section 2.1, you introduce the term "NAT gateway" and then later > use just "gateway" when I suspect you mean "NAT gateway". I suggest > using the term "NAT" and thereby not introduce possible confusion > between the gateway term defined in section 1.1 and "NAT gateways". > > - In section 2.2, s/occupies/requires > > - In sections 2.2, and Section 3.2 you say dynamic addresses makes > static configuration impossible. This doesn't reflect the use of > dynamic dns to handle this issues (and is currently supported by some > vendors.) > > Let me know what you think, > Lou > _______________________________________________ > IPsec mailing list > IPsec@ietf.org <mailto:IPsec@ietf.org> > https://www.ietf.org/mailman/listinfo/ipsec > > >
- [IPsec] Some comments / questions on draft-ietf-i… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger
- Re: [IPsec] Some comments / questions on draft-ie… Vishwas Manral
- Re: [IPsec] Some comments / questions on draft-ie… Lou Berger